rss feed + updated links

This commit is contained in:
nihilist 2024-12-10 08:22:17 +01:00
parent 9ec5a23b74
commit af4dcb641f
10 changed files with 958 additions and 3 deletions

View file

@ -81,7 +81,7 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Initial Setup </b></h2>
<p>First you're going to need a Libvirtd QEMU hypervisor on your home server, check <a href="../antiforensics/index.html">this</a> tutorial to know how to set it up.</p>
<p>First you're going to need a Libvirtd QEMU hypervisor on your home server, check <a href="../hypervisorsetup/index.html">this</a> tutorial to know how to set it up.</p>
<p>So here we create the pfsense VM as shown in <a href="../pf_virt/index.html">this</a> tutorial, and we make sure to adjust it to have the following network configuration:</p>
<p>So for the main network interface we setup the network interface as a direct attachment to the host network interface enp8s0 (as a macvtap device in virt-manager):</p>
<img src="2.png" class="imgRz">

View file

@ -248,6 +248,7 @@
<li><a href="hiddenservice/index.html">✅ Where to host Anonymous Hidden Services ?</a><img src="logos/Tor.png" class="logo"></li>
<li><a href="anonymousremoteserver/index.html">✅ How to rent remote servers anonymously (Cloud resellers) ⭐</a><img src="logos/Tor.png" class="logo"><img src="logos/kycnotme.webp" class="logo"><img src="logos/vps.png" class="logo"></li>
<li><a href="torwebsite/index.html">✅ Hidden Service with custom .onion Vanity V3 address</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/179">❌ How to Verify one's Identity while maintaining Anonymity using PGP canaries ?</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="gitea-anon/index.html">✅ Gitea .onion Setup (Anonymous Code Repositories and Collaboration)</a><img src="logos/gitea.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/47">❌ How to setup Nerostr (Nostr blogging)</a><img src="logos/nostr.png" class="logo"><img src="logos/Tor.png" class="logo"><img src="logos/monero.png" class="logo"></li>
</br>

View file

@ -100,7 +100,7 @@ regarding wear leveling:
</pre></code>
<p>Look at <a href="../veracrypt/index.html">this tutorial</a> on how to create a veracrypt hidden partition, now create a volume that can contain a debian VM inside the hidden partition (ex: outer volume 140G, and inner/hidden volume 70G). Also follow <a href="../antiforensics/index.html">this tutorial</a> to know how to setup a QEMU hypervisor to virtualize VMs on linux. Now in the hidden partition we will create the debian QEMU VM (whose disk is 50Gb) as follows (keep in mind that we will also need to copy it into the decoy partition without overwriting the hidden partition, so make sure you can fit the same VM there aswell when you are creating the veracrypt volume!):</p>
<p>Look at <a href="../veracrypt/index.html">this tutorial</a> on how to create a veracrypt hidden partition, now create a volume that can contain a debian VM inside the hidden partition (ex: outer volume 140G, and inner/hidden volume 70G). Also follow <a href="../hypervisorsetup/index.html">this tutorial</a> to know how to setup a QEMU hypervisor to virtualize VMs on linux. Now in the hidden partition we will create the debian QEMU VM (whose disk is 50Gb) as follows (keep in mind that we will also need to copy it into the decoy partition without overwriting the hidden partition, so make sure you can fit the same VM there aswell when you are creating the veracrypt volume!):</p>
<img src="2.png" class="imgRz">
<img src="3.png" class="imgRz">

View file

@ -88,7 +88,7 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Initial Setup </b></h2>
<p>Make sure that you have setup the QEMU / virt-viewer setup we described in <a href="../antiforensics/index.html">this</a> earlier tutorial</p>
<p>Make sure that you have setup the QEMU / virt-viewer setup we described in <a href="../hypervisorsetup/index.html">this</a> earlier tutorial</p>
<p>Then install download the whonix VMS as follows:</p>
<p>First go <a href="https://www.whonix.org/wiki/KVM">here</a> to download whonix for qemu, </p>
<img src="1.png" class="imgRz">

5
rss/README.TXT Normal file
View file

@ -0,0 +1,5 @@
do ./rss-roller.sh --manual
complete each requested question with the appropriate text (the title of the new blogpost, the URL, a quick description, and a unique ID (which i intentionally make to be today's date))
and then it will automatically append what you need to feed.xml

792
rss/feed.xml Normal file
View file

@ -0,0 +1,792 @@
<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0' xmlns:atom='http://www.w3.org/2005/Atom'>
<!-- Made using rss-roller https://github.com/maxhebditch/rss-roller -->
<channel>
<title>Nihilism Network Blog</title>
<link>https://blog.nihilism.network</link>
<description>Nihilist`s Technical Blog</description>
<atom:link href='https://blog.nihilism.network/rss/feed.xml' rel='self' type='application/rss+xml' />
<item>
<title>Stylography protection (Running a Local LLM and copy pasting messages)</title>
<link>https://blog.nowhere.moe/stylometry/index.html</link>
<guid isPermaLink='false'>2024120400</guid>
<description>In this tutorial we're going to take a look at how you can run a LLM Locally to rewrite your messages to prevent sylometry fingerprinting (in order to make sure you're not being deanonymized from the way you're typing)</description>
</item>
<item>
<title>Why is the Darknet superior to Clearnet ?</title>
<link>https://blog.nowhere.moe/opsec/clearnetvsdarknet/index.html</link>
<guid isPermaLink='false'>2024120200</guid>
<description>In this tutorial we're going to explain why you should host your services on the Darknet rather than the Clearnet.</description>
</item>
<item>
<title>Easy Private Chats - SimpleX</title>
<link>https://blog.nowhere.moe//opsec/privatesimplex/index.html</link>
<guid isPermaLink='false'>2024120100</guid>
<description>In this article we'll compare a few options (Telegram, Signal and SimpleX) to see how their technical details stack up and determine which is best for easy private chats.</description>
</item>
<item>
<title>How to access Tor when you are in Russia or China using v2ray (vmess / vless)</title>
<link>https://blog.nowhere.moe/opsec/v2ray/index.html</link>
<guid isPermaLink='false'>2024112700</guid>
<description>In this tutorial we're going to cover how you can access Tor while being in a heavily-censored country like russia or china, by using the censorship-circumvention tool called v2ray.</description>
</item>
<item>
<title>Gitea .onion Setup (Anonymous Code Repositories and Collaboration)</title>
<link>https://blog.nowhere.moe/opsec/gitea-anon/index.html</link>
<guid isPermaLink='false'>2024112302</guid>
<description>In this tutorial we're going to take a look at how you can setup an anonymous gitea instance that is accessible over Tor, in order to be able to collaborate with people on projects, while maintaining everyone's anonymity.</description>
</item>
<item>
<title>One on One large file sharing (Syncthing over Tor)</title>
<link>https://blog.nowhere.moe/opsec/syncthinganon/index.html</link>
<guid isPermaLink='false'>2024112300</guid>
<description>In this tutorial we're going to dive into how to transfer large files anonymously, using whonix and Syncthing</description>
</item>
<item>
<title>Mental Energy: How are you good at spending it ?</title>
<link>https://blog.nowhere.moe/productivity/mentalenergy/index.html</link>
<guid isPermaLink='false'>2024111800</guid>
<description>In this tutorial we're going to explain the 3 ways you can spend your mental energy, just like money you can spend it gradually, spend it all in one go, or invest it to get a return over investment.</description>
</item>
<item>
<title>How to run the Blog Yourself</title>
<link>https://blog.nowhere.moe/opsec/runtheblog/index.html</link>
<guid isPermaLink='false'>2024111600</guid>
<description>In this tutorial we're going to see how you can host the nihilism blog yourself, since it has no copyright restrictions whatsoever.</description>
</item>
<item>
<title>How to Get a Credit Card Anonymously (Credit Cards as a Service)</title>
<link>https://blog.nowhere.moe/opsec/anoncreditcard/index.html</link>
<guid isPermaLink='false'>2024110800</guid>
<description>In this tutorial we're going to look at how to get a credit card anonymously online</description>
</item>
<item>
<title>Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)</title>
<link>https://blog.nowhere.moe/opsec/sensitivevm/index.html</link>
<guid isPermaLink='false'>2024110701</guid>
<description>In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop.</description>
</item>
<item>
<title>How to get and use residential proxies anonymously</title>
<link>https://blog.nowhere.moe/opsec/anonproxy/index.html</link>
<guid isPermaLink='false'>2024110700</guid>
<description>While Tor is a requirement to protect your anonymity online, some services refuse to be accessed anonymously, and are intentionally blocking connections coming from Tor exits nodes. A residential proxy will reroute your access through a residential ip address, which makes your connection look like it is coming from your ISP or your mobile carrier.</description>
</item>
<item>
<title>The main source of Plausible Deniability: Deniable Encryption</title>
<link>blog.nowhere.moe/opsec/veracrypt/index.html</link>
<guid isPermaLink='false'>2024110501</guid>
<description>In this tutorial we're going to explain why deniable encryption is important for sensitive use, and why we need to have the host OS in live mode to be able to use it.</description>
</item>
<item>
<title>Using the Host-OS in live-mode to prepare for long-term Sensitive Use</title>
<link>https://blog.nowhere.moe/opsec/livemode/index.html</link>
<guid isPermaLink='false'>2024110400</guid>
<description>The main usecase of using your Host OS in live mode, is that you want to use it for long term sensitive activities (meaning, you want to save sensitive files on a harddrive). As you're going to see, using the Host OS in live mode is effectively a hard requirement for deniability.</description>
</item>
<item>
<title>Tails OS QEMU VM for Temporary Sensitive Use</title>
<link>https://blog.nowhere.moe/opsec/tailsqemuvm/index.html</link>
<guid isPermaLink='false'>2024110300</guid>
<description>In this tutorial we're going to see why Tails OS is suitable for Short Term Sensitive Use due to it's default live-mode feature, where upon shutting down the OS, every forensic trace of what you were doing is completely erased from memory, where the entire OS is loaded into.</description>
</item>
<item>
<title>One-on-One Large File Sharing (Syncthing over VPN)</title>
<link>https://blog.nowhere.moe/opsec/syncthingvpn/index.html</link>
<guid isPermaLink='false'>2024110202</guid>
<description>In this tutorial we're going to showcase how you can send large files privately to someone else by using Syncthing.</description>
</item>
<item>
<title>How to Anonymously access websites that block Tor</title>
<link>https://blog.nowhere.moe/opsec/whentorisblocked/index.html</link>
<guid isPermaLink='false'>2024110200</guid>
<description>In this tutorial we're going to cover how we can circumvent a website's attempts at blocking Tor traffic, by using a VPN. As we discussed previously, this is relating to the serverside context required to know if we should combine the use of Tor with the use of a VPN.</description>
</item>
<item>
<title>Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)</title>
<link>https://blog.nowhere.moe/opsec/sensitivevm/index.html</link>
<guid isPermaLink='false'>2024110100</guid>
<description>In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop.</description>
</item>
<item>
<title>Reflecting: Brainstorming Ideas while on the run</title>
<link>https://blog.nowhere.moe/productivity/reflecting/index.html</link>
<guid isPermaLink='false'>2024102702</guid>
<description>In this tutorial we're going to cover what to do when you get a simple or complex idea when you are not at home, and how you can quickly grab a hold of that idea before you forget about it</description>
</item>
<item>
<title>Productivity - Diet to favor cerebral activity</title>
<link>https://blog.nowhere.moe/productivity/index.html</link>
<guid isPermaLink='false'>2024102701</guid>
<description>In this tutorial we're going to cover what fuel you need to use for your body and brain to function at their best, what to avoid, and what food to prefer. we'll also go over on the frequency of meals you should have, and how to correctly assess what food is best for your body.</description>
</item>
<item>
<title>Reflecting: How to use graphs to help Brainstorming ideas (draw.io)</title>
<link>https://blog.nowhere.moe/productivity/graphs/index.html</link>
<guid isPermaLink='false'>2024102604</guid>
<description>In this tutorial we're going to see why graphs are important, and how to make them using drawio.</description>
</item>
<item>
<title>Zero Email Workflow (in Thunderbird)</title>
<link>https://blog.nowhere.moe/productivity/zeroemail/index.html</link>
<guid isPermaLink='false'>2024102602</guid>
<description>In this tutorial we're going to cover how you can organize your mailbox in such a way that only the important parts remain in your focus. We'll go over what labels to use, and how to set your priorities straight from both the inbox folder and the sent folder.</description>
</item>
<item>
<title>Pomodoro Focus times (Intentional pauses to prevent burnouts)</title>
<link>https://blog.nowhere.moe/productivity/pomodoro/index.html</link>
<guid isPermaLink='false'>2024102601</guid>
<description>In this tutorial we're going to go over why you need to take breaks, how often, how long, and what you can do during those breaks.</description>
</item>
<item>
<title>Workspace Preparation: Mental Energy Optimisation</title>
<link>https://blog.nowhere.moe/productivity/mentalopti/index.html</link>
<guid isPermaLink='false'>2024102500</guid>
<description>In this tutorial we're going to cover how you can remove all blockers from your ability to focus on your work. We'll go over IRL measures to take, and digital measures to take.</description>
</item>
<item>
<title>Productivity: The Morning Routine</title>
<link>https://blog.nowhere.moe/productivity/morningroutine/index.html</link>
<guid isPermaLink='false'>2024102301</guid>
<description>In this tutorial we're covering when and how i start the day, and why i do those things.</description>
</item>
<item>
<title>Collaborative Project Management (Kanban in Gitea)</title>
<link>https://blog.nowhere.moe/productivity/kanban/index.html</link>
<guid isPermaLink='false'>2024102203</guid>
<description>In this tutorial we're going to showcase how to create a git repository on gitea, and how to manage projects with a Kanban-style.</description>
</item>
<item>
<title>Micro Workflow: Todo Listing, Contextualizing, and Ordering Tasks</title>
<link>https://blog.nowhere.moe/productivity/microworkflow/index.html</link>
<guid isPermaLink='false'>2024102201</guid>
<description>In this tutorial we're going to look at how you can manage your workflow on the micro level, by listing the things you have to do, contextualizing them, and ordering each task.</description>
</item>
<item>
<title>Peer-to-Peer Large File Sharing (Torrents over VPN)</title>
<link>https://blog.nowhere.moe/opsec/p2ptorrents/index.html</link>
<guid isPermaLink='false'>2024102002</guid>
<description>In this article, we will explore how, after binding a VPN to their torrent clients, Sam the Seeder can privately share a large file with Larry the Leecher.</description>
</item>
<item>
<title>Macro Time Management: Prioriting Projects and Calendar Scheduling</title>
<link>https://blog.nowhere.moe/productivity/macrotime/index.html</link>
<guid isPermaLink='false'>2024102000</guid>
