http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/ Operational Security: Showing how Privacy, Anonymity and Deniability can be achieved online. What is the goal of the Opsec blog ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/whytheblog/index.html 2025043000 In this tutorial we explain what the goal of the blog is, and what we are trying to solve with it Anonymous Monitoring (Grafana, Prometheus, Node-exporter) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonymous_server_monitoring/index.html 2025042700 In this tutorial we're going to cover how you can monitor the resource consumption of your remote servers while maintaining your anonymity, using Grafana, Prometheus, and node exporter. Self-Hosted LLM Hidden Service http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/openwebuilocalllms/index.html 2025042100 In this tutorial we're going to look at how you can replace services like ChatGPT with your own local, self-hosted LLM, and make it available via Tor using a hidden service. Where to hide your Monero Wealth ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/monerowealth/index.html 2025042001 In this tutorial we're going to cover how and where you can safely store your monero wealth, even when an adversary seizes your harddrives. Public Chats / Private Chats / Anonymous Chats / Deniable Chats http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/chats/index.html 2025041600 In this tutorial we're going to differentiate all 4 types of Chats, being the public, private, anonymous and deniable chats, and briefly showcase how simpleX fits all of our needs. How to Verify One's Identity While Maintaining Anonymity Using PGP Canaries http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/pgpcanary/index.html 2025041300 In this tutorial we're covering how to verify someone's identity while maintaining their anonymity intact, thanks to PGP canaries Sensitive Critical Data Backup Procedure http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/plausiblydeniabledataprotection/index.html 2025040601 In this tutorial we're going to cover how to backup the critical data that you would normally store inside of your Sensitive use VM, in order to make sure that your critical data (meaning your keepass .kdbx file, your SSH keys, your PGP keys, your Monero seed files) can still be accessed and reused, even if the adversary were to seize and destroy your devices in multiple takedowns. Why is Metadata detrimental to Anonymity? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonymitymetadata/index.html 2025040201 In this tutorial we're going to cover why exactly is Metadata detrimental to one's anonymity Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) (April 2025 Update) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/sensitivevm/index.html 2025040200 In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop. The main source of Plausible Deniability: Deniable Encryption (April 2025 update) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/veracrypt/index.html 2025040100 In this tutorial we're going to cover how to use zulucrypt to create hidden veracrypt volumes to enable long-term sensitive use. Using the Host-OS in live-mode to enable Sensitive Use http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/livemode/index.html 2025040100 In this tutorial we're going to cover how to use livemode and ram-wipe from inside kicksecure to enable sensitive use Nextcloud .onion Setup (Anonymous File Hosting) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/nextcloud/index.html 2025032701 In this tutorial we're going to cover how you can install an .onion only Nextcloud instance, Nextcloud is a FOSS alternative to replace popular file hosting websites like google cloud or onedrive, which can be ideal to make sure that your files are backed up somewhere, all while preserving anonymity. I recommend self-hosting this service at home, that way you make sure that your personal data stays at your home, rather than making it readable by an adversary on a remote server. How to become a Maintainer http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/maintainers/index.html 2025032600 In this tutorial we're going to cover how to become a maintainer for the Opsec blog, which is the next step for you if you are already a good content contributor for the blog. Peer-to-Peer Large File Sharing (Torrents over I2P) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/i2ptorrents/index.html 2025031700 In this tutorial we're covering how to torrent files via i2p Anonymous Server Monitoring http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonymous_server_monitoring/index.html 2025031000 In this tutorial, we're going to cover how you can monitor your servers remotely, but while maintaining anonymity the whole time. OnionBalance for .onion domains load balancing http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/onionbalancelb/index.html 2025022700 In this tutorial we're going to cover how to setup high availability on the domain level for .onion websites, using onionbalance How to setup a MySQL Master-Master replication over Tor http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/mysqlmastermaster/index.html 2025022100 In this tutorial we're going to cover how to have a master-master mysql replication going but while keeping Tor in between each server, to prevent an adversary from figuring out where each server is. When the Adversary is the cloud provider himself http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/cloud_provider_adversary/index.html 2025020600 In this tutorial we're going to cover what are the 2 main strategies when it comes to hosting a sensitive service remotely How