started listing the git issues for each tutorial (30% done)

This commit is contained in:
nihilist 2025-03-30 16:07:24 +02:00
parent 40f03bba53
commit bbfab6f47e
30 changed files with 892 additions and 40 deletions

View file

@ -49,7 +49,7 @@
<ol>
<li>⭐: Personal Favorite</li>
<li>✅: Completed</li>
<li>🟠: Work in progress</li>
<li>🚧: Work in progress</li>
<li>❌: Not started yet (can be brainstormed on their assigned Forgejo issues <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1">here</a>)</li>
</ol></br>
@ -73,20 +73,20 @@
<ol>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li>
<li><a href="manifesto/index.html"> a Nihilist's Manifesto</a></li>
<li><a href="aps/index.html"> Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="governments/index.html"> Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li>
<li><a href="govfear/index.html"> Governments fear Decentralisation and Anonymity</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/259"></a><a href="manifesto/index.html"> a Nihilist's Manifesto</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67"></a><a href="aps/index.html"> Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68"></a><a href="governments/index.html"> Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69"></a><a href="govfear/index.html"> Governments fear Decentralisation and Anonymity</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/242">❌ What is my Attack surface ?</a></li>
</ol>
</br> <p>📝 Explaining OPSEC ⭐</p>
<ol>
<li><a href="opsec4levels/index.html"> Audit your OPSEC and determine the appropriate internet use</a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="internetsegmentation/index.html"> Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="opsec/index.html"> OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="multiple_identities/index.html"> How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/70"></a><a href="opsec4levels/index.html"> Audit your OPSEC and determine the appropriate internet use</a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/71">🚧</a><a href="internetsegmentation/index.html"> Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/72"></a><a href="opsec/index.html"> OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/56"></a><a href="multiple_identities/index.html"> How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/241">❌ 10 Things you must do if you are pro-freedom</a></li>
@ -107,40 +107,40 @@
<p>📝 Explaining Privacy</p>
<ol>
<li><a href="privacy/index.html"> What is Privacy ? Why is it important ? </a><img src="logos/su0.png" class="logo"></li>
<li><a href="closedsource/index.html"> Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="openhardware/index.html"> The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li>
<li><a href="serversideencryption/index.html"> Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/73"></a><a href="privacy/index.html"> What is Privacy ? Why is it important ? </a><img src="logos/su0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261"></a><a href="closedsource/index.html"> Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/75"></a><a href="openhardware/index.html"> The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/262"></a><a href="serversideencryption/index.html"> Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li>
</ol>
<p>💻 Getting started</p>
<ol>
<li><a href="linux/index.html"> How to have Privacy on your Computer (Linux) ⭐</a><img src="logos/tr0.png" class="logo"><img src="logos/linux.png" class="logo"></li>
<li><a href="graphene/index.html"> How to have Privacy on your Phone (GrapheneOS)</a><img src="logos/tr0.png" class="logo"><img src="logos/grapheneos.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/76"></a><a href="linux/index.html"> How to have Privacy on your Computer (Linux) ⭐</a><img src="logos/tr0.png" class="logo"><img src="logos/linux.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78"></a><a href="graphene/index.html"> How to have Privacy on your Phone (GrapheneOS)</a><img src="logos/tr0.png" class="logo"><img src="logos/grapheneos.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/161">❌ How to have Privacy on your Router (Openwrt)</a><img src="logos/tr0.png" class="logo"><img src="logos/openwrt.png" class="logo"></li>
<li><a href="privatesimplex/index.html"> Easy Private Chats - SimpleX</a><img src="logos/tr0.png" class="logo"><img src="logos/simplex.png" class="logo"></li>
<li><a href="qubesos/index.html"> How to setup Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/61">🚧</a><a href="privatesimplex/index.html"> Easy Private Chats - SimpleX</a><img src="logos/tr0.png" class="logo"><img src="logos/simplex.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/42"></a><a href="qubesos/index.html"> How to setup Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
</ol>
<p>💻 File Sharing</p>
<ol>
<li><a href="syncthingvpn/index.html"> One on One large file sharing (Syncthing over VPN)</a><img src="logos/syncthing.png" class="logo"></li>
<li><a href="p2ptorrents/index.html"> P2P large file sharing (Torrents over VPN)</a><img src="logos/qbittorrent.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/11"></a><a href="syncthingvpn/index.html"> One on One large file sharing (Syncthing over VPN)</a><img src="logos/syncthing.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/12"></a><a href="p2ptorrents/index.html"> P2P large file sharing (Torrents over VPN)</a><img src="logos/qbittorrent.png" class="logo"></li>
</ol></br>
<p>💻 Maintaining Privacy</p>
<ol>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/240">❌ How to use Linux - The essentials </a><img src="logos/linux.png" class="logo"></li>
<li><a href="compilation/index.html"> How to compile open source software + How to verify software integrity </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="hypervisorsetup/index.html"> How to Virtualize Machines (QEMU/KVM Hypervisor)</a><img src="logos/kvm.png" class="logo"></li>
<li><a href="passwordmanagement/index.html"> Password Management 101 (How to use Keepass)</a><img src="logos/keepass.png" class="logo"></li>