<description>In this tutorial we're going to cover how to schdule time for your work projects and your personal projects. We're going to cover how you can priorize your projects, and how you can schedule it from inside Thunderbird, and using nextcloud CalDAV.</description>
</item>
<item>
<title>How to Get an Email Account Anonymously (Emails as a Service)</title>
<link>https://blog.nowhere.moe/opsec/anonemail/index.html</link>
<guid isPermaLink='false'>2024101600</guid>
<description>In this article, we will explore how to sign up for email account anonymously. Specifically, we will explore a privacy-focused email provider, Proton Mail, and how to sign up using Tor without inputting any additional information whatsoever.</description>
</item>
<item>
<title>How to Receive Anonymous SMSes (Remote SMSes as a Service)</title>
<link>https://blog.nowhere.moe/opsec/anonsms/index.html</link>
<guid isPermaLink='false'>2024101400</guid>
<description>In this tutorial we're going to showcase how to recieve SMSes anonymously, using a remote SMS as a service that doesn't require any KYC to use.</description>
</item>
<item>
<title>Easy Anonymous Chats Using SimpleX</title>
<link>https://blog.nowhere.moe/opsec/anonsimplex/index.html</link>
<guid isPermaLink='false'>2024101302</guid>
<description>In this tutorial we're going to see how to setup a chat application for Anonymous use. This is especially important in a world where mass-surveillance is nearly-omnipresent. It has become the end users' responsibility to uphold their privacy and anonymity while communicating online.</description>
</item>
<item>
<title>Macro Workflow: Listing Topics that truly matter</title>
<link>https://blog.nowhere.moe/productivity/macroworkflow/index.html</link>
<guid isPermaLink='false'>2024101301</guid>
<description>In this tutorial we'll cover briefly how to choose topics based on the reason behind your actions, we'll go over some example topics, and how to label them to be able to easily order them.</description>
</item>
<item>
<title>The right thing to do: What is the reason behind your actions?</title>
<link>https://blog.nowhere.moe/productivity/rightthing/index.html</link>
<guid isPermaLink='false'>2024101200</guid>
<description>Introspection: What is it that truly matters to you? Acting out of self interest: Unfulfilling Immaturity, The right thing to do: The Fulfilling Maturity</description>
</item>
<item>
<title>Nihilism: Mantras to reset the Mind</title>
<link>https://blog.nowhere.moe/productivity/nihilism/index.html</link>
<guid isPermaLink='false'>2024101004</guid>
<description>In this tutorial we're going to cover the structure of your own mind, We're going to explain why it is not normal to follow the norm, and why Nihilism is vital for your own mental health.</description>
</item>
<item>
<title>How to Maintain Multiple Identities Online</title>
<link>https://blog.nowhere.moe/opsec/multiple_identities/index.html</link>
<guid isPermaLink='false'>2024101001</guid>
<description>In this tutorial, well guide you through setting up and managing multiple online identities to enhance your privacy and security. Well discuss why this is crucial, how to establish distinct personas, and the steps you need to keep them isolated from each other.</description>
</item>
<item>
<title>How to remain Anonymous during a protest</title>
<link>https://blog.nowhere.moe/opsec/anonprotest/index.html</link>
<guid isPermaLink='false'>2024101000</guid>
<description>In this tutorial we're going to cover what must be taken into account when it comes to using phones outdoors, how you can remain anonymous outdoors, and what it takes to have a phone for anonymous use.</description>
</item>
<item>
<title>How to contribute to The Nihilism Blog</title>
<link>https://blog.nowhere.moe/opsec/contribute/index.html</link>
<guid isPermaLink='false'>2024100602</guid>
<description>In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via gitea. We'll also look into how you can run the blog yourself since it's entirely public domain (Creative Commons Zero license).</description>
</item>
<item>
<title>How to setup a Haveno Seed Node</title>
<link>https://blog.nowhere.moe/opsec/haveno-seednode/index.html</link>
<guid isPermaLink='false'>2024100600</guid>
<description>In this tutorial we're going to take a look at how you can contribute to an existing Haveno Network, by running a Seed Node, in order to make the Haveno Network of your choice more resillient to potential takedowns.</description>
</item>
<item>
<title>How to send small files Anonymously (Onionshare)</title>
<link>https://blog.nowhere.moe/opsec/onionshare/index.html</link>
<guid isPermaLink='false'>2024093000</guid>
<description>OnionShare is a free and open-source cross-platform tool that utilises the TOR network to anonymously share files (send and receive), host an onion website and create a simple chat room.</description>
</item>
<item>
<title>Hiding files in images with steghide</title>
<link>https://blog.nowhere.moe/opsec/steghide/index.html</link>
<guid isPermaLink='false'>2024092800</guid>
<description>steghide is a mature GPL-licensed CLI tool for hiding arbitrary data inside of of image files (and some archaic audio formats). Its official web presence is located at https://steghide.sourceforge.net/. it conceals data inside a larger coverfile in a way that is indistinguishable to first-order statistical analysis. This means there is are anomalies in the file histogram, making most pictures innocuous without having the original image to compare it to.</description>
</item>
<item>
<title>Cold Exposure: Where Discipline takes over Comfort</title>
<link>https://blog.nowhere.moe/productivity/coldshowers/index.html</link>
<guid isPermaLink='false'>2024092600</guid>
<description>What the body and mind doesn't want, but actually needs. The perfect discipline practice.</description>
</item>
<item>
<title>Opus Nihil: Dissolving Compulsions</title>
<link>https://blog.nowhere.moe/productivity/opus-nihil/index.html</link>
<guid isPermaLink='false'>2024092601</guid>
<description>What is it that you truly need ? What is it that you truly want ? Dissolve those compulsions yourself.</description>
</item>
<item>
<title>New Tutorial Category : Productivity Introduction - Discipline over Comfort</title>
<link>https://blog.nowhere.moe/productivity/discipline/index.html</link>
<guid isPermaLink='false'>2024092500</guid>
<description>Making sure that your Body and Mind are not getting in the way of your work, and making sure that you are working as efficiently as possible.</description>
</item>
<item>
<title>XMPP Chat Server Setup (Clearnet + Onion + OMEMO E2EE)</title>
<link>https://blog.nowhere.moe/opsec/xmpp2024/index.html</link>
<guid isPermaLink='false'>2024092100</guid>
<description>In this tutorial, we're going to check out how to setup a XMPP chat server, that is accessible over Tor, as a hidden service, using Prosody. We'll also cover how to have a Clearnet XMPP server, and how to have OMEMO End to End encryption using the Gajim XMPP client.</description>
</item>
<item>
<title>Why can't I trust Centralised Exchanges, and random Monero nodes ?</title>
<link>https://blog.nowhere.moe/opsec/chainalysisattempts/index.html</link>
<guid isPermaLink='false'>2024090700</guid>
<description>As of September 5, 2024 the sech1 posted on monero.town the following post, which was a repost of the following reddit post talking about a leaked Chainalysis meeting video about what was their progress on tracing monero transactions back in August 2023. This is a great opportunity to highlight the opsec weaknesses they are targeting so let's dive into it.</description>
</item>
<item>
<title>How to rent remote domains anonymously (Registrar resellers) ⭐</title>
<link>https://blog.nowhere.moe/opsec/anondomain/index.html</link>
<guid isPermaLink='false'>2024090500</guid>
<description>Not many people know that it is possible to operate a clearnet website, anonymously. In this tutorial we're covering how you can rent a clearnet domain, anonymously.</description>
</item>
<item>
<title>Mine Monero with p2pool and xmrig</title>
<link>https://blog.nowhere.moe/opsec/monerop2pool/index.html</link>
<guid isPermaLink='false'>2024082500</guid>
<description>how to mine Monero using p2pool and xmrig.</description>
</item>
<item>
<title>How to use the Tor Browser on Mobile</title>
<link>https://blog.nowhere.moe/opsec/MobileTor/index.html</link>
<guid isPermaLink='false'>2024081901</guid>
<description>Sometimes you are not always in front of your computer but need to browse the web anonymously while being away from your home. In this tutorial we're going to cover how to browse the web anonymously while on your mobile device.</description>
</item>
<item>
<title>How to write good Tutorials</title>
<link>https://blog.nowhere.moe/opsec/tutorial/index.html</link>
<guid isPermaLink='false'>2024081900</guid>
<description>Because after all, how can you expect people to write good tutorials without being shown how to write them in the first place ?</description>
</item>
<item>
<title>Hiding files in videos (small or large files) with zuluCrypt</title>
<link>https://blog.nowhere.moe/servers/anonzulucrypt/index.html</link>
<guid isPermaLink='false'>2024081800</guid>
<description>Using Steganography to hide small or large files into Video files, using zulucrypt</description>
</item>
<item>
<title>New Matrix Chat (Opsec, Sysadmin, hacking, Programming)</title>
<link>https://matrix.to/#/#nowheremoe:nowhere.moe</link>
<guid isPermaLink='false'>2024081500</guid>
<description>As nowhere.moe and datura.network are being merged into nowhere.moe, feel free to join the new matrix chat</description>
</item>
<item>
<title>Why isnt Privacy enough for Anonymous Use?</title>
<link>https://blog.nowhere.moe/servers/anonuse/index.html</link>
<guid isPermaLink='false'>2024081400</guid>
<description>In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it.</description>
</item>
<item>
<title>New domain: Nowhere.moe</title>
<link>https://blog.nowhere.moe/nowhere.moe.txt.asc</link>
<guid isPermaLink='false'>2024081000</guid>
<description>Explaining how the ownership of the services will change</description>
</item>
<item>
<title>Route QEMU VMs through a Host OS VPN</title>
<link>https://blog.nowhere.moe/servers/vpnqemu/index.html</link>
<guid isPermaLink='false'>2024080900</guid>
<description>In this tutorial we're going to check how to have VMs use a Host OS VPN, which can be vital if your ISP doesn't allow Tor traffic</description>
</item>
<item>
<title>Where to host Anonymous Clearnet Services ?</title>
<link>https://blog.nowhere.moe/servers/anonclearnetservices/index.html</link>
<guid isPermaLink='false'>2024060801</guid>
<description>In this tutorial we're going explain how you can have anonymous clearnet services, which can either remotely or self-hosted.</description>
</item>
<item>
<title>Where to host Anonymous Hidden Services ?</title>
<link>https://blog.nowhere.moe/servers/hiddenservice/index.html</link>
<guid isPermaLink='false'>2024060800</guid>
<description>In this tutorial we're going to look at where you can host Hidden Services, while still remaining Anonymous, One way is to host the service remotely, and the other is to self-host it.</description>
</item>
<item>
<title>Introduction to Self-Hosting Hidden Services</title>
<link>https://blog.nowhere.moe/servers/hiddenservices/index.html</link>
<guid isPermaLink='false'>2024080300</guid>
