mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
livemode rewritten + internet segmentation polished
This commit is contained in:
parent
476b853168
commit
c64eb7c369
16 changed files with 914 additions and 688 deletions
|
@ -84,7 +84,7 @@
|
|||
<p><u>Internet Uses:</u></p>
|
||||
<ol>
|
||||
<li><p><u>Public use</u>: What you do is public knowledge</p></li>
|
||||
<li><p><u>Private use</u>: What you do is not meant to be known (private)</p></li>
|
||||
<li><p><u>Private use</u>: What you do is NOT publicly known</p></li>
|
||||
<li><p><u>Anonymous use</u>: What you do is meant to be done without revealing your identity</p></li>
|
||||
<li><p><u>Sensitive use</u>: What you do is meant to remain secret at all cost, only to be known by you</p></li>
|
||||
</ol>
|
||||
|
@ -92,10 +92,10 @@
|
|||
<img src="3.png" class="imgRz">
|
||||
<p><u>Requirements:</u></p>
|
||||
<ol>
|
||||
<li><p><u>Public use</u>: No requirement ; you can use closed source software (meaning it's all public)</p></li>
|
||||
<li><p><u>Private use</u>: only open source software, + you use a pseudonym, to practice privacy</p></li>
|
||||
<li><p><u>Anonymous use</u>: open source, using a false identity to practice anonymity, not sensitive</p></li>
|
||||
<li><p><u>Sensitive use</u>: open source, using an other false identity and must be plausibly deniable</p></li>
|
||||
<li><p><u>Public use</u>: No requirement ; you can use closed source software (meaning it's all public), using your IRL identity</p></li>
|
||||
<li><p><u>Private use</u>: only open source software, + you use a pseudonym instead of your IRL identity</p></li>
|
||||
<li><p><u>Anonymous use</u>: open source, using a random, meaningless identity not sensitive</p></li>
|
||||
<li><p><u>Sensitive use</u>: open source, using an other random meaningless identity, <b>AND if the adversary seizes the device, they musn't be able to prove the existance of the Sensitive VM</b></p></li>
|
||||
</ol>
|
||||
<p>Now with this we identified the 4 most typical internet use cases, and their requirements.</p>
|
||||
</div>
|
||||
|
@ -137,11 +137,11 @@
|
|||
<p><u>Virtual Machines:</u></p>
|
||||
<ol>
|
||||
<li><p><u>Public use</u>: No requirement ; you can use a windows VM for all closed source software and KYC use</p></li>
|
||||
<li><p><u>Private use</u>: you can use a Debian VM, with only open source software (ex:matrix and element)</p></li>
|
||||
<li><p><u>Anonymous use</u>: you can use Whonix VMs, (can also have a with a Tor -> VPN setup) </p></li>
|
||||
<li><p><u>Sensitive use</u>: You can use Whonix VMs, but they need to be inside a <a href="../anonymity/index.html">veracrypt hidden volume</a></p></li>
|
||||
<li><p><u>Private use</u>: you can use a Debian VM, with only open source software (ex: <a href="../privatesimplex/index.html">SimpleX chat</a>)</p></li>
|
||||
<li><p><u>Anonymous use</u>: you can use Whonix VMs (it forces every connection to go through Tor)</p></li>
|
||||
<li><p><u>Sensitive use</u>: You can use Whonix VMs, but they need to be inside a <a href="../veracrypt/index.html">Veracrypt hidden volume</a></p></li>
|
||||
</ol>
|
||||
<p><u>Sidenote:</u> <a href="https://www.qubes-os.org/">QubesOS</a> is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same. </p>
|
||||
<p><u>Sidenote:</u> <a href="../qubesos/index.html">QubesOS</a> is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same. </p>
|
||||
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue