fix typos

This commit is contained in:
nihilist 2025-05-15 08:40:31 +02:00
parent 9f05f656f1
commit e142601b4d
6 changed files with 9 additions and 9 deletions

View file

@ -200,7 +200,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md). Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md).
![](../on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, wether they like it or not. ![](../on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
Example: Example:

View file

@ -19,7 +19,7 @@ When discussing the topic of OPSEC, an important concept that inevitably arises
## **OPSEC Requirements in Chats** ## **OPSEC Requirements in Chats**
Another thing to note is that there are a ton of chat apps out there, and as we have explained [previously](../opsec4levels/index.md), depending on the level of Operational Security you are aiming for (wether it is privacy, anonymity or deniability), **the tool has to meet certain criterias to be suitable for the intended use**. Another thing to note is that there are a ton of chat apps out there, and as we have explained [previously](../opsec4levels/index.md), depending on the level of Operational Security you are aiming for (whether it is privacy, anonymity or deniability), **the tool has to meet certain criterias to be suitable for the intended use**.
![](../opsec4levels/0.1.png) ![](../opsec4levels/0.1.png)

View file

@ -4,7 +4,7 @@ date: 2001-01-30
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
--- ---
# What is On topic ? # What is on topic ?
The Nihilism Blog's Operational Security tutorial category is on purpose restricted to a few topics to avoid the subject from being too vast and to remain fully explorable. The Nihilism Blog's Operational Security tutorial category is on purpose restricted to a few topics to avoid the subject from being too vast and to remain fully explorable.
@ -38,7 +38,7 @@ And Lastly, the holy grail of Operational Security being deniability, where we c
![](../deniability/4.png) ![](../deniability/4.png)
This is where we showcase how to implement host OS livemode, and Veracrypt hidden volumes into one's setup, to make sure that there are no proofs left behind that could prove that the individual is behind said sensitive operations once his . This is where we showcase how to implement host OS livemode, and Veracrypt hidden volumes into one's setup, to make sure that there are no proofs left behind that could prove that the individual is behind said sensitive operations upon being forced to unlock his devices.
![](../veracrypt/20.png) ![](../veracrypt/20.png)
On the clientside, the core scenario is to explore how to ensure that the individual's operations can survive a police raid, and the order from the judge where he's forced to type his own password. On the clientside, the core scenario is to explore how to ensure that the individual's operations can survive a police raid, and the order from the judge where he's forced to type his own password.

View file

@ -49,11 +49,11 @@ Your personal data is being sold by large corporations, for their own profit, an
## **The Panopticon, Myth or Reality ?** ## **The Panopticon, Myth or Reality ?**
The Panopticon originally was a prison building design, which was designed by the social theorist Jeremy Bentham in the 18th century, where the core concept revolved around making all prisoners to be observed by a single cop, **without the inmates being able to know wether or not they are being watched**. The Panopticon originally was a prison building design, which was designed by the social theorist Jeremy Bentham in the 18th century, where the core concept revolved around making all prisoners to be observed by a single cop, **without the inmates being able to know whether or not they are being watched**.
![](2.png) ![](2.png)
The idea is that every inmate, since they don't know wether or not they are being watched, **they would have to assume that they were under constant surveillance, forcing all of them to behave at their best** , even if the cop is not looking in their direction. The idea is that every inmate, since they don't know whether or not they are being watched, **they would have to assume that they were under constant surveillance, forcing all of them to behave at their best** , even if the cop is not looking in their direction.
Now you probably get where i'm trying to go with this, **this is the narrative that governments are trying to push, that everyone's actions are under constant surveillance, that everyone must behave at their best at all times if they don't want to end up in jail.** And how convenient it must be for those governments, they have the vast majority of their populations giving away their privacy in the name of convenience by using closed-source software on their phones, on their computers, on their laptops, on their routers, etc. Now you probably get where i'm trying to go with this, **this is the narrative that governments are trying to push, that everyone's actions are under constant surveillance, that everyone must behave at their best at all times if they don't want to end up in jail.** And how convenient it must be for those governments, they have the vast majority of their populations giving away their privacy in the name of convenience by using closed-source software on their phones, on their computers, on their laptops, on their routers, etc.

View file

@ -62,7 +62,7 @@ So now you have zuluCrypt on your system. **However before you start to use it,
![](../livemode/3.png) ![](../livemode/3.png)
By default, your host OS directly writes into the system drive all sorts of potential forensic evidence that an adversary may use against you, such as system logs, kernel logs, non-standