fix stuff

This commit is contained in:
nihilist 2025-05-11 17:42:37 +02:00
parent ab805ea1fd
commit c01d707863
4 changed files with 47 additions and 12 deletions

View file

@ -8,6 +8,16 @@
With this new mkdocs blog version, we have completely changed how you can find blogposts that are relevant to your own situation. Thanks to the Mkdocs search plugin, **you can now search for specific terms (ex:Tor, Monero, Anonymity, Deniability) in the search bar at the top** to find the blogposts that are relevant to what you wish to know. Don't hesitate to combine search terms together to try and find what you need.
## What is the goal of the Opsec blog ?
**In short, we're here to tell you why and how you can become ungovernable.**
- Priority number 1: Solving the lack of education
- Priority number 2: Advice applicable to 90% of the people out there, to defeat 99% of the risks
- Priority number 3: Simplifying the advice as much as possible
(Check out [this blogpost](whytheblog/index.md) for more details on our mission)
## Our latest contributed tutorials:
- 2025-05-02: [Convert Monero into other Cryptos Anonymously (XMR -> LTC)](haveno-crypto/index.md)
- 2025-05-01: [How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)](monerofirst/index.md)
@ -37,3 +47,4 @@ If you want to earn some Monero, you can write new blogposts for us (from 10 to
- [Dread /d/opsec](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/opsec)
- [Sam bent's youtube channel](https://www.youtube.com/@Sam_Bent)
- [Monero Talk's youtube channel](https://www.youtube.com/@MoneroTalk)

Binary file not shown.

Before

Width:  |  Height:  |  Size: 16 KiB

After

Width:  |  Height:  |  Size: 500 KiB

Before After
Before After

View file

@ -96,11 +96,23 @@ Now that the /dev/vdb1 partition is available for us to use, let's create the ve
Here is the important part: you need to mention **Password A for the decoy volume** (which is the outer volume, it will span the entire disk), and you need to mention **Password B for the hidden volume** (which is the hidden veracrypt volume where we'll be able to store our sensitive files)
**WARNING (11/05/2025): Do not use the default ext4 filesystem type for veracrypt volumes, as writing in an ext4 decoy volume may overwrite the hidden volume at random (i tested it by writing a random 100mb file in a 300mb ext4 decoy volume, and it started overwriting the hidden volume, unlike with an exfat filesystem), therefore we need to use the exfat filesystem, to prevent this problem:**
```sh
#make sure your system can use exfat filesystems:
[user ~]% sudo apt update -y
[user ~]% sudo apt install exfat-fuse -y
```
(Special thanks to VioletSentiment for finding this btw, since i overlooked it initially)
![](41.png)
Here you may need to click create twice as zulucrypt recommends you to use another format that it can't use, so click create a second time and then wait for it to create the volume:
Here click create, then wait for the volume to be created (it takes some time because it needs to write random data on the disk initially)
![](42.png) ![](43.png)
![](42.png)
![](43.png)
And that's it! We have successfully created the veracrypt volume, so now let's mount each one:
@ -108,7 +120,15 @@ And that's it! We have successfully created the veracrypt volume, so now let's m
First let's mount the decoy volume (which we'll later use to store non-sensitive files, that would make sense for an adversary to keep in an encrypted drive):
![](44.png) ![](45.png) ![](46.png) ![](47.png) ![](52.png)
![](44.png)
![](45.png)
![](46.png)
![](47.png)
![](52.png)
Here as you can see, the decoy volume once mounted spans the entire non-system drive (in this case 20GB). **So if you were forced to open it for an adversary, they would only find non-sensitive files** (for example pirated movies or adult content) that are stored in it. And since the volume spans the entire drive, **you can deny the existance of any other encrypted volume in there, and the adversary would be unable to prove otherwise.** This means that our deniability is maintained.
@ -120,7 +140,9 @@ Next we'll unmount the decoy volume to mount the hidden volume instead:
At this step you need to make sure that noone is watching you type this second password, **as this second volume needs to remain a secret at all costs, it's existance is only to be known by you.**
![](50.png) ![](51.png)
![](50.png)
![](51.png)
And now after unlocking the hidden volume (and revealing it at the same time), we see that it is 10GB big, as intended. **And it is only in that hidden volume, that you can safely store your sensitive files which are meant to remain secret at all costs.**

View file

@ -19,13 +19,13 @@ On the one hand you have people that want to protect their individual freedom, w
However, don't be naive and believe that anonymity only benefits the good people,**you have statists that also use anonymity to blend in with everyone else, to try and stir things their way.** In practice, to spot them you need to look for the following:
- FUD Spreading (over-skepticism) [(ex: SimpleX not being compilable)](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/5c664bb82ffb0cac6650/#c-55265a407fa5fbd5a6)
- FUD Spreading (over-skepticism) (ex: SimpleX not being compilable)
` ![](2.png)
Most of the times this is the most effective tactic because according to brandolini's law, **the time it takes to refute bullshit is an order of magnitude greater than that required to produce it.** It takes time to refute someone's made up lies, more time than it took time to for them to create them. Lucky for you, this entire blog is here to dispel people's lies, and show you the raw truth. _In this instance someone was spreading FUD that simplex wasn't compilable_ (they were only partly right in saying that simplex didnt have reproducible builds yet, to their credit). **So we went ahead and explored if it was possible to compile simplex ourselves, which we confirmed that it actually was,[as explained in this post.](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/f8e6c1325c63075514b7/#c-df5fdf8c61453e7deb)** (we obviously listed all the steps to compile it, so that the other party can test it and verify it as valid from his end).
Most of the times this is the most effective tactic because according to brandolini's law, **the time it takes to refute bullshit is an order of magnitude greater than that required to produce it.** It takes time to refute someone's made up lies, more time than it took time to for them to create them. Lucky for you, this entire blog is here to dispel people's lies, and show you the raw truth. _In this instance someone was spreading [FUD that simplex wasn't compilable]((http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/5c664bb82ffb0cac6650/#c-55265a407fa5fbd5a6))_ (they were only partly right in saying that simplex didnt have reproducible builds yet, to their credit). **So we went ahead and explored if it was possible to compile simplex ourselves, which we confirmed that it actually was,[as explained in this post.](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/f8e6c1325c63075514b7/#c-df5fdf8c61453e7deb)** (we obviously listed all the steps to compile it, so that the other party can test it and verify it as valid from his end).
![](1.png)
@ -43,10 +43,10 @@ Not to mention the organization of the whole blogpost will affect wether or not
**TLDR: if you're not serious about it, in the long run, you're bound to make a mess out of it.**
You can also encounter the opposite with laxists giving into over-simplifications at the expense of their objectivity:
You can also encounter the opposite with laxists giving into [over-simplifications](https://discuss.privacyguides.net/t/should-privacy-guides-require-open-source-source-first-or-source-available-as-a-criteria-for-all-tools/22684/83) at the expense of their objectivity:
- Minimization Fallacies (ex: [Pretending that using closed-source software is OK for privacy](https://discuss.privacyguides.net/t/should-privacy-guides-require-open-source-source-first-or-source-available-as-a-criteria-for-all-tools/22684/83))
- Minimization Fallacies (ex: Pretending that using closed-source software is OK for privacy)
@ -78,7 +78,7 @@ If we recommend something that is objectively not protecting against an obvious
Truth seeking is definitely required in Opsec, since it is about combining all valid relevant perspectives on a given topic. For instance, you have the perspective of privacy, the perspective of anonymity, the perspective of deniability, the perspective of the adversary, the perspective of all the relevant parties in a given setup (the cloud provider, the peer you are transacting with, the law enforcement, the internet service provider, etc). **ALL of those perspectives need to be taken into account when you give accurate operational security advice** , you may see something that i missed, and i may see something you missed. It happens all the time, therefore remain open-minded, and stay objective as much as possible. **Don't be an egocentrist, and become a truth seeker. Seek to percieve the truth from all the different valid perspectives, because that's the only way to get closer to it.**
## **Priority Number 2: Applicability to 90% of the people out there**
## **Priority Number 2: Applicability to 90% of the people out there, to defeat 99% of the risks**
When you're giving operational security advice, people need to care about it first of all. Everyone cares about privacy sooner or later in their life. Wether it is to do something private in the bedroom, or to have some private discussion about something, it is a clear topic that people want to know about. Especially on the digital side of things.
@ -95,8 +95,8 @@ Another example of context importance, is wheter or not you need anonymity to sa
In 2017 The Times made a Freedom of Information request which found **3,395 arrests had been made by 29 UK police forces for “section 127” offences, which is used for cases of online abuse.** According to the article, 1,696 people were subsequently charged. Section 127 offences cover harassment that takes place via an “electronic communications network”, and is not limited to social media posts harassment via email or other forms of online communication can also fall under this definition.
([source](https://pa.media/blogs/fact-check/russia-has-far-more-restrictions-on-social-media-use-than-the-uk/))
_TLDR:_ there were 9 times more arrests for social media posts in the UK than in Russia.
(source: https://pa.media/blogs/fact-check/russia-has-far-more-restrictions-on-social-media-use-than-the-uk/)
TLDR: there were 9 times more arrests for social media posts in the UK than in Russia.
Therefore, **contextualize, list the threats, and explain the appropriate solution for a given situation**
@ -135,5 +135,7 @@ We need to ensure that everyone knows that with the correct technology, when use
Yes, this is an Anarchist blog. We are telling you how exactly you can become ungovernable. We don't care about what you intend to do with the setups we showcase, in fact we hope that you intend to use it to better the world with it, but one thing is for sure; **the individual is free to do whatever they like, as long as their actions are protected from any possible repercussions, be it by implementing the appropriate setups that protect their Privacy, their Anonymity, or their Deniability.**
_TLDR:_ Stop complaining that government/corporation/company did X, Y or Z. Learn about those tools that are here to protect your freedom, Learn how to use them, Implement them yourself, and just become free, you have 0 excuse to not choose to be free right now. **All you need is to learn how to do it, and to just do it.**
_TLDR:_ Stop complaining that government / corporation / company did X, Y or Z. Learn about those tools that are here to protect your freedom, Learn how to use them, Implement them yourself, and by using become free.
**You have ZERO excuse to not choose to be free right now. All you need is to learn how to do it, and to just do it.**