started listing the git issues for each tutorial (30% done)

This commit is contained in:
nihilist 2025-03-30 16:07:24 +02:00
parent 40f03bba53
commit bbfab6f47e
30 changed files with 892 additions and 40 deletions

767
graphs/.$OPSEC.drawio.bkp Normal file

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View file

@ -65,6 +65,9 @@
<img src="0.png" class="imgRz"> <img src="0.png" class="imgRz">
<p> </p> <p> </p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -63,6 +63,7 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-04-30</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-04-30</ba></p>
<h1>Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days </h1> <h1>Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days </h1>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -66,6 +66,8 @@
<p> What? You want the source code? Hell no, just trust me bro!"</p> <p> What? You want the source code? Hell no, just trust me bro!"</p>
<p>Or in other words, why can't I trust an adversary to not look at me when i install one of his cameras in my bedroom?</p> <p>Or in other words, why can't I trust an adversary to not look at me when i install one of his cameras in my bedroom?</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -68,6 +68,8 @@
<li><p>OS : <a href="../linux/index.html">Linux</a></p></li> <li><p>OS : <a href="../linux/index.html">Linux</a></p></li>
</ol> </ol>
<p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p> <p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79">git issue</a> directly!</p>
</div> </div>

View file

@ -63,6 +63,7 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-07</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-07</ba></p>
<h1>Governments, Centralisation, and Law Enforcement</h1> <h1>Governments, Centralisation, and Law Enforcement</h1>
<p>In this tutorial we're going to cover and explain what are governments, and why they are trying to force us into mass surveillance and KYC procedures.</p> <p>In this tutorial we're going to cover and explain what are governments, and why they are trying to force us into mass surveillance and KYC procedures.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -63,6 +63,7 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-07</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-07</ba></p>
<h1>Governments fear Decentralisation and Anonymity </h1> <h1>Governments fear Decentralisation and Anonymity </h1>
<p>In this tutorial we're going to explain why Decentralisation and Anonymity are essential in reducing the power of the government over it's citizens. </p> <p>In this tutorial we're going to explain why Decentralisation and Anonymity are essential in reducing the power of the government over it's citizens. </p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -72,6 +72,8 @@
<li><p>Hardware : (Phone (google Pixel model))</p></li> <li><p>Hardware : (Phone (google Pixel model))</p></li>
</ol> </ol>
<p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p> <p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -71,6 +71,8 @@
<li><p>Host OS : <a href="../linux/index.html">Linux</a></p></li> <li><p>Host OS : <a href="../linux/index.html">Linux</a></p></li>
</ol> </ol>
<p>I recommend using this setup first of all to <b>isolate your Public use</b>, and to <b>segment it from the other Uses</b> such as <a href="../privacy/index.html">Private use</a>, but it can later be used for <a href="../anonymityexplained/index.html">Anonymous use</a>, and also <a href="../encryption/index">Sensitive Use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p> <p>I recommend using this setup first of all to <b>isolate your Public use</b>, and to <b>segment it from the other Uses</b> such as <a href="../privacy/index.html">Private use</a>, but it can later be used for <a href="../anonymityexplained/index.html">Anonymous use</a>, and also <a href="../encryption/index">Sensitive Use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/80">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -49,7 +49,7 @@
<ol> <ol>
<li>⭐: Personal Favorite</li> <li>⭐: Personal Favorite</li>
<li>✅: Completed</li> <li>✅: Completed</li>
<li>🟠: Work in progress</li> <li>🚧: Work in progress</li>
<li>❌: Not started yet (can be brainstormed on their assigned Forgejo issues <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1">here</a>)</li> <li>❌: Not started yet (can be brainstormed on their assigned Forgejo issues <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1">here</a>)</li>
</ol></br> </ol></br>
@ -73,20 +73,20 @@
<ol> <ol>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li>
<li><a href="manifesto/index.html"> a Nihilist's Manifesto</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/259"></a><a href="manifesto/index.html"> a Nihilist's Manifesto</a></li>
<li><a href="aps/index.html"> Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67"></a><a href="aps/index.html"> Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="governments/index.html"> Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68"></a><a href="governments/index.html"> Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li>
