From c00f3cf0a8e4b4825ed99038f2a927fae1534e5a Mon Sep 17 00:00:00 2001 From: nihilist Date: Sun, 1 Dec 2024 17:47:11 +0100 Subject: [PATCH] contributions updated + readme --- README.md | 10 +++--- opsec/contribute/index.html | 39 +++++++++++++++++++--- opsec/index.html | 66 ++++++++++++++++++------------------- 3 files changed, 74 insertions(+), 41 deletions(-) diff --git a/README.md b/README.md index eec0117..64497c7 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,6 @@ -# How to contribute to https://blog.nowhere.moe/ +# How to contribute to The Nihilism Blog (http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/) + +For the full "How to contribute" guide, please check out [this tutorial](http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/contribute/index.html). ## If you want to edit one of my existing blogposts: - fork the repository @@ -51,7 +53,7 @@ Send me on chat your blogpost idea, and tell me where exactly it's supposed to f - your pseudonym, - the date - the title of the page - - the correct blogpost writing style as explained here: https://blog.nowhere.moe/opsec/tutorial/index.html + - the correct blogpost writing style as explained here: http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/tutorial/index.html - a brief description at the top detailing what you're going to showcase, and why it's important - contextualize what you want to showcase whenever needed, as part of explaining WHY it's important - then showcase each step to get there: (see the full explanation here: @@ -81,9 +83,9 @@ However If over time you're a frequent contributor (that has contributed multipl ### Contributors Todolist ### -Each upcoming blogpost has it's own gitea issue as listed [here](https://git.nowhere.moe/nihilist/blog-contributions/issues). +Each upcoming blogpost has it's own gitea issue as listed [here](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues). -To see their status in the overall opsec blog project, check out the project board [here](https://git.nowhere.moe/nihilist/blog-contributions/projects/1). +To see their status in the overall opsec blog project, check out the project board [here](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1). ### LICENSE ### diff --git a/opsec/contribute/index.html b/opsec/contribute/index.html index 6bda7e3..1694250 100644 --- a/opsec/contribute/index.html +++ b/opsec/contribute/index.html @@ -78,8 +78,26 @@

Each tutorial (even if completed) has it's own assigned issue on gitea:

-

You can pick one that you'd like to do, if you see one that has a red cross you can click on it, it will redirect you to it's assigned gitea issue (example: Easy Private Chats - SimpleX you are free to brainstorm it further like so:

+

You can pick one that you'd like to do, if you see one that has a red cross you can click on it, it will redirect you to it's assigned gitea issue (example: Easy Private Chats - SimpleX. If there is no todolist on each assigned gitea issue, you are free to brainstorm it like so:

+

If a blogpost gitea issue doesn't have a todolist yet, please follow this general template to write it:

+

+Privacy - Easy Private Chats with SimpleX
+
+To be explained:
+- Graph of the targeted setup
+- why is this setup relevant ? What are the threats ? What are we trying to achieve (Privacy / Anonymity / Deniability) ? 
+- what are your options ? 
+- comparing option A B and C
+- In this tutorial we're going to use option B because it is superior due to these criterias blah blah blah
+
+To be showcased:
+- how to install the clientside application
+- how to install the serverside application
+- how to configure the application
+- show that it works as intended
+
+

The idea being that each issue needs to have a clear todolist to bring clarity on what needs to be done in it. Please check if the tutorial is already assigned to someone already or not:

At first, I am assigning only one contributor per tutorial, and only one tutorial per contributor at a time, with a default deadline of 1 month. to complete the assigned tutorial. (if you want to extend the deadline, you'll have to contact me first).

@@ -131,6 +149,15 @@ Resolving deltas: 100% (1588/1588), done. [ mainpc ] [ /dev/pts/18 ] [~/Documents] → cd blog-contributions + +

If you are reusing the repository after you're done sending pull requests, don't forget to do a git pull to make sure you're working on an up-to-date repository, as i am frequently pushing commits.