<li><a href="pgp/index.html"> Private Messaging (PGP encryption)</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="qubesosnetwork/index.html"> How to navigate Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79"></a><a href="compilation/index.html"> How to compile open source software + How to verify software integrity </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/80"></a><a href="hypervisorsetup/index.html"> How to Virtualize Machines (QEMU/KVM Hypervisor)</a><img src="logos/kvm.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/83">🚧</a><a href="passwordmanagement/index.html"> Password Management 101 (How to use Keepass)</a><img src="logos/keepass.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/85"></a><a href="pgp/index.html"> Private Messaging (PGP encryption)</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/265"></a><a href="qubesosnetwork/index.html"> How to navigate Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
</ol>
<p>💻 Privacy from your ISP</p>
<ol>
<li><a href="vpn/index.html"> How to get privacy from your ISP using a VPN inside a VM</a><img src="logos/mullvad.png" class="logo"><img src="logos/kvm.png" class="logo"></li>
<li><a href="vpnqemu/index.html"> How to Route VMs traffic through a VPN on the Host OS</a><img src="logos/mullvad.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/81"></a><a href="vpn/index.html"> How to get privacy from your ISP using a VPN inside a VM</a><img src="logos/mullvad.png" class="logo"><img src="logos/kvm.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/82">🚧</a><a href="vpnqemu/index.html"> How to Route VMs traffic through a VPN on the Host OS</a><img src="logos/mullvad.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/183">❌ How to route your entire network through a VPN on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/184">❌ How to route your entire network through XRay on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/v2ray.png" class="logo"></li>
@ -194,7 +194,7 @@
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/170">❌ How to obtain Internet access anonymously</a><img src="logos/wan.png" class="logo"></li>
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a><img src="logos/kvm.png" class="logo"><img src="logos/whonix.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="torbrowsing/index.html">✅ Tor Web Browser setup</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="MobileTor/index.html">🟠 How to use the Tor Browser on Mobile</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="MobileTor/index.html">🚧 How to use the Tor Browser on Mobile</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="whentorisblocked/index.html">✅ How to Anonymously access websites that block Tor</a><img src="logos/Tor.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
<li><a href="anonproxy/index.html">✅ How to Anonymous access websites that block Tor and VPNs</a><img src="logos/torbrowser.png" class="logo"><img src="logos/proxy.png" class="logo"></li>
<li><a href="anonsimplex/index.html">✅ Easy Anonymous Chats - SimpleX (and onion-only servers)</a><img src="logos/Tor.png" class="logo"><img src="logos/simplex.png" class="logo"></li>
@ -315,7 +315,7 @@
<li><a href="livemode/index.html">✅ Using the Host-OS in live-mode to enable Sensitive Use</a><img src="logos/poweroff.png" class="logo"></li>
<li><a href="veracrypt/index.html">✅ The main source of Plausible Deniability: Deniable Encryption</a><img src="logos/veracrypt.png" class="logo"></li>
<li><a href="sensitivevm/index.html">✅ Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐</a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/whonix.png" class="logo"></li>
<li><a href="plausiblydeniabledataprotection/index.html">🟠 Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li>
<li><a href="plausiblydeniabledataprotection/index.html">🚧 Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li>
</ol></br>
<p>💻 Steganography - Hiding secrets in plain sight</p>
<ol>
@ -337,11 +337,11 @@
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/185">❌ Host OS WAN Failover Configuration</a><img src="logos/wan.png" class="logo"></li>
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a><img src="logos/ups.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/66">❌ Isolating on-premise hidden services (VM-based restrictive networking)</a><img src="logos/firewall.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="physicalsecurity/index.html">🟠 Deniable Encryption Protection Automation </a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/cctv.png" class="logo"></li>
<li><a href="physicalsecurity/index.html">🚧 Deniable Encryption Protection Automation </a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/cctv.png" class="logo"></li>
</ol></br>
<p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<ol>
<li><a href="sensitiveremotevshome/index.html">🟠 Sensitive Services: Self-Host or Host Remotely ?</a><img src="logos/de0.png" class="logo"></li>
<li><a href="sensitiveremotevshome/index.html">🚧 Sensitive Services: Self-Host or Host Remotely ?</a><img src="logos/de0.png" class="logo"></li>
<li><a href="cloud_provider_adversary/index.html">✅ When the Adversary is the cloud provider himself</a><img src="logos/vps.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/222">❌ Sensitive remote servers organisation</a><img src="logos/vps.png" class="logo"></li>
<li><a href="anonymous_server_monitoring/index.html">✅ Anonymous Servers Monitoring</a><img src="logos/vps.png" class="logo"></li>
@ -359,7 +359,7 @@
<li><a href="tornginxphpmysql/index.html">✅ How to setup a basic NGINX / PHP / MySQL app</a><img src="logos/nginx.png" class="logo"><img src="logos/php.png" class="logo"><img src="logos/mysql.png" class="logo"></li>
<li><a href="mysqlmastermaster/index.html">✅ How to setup a MySQL Master-Master replication over Tor</a><img src="logos/mysql.png" class="logo"><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li>
<li><a href="onionbalancelb/index.html">✅ OnionBalance for .onion domains load balancing</a><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li>
<li><a href="endgame/index.html">🟠 Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a><img src="logos/endgame.png" class="logo"></li>
<li><a href="endgame/index.html">🚧 Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a><img src="logos/endgame.png" class="logo"></li>
</ol></br>