<li><a href="govfear/index.html"> Governments fear Decentralisation and Anonymity</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69"></a><a href="govfear/index.html"> Governments fear Decentralisation and Anonymity</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/242">❌ What is my Attack surface ?</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/242">❌ What is my Attack surface ?</a></li>
</ol> </ol>
</br> <p>📝 Explaining OPSEC ⭐</p> </br> <p>📝 Explaining OPSEC ⭐</p>
<ol> <ol>
<li><a href="opsec4levels/index.html"> Audit your OPSEC and determine the appropriate internet use</a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/70"></a><a href="opsec4levels/index.html"> Audit your OPSEC and determine the appropriate internet use</a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="internetsegmentation/index.html"> Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/71">🚧</a><a href="internetsegmentation/index.html"> Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="opsec/index.html"> OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/72"></a><a href="opsec/index.html"> OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="multiple_identities/index.html"> How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/56"></a><a href="multiple_identities/index.html"> How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/241">❌ 10 Things you must do if you are pro-freedom</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/241">❌ 10 Things you must do if you are pro-freedom</a></li>
@ -107,40 +107,40 @@
<p>📝 Explaining Privacy</p> <p>📝 Explaining Privacy</p>
<ol> <ol>
<li><a href="privacy/index.html"> What is Privacy ? Why is it important ? </a><img src="logos/su0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/73"></a><a href="privacy/index.html"> What is Privacy ? Why is it important ? </a><img src="logos/su0.png" class="logo"></li>
<li><a href="closedsource/index.html"> Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261"></a><a href="closedsource/index.html"> Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="openhardware/index.html"> The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/75"></a><a href="openhardware/index.html"> The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li>
<li><a href="serversideencryption/index.html"> Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/262"></a><a href="serversideencryption/index.html"> Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li>
</ol> </ol>
<p>💻 Getting started</p> <p>💻 Getting started</p>
<ol> <ol>
<li><a href="linux/index.html"> How to have Privacy on your Computer (Linux) ⭐</a><img src="logos/tr0.png" class="logo"><img src="logos/linux.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/76"></a><a href="linux/index.html"> How to have Privacy on your Computer (Linux) ⭐</a><img src="logos/tr0.png" class="logo"><img src="logos/linux.png" class="logo"></li>
<li><a href="graphene/index.html"> How to have Privacy on your Phone (GrapheneOS)</a><img src="logos/tr0.png" class="logo"><img src="logos/grapheneos.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78"></a><a href="graphene/index.html"> How to have Privacy on your Phone (GrapheneOS)</a><img src="logos/tr0.png" class="logo"><img src="logos/grapheneos.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/161">❌ How to have Privacy on your Router (Openwrt)</a><img src="logos/tr0.png" class="logo"><img src="logos/openwrt.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/161">❌ How to have Privacy on your Router (Openwrt)</a><img src="logos/tr0.png" class="logo"><img src="logos/openwrt.png" class="logo"></li>
<li><a href="privatesimplex/index.html"> Easy Private Chats - SimpleX</a><img src="logos/tr0.png" class="logo"><img src="logos/simplex.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/61">🚧</a><a href="privatesimplex/index.html"> Easy Private Chats - SimpleX</a><img src="logos/tr0.png" class="logo"><img src="logos/simplex.png" class="logo"></li>
<li><a href="qubesos/index.html"> How to setup Qubes OS</a><img src="logos/qubes.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/42"></a><a href="qubesos/index.html"> How to setup Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
</ol> </ol>
<p>💻 File Sharing</p> <p>💻 File Sharing</p>
<ol> <ol>
<li><a href="syncthingvpn/index.html"> One on One large file sharing (Syncthing over VPN)</a><img src="logos/syncthing.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/11"></a><a href="syncthingvpn/index.html"> One on One large file sharing (Syncthing over VPN)</a><img src="logos/syncthing.png" class="logo"></li>
<li><a href="p2ptorrents/index.html"> P2P large file sharing (Torrents over VPN)</a><img src="logos/qbittorrent.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/12"></a><a href="p2ptorrents/index.html"> P2P large file sharing (Torrents over VPN)</a><img src="logos/qbittorrent.png" class="logo"></li>
</ol></br> </ol></br>
<p>💻 Maintaining Privacy</p> <p>💻 Maintaining Privacy</p>
<ol> <ol>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/240">❌ How to use Linux - The essentials </a><img src="logos/linux.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/240">❌ How to use Linux - The essentials </a><img src="logos/linux.png" class="logo"></li>