+

+[ mainpc ] [ /dev/pts/18 ] [blog-contributions]
+→ torsocks git pull http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/6dv9lk1pbaflulau/blog-contributions
+
+
+

Now that you're on the latest commit, you can start to do your own changes:

+

 [ mainpc ] [ /dev/pts/18 ] [~/Documents/blog-contributions]
 → ls
 assets  index.html  opsec  productivity  pull.sh  push.sh  pushtoprod.sh  README.md
@@ -164,7 +191,9 @@ index.html
 

and you can also view your edits in real time from your browser of choice, just put the complete path to the index.html file to view it in real time, for me it is as follows: /home/nihilist/Documents/blog-contributions/opsec/newtutorial/index.html (just hit F5 to refresh in the browser, everytime you save (:w) in vim)

-

Make sure that you follow the quality standard i described here: start with the Why, then the What, then the How. to describe how to do things, you can use images and screenshots like so:

+

Make sure that you follow the quality standard i described here: start with the Why, then the What, then the How.

+

DISCLAIMER: We are not taking any shortcuts in this blog, I expect you to talk about the path, to list the steps that are on that path, and more importantly want you to show the audience how YOU walk that path.

+

For the "How" parts specifically, as you are expected to explain and show the audience how to do things, make sure you use images and screenshots like so:


 <img src="12.png" class="imgRz">
 
@@ -175,9 +204,11 @@ index.html
 apt install flameshot -y 
 
 flameshot
+
 
-

If you are showcasing a complex tutorial please put into a graph what you are talking about. I used to make graphs using yEd Graphs (but it's closed source) so instead as of q3 2024 i'm using Drawio to make them, both tools have got everything you need to write complex graphs.

+

Sidenote: If you are showcasing any IRL steps to make, take pictures to explain what needs to be done, just like how i did when i showcased how to install GrapheneOS.

+

If you are showcasing a complex tutorial please make a graph to explain what you are talking about. One graph will convey the equivalent of a wall of text in one clear image, it's a matter of efficiently conveying information to the audience. I used to make graphs using yEd Graphs (but it's closed source) so instead as of q3 2024 i'm using Drawio to make them, both tools have got everything you need to write complex graphs.


 [ mainpc ] [ /dev/pts/3 ] [blog/opsec/manifesto]
 → apt search draw.io
@@ -205,7 +236,7 @@ draw.io/now 24.7.17 amd64 [installed,local]
 
 

But in the end you should have a good looking graph like this one:

-

and if there are any commands to be shown, just copy paste from your terminal directly into the index.html file, into the pre code blocks:

+

and if there are any commands (or terminal output) to be shown, copy paste from your terminal directly into the index.html file as this is going to help us save some disk space, into the pre code blocks:


 <pre><code class="nim">
 [ mainpc ] [ /dev/pts/20 ] [~/Nextcloud/blog]
diff --git a/opsec/index.html b/opsec/index.html
index f601354..74ce053 100644
--- a/opsec/index.html
+++ b/opsec/index.html
@@ -49,11 +49,11 @@
                 
  • ⭐: Personal Favorite
  • ✅: Completed
  • 🟠: Work in progress
  • -
  • ❌: Not started yet (can be brainstormed on their assigned gitea issues here)
  • +
  • ❌: Not started yet (can be brainstormed on their assigned gitea issues here)

  • ⚠️ This Blog is open to contributions: -

    If you want to contribute, check out the gitea repository for contributions (along with the guidelines) here, check out the project board here to know the status of which tutorial being assigned to whom. (i'm rewarding 10 to 50 euros in monero per new complete blogpost, as advertised on Xmrbazaar). if the blogpost you want to contribute is not listed below, contact me directly so that I can validate your blogpost idea beforehand. For a step-by-step tutorial on how to contribute, please check out this tutorial.

    +

    If you want to contribute, check out the gitea repository for contributions (along with the guidelines) here, check out the project board here to know the status of which tutorial being assigned to whom. (i'm rewarding 10 to 50 euros in monero per new complete blogpost, as advertised on Xmrbazaar). if the blogpost you want to contribute is not listed below, contact me directly so that I can validate your blogpost idea beforehand. For a step-by-step tutorial on how to contribute, please check out this tutorial.

