diff --git a/opsec/graphene/index.html b/opsec/graphene/index.html index f1e68d4..5d9ee36 100644 --- a/opsec/graphene/index.html +++ b/opsec/graphene/index.html @@ -8,7 +8,7 @@ - How to install GrapheneOS on a Pixel Phone + How to have Privacy on your Phone (GrapheneOS) @@ -61,7 +61,7 @@
Previous Page

nihilist@mainpc - 2024-07-10

-

How to install GrapheneOS on a Pixel Phone

+

How to have Privacy on your Phone (GrapheneOS)

In this tutorial we're going to setup graphene OS, an open source android operating system for google pixel phones. (Yes google phones, if you don't like it then you'll have to wait for functional open hardware alternatives to arrive on the market.) Currently GrapheneOS is one of the most privacy-focused mobile operating systems given that it's fully open source. and that they refuse to implement google services by default, unlike their competitors like LineageOS.

diff --git a/opsec/haveno-client-f2f/index.html b/opsec/haveno-client-f2f/index.html index 68661ec..7e16758 100644 --- a/opsec/haveno-client-f2f/index.html +++ b/opsec/haveno-client-f2f/index.html @@ -181,10 +181,9 @@ May-29 20:55:27.427 [JavaFX Application Thread] INFO h.d.c.c.c.PopOver: hide:20

For Arch Linux Users

You can either extract the .rpm (which is originally intended for Fedora users) package and run the haveno binary yourself, or use the AUR package maintained by duje

For Windows Users

-

If you are a windows user (know that it cant be trusted as it's not an open source operating system, check out my tutorial here on how to install linux instead), if you're too lazy you can check out darknetreporter's tutorial:

- +

If you are a windows user (know that windows cant be trusted as it's not an open source operating system, so install linux instead):

-

For Tails OS Users: (as of 6th October 2024)

+

For Tails OS Users: (as of 3rd November 2024)

If you want to have a TailsOS VM running, check out my latest tutorial on it here.

Then make sure you have the admin password enabled:

diff --git a/opsec/index.html b/opsec/index.html index d51cdf7..92bcc7f 100644 --- a/opsec/index.html +++ b/opsec/index.html @@ -109,9 +109,9 @@

💻 Getting started

    -
  1. ✅ How to install Linux from a Windows PC ⭐
  2. -
  3. ✅ How to install and update programs on Linux
  4. -
  5. ✅ How to install GrapheneOS on a Pixel Phone
  6. +
  7. ✅ How to have Privacy on your Computer (Linux) ⭐
  8. +
  9. ✅ How to have Privacy on your Phone (GrapheneOS)
  10. +
  11. ❌ How to have Privacy on your Router (Opnsense)
  12. ❌ Easy Private Chats - SimpleX

@@ -125,6 +125,7 @@

💻 Privacy means Open Source (FOSS)

    +
  1. ✅ How to install and update programs on Linux
  2. ✅ How to compile open source software + How to verify software integrity
  3. ✅ How to Virtualize Machines (QEMU/KVM Hypervisor)
  4. ✅ How to get privacy from your ISP using a VPN
  5. @@ -286,11 +287,11 @@

    💻 Clientside - Getting Started

      +
    1. ✅ Using the Host-OS in live-mode to enable Sensitive Use
    2. ✅ The main source of Plausible Deniability: Deniable Encryption
    3. -
    4. ✅ Tails OS QEMU VM for Temporary Sensitive Use
    5. -
    6. ✅ Using the Host-OS in live-mode to prepare for long-term Sensitive Use
    7. 🟠 Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐
    8. 🟠 Plausibly Deniable Critical Data Backups
    9. +
    10. ✅ Tails OS QEMU VM for Temporary Sensitive Use

    💻 Steganography - Hiding secrets in plain sight

      diff --git a/opsec/linux/index.html b/opsec/linux/index.html index c0e6e40..f3901d5 100644 --- a/opsec/linux/index.html +++ b/opsec/linux/index.html @@ -8,7 +8,7 @@ - How to install Linux from a Windows PC + How to have Privacy on your Computer (Linux) @@ -61,7 +61,7 @@
      Previous Page

      nihilist@mainpc - 2024-06-16

      -

      How to install Linux from a Windows PC

      +

      How to have Privacy on your Computer (Linux)

      In this tutorial, we're going to look at the first and foremost thing anyone can do to remove surveillance from their digital lives, by installing a free and open source software (FOSS) host operating system: Linux, in this case we're going to setup the latest Debian.

      OPSEC Recommendations:

      @@ -175,7 +175,7 @@ -

      Here Bob decides that he wants to encrypt his whole harddrive too. That way, if someone were to steal his computer, without knowing his password, they would have no way to access Bob's local data.

      +

      Here Bob decides that he wants to encrypt his whole harddrive too. That way, if someone were to steal his computer, without knowing his password, they would have no way to access Bob's local data. (but be warned that for sensitive use, one shouldn't need to encrypt the system drive at all (more details).

      diff --git a/opsec/livemode/3.png b/opsec/livemode/3.png index 437b260..6829101 100644 Binary files a/opsec/livemode/3.png and b/opsec/livemode/3.png differ diff --git a/opsec/livemode/4.png b/opsec/livemode/4.png index a8284ac..ef84cda 100644 Binary files a/opsec/livemode/4.png and b/opsec/livemode/4.png differ diff --git a/opsec/livemode/index.html b/opsec/livemode/index.html index ae12e37..27aa821 100644 --- a/opsec/livemode/index.html +++ b/opsec/livemode/index.html @@ -63,6 +63,15 @@ Previous Page

      nihilist@mainpc - 2024-11-03

      Using the Host-OS in live-mode to prepare for long-term Sensitive Use

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. System Harddrive: not LUKS encrypted [1]

      4. +
      5. Non-System Harddrive: 500Gb (will be used to contain our Veracrypt encrypted volumes)

      6. +
      7. Host OS: Linux

      8. +
      9. Hypervisor: QEMU/KVM

      10. +
      +
      @@ -127,9 +136,9 @@ Fetched 101 kB in 1s (73.7 kB/s) Reading package lists... Done -

      Then we install the grub-live package

      +

      Then we install the grub-live package, and the ram-wipe package (warning, the ram-wipe package may cause your system to fail to boot in case if you encrypted the system drive using LUKS, click here for more details on this). Therefore i recommend having the Host OS system drive not encrypted until dracut supports LUKS encryption, but it shouldn't matter though, as the actual VMs that we'll be running will be on a non-system drive, which will be manually kept in deniable encryption.

      
      -root@debian-tests:~# sudo apt-get install grub-live -y
      +root@debian-tests:~#  apt install grub-live ram-wipe -y
       
       
      diff --git a/opsec/sensitivevm/0.png b/opsec/sensitivevm/0.png index 0188ac7..6b695d2 100644 Binary files a/opsec/sensitivevm/0.png and b/opsec/sensitivevm/0.png differ diff --git a/opsec/veracrypt/index.html b/opsec/veracrypt/index.html index ca208c3..92c6b79 100644 --- a/opsec/veracrypt/index.html +++ b/opsec/veracrypt/index.html @@ -65,7 +65,16 @@

      VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. It is based on Truecrypt, This tool will be used for Plausible Deniability.

      But why is Plausible Deniability important first of all ? From a legal perspective, depending on jurisdictions, you may be forced to type your password into an encrypted drive if requested. All it takes is for an adversary to be able to prove the existence of an encrypted drive to be able to force you to reveal the password to unlock it. Hence for example the regular LUKS encryption is not enough, because you need to be able to deny the existence of the encrypted volume. If that is the case, we have to use Veracrypt, which is an encryption tool used to provide protection (which is Plausible Deniability) against that scenario where you're forced to provide a password.

      - +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. System Harddrive: not LUKS encrypted [1]

      4. +
      5. Non-System Harddrive: 500Gb (used to contain our Veracrypt encrypted volumes)

      6. +
      7. Host OS: Linux but in live mode

      8. +
      9. Packages: grub-live and ram-wipe

      10. +
      11. Hypervisor: QEMU/KVM

      12. +
      +