mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-07-01 16:06:40 +00:00
fix logos
This commit is contained in:
parent
8a42f82534
commit
b1128e473f
7 changed files with 41 additions and 40 deletions
|
@ -187,7 +187,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
## **The Enemies of Anonymity: Surveillance, KYC procedures and Centralisation**
|
||||
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -202,7 +202,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md).
|
||||
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -225,7 +225,7 @@ Surveillance CANNOT be tolerated when you want Anonymity. So before you try to l
|
|||
|
||||
|
||||
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
|
||||
**There are only 2 possible long-term outcomes for Centralisation** : **
|
||||
|
||||
|
@ -250,9 +250,9 @@ As we have discussed [previously](../governments/index.md), for a government's l
|
|||
|
||||
And for the laws to be enforced, governments need:
|
||||
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -50,9 +50,9 @@ Businesses are centralised entities just like governments, they ALL can act as p
|
|||
|
||||
For the Law to be enforceable the authorities need to know 2 things:
|
||||
|
||||
1. What happened ? (lack of Privacy)
|
||||
1. What happened ? (lack of Privacy)
|
||||
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
|
||||
|
||||

|
||||
|
@ -63,9 +63,9 @@ That is the basis of this whole Privacy and Anonymity talk. In short, For the la
|
|||
|
||||
Modern governments know this very well, and some go to extreme lengths to make sure that every citizen is under surveillance.
|
||||
|
||||
1. USA: [Edward Snowden's Revelations](https://iv.nowhere.moe/watch?v=9g_sqKH2z4I)
|
||||
1. USA: [Edward Snowden's Revelations](https://youtube.com/watch?v=9g_sqKH2z4I)
|
||||
|
||||
2. China: [the Surveillance State](https://iv.nowhere.moe/watch?v=Np_C8647mK8) \- [See what it can lead to](https://iv.nowhere.moe/watch?v=v7AYyUqrMuQ)
|
||||
2. China: [the Surveillance State](https://youtube.com/watch?v=Np_C8647mK8) \- [See what it can lead to](https://youtube.com/watch?v=v7AYyUqrMuQ)
|
||||
|
||||
|
||||
|
||||
|
|
1
index.md
1
index.md
|
@ -73,6 +73,7 @@ If you want to earn some Monero, you can write new blogposts for us (from 10 to
|
|||
- [Dread /d/opsec](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/opsec) : Dread being one of the largest darknet forums out there, their opsec board is a fertile ground for truth seeking
|
||||
- [Sam bent's youtube channel](https://www.youtube.com/@Sam_Bent) : Ex-darknet vendor, well versed in anything opsec-related, with solid background on the law in general.
|
||||
- [Monero Talk's youtube channel](https://www.youtube.com/@MoneroTalk) : Show focusing on growing the adoption of Monero to the masses.
|
||||
- [/biz/'s Monero Info Dump](https://moneroinfodump.neocities.org/) : Website explaining why monero is the ultimate cryptocurrency
|
||||
|
||||
## Wall of Shame (as of May 2025)
|
||||
|
||||
|
|
|
@ -30,17 +30,17 @@ _Sidenote:_ If your setup is suitable only for public internet use, you CANNOT u
|
|||
|
||||

|
||||
|
||||
_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.
|
||||
_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.
|
||||
|
||||
_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.
|
||||
_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.
|
||||
|
||||
_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer.
|
||||
_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer.
|
||||
|
||||
_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services
|
||||
_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services
|
||||
|
||||
_Onymity:_ Because there is no privacy, anonymity is impossible for Bob.
|
||||
_Onymity:_ Because there is no privacy, anonymity is impossible for Bob.
|
||||
|
||||
_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.
|
||||
_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.
|
||||
|
||||
_Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he is under constant surveillance while using it.
|
||||
|
||||
|
@ -48,17 +48,17 @@ _Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he i
|
|||
|
||||

|
||||
|
||||
_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.
|
||||
_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.
|
||||
|
||||
_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.
|
||||
_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.
|
||||
|
||||
_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her
|
||||
_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her
|
||||
|
||||
_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised.
|
||||
_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised.
|
||||
|
||||
_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.
|
||||
_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.
|
||||
|
||||
_Deniability:_ Alice cannot deny that she has used her current setup
|
||||
_Deniability:_ Alice cannot deny that she has used her current setup
|
||||
|
||||
_Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to remove surveillance from her setup.
|
||||
|
||||
|
@ -66,17 +66,17 @@ _Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to
|
|||
|
||||

|
||||
|
||||
_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC
|
||||
_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC
|
||||
|
||||
_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.
|
||||
_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.
|
||||
|
||||
_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing
|
||||
_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing
|
||||
|
||||
_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse
|
||||
_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse
|
||||
|
||||
_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
|
||||
_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
|
||||
|
||||
_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.
|
||||
_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.
|
||||
|
||||
_Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed to implement anonymity technologies into his setup.
|
||||
|
||||
|
@ -84,17 +84,17 @@ _Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed
|
|||
|
||||

|
||||
|
||||
_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC
|
||||
_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC
|
||||
|
||||
_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.
|
||||
_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.
|
||||
|
||||
_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing
|
||||
_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing
|
||||
|
||||
_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse
|
||||
_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse
|
||||
|
||||
_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
|
||||
_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser
|
||||
|
||||
_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of.
|
||||
_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of.
|
||||
|
||||
_Conclusion:_ **Dave's setup is suitable for Sensitive use** , as he managed to implement plausible deniability on top of anonymity technologies into his setup.
|
||||
|
||||
|
|
|
@ -20,9 +20,9 @@ Naturally, law enforcement agencies LOVE to keep their hands on this data. They
|
|||
|
||||
As we discussed [previously](../governments/index.md) for the law to be respected, it needs to be enforced. And to be enforced, the authorities need to know:
|
||||
|
||||
1. What happened ? (lack of Privacy)
|
||||
1. What happened ? (lack of Privacy)
|
||||
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -24,7 +24,7 @@ When you are looking for Privacy, always ask yourself : **Privacy from what ? Pr
|
|||
|
||||
## **The Enemy of Privacy is Surveillance**
|
||||
|
||||
Make no mistake, as we discussed [previously](../govfear/index.md), governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: **They need to know what happened.** To be able to know what happened, **they need surveillance to be implemented wherever they can** , and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf.
|
||||
Make no mistake, as we discussed [previously](../govfear/index.md), governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: **They need to know what happened.** To be able to know what happened, **they need surveillance to be implemented wherever they can** , and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf.
|
||||
|
||||
Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their [closed source](../closedsource/index.md) software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see [FISA 702](https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf)).
|
||||
|
||||
|
|
|
@ -16,17 +16,17 @@ As we went over this comparison in the previous blogpost [here](../torvsvpns/ind
|
|||
|
||||
**VPNS:**
|
||||
|
||||
VPNs can provide Privacy from your ISP , but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.
|
||||
VPNs can provide Privacy from your ISP , but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.
|
||||
|
||||
In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity to another
|
||||
In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity to another
|
||||
|
||||
**Tor:**
|
||||
|
||||
The Tor Network provides Anonymity by routing your traffic through 3 random servers that are spread across the world.
|
||||
|
||||
Using Tor means you are employing Decentralisation, by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. 
|
||||
Using Tor means you are employing Decentralisation, by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. 
|
||||
|
||||
There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. 
|
||||
There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. 
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue