mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
list new tutorials scheduled
This commit is contained in:
parent
ed82a57fc1
commit
9b0b0c96fd
50 changed files with 780 additions and 147 deletions
|
@ -38,7 +38,7 @@
|
|||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<a href="../index.html">Previous Page</a></br></br><h1>OPSEC: Privacy, Anonymity and Deniability</h1>
|
||||
<a href="../index.html">Previous Page</a></br></br><h1>Operational Security: Privacy, Anonymity and Deniability</h1>
|
||||
<p> Tutorials to show how to achieve Privacy, Anonymity and Deniability online.
|
||||
I have <a href="tutorial/index.html">a quality standard</a> as to how i do these tutorials, if there are any improvements i can do on them please let me know.</p>
|
||||
|
||||
|
@ -67,15 +67,17 @@
|
|||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<div class="container">
|
||||
<h2><b>OPSEC Introduction </b> </h2>
|
||||
|
||||
<p>📝 Explaining Concepts</p></br>
|
||||
<p>📝 Explaining Concepts</p>
|
||||
<ol>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li>
|
||||
<li><a href="manifesto/index.html">✅ a Nihilist's Manifesto</a></li>
|
||||
<li><a href="aps/index.html">✅ Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
|
||||
<li><a href="governments/index.html">✅ Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li>
|
||||
<li><a href="govfear/index.html">✅ Governments fear Decentralisation and Anonymity</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/242">❌ What is my Attack surface ?</a></li>
|
||||
</ol>
|
||||
|
||||
|
||||
|
@ -85,7 +87,8 @@
|
|||
<li><a href="internetsegmentation/index.html">✅ Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
|
||||
<li><a href="opsec/index.html">✅ OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
|
||||
<li><a href="multiple_identities/index.html">✅ How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/241">❌ 10 Things you must do if you are pro-freedom</a></li>
|
||||
|
||||
</ol></br>
|
||||
|
||||
|
@ -108,8 +111,8 @@
|
|||
<li><a href="closedsource/index.html">✅ Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li>
|
||||
<li><a href="openhardware/index.html">✅ The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li>
|
||||
<li><a href="serversideencryption/index.html">✅ Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li>
|
||||
</ol>
|
||||
<p>💻 Getting started</p>
|
||||
<ol>
|
||||
|
@ -127,7 +130,7 @@
|
|||
</ol></br>
|
||||
<p>💻 Maintaining Privacy</p>
|
||||
<ol>
|
||||
<li><a href="linuxprograms/index.html">✅ How to install and update programs on Linux </a><img src="logos/linux.png" class="logo"></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/240">❌ How to use Linux - The essentials </a><img src="logos/linux.png" class="logo"></li>
|
||||
<li><a href="compilation/index.html">✅ How to compile open source software + How to verify software integrity </a><img src="logos/tr0.png" class="logo"></li>
|
||||
<li><a href="hypervisorsetup/index.html">✅ How to Virtualize Machines (QEMU/KVM Hypervisor)</a><img src="logos/kvm.png" class="logo"></li>
|
||||
<li><a href="passwordmanagement/index.html">✅ Password Management 101 (How to use Keepass)</a><img src="logos/keepass.png" class="logo"></li>
|
||||
|
@ -138,7 +141,7 @@
|
|||
<ol>
|
||||
<li><a href="vpn/index.html">✅ How to get privacy from your ISP using a VPN inside a VM</a><img src="logos/mullvad.png" class="logo"><img src="logos/kvm.png" class="logo"></li>
|
||||
<li><a href="vpnqemu/index.html">✅ How to Route VMs traffic through a VPN on the Host OS</a><img src="logos/mullvad.png" class="logo"></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/183">❌ How to route your entire network through a VPN on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/183">❌ How to route your entire network through a VPN on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/184">❌ How to route your entire network through XRay on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/v2ray.png" class="logo"></li>
|
||||
|
||||
|
||||
|
@ -175,7 +178,7 @@
|
|||
<li><a href="anonymityexplained/index.html">✅ What is Anonymity ? Why is it Important ? </a><img src="logos/on0.png" class="logo"></li>
|
||||
<li><a href="anonuse/index.html">✅ Why isn't Privacy enough for Anonymous use ? </a><img src="logos/su0.png" class="logo"><img src="logos/on2.png" class="logo"></li>
|
||||
<li><a href="phonenumbers/index.html">✅ Phone Numbers are incompatible with Anonymity</a><img src="logos/on2.png" class="logo"><img src="logos/sim.png" class="logo"></li>
|
||||
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237">❌ Why is metadata detrimental to Anonymity ?</a></li>
|
||||
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237">❌ Why is metadata detrimental to Anonymity ?</a></li>
|
||||
|
||||
<li><a href="torvsvpns/index.html">✅ The main source of Anonymity: The Tor Network</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
|
||||
<li><a href="torthroughvpn/index.html">✅ How to use Tor Safely: (Tor + VPN combinations)</a><img src="logos/su0.png" class="logo"><img src="logos/mullvad.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
|
||||
|
@ -378,7 +381,7 @@
|
|||
|
||||
|
||||
|
||||
<div id="anon1">
|
||||
<!-- <div id="anon1">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
|
@ -386,15 +389,15 @@
|
|||
<img src="OPSEC.drawio.png" class="imgRz100">
|
||||
</div></br></br>
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
</div><!-- /white -->
|
||||
</div>
|
||||
</div>
|
||||
</div>-->
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<div id="anon2">
|
||||
<div id="anon1">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue