fix logos

This commit is contained in:
anon 2025-06-21 08:15:54 +02:00
parent 8a42f82534
commit b1128e473f
7 changed files with 41 additions and 40 deletions

View file

@ -30,17 +30,17 @@ _Sidenote:_ If your setup is suitable only for public internet use, you CANNOT u
![](1.png)
![](../co0.png)_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.
![](../logos/co0.png)_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.
![](../tr2.png)_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.
![](../logos/tr2.png)_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.
![](../su2.png)_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer.
![](../logos/su2.png)_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer.
![](../ce2.png)_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services
![](../logos/ce2.png)_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services
![](../on2.png)_Onymity:_ Because there is no privacy, anonymity is impossible for Bob.
![](../logos/on2.png)_Onymity:_ Because there is no privacy, anonymity is impossible for Bob.
![](../de2.png)_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.
![](../logos/de2.png)_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.
_Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he is under constant surveillance while using it.
@ -48,17 +48,17 @@ _Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he i
![](2.png)
![](../co1.png)_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.
![](../logos/co1.png)_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.
![](../tr0.png)_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.
![](../logos/tr0.png)_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.
![](../su0.png)_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her
![](../logos/su0.png)_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her
![](../ce1.png)_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised.
![](../logos/ce1.png)_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised.
![](../on1.png)_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.
![](../logos/on1.png)_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.
![](../de2.png)_Deniability:_ Alice cannot deny that she has used her current setup
![](../logos/de2.png)_Deniability:_ Alice cannot deny that she has used her current setup
_Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to remove surveillance from her setup.
@ -66,17 +66,17 @@ _Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to
![](3.png)
![](../co2.png)_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC
![](../logos/co2.png)_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC
![](../tr0.png)_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.
![](../logos/tr0.png)_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.
![](../su0.png)_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing
![](../logos/su0.png)_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing
![](../ce0.png)_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse
![](../logos/ce0.png)_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse
![](../on0.png)_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
![](../logos/on0.png)_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
![](../de1.png)_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.
![](../logos/de1.png)_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.
_Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed to implement anonymity technologies into his setup.
@ -84,17 +84,17 @@ _Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed
![](4.png)
![](../co2.png)_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC
![](../logos/co2.png)_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC
![](../tr0.png)_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.
![](../logos/tr0.png)_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.
![](../su0.png)_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing
![](../logos/u0.png)_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing
![](../ce0.png)_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse
![](../logos/ce0.png)_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse
![](../on0.png)_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
![](../logos/on0.png)_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
![](../de0.png)_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of.
![](../logos/de0.png)_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of.
_Conclusion:_ **Dave's setup is suitable for Sensitive use** , as he managed to implement plausible deniability on top of anonymity technologies into his setup.