<description>Clearnet Services: Centralized, but can be used anonymously, Tor Hidden Services: Decentralized and Anonymous, But Warning, do not host anything sensitive at Home!</description>
</item>
<item>
<title>Opening the Blog to contributions (earn XMR!)</title>
<link>https://git.datura.network/nihilist/blog-contributions</link>
<guid isPermaLink='false'>2024072500</guid>
<description>Long due, i'm now opening blog.nowhere.moe to contributions, i am offering monero (10-50euros per new complete blogpost), if you want to contribute a tutorial i didn't list yet, let me validate your idea beforehand.</description>
</item>
<item>
<title>Tor through VPN or VPN through Tor?</title>
<link>https://blog.nowhere.moe/servers/torthroughvpn/index.html</link>
<guid isPermaLink='false'>2024072400</guid>
<description>In this tutorial we're going to justify the 4 possible Tor / VPN combinations, based on both clienside and serverside contexts. We'll also discuss specific contexts where anonymity is too risky to attempt.</description>
</item>
<item>
<title>How to install GrapheneOS on a Pixel Phone</title>
<link>https://blog.nowhere.moe/servers/graphene/index.html</link>
<guid isPermaLink='false'>2024071001</guid>
<description>In this tutorial we're going to setup graphene OS, an open source android operating system for google pixel phones.</description>
</item>
<item>
<title>The lack of Open Source Hardware (CPUs, Motherboards, GPUs)</title>
<link>https://blog.nowhere.moe/servers/openhardware/index.html</link>
<guid isPermaLink='false'>2024071000</guid>
<description>In this article we'll look at why Open source Hardware is vital, the current status of the closed-source hardware monopoly on the market, and the current status of open source hardware on the market</description>
</item>
<item>
<title>The main source of Anonymity: The Tor Network</title>
<link>https://blog.nowhere.moe/servers/torvsvpns/index.html</link>
<guid isPermaLink='false'>2024063000</guid>
<description>In this tutorial we're going to explain why VPNs are not enough when it comes to maintaining Anonymity, and in what way Tor is the main source of Anonymity online.</description>
</item>
<item>
<title>What is Anonymity ? Why is it Important ?</title>
<link>https://blog.nowhere.moe/servers/anonymityexplained/index.html</link>
<guid isPermaLink='false'>2024062900</guid>
<description>In this tutorial we're going to explain what is Anonymity, What are the enemies of Anonymity, and why it is important, especially for international journalism.</description>
</item>
<item>
<title>How to compile open source software + How to verify software integrity</title>
<link>https://blog.nowhere.moe/servers/compilation/index.html</link>
<guid isPermaLink='false'>2024062803</guid>
<description>In this tutorial we're going to cover Why compile even compile software yourself, how to compile c++ programs, and How to verify software integrity</description>
</item>
<item>
<title>How to get privacy from your ISP using a VPN</title>
<link>https://blog.nowhere.moe/servers/vpn/index.html</link>
<guid isPermaLink='false'>2024062801</guid>
<description>In this tutorial we're going to cover Why does Bob need a VPN to begin with, how to purchase a VPN, How to download it, and how to verify that it is properly connected, from inside a debian VM, for private internet usage.</description>
</item>
<item>
<title>Linux Hypervisor Setup (QEMU/KVM virtualisation)</title>
<link>https://blog.nowhere.moe/servers/hypervisorsetup/index.html</link>
<guid isPermaLink='false'>2024062800</guid>
<description>In this tutorial we're going to cover how to setup the open source hypervisor QEMU/KVM in Linux host OS, using the libvirt technology.</description>
</item>
<item>
<title>How to install Linux from a Windows PC</title>
<link>https://blog.nowhere.moe/servers/linux/index.html</link>
<guid isPermaLink='false'>2024061601</guid>
<description>In this tutorial, we're going to look at the first and foremost thing anyone can do to remove surveillance from their digital lives, by installing a free and open source software (FOSS) host operating system: Linux, in this case we're going to setup the latest Debian.</description>
</item>
<item>
<title>What is Privacy ? Why is it Important ?</title>
<link>https://blog.nowhere.moe/servers/privacy/index.html</link>
<guid isPermaLink='false'>2024061600</guid>
<description>This is where the Journey begins. We're going to look at why you should bother with Privacy first of all, and what it is exactly.</description>
</item>
<item>
<title>Tails OS QEMU VM for Temporary Anonymity</title>
<link>https://blog.nowhere.moe/servers/tailsqemuvm/index.html</link>
<guid isPermaLink='false'>2024061400</guid>
<description>In this tutorial we're going to look at how you can run Tails OS (The Amnesic Incognito Linux System) in a QEMU VM, following the official documentation, along with how to setup persistant storage</description>
</item>
<item>
<title>Audit your OPSEC and determine the appropriate internet use</title>
<link>https://blog.nowhere.moe/servers/opsec4levels/index.html</link>
<guid isPermaLink='false'>2024060900</guid>
<description>In this tutorial we're going to explore how you can audit your own level of opsec, using the following 6 parameters:Complexity, Transparency, Surveillance, Centralisation, Onymity, and Deniability.</description>
</item>
<item>
<title>Governments fear Decentralisation and Anonymity</title>
<link>https://blog.nowhere.moe/servers/govfear/index.html</link>
<guid isPermaLink='false'>2024060701</guid>
<description>In this tutorial we're going to explain why Decentralisation and Anonymity are essential in reducing the power of the government over it's citizens.</description>
</item>
<item>
<title>Governments, Centralisation, and Law Enforcement</title>
<link>https://blog.nowhere.moe/servers/governments/index.html</link>
<guid isPermaLink='false'>2024060700</guid>
<description>In this tutorial we're going to cover and explain what are governments, and why they are trying to force us into mass surveillance and KYC procedures.</description>
</item>
<item>
<title>OPSEC: The right technology and behavior</title>
<link>https://blog.nowhere.moe/servers/opsec/index.html</link>
<guid isPermaLink='false'>2024060600</guid>
<description>Operational Security, is a process aimed at identifying if your actions can be observed by an adversary. In this context, how good your OPSEC is, determines the level of your privacy and anonymity.</description>
</item>
<item>
<title>Phone Numbers are incompatible with Privacy!</title>
<link>https://blog.nowhere.moe/servers/phonenumbers/index.html</link>
<guid isPermaLink='false'>2024052600</guid>
<description>Sim Cards: the Deanonymization Tool, You cannot have an anonymous Phone at home. If a service requires your phone number, it is against both your Privacy and Anonymity</description>
</item>
<item>
<title>My Manifesto</title>
<link>https://blog.nowhere.moe/servers/manifesto/index.html</link>
<guid isPermaLink='false'>2024052500</guid>
<description>Explaining why I have a blog in the first place</description>
</item>
<item>
<title>Haveno DEX Cash by Mail -> XMR transaction</title>
<link>https://blog.nowhere.moe/servers/haveno-cashbymail/index.html</link>
<guid isPermaLink='false'>2024052400</guid>
<description>In this tutorial we're going to cover how to buy Monero, for cash by mail on the Haveno Decentralised Exchange. This was the most popular payment method back on LocalMonero, due to being an improvement over bank transfers (like SEPA in the EU) when it comes to trading larger volumes in the long run, as Cash cannot easily be traced by adversaries unlike bank transfers, making Cash by Mail one of the most private ways to exchange real world money for Monero.</description>
</item>
<item>
<title>Haveno DEX SEPA Instant -> XMR transaction</title>
<link>https://blog.nowhere.moe/servers/haveno-sepa/index.html</link>
<guid isPermaLink='false'>2024052300</guid>
<description>In this tutorial we're going to cover an instant SEPA transfer (which is a bank transfer) transaction for monero, this is one of the most popular payment options in the EU region, a favorite of mine due to the speed of the transaction.</description>
</item>
<item>
<title>Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)</title>
<link>https://blog.nowhere.moe/servers/haveno-arbitrator/index.html</link>
<guid isPermaLink='false'>2024051900</guid>
<description>In this tutorial we're going to cover how the Haveno DEX handles trade disputes, which can happen as, after all it's decentralised, and anonymous by default. We'll cover What protects the Buyer or the Seller, what happens when you encounter a scammer, and how the arbitration resolution plays out.</description>
</item>
<item>
<title>Haveno Decentralised Exchange Face-to-Face Fiat to Monero Transaction</title>
<link>https://blog.nowhere.moe/servers/haveno-client-f2f/index.html</link>
<guid isPermaLink='false'>2024140500</guid>
<description>Setting up Haveno DEX locally, making it connect to a Tor bridge, creating a buying offer, transacting with a user directly, to exchange FIAT for Monero, and then withdrawing your funds from the Haveno Monero wallet.</description>
</item>
<item>
<title>Internet usage segmentation (QEMU VMs + Identity Management)</title>
<link>https://blog.nowhere.moe/servers/internetsegmentation/index.html</link>
<guid isPermaLink='false'>2024030500</guid>
<description>Different Internet Usage, Identity Management, Multiple Virtual Machines (VMs), Internet Usage Segmentation Recap</description>
</item>
<item>
<title>Acquiring remote servers and domains anonymously (non-KYC providers)</title>
<link>https://blog.nowhere.moe/servers/anonymousremoteserver/index.html</link>
<guid isPermaLink='false'>2024020501</guid>
<description>Finding out a non-KYC Cloud Provider and Email Provider, Purchasing the server anonymously (using Monero), and Accessing the server anonymously (SSH through Tor)</description>
</item>
<item>
<title>Clientside: Encryption is good, but you need Plausible Deniability</title>
<link>https://blog.nowhere.moe/servers/encryption/index.html</link>
<guid isPermaLink='false'>2024050100</guid>
<description>Encryption Provides Privacy, But what happens when Bob is forced to give out your password? Why is Plausible Deniability is Vital?</description>
</item>
<item>
<title>Tor through VPN or VPN through Tor?</title>
<link>https://blog.nowhere.moe/servers/torthroughvpn/index.html</link>
<guid isPermaLink='false'>202404301</guid>
<description>Accessing websites that block Tor and Hiding Tor usage from your ISP</description>
</item>
<item>
<title>Why can't I trust closed source software?</title>
<link>https://blog.nowhere.moe/servers/closedsource/index.html</link>
<guid isPermaLink='false'>20240430</guid>
<description>No, you still can't trust closed source software</description>
</item>
<item>
<title>Sensitive .onion Services: Self-Host or Host Remotely ?</title>
<link>https://blog.nowhere.moe/servers/sensitiveremotevshome/index.html</link>
<guid isPermaLink='false'>20240429</guid>
<description>Explaining what hosting sensitive services implies</description>
</item>
<item>
<title>Decentralized Finances</title>
<link>https://blog.nowhere.moe/servers/finances/index.html</link>
<guid isPermaLink='false'>1</guid>
<description>Centralised currencies, Decentralised Currencies, and Centralised Exchanges, privacy cryptos and decentralised exchanges</description>
</item>
</channel>
</rss>