<li><a href="compilation/index.html"> How to compile open source software + How to verify software integrity </a><img src="logos/tr0.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79"></a><a href="compilation/index.html"> How to compile open source software + How to verify software integrity </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="hypervisorsetup/index.html"> How to Virtualize Machines (QEMU/KVM Hypervisor)</a><img src="logos/kvm.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/80"></a><a href="hypervisorsetup/index.html"> How to Virtualize Machines (QEMU/KVM Hypervisor)</a><img src="logos/kvm.png" class="logo"></li>
<li><a href="passwordmanagement/index.html"> Password Management 101 (How to use Keepass)</a><img src="logos/keepass.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/83">🚧</a><a href="passwordmanagement/index.html"> Password Management 101 (How to use Keepass)</a><img src="logos/keepass.png" class="logo"></li>
<li><a href="pgp/index.html"> Private Messaging (PGP encryption)</a><img src="logos/gnupg.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/85"></a><a href="pgp/index.html"> Private Messaging (PGP encryption)</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="qubesosnetwork/index.html"> How to navigate Qubes OS</a><img src="logos/qubes.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/265"></a><a href="qubesosnetwork/index.html"> How to navigate Qubes OS</a><img src="logos/qubes.png" class="logo"></li>
</ol> </ol>
<p>💻 Privacy from your ISP</p> <p>💻 Privacy from your ISP</p>
<ol> <ol>
<li><a href="vpn/index.html"> How to get privacy from your ISP using a VPN inside a VM</a><img src="logos/mullvad.png" class="logo"><img src="logos/kvm.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/81"></a><a href="vpn/index.html"> How to get privacy from your ISP using a VPN inside a VM</a><img src="logos/mullvad.png" class="logo"><img src="logos/kvm.png" class="logo"></li>
<li><a href="vpnqemu/index.html"> How to Route VMs traffic through a VPN on the Host OS</a><img src="logos/mullvad.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/82">🚧</a><a href="vpnqemu/index.html"> How to Route VMs traffic through a VPN on the Host OS</a><img src="logos/mullvad.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/183">❌ How to route your entire network through a VPN on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/mullvad.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/183">❌ How to route your entire network through a VPN on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/184">❌ How to route your entire network through XRay on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/v2ray.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/184">❌ How to route your entire network through XRay on the Router</a><img src="logos/openwrt.png" class="logo"><img src="logos/v2ray.png" class="logo"></li>
@ -194,7 +194,7 @@
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/170">❌ How to obtain Internet access anonymously</a><img src="logos/wan.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/170">❌ How to obtain Internet access anonymously</a><img src="logos/wan.png" class="logo"></li>
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a><img src="logos/kvm.png" class="logo"><img src="logos/whonix.png" class="logo"><img src="logos/Tor.png" class="logo"></li> <li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a><img src="logos/kvm.png" class="logo"><img src="logos/whonix.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="torbrowsing/index.html">✅ Tor Web Browser setup</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li> <li><a href="torbrowsing/index.html">✅ Tor Web Browser setup</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="MobileTor/index.html">🟠 How to use the Tor Browser on Mobile</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li> <li><a href="MobileTor/index.html">🚧 How to use the Tor Browser on Mobile</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="whentorisblocked/index.html">✅ How to Anonymously access websites that block Tor</a><img src="logos/Tor.png" class="logo"><img src="logos/mullvad.png" class="logo"></li> <li><a href="whentorisblocked/index.html">✅ How to Anonymously access websites that block Tor</a><img src="logos/Tor.png" class="logo"><img src="logos/mullvad.png" class="logo"></li>
<li><a href="anonproxy/index.html">✅ How to Anonymous access websites that block Tor and VPNs</a><img src="logos/torbrowser.png" class="logo"><img src="logos/proxy.png" class="logo"></li> <li><a href="anonproxy/index.html">✅ How to Anonymous access websites that block Tor and VPNs</a><img src="logos/torbrowser.png" class="logo"><img src="logos/proxy.png" class="logo"></li>
<li><a href="anonsimplex/index.html">✅ Easy Anonymous Chats - SimpleX (and onion-only servers)</a><img src="logos/Tor.png" class="logo"><img src="logos/simplex.png" class="logo"></li> <li><a href="anonsimplex/index.html">✅ Easy Anonymous Chats - SimpleX (and onion-only servers)</a><img src="logos/Tor.png" class="logo"><img src="logos/simplex.png" class="logo"></li>
@ -315,7 +315,7 @@
<li><a href="livemode/index.html">✅ Using the Host-OS in live-mode to enable Sensitive Use</a><img src="logos/poweroff.png" class="logo"></li> <li><a href="livemode/index.html">✅ Using the Host-OS in live-mode to enable Sensitive Use</a><img src="logos/poweroff.png" class="logo"></li>
<li><a href="veracrypt/index.html">✅ The main source of Plausible Deniability: Deniable Encryption</a><img src="logos/veracrypt.png" class="logo"></li> <li><a href="veracrypt/index.html">✅ The main source of Plausible Deniability: Deniable Encryption</a><img src="logos/veracrypt.png" class="logo"></li>
<li><a href="sensitivevm/index.html">✅ Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐</a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/whonix.png" class="logo"></li> <li><a href="sensitivevm/index.html">✅ Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐</a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/whonix.png" class="logo"></li>
<li><a href="plausiblydeniabledataprotection/index.html">🟠 Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li> <li><a href="plausiblydeniabledataprotection/index.html">🚧 Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li>
</ol></br> </ol></br>
<p>💻 Steganography - Hiding secrets in plain sight</p> <p>💻 Steganography - Hiding secrets in plain sight</p>
<ol> <ol>
@ -337,11 +337,11 @@
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/185">❌ Host OS WAN Failover Configuration</a><img src="logos/wan.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/185">❌ Host OS WAN Failover Configuration</a><img src="logos/wan.png" class="logo"></li>
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a><img src="logos/ups.png" class="logo"></li> <li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a><img src="logos/ups.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/66">❌ Isolating on-premise hidden services (VM-based restrictive networking)</a><img src="logos/firewall.png" class="logo"><img src="logos/Tor.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/66">❌ Isolating on-premise hidden services (VM-based restrictive networking)</a><img src="logos/firewall.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="physicalsecurity/index.html">🟠 Deniable Encryption Protection Automation </a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/cctv.png" class="logo"></li> <li><a href="physicalsecurity/index.html">🚧 Deniable Encryption Protection Automation </a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/cctv.png" class="logo"></li>
</ol></br> </ol></br>
<p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p> <p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<ol> <ol>
<li><a href="sensitiveremotevshome/index.html">🟠 Sensitive Services: Self-Host or Host Remotely ?</a><img src="logos/de0.png" class="logo"></li> <li><a href="sensitiveremotevshome/index.html">🚧 Sensitive Services: Self-Host or Host Remotely ?</a><img src="logos/de0.png" class="logo"></li>
<li><a href="cloud_provider_adversary/index.html">✅ When the Adversary is the cloud provider himself</a><img src="logos/vps.png" class="logo"></li> <li><a href="cloud_provider_adversary/index.html">✅ When the Adversary is the cloud provider himself</a><img src="logos/vps.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/222">❌ Sensitive remote servers organisation</a><img src="logos/vps.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/222">❌ Sensitive remote servers organisation</a><img src="logos/vps.png" class="logo"></li>
<li><a href="anonymous_server_monitoring/index.html">✅ Anonymous Servers Monitoring</a><img src="logos/vps.png" class="logo"></li> <li><a href="anonymous_server_monitoring/index.html">✅ Anonymous Servers Monitoring</a><img src="logos/vps.png" class="logo"></li>
@ -359,7 +359,7 @@
<li><a href="tornginxphpmysql/index.html">✅ How to setup a basic NGINX / PHP / MySQL app</a><img src="logos/nginx.png" class="logo"><img src="logos/php.png" class="logo"><img src="logos/mysql.png" class="logo"></li> <li><a href="tornginxphpmysql/index.html">✅ How to setup a basic NGINX / PHP / MySQL app</a><img src="logos/nginx.png" class="logo"><img src="logos/php.png" class="logo"><img src="logos/mysql.png" class="logo"></li>
<li><a href="mysqlmastermaster/index.html">✅ How to setup a MySQL Master-Master replication over Tor</a><img src="logos/mysql.png" class="logo"><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li> <li><a href="mysqlmastermaster/index.html">✅ How to setup a MySQL Master-Master replication over Tor</a><img src="logos/mysql.png" class="logo"><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li>
<li><a href="onionbalancelb/index.html">✅ OnionBalance for .onion domains load balancing</a><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li> <li><a href="onionbalancelb/index.html">✅ OnionBalance for .onion domains load balancing</a><img src="logos/Tor.png" class="logo"><img src="logos/HA.png" class="logo"></li>
<li><a href="endgame/index.html">🟠 Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a><img src="logos/endgame.png" class="logo"></li> <li><a href="endgame/index.html">🚧 Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a><img src="logos/endgame.png" class="logo"></li>
</ol></br> </ol></br>