    @@ -109,7 +109,7 @@
    1. ✅ How to have Privacy on your Computer (Linux) ⭐
    2. ✅ How to have Privacy on your Phone (GrapheneOS)
    3. -
    4. ❌ How to have Privacy on your Router (Opnsense)
    5. +
    6. ❌ How to have Privacy on your Router (Opnsense)
    7. ✅ Easy Private Chats - SimpleX

    @@ -135,7 +135,7 @@

    ⚠️ Miscellaneous - In real life

      -
    1. ❌ How to hide the contents of a mail package
    2. +
    3. ❌ How to hide the contents of a mail package



    @@ -159,17 +159,17 @@
  • ✅ What is Anonymity ? Why is it Important ?
  • ✅ Why isn't Privacy enough for Anonymous use ?
  • ✅ The main source of Anonymity: The Tor Network
  • -
  • ❌ Why is the darknet superior to clearnet ?
  • -
  • ❌ When should I use I2P instead of Tor ?
  • +
  • ❌ Why is the darknet superior to clearnet ?
  • +
  • ❌ When should I use I2P instead of Tor ?
  • ✅ Using Tor Safely: Tor through VPN or VPN through Tor ?
  • ✅ Phone Numbers are incompatible with Anonymity
  • -
  • ❌ How to protect against fingerprinting (persona, text, files)
  • -
  • ❌ Stylography protection (Running a Local LLM and copy pasting messages)
  • +
  • ❌ How to protect against fingerprinting (persona, text, files)
  • +
  • ❌ Stylography protection (Running a Local LLM and copy pasting messages)

  • 💻 Clientside - Getting Started (⚠️ Check if your ISP allows Tor or Not!)

      -
    1. ❌ How to setup and navigate Qubes OS
    2. +
    3. ❌ How to setup and navigate Qubes OS
    4. ✅ Tor Web Browser setup
    5. ✅ How to use the Tor Browser on Mobile
    6. ✅ VMs for Long-term Anonymity (Whonix QEMU VMs)
    7. @@ -180,8 +180,8 @@

      💻 Clientside - Censorship Evasion

      1. ✅ How to access Tor when it is being blocked, using VPNs
      2. -
      3. ❌ How to temporarily access Tor when VPNs are blocked, using Tor bridges
      4. -
      5. ❌ How to access Tor when VPNs are blocked, using VPSes (SSH port forwarding / OpenVPN port sharing)
      6. +
      7. ❌ How to temporarily access Tor when VPNs are blocked, using Tor bridges
      8. +
      9. ❌ How to access Tor when VPNs are blocked, using VPSes (SSH port forwarding / OpenVPN port sharing)
      10. ✅ How to access Tor when you are in a heavily-censored country using v2ray (vmess / vless)

      @@ -191,7 +191,7 @@
      1. ✅ How to send small files Anonymously (Onionshare)
      2. ✅ One on One large file sharing (Syncthing over Tor)
      3. -
      4. ❌ P2P large file sharing (Torrents over Tor)
      5. +
      6. ❌ P2P large file sharing (Torrents over Tor)

      @@ -200,13 +200,13 @@
    8. ✅ Why Financial decentralisation ? (Cryptocurrencies, Exchanges and KYC) ⭐
    9. ✅ How to setup your Monero Wallet
    10. ✅ Why can't I trust Centralised Exchanges, and random Monero nodes ?
    11. -
    12. ❌ How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
    13. +
    14. ❌ How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
    15. ✅ Haveno Decentralised Exchange direct Fiat -> XMR transaction ⭐
    16. ✅ Haveno DEX Dispute resolution (Fiat -> XMR)
    17. ✅ Haveno DEX Bank Transfer (ex: SEPA) -> XMR transaction
    18. ✅ Haveno DEX Cash By Mail -> XMR transaction ⭐
    19. -
    20. ❌ Convert Monero into other Cryptos Anonymously (XMR -> BTC w/ BasicSwap DEX)
    21. -
    22. ❌ Monero Inheritence Management (Threshold encryption (2of3)+ PGP)
    23. +
    24. ❌ Convert Monero into other Cryptos Anonymously (XMR -> BTC w/ BasicSwap DEX)
    25. +
    26. ❌ Monero Inheritence Management (Threshold encryption (2of3)+ PGP)

    💻 Clientside - Making use of Anonymity (Non-KYC Providers)

    @@ -230,7 +230,7 @@
  • ✅ Monero Node
  • ✅ Monero Mining with p2pool (help validate the network)
  • ✅ Haveno Seed Node
  • -
  • ❌ Haveno DEX Network
  • +
  • ❌ Haveno DEX Network

  • 🧅 Serverside - Anonymous Hidden Services

    @@ -239,7 +239,7 @@
  • ✅ Where to host Anonymous Hidden Services ?
  • ✅ Hidden Service with custom .onion Vanity V3 address
  • ✅ Gitea .onion Setup (Anonymous Code Repositories and Collaboration)
  • -
  • ❌ How to setup Nerostr (Nostr blogging)
  • +
  • ❌ How to setup Nerostr (Nostr blogging)


  • 🧅 Serverside - Anonymous Clearnet Services

    @@ -254,8 +254,8 @@

    ⚠️ Miscellaneous - In real life

      -
    1. ❌ How to send a mail package anonymously
    2. -
    3. ❌ How to recieve a mail package anonymously
    4. +
    5. ❌ How to send a mail package anonymously
    6. +
    7. ❌ How to recieve a mail package anonymously
    8. ✅ How to remain Anonymous during a protest

    @@ -300,14 +300,14 @@

    💻 Decentralised Finances

      -
    1. ❌ How to hide your Monero ?
    2. -
    3. ❌ How to Cash out your crypto gains (Fiat income limits, and justifications)
    4. +
    5. ❌ How to hide your Monero ?
    6. +
    7. ❌ How to Cash out your crypto gains (Fiat income limits, and justifications)

    ⚠️ When you risk being persecuted for just using technology

      -
    1. ❌ When your harddrives must look innocent and you can use Tails
    2. -
    3. ❌ When your harddrives must look innocent and you can only use VPNs
    4. -
    5. ❌ When your harddrives must look innocent and you can't use Tails nor VPNs
    6. +
    7. ❌ When your harddrives must look innocent and you can use Tails
    8. +
    9. ❌ When your harddrives must look innocent and you can only use VPNs
    10. +
    11. ❌ When your harddrives must look innocent and you can't use Tails nor VPNs

    @@ -320,26 +320,26 @@
  • ❌ Open source router VM setup (OpnSense on QEMU/KVM)
  • ✅ Electrical Failover (basic UPS setup)
  • ❌ Internet Failover (Dual WAN OpnSense setup)
  • -
  • ❌ Isolating on-premise hidden services (VM-based restrictive networking)
  • -
  • ❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)
  • +
  • ❌ Isolating on-premise hidden services (VM-based restrictive networking)
  • +
  • ❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)
  • 🟠 Automating Deniable Encryption Protection (USB Changes, detecting movements, and SSH bruteforce attempts)
  • ✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐

  • 🧅 Serverside - Remote Plausible Deniability (⚠️ Remote Hosting = Safer!)

    1. 🟠 Sensitive Services: Self-Host or Host Remotely ?
    2. -
    3. ❌ When the Adversary is the cloud provider himself
    4. -
    5. ❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)
    6. -
    7. ❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)
    8. -
    9. ❌ Custom Linux OS making (debian-based)
    10. -
    11. ❌ Obtaining a non-KYC dedicated server, with a custom OS
    12. -
    13. ❌ Intrusion detection on remote servers
    14. +
    15. ❌ When the Adversary is the cloud provider himself
    16. +
    17. ❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)
    18. +
    19. ❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)
    20. +
    21. ❌ Custom Linux OS making (debian-based)
    22. +
    23. ❌ Obtaining a non-KYC dedicated server, with a custom OS
    24. +
    25. ❌ Intrusion detection on remote servers

    ⚠️ Miscellaneous - In real life

      -
    1. ❌ When protests go wrong - SimpleX Disappearing Messages
    2. +
    3. ❌ When protests go wrong - SimpleX Disappearing Messages