to setup a basic NGINX / PHP / MySQL app http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/tornginxphpmysql/index.html 2025020200 in this tutorial we're going to cover how to setup a basic nginx php and mysql web app accessible over Tor, which we'll use later on to showcase high availability How to join the Darknet Lantern Webring ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/darknetlantern/index.html 2025020100 In this tutorial we're going to first explain why the Darknet Lantern is important in the current Darknet context, we'll cover what it is made of, and then we'll cover how to spin up a Darknet Lantern instance, how to maintain one's list of onion links, and lastly we'll cover how to join the Darknet Webring. Monero Inheritence Management (VaultWarden Emergency Contacts) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/moneroinheritance/index.html 2025012900 In this tutorial we're going to cover how you can transfer your monero wealth to your successor safely without requiring a third-party. How to explore the Darknet? (Visibility and Discoverability) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/darknetexploration/index.html 2024012500 In this tutorial we're going to take a look at what are the differences between the clearnet and the darknet, and how you can explore the darknet using the lantern project. Why is High Availability Important for Deniability ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/high_availability/index.html 2024123000 In this blogpost we're going to look into why High Availability is essential to maintain deniability for a particular hidden service. How to navigate qubes OS and segment your internet uses http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/qubesosnetwork/index.html 2024122000 In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os. Stylography protection (Running a Local LLM and copy pasting messages) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/stylometry/index.html 2024120400 In this tutorial we're going to take a look at how you can run a LLM Locally to rewrite your messages to prevent sylometry fingerprinting (in order to make sure you're not being deanonymized from the way you're typing) Why is the Darknet superior to Clearnet ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/clearnetvsdarknet/index.html 2024120200 In this tutorial we're going to explain why you should host your services on the Darknet rather than the Clearnet. Easy Private Chats - SimpleX http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion//opsec/privatesimplex/index.html 2024120100 In this article we'll compare a few options (Telegram, Signal and SimpleX) to see how their technical details stack up and determine which is best for easy private chats. How to access Tor when you are in Russia or China using v2ray (vmess / vless) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/v2ray/index.html 2024112700 In this tutorial we're going to cover how you can access Tor while being in a heavily-censored country like russia or china, by using the censorship-circumvention tool called v2ray. Gitea .onion Setup (Anonymous Code Repositories and Collaboration) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/gitea-anon/index.html 2024112302 In this tutorial we're going to take a look at how you can setup an anonymous gitea instance that is accessible over Tor, in order to be able to collaborate with people on projects, while maintaining everyone's anonymity. One on One large file sharing (Syncthing over Tor) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/syncthinganon/index.html 2024112300 In this tutorial we're going to dive into how to transfer large files anonymously, using whonix and Syncthing Mental Energy: How are you good at spending it ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/mentalenergy/index.html 2024111800 In this tutorial we're going to explain the 3 ways you can spend your mental energy, just like money you can spend it gradually, spend it all in one go, or invest it to get a return over investment. How to run the Blog Yourself http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/runtheblog/index.html 2024111600 In this tutorial we're going to see how you can host the nihilism blog yourself, since it has no copyright restrictions whatsoever. How to Get a Credit Card Anonymously (Credit Cards as a Service) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anoncreditcard/index.html 2024110800 In this tutorial we're going to look at how to get a credit card anonymously online Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/sensitivevm/index.html 2024110701 In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop. How to get and use residential proxies anonymously http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonproxy/index.html 2024110700 While Tor is a requirement to protect your anonymity online, some services refuse to be accessed anonymously, and are intentionally blocking connections coming from Tor exits nodes. A residential proxy will reroute your access through a residential ip address, which makes your connection look like it is coming from your ISP or your mobile carrier. The main source of Plausible Deniability: Deniable Encryption blog.nowhere.moe/opsec/veracrypt/index.html 2024110501 In this tutorial we're going to explain why deniable encryption is important for sensitive use, and why we need to have the host OS in live mode to be able to use it. Using the Host-OS in live-mode to prepare for long-term Sensitive Use http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/livemode/index.html 2024110400 The main usecase of using your Host OS in live mode, is that you want to use it for long term sensitive activities (meaning, you want to save sensitive files on a harddrive). As you're going to see, using the Host OS in live mode is effectively a hard requirement for deniability. Tails OS QEMU VM for Temporary Sensitive Use http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/tailsqemuvm/index.html 2024110300 In this tutorial we're going to see why Tails OS is suitable for Short Term Sensitive Use due to it's default live-mode feature, where upon shutting down the OS, every forensic trace of what you were doing is completely erased from memory, where the entire OS is loaded into. One-on-One Large File Sharing (Syncthing over VPN) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/syncthingvpn/index.html 2024110202 In this tutorial we're going to showcase how you can send large files privately to someone else by using Syncthing. How to Anonymously access websites that block Tor http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/whentorisblocked/index.html 2024110200 In this tutorial we're going to cover how we can circumvent a website's attempts at blocking Tor traffic, by using a VPN. As we discussed previously, this is relating to the serverside context required to know if we should combine the use of Tor with the use of a VPN. Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/sensitivevm/index.html 2024110100 In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop. Reflecting: Brainstorming Ideas while on the run http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/reflecting/index.html 2024102702 In this tutorial we're going to cover what to do when you get a simple or complex idea when you are not at home, and how you can quickly grab a hold of that idea before you forget about it Productivity - Diet to favor cerebral activity http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/index.html 2024102701 In this tutorial we're going to cover what fuel you need to use for your body and brain to function at their best, what to avoid, and what food to prefer. we'll also go over on the frequency of meals you should have, and how to correctly assess what food is best for your body. Reflecting: How to use graphs to help Brainstorming ideas (draw.io) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/graphs/index.html 2024102604 In this tutorial we're going to see why graphs are important, and how to make them using drawio. Zero Email Workflow (in Thunderbird) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/zeroemail/index.html 2024102602 In this tutorial we're going to cover how you can organize your mailbox in such a way that only the important parts remain in your focus. We'll go over what labels to use, and how to set your priorities straight from both the inbox folder and the sent folder. Pomodoro Focus times (Intentional pauses to prevent burnouts) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/pomodoro/index.html 2024102601 In this tutorial we're going to go over why you need to take breaks, how often, how long, and what you can do during those breaks. Workspace Preparation: Mental Energy Optimisation http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/mentalopti/index.html 2024102500 In this tutorial we're going to cover how you can remove all blockers from your ability to focus on your work. We'll go over IRL measures to take, and digital measures to take. Productivity: The Morning Routine http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/morningroutine/index.html 2024102301 In this tutorial we're covering when and how i start the day, and why i do those things. Collaborative Project Management (Kanban in Gitea) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/kanban/index.html 2024102203 In this tutorial we're going to showcase how to create a git repository on gitea, and how to manage projects with a Kanban-style. Micro Workflow: Todo Listing, Contextualizing, and Ordering Tasks http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/microworkflow/index.html 2024102201 In this tutorial we're going to look at how you can manage your workflow on the micro level, by listing the things you have to do, contextualizing them, and ordering each task. Peer-to-Peer Large File Sharing (Torrents over VPN) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/p2ptorrents/index.html 2024102002 In this article, we will explore how, after binding a VPN to their torrent clients, Sam the Seeder can privately share a large file with Larry the Leecher. Macro Time Management: Prioriting Projects and Calendar Scheduling http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/macrotime/index.html 2024102000 In this tutorial we're going to cover how to schdule time for your work projects and your personal projects. We're going to cover how you can priorize your projects, and how you can schedule it from inside Thunderbird, and using nextcloud CalDAV. How to Get an Email Account Anonymously (Emails as a Service) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonemail/index.html 2024101600 In this article, we will explore how to sign up for email account anonymously. Specifically, we will explore a privacy-focused email provider, Proton Mail, and how to sign up using Tor without inputting any additional information whatsoever. How to Receive Anonymous SMSes (Remote SMSes as a Service) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonsms/index.html 2024101400 In this tutorial we're going to showcase how to recieve SMSes anonymously, using a remote SMS as a service that doesn't require any KYC to use. Easy Anonymous Chats Using SimpleX http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonsimplex/index.html 2024101302 In this tutorial we're going to see how to setup a chat application for Anonymous use. This is especially important in a world where mass-surveillance is nearly-omnipresent. It has become the end users' responsibility to uphold their privacy and anonymity while communicating online. Macro Workflow: Listing Topics that truly matter http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/macroworkflow/index.html 2024101301 In this tutorial we'll cover briefly how to choose topics based on the reason behind your actions, we'll go over some example topics, and how to label them to be able to easily order them. The right thing to do: What is the reason behind your actions? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/rightthing/index.html 2024101200 Introspection: What is it that truly matters to you? Acting out of self interest: Unfulfilling Immaturity, The right thing to do: The Fulfilling Maturity Nihilism: Mantras to reset the Mind http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/nihilism/index.html 2024101004 In this tutorial we're going to cover the structure of your own mind, We're going to explain why it is not normal to follow the norm, and why Nihilism is vital for your own mental health. How to Maintain Multiple Identities Online http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/multiple_identities/index.html 2024101001 In this tutorial, we’ll guide you through setting up and managing multiple online identities to enhance your privacy and security. We’ll discuss why this is crucial, how to establish distinct personas, and the steps you need to keep them isolated from each other. How to remain Anonymous during a protest http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonprotest/index.html 2024101000 In this tutorial we're going to cover what must be taken into account when it comes to using phones outdoors, how you can remain anonymous outdoors, and what it takes to have a phone for anonymous use. How to contribute to The Nihilism Blog http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/contribute/index.html 2024100602 In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via gitea. We'll also look into how you can run the blog yourself since it's entirely public domain (Creative Commons Zero license). How to setup a Haveno Seed Node http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/haveno-seednode/index.html 2024100600 In this tutorial we're going to take a look at how you can contribute to an existing Haveno Network, by running a Seed Node, in order to make the Haveno Network of your choice more resillient to potential takedowns. How to send small files Anonymously (Onionshare) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/onionshare/index.html 2024093000 OnionShare is a free and open-source cross-platform tool that utilises the TOR network to anonymously share files (send and receive), host an onion website and create a simple chat room. Hiding files in images with steghide http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/steghide/index.html 2024092800 steghide is a mature GPL-licensed CLI tool for hiding arbitrary data inside of of image files (and some archaic audio formats). Its official web presence is located at http://steghide.sourceforge.net/. it conceals data inside a larger coverfile in a way that is indistinguishable to first-order statistical analysis. This means there is are anomalies in the file histogram, making most pictures innocuous without having the original image to compare it to. Cold Exposure: Where Discipline takes over Comfort http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/coldshowers/index.html 2024092600 What the body and mind doesn't want, but actually needs. The perfect discipline practice. Opus Nihil: Dissolving Compulsions http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/opus-nihil/index.html 2024092601 What is it that you truly need ? What is it that you truly want ? Dissolve those compulsions yourself. New Tutorial Category : Productivity Introduction - Discipline over Comfort http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/productivity/discipline/index.html 2024092500 Making sure that your Body and Mind are not getting in the way of your work, and making sure that you are working as efficiently as possible. XMPP Chat Server Setup (Clearnet + Onion + OMEMO E2EE) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/xmpp2024/index.html 2024092100 In this tutorial, we're going to check out how to setup a XMPP chat server, that is accessible over Tor, as a hidden service, using Prosody. We'll also cover how to have a Clearnet XMPP server, and how to have OMEMO End to End encryption using the Gajim XMPP client. Why can't I trust Centralised Exchanges, and random Monero nodes ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/chainalysisattempts/index.html 2024090700 As of September 5, 2024 the sech1 posted on monero.town the following post, which was a repost of the following reddit post talking about a leaked Chainalysis meeting video about what was their progress on tracing monero transactions back in August 2023. This is a great opportunity to highlight the opsec weaknesses they are targeting so let's dive into it. How to rent remote domains anonymously (Registrar resellers) ⭐ http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anondomain/index.html 2024090500 Not many people know that it is possible to operate a clearnet website, anonymously. In this tutorial we're covering how you can rent a clearnet domain, anonymously. Mine Monero with p2pool and xmrig http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/monerop2pool/index.html 2024082500 how to mine Monero using p2pool and xmrig. How to use the Tor Browser on Mobile http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/MobileTor/index.html 2024081901 Sometimes you are not always in front of your computer but need to browse the web anonymously while being away from your home. In this tutorial we're going to cover how to browse the web anonymously while on your mobile device. How to write good Tutorials http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/tutorial/index.html 2024081900 Because after all, how can you expect people to write good tutorials without being shown how to write them in the first place ? Hiding files in videos (small or large files) with zuluCrypt http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/anonzulucrypt/index.html 2024081800 Using Steganography to hide small or large files into Video files, using zulucrypt New Matrix Chat (Opsec, Sysadmin, hacking, Programming) http://matrix.to/#/#nowheremoe:nowhere.moe 2024081500 As nowhere.moe and datura.network are being merged into nowhere.moe, feel free to join the new matrix chat Why isn’t Privacy enough for Anonymous Use? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/anonuse/index.html 2024081400 In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it. New domain: Nowhere.moe http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nowhere.moe.txt.asc 2024081000 Explaining how the ownership of the services will change Route QEMU VMs through a Host OS VPN http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/vpnqemu/index.html 2024080900 In this tutorial we're going to check how to have VMs use a Host OS VPN, which can be vital if your ISP doesn't allow Tor traffic Where to host Anonymous Clearnet Services ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/anonclearnetservices/index.html 2024060801 In this tutorial we're going explain how you can have anonymous clearnet services, which can either remotely or self-hosted. Where to host Anonymous Hidden Services ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/hiddenservice/index.html 2024060800 In this tutorial we're going to look at where you can host Hidden Services, while still remaining Anonymous, One way is to host the service remotely, and the other is to self-host it. Introduction to Self-Hosting Hidden Services http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/hiddenservices/index.html 2024080300 Clearnet Services: Centralized, but can be used anonymously, Tor Hidden Services: Decentralized and Anonymous, But Warning, do not host anything sensitive at Home! Opening the Blog to contributions (earn XMR!) http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions 2024072500 Long due, i'm now opening blog.nowhere.moe to contributions, i am offering monero (10-50euros per new complete blogpost), if you want to contribute a tutorial i didn't list yet, let me validate your idea beforehand. Tor through VPN or VPN through Tor? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/torthroughvpn/index.html 2024072400 In this tutorial we're going to justify the 4 possible Tor / VPN combinations, based on both clienside and serverside contexts. We'll also discuss specific contexts where anonymity is too risky to attempt. How to install GrapheneOS on a Pixel Phone http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/graphene/index.html 2024071001 In this tutorial we're going to setup graphene OS, an open source android operating system for google pixel phones. The lack of Open Source Hardware (CPUs, Motherboards, GPUs) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/openhardware/index.html 2024071000 In this article we'll look at why Open source Hardware is vital, the current status of the closed-source hardware monopoly on the market, and the current status of open source hardware on the market The main source of Anonymity: The Tor Network http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/torvsvpns/index.html 2024063000 In this tutorial we're going to explain why VPNs are not enough when it comes to maintaining Anonymity, and in what way Tor is the main source of Anonymity online. What is Anonymity ? Why is it Important ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/anonymityexplained/index.html 2024062900 In this tutorial we're going to explain what is Anonymity, What are the enemies of Anonymity, and why it is important, especially for international journalism. How to compile open source software + How to verify software integrity http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/compilation/index.html 2024062803 In this tutorial we're going to cover Why compile even compile software yourself, how to compile c++ programs, and How to verify software integrity How to get privacy from your ISP using a VPN http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/vpn/index.html 2024062801 In this tutorial we're going to cover Why does Bob need a VPN to begin with, how to purchase a VPN, How to download it, and how to verify that it is properly connected, from inside a debian VM, for private internet usage. Linux Hypervisor Setup (QEMU/KVM virtualisation) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/hypervisorsetup/index.html 2024062800 In this tutorial we're going to cover how to setup the open source hypervisor QEMU/KVM in Linux host OS, using the libvirt technology. How to install Linux from a Windows PC http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/linux/index.html 2024061601 In this tutorial, we're going to look at the first and foremost thing anyone can do to remove surveillance from their digital lives, by installing a free and open source software (FOSS) host operating system: Linux, in this case we're going to setup the latest Debian. What is Privacy ? Why is it Important ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/privacy/index.html 2024061600 This is where the Journey begins. We're going to look at why you should bother with Privacy first of all, and what it is exactly. Tails OS QEMU VM for Temporary Anonymity http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/tailsqemuvm/index.html 2024061400 In this tutorial we're going to look at how you can run Tails OS (The Amnesic Incognito Linux System) in a QEMU VM, following the official documentation, along with how to setup persistant storage Audit your OPSEC and determine the appropriate internet use http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/opsec4levels/index.html 2024060900 In this tutorial we're going to explore how you can audit your own level of opsec, using the following 6 parameters:Complexity, Transparency, Surveillance, Centralisation, Onymity, and Deniability. Governments fear Decentralisation and Anonymity http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/govfear/index.html 2024060701 In this tutorial we're going to explain why Decentralisation and Anonymity are essential in reducing the power of the government over it's citizens. Governments, Centralisation, and Law Enforcement http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/governments/index.html 2024060700 In this tutorial we're going to cover and explain what are governments, and why they are trying to force us into mass surveillance and KYC procedures. OPSEC: The right technology and behavior http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/opsec/index.html 2024060600 Operational Security, is a process aimed at identifying if your actions can be observed by an adversary. In this context, how good your OPSEC is, determines the level of your privacy and anonymity. Phone Numbers are incompatible with Privacy! http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/phonenumbers/index.html 2024052600 Sim Cards: the Deanonymization Tool, You cannot have an anonymous Phone at home. If a service requires your phone number, it is against both your Privacy and Anonymity My Manifesto http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/manifesto/index.html 2024052500 Explaining why I have a blog in the first place Haveno DEX Cash by Mail -> XMR transaction http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/haveno-cashbymail/index.html 2024052400 In this tutorial we're going to cover how to buy Monero, for cash by mail on the Haveno Decentralised Exchange. This was the most popular payment method back on LocalMonero, due to being an improvement over bank transfers (like SEPA in the EU) when it comes to trading larger volumes in the long run, as Cash cannot easily be traced by adversaries unlike bank transfers, making Cash by Mail one of the most private ways to exchange real world money for Monero. Haveno DEX SEPA Instant -> XMR transaction http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/haveno-sepa/index.html 2024052300 In this tutorial we're going to cover an instant SEPA transfer (which is a bank transfer) transaction for monero, this is one of the most popular payment options in the EU region, a favorite of mine due to the speed of the transaction. Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/haveno-arbitrator/index.html 2024051900 In this tutorial we're going to cover how the Haveno DEX handles trade disputes, which can happen as, after all it's decentralised, and anonymous by default. We'll cover What protects the Buyer or the Seller, what happens when you encounter a scammer, and how the arbitration resolution plays out. Haveno Decentralised Exchange Face-to-Face Fiat to Monero Transaction http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/haveno-client-f2f/index.html 2024140500 Setting up Haveno DEX locally, making it connect to a Tor bridge, creating a buying offer, transacting with a user directly, to exchange FIAT for Monero, and then withdrawing your funds from the Haveno Monero wallet. Internet usage segmentation (QEMU VMs + Identity Management) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/internetsegmentation/index.html 2024030500 Different Internet Usage, Identity Management, Multiple Virtual Machines (VMs), Internet Usage Segmentation Recap Acquiring remote servers and domains anonymously (non-KYC providers) http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/anonymousremoteserver/index.html 2024020501 Finding out a non-KYC Cloud Provider and Email Provider, Purchasing the server anonymously (using Monero), and Accessing the server anonymously (SSH through Tor) Clientside: Encryption is good, but you need Plausible Deniability http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/encryption/index.html 2024050100 Encryption Provides Privacy, But what happens when Bob is forced to give out your password? Why is Plausible Deniability is Vital? Tor through VPN or VPN through Tor? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/torthroughvpn/index.html 202404301 Accessing websites that block Tor and Hiding Tor usage from your ISP Why can't I trust closed source software? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/closedsource/index.html 20240430 No, you still can't trust closed source software Sensitive .onion Services: Self-Host or Host Remotely ? http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/sensitiveremotevshome/index.html 20240429 Explaining what hosting sensitive services implies Decentralized Finances http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/servers/finances/index.html 1 Centralised currencies, Decentralised Currencies, and Centralised Exchanges, privacy cryptos and decentralised exchanges