View file

@ -64,6 +64,7 @@
<h1>Internet Usage Segmentation Setup </h1> <h1>Internet Usage Segmentation Setup </h1>
<p>In this tutorial we're going to cover how to properly segment your internet usage. This is the most common opsec practice that you should always use. We're going to base ourselves off from the pyramid of internet use that we have seen <a href="../opsec4levels/index.html">previously</a>, to be able to replicate each of the 4 OPSEC levels into our current setup:</p> <p>In this tutorial we're going to cover how to properly segment your internet usage. This is the most common opsec practice that you should always use. We're going to base ourselves off from the pyramid of internet use that we have seen <a href="../opsec4levels/index.html">previously</a>, to be able to replicate each of the 4 OPSEC levels into our current setup:</p>
<img src="../opsec4levels/0.3.png" class="imgRz"> <img src="../opsec4levels/0.3.png" class="imgRz">
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/71">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -71,6 +71,8 @@
<p>I recommend using this setup on your main PC, laptop, but also as a home server or a remote server. For <a href="../privacy/index.html">Privacy use</a>, and potentially <a href="../anonymityexplained/index.html">Anonymous use</a> if you implement the correct technology for it later on, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p> <p>I recommend using this setup on your main PC, laptop, but also as a home server or a remote server. For <a href="../privacy/index.html">Privacy use</a>, and potentially <a href="../anonymityexplained/index.html">Anonymous use</a> if you implement the correct technology for it later on, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/76">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

BIN
opsec/logos/daturagit.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

View file

@ -63,6 +63,7 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>user@Whonix - 2024-05-19</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>user@Whonix - 2024-05-19</ba></p>
<h1>a Nihilist's Manifesto </h1> <h1>a Nihilist's Manifesto </h1>
<p>Explaining why I have a blog in the first place.</p> <p>Explaining why I have a blog in the first place.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/259">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -40,6 +40,7 @@
</p> </p>
<h1>How to Maintain Multiple Identities Online</h1> <h1>How to Maintain Multiple Identities Online</h1>
<p>In this tutorial, well guide you through setting up and managing multiple online identities to enhance your privacy and security. Well discuss why this is crucial, how to establish distinct personas, and the steps you need to keep them isolated from each other.</p> <p>In this tutorial, well guide you through setting up and managing multiple online identities to enhance your privacy and security. Well discuss why this is crucial, how to establish distinct personas, and the steps you need to keep them isolated from each other.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/56">git issue</a> directly!</p>
</div> </div>
</div> </div>
</div> </div>

View file

@ -64,6 +64,8 @@
<h1>The lack of Open Source Hardware (CPUs, Motherboards, GPUs) </h1> <h1>The lack of Open Source Hardware (CPUs, Motherboards, GPUs) </h1>
<img src="0.png" style="width:250px"> <img src="0.png" style="width:250px">
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/75">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -68,6 +68,7 @@
<img src="3.png" class="imgRz"> <img src="3.png" class="imgRz">
<p>If you wish to have Privacy and Anonymity online, you need to use the correct technologies, and to have the correct behavior when using them.</p> <p>If you wish to have Privacy and Anonymity online, you need to use the correct technologies, and to have the correct behavior when using them.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/72">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -72,6 +72,7 @@
<p>To do so, we are going to simplify it down to 4 OPSEC levels: <b>Public, Private, Anonymous and Sensitive</b>.</p> <p>To do so, we are going to simplify it down to 4 OPSEC levels: <b>Public, Private, Anonymous and Sensitive</b>.</p>
<img src="0.4.png" class="imgRz"> <img src="0.4.png" class="imgRz">
<p><u>Sidenote:</u> If your setup is suitable only for public internet use, you CANNOT use it for any private use, and so on. </p> <p><u>Sidenote:</u> If your setup is suitable only for public internet use, you CANNOT use it for any private use, and so on. </p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/70">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -63,7 +63,8 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 2024 / 10 / 23</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 2024 / 10 / 23</ba></p>
<h1>Peer-to-Peer Large File Sharing (Torrents over VPN)</h1> <h1>Peer-to-Peer Large File Sharing (Torrents over VPN)</h1>
<img src="0.png" style="width:250px"> <img src="0.png" style="width:250px">
<p> </p> <p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/12">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -63,7 +63,8 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-16</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-16</ba></p>
<h1>Password Management 101 (How to use Keepass) </h1> <h1>Password Management 101 (How to use Keepass) </h1>
<img src="1.png" style="width:250px"> <img src="1.png" style="width:250px">
<p> </p> <p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/83">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -64,6 +64,8 @@
<h1>How to use PGP encryption </h1> <h1>How to use PGP encryption </h1>
<img src="0.png" style="width:250px"> <img src="0.png" style="width:250px">
<p>In this tutorial we're going to look at how to setup PGP keys, and use them to encrypt messages </p> <p>In this tutorial we're going to look at how to setup PGP keys, and use them to encrypt messages </p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/85">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -64,6 +64,9 @@
<h1>What is Privacy ? Why is it Important ? </h1> <h1>What is Privacy ? Why is it Important ? </h1>
<p>This is where the Journey begins. We're going to look at why you should bother with Privacy first of all, and what it is exactly.</p> <p>This is where the Journey begins. We're going to look at why you should bother with Privacy first of all, and what it is exactly.</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/73">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -63,7 +63,9 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 30 / 11 / 2024</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 30 / 11 / 2024</ba></p>
<h1>Easy Private Chats - SimpleX</h1> <h1>Easy Private Chats - SimpleX</h1>
<img src="0.png" style="width:100px"> <img src="0.png" style="width:100px">
<p> </p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
@ -80,7 +82,7 @@
Online communication is one of the most ubiquitous activities on all of the internet. From newsletters, corporate emails and even down to instant messaging with friends, its spread cannot be denied. With such wide reach, it would seem very important to protect these communication channels, yet this is almost an after-thought for most mainstream messengers. Platforms with millions of users market their services with the latest buzz words yet close-source their protocols leaving users with a "trust me bro". With so many options to choose from how can we best decide which app to use? In this article we'll compare a few options (Telegram, Signal and SimpleX) to see how their technical details stack up and determine which is best for easy private chats. Online communication is one of the most ubiquitous activities on all of the internet. From newsletters, corporate emails and even down to instant messaging with friends, its spread cannot be denied. With such wide reach, it would seem very important to protect these communication channels, yet this is almost an after-thought for most mainstream messengers. Platforms with millions of users market their services with the latest buzz words yet close-source their protocols leaving users with a "trust me bro". With so many options to choose from how can we best decide which app to use? In this article we'll compare a few options (Telegram, Signal and SimpleX) to see how their technical details stack up and determine which is best for easy private chats.
</p> </p>
</code></pre> <p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/61">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -67,6 +67,8 @@
<p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p> <p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p>
<p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p> <p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p>
<p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p> <p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/42">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -64,6 +64,8 @@
<h1>How to navigate qubes OS and segment your internet uses </h1> <h1>How to navigate qubes OS and segment your internet uses </h1>
<p>In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.</p> <p>In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.</p>
<p>If you are still not familiar with the identity model please check this link <a href="../internetsegmentation/index.html">Theories about building up your online identities</a></p> <p>If you are still not familiar with the identity model please check this link <a href="../internetsegmentation/index.html">Theories about building up your online identities</a></p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -62,6 +62,7 @@
<div class="col-lg-8 col-lg-offset-2"> <div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-05-01</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-05-01</ba></p>
<h1>Why can't I trust Server-side Encryption ? </h1> <h1>Why can't I trust Server-side Encryption ? </h1>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/262">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
@ -95,6 +96,7 @@
<img src="3.png" class="imgRz"> <img src="3.png" class="imgRz">
<p>What happens here, is that Bob decides to trust Jack with the confidentiality of his data, <b>instead of encrypting his sensitive data with PGP</b>. What can happen from there ?</p> <p>What happens here, is that Bob decides to trust Jack with the confidentiality of his data, <b>instead of encrypting his sensitive data with PGP</b>. What can happen from there ?</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->

View file

@ -63,7 +63,8 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 2024 / 11 / 01</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>XMRonly - 2024 / 11 / 01</ba></p>
<h1>One-on-One Large File Sharing (Syncthing over VPN)</h1> <h1>One-on-One Large File Sharing (Syncthing over VPN)</h1>
<img src="0.png" style="width:250px"> <img src="0.png" style="width:250px">
<p> </p> <p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/11">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -73,6 +73,8 @@
<p>I recommend to use that setup as part of your <a href="../privacy/index.html">Privacy Use</a> online, to hide what you are browsing online from your ISP</p> <p>I recommend to use that setup as part of your <a href="../privacy/index.html">Privacy Use</a> online, to hide what you are browsing online from your ISP</p>
<p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/81">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->

View file

@ -62,7 +62,8 @@
<div class="col-lg-8 col-lg-offset-2"> <div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-08-08</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-08-08</ba></p>
<h1>Route QEMU VMs through a Host OS VPN </h1> <h1>Route QEMU VMs through a Host OS VPN </h1>
<p> </p> <p><img src="../logos/daturagit.png" style="width:100px"> <u>Sidenote:</u> Help us improve this tutorial by letting us know if there's anything missing or incorrect on this <a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260">git issue</a> directly!</p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->