6
rss/rss-roller.rc Normal file
View file

@ -0,0 +1,6 @@
title="Nihilism Network Blog"
link=https://blog.nihilism.network
description='Nihilist`s Technical Blog'
rsslink=https://blog.nihilism.network/rss/feed.xml
feedname=~/Nextcloud/blog/rss/feed.xml
postDir=

6
rss/rss-roller.rc.old Normal file
View file

@ -0,0 +1,6 @@
title="Nihilism Network Blog"
link=https://blog.nihilism.network
description='Nihilist`s Technical Blog'
rsslink=https://blog.nihilism.network/rss/feed.xml
feedname=/srv/blog/rss/feed.xml
postDir=

141
rss/rss-roller.sh Normal file
View file

@ -0,0 +1,141 @@
#!/bin/bash
header () {
echo """<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0' xmlns:atom='http://www.w3.org/2005/Atom'>
<!-- Made using rss-roller https://github.com/maxhebditch/rss-roller -->
""" > ~/feedtop
echo """
<channel>
<title>$title</title>
<link>$link</link>
<description>$description</description>
<atom:link href='$rsslink' rel='self' type='application/rss+xml' />
""" >> ~/feedtop
echo "adding the header"
}
footer () {
echo """
</channel>
</rss>
""" >> ~/feedbottom
echo "adding the footer"
}
item () {
if [[ $mode == "a" ]]; then
echo """<item>
<title>$fullTitle</title>
<link>$linkadd</link>
<guid>$guid</guid>
<description>$extract</description>
</item>
""" >> ~/feed
elif [[ $mode == "m" ]]; then
echo """<item>
<title>$fullTitle</title>
<link>$linkadd</link>
<guid isPermaLink='false'>$guidadd</guid>
<description>$extract</description>
</item>
""" >> ~/feed
fi
}
combine () {
header
footer
cat ~/feedtop ~/feed > ~/feedtb
cat ~/feedtb ~/feedbottom > $feedname
rm ~/feedtop ~/feed ~/feedtb ~/feedbottom
}
makeRSS () {
echo "feed does not exit already, going to make from scratch"
echo """
CONFIGURATION
=============
"""
read -p "What is your website called?: (e.g Google) " title
read -p "What is the link to the website?: (e.g http://google.com) " link
read -p "Give a brief description of your website: (e.g A search engine) " description
read -p "Give the URL to where the rss feed will live: (e.g http://google.com/rssfeed.xml) " rsslink
read -p "What will be the feed file live on the disk?: (e.g /home/dog/www/rssfeed.xml has to match above) " feedname
read -p "Where is the file path for the posts? (leave blank if you are not using auto mode): " postDir
echo -e "title=$title\nlink=$link\ndescription='$description'\nrsslink=$rsslink\nfeedname=$feedname\npostDir=$postDir" > ~/.rss-roller.rc
echo "please run rss-roller again with the --auto or --manual flags"
exit
}
if [[ ! -f ~/.rss-roller.rc ]]; then
makeRSS
fi
source ~/.rss-roller.rc
if [[ ! -f $feedname ]]; then
touch $feedname
fi
if [[ $1 == "--auto" ]]; then
mode=a
#Do the bad thing
if [[ -f $feedname ]]; then
rm $feedname
fi
touch $feedname
postArray=( $(ls -r "$postDir"/*.html) )
numPosts=$(ls "$postDir"/*.html | wc -l)
echo "numposts is $numPosts"
postNum=0
guidadd=$linkadd
for posts in "${postArray[@]}"; do
let postNum+=1
post=$posts
echo "adding post $postNum/$numPosts"
fullTitle=$(grep -o '>.*</h1>' $post | sed 's/\(>\|<\/h1>\)//g')
postname=${post##*/}
linkadd="$link"/"$postname"
extract=$(sed -n '/<p>.*/,/*.<\/p>/{p;q;}' $post | sed -e 's/<[^>]\+>/ /g' -e 's|<p>||g' -e 's|</p>||g' -e 's|"||g')
item $post
done
combine
exit
fi
if [[ $1 == "--manual" ]]; then
mode=m
echo """
NEW POST
=======
"""
read -p "What is the title of the new update?: " fullTitle
read -p "What is the link of the new update?: " linkadd
read -p "Provide a description of the new update: " extract
read -p "Provide a unique identifier for the update: " guidadd
if [[ -f $feedname ]]; then
sed -e '1,10d' $feedname > ~/rssrollertopless
head -n -4 ~/rssrollertopless > ~/rssrollertopandbottomless
mv ~/rssrollertopandbottomless $feedname-old
rm ~/rssrollertopless
rm $feedname
else
touch $feedname
fi
item
if [[ -f $feedname-old ]]; then
mv ~/feed ~/feedtop
cat ~/feedtop $feedname-old > ~/feed
rm $feedname-old ~/feedtop
fi
combine
exit
fi
if [[ $# == 0 ]]; then
echo "please use the --auto or --manual flag"
fi

4
rss/rss-setup-local.sh Normal file
View file

@ -0,0 +1,4 @@
#!/bin/bash
sudo cp rss-roller.rc /root/.rss-roller.rc
cp rss-roller.rc ~/.rss-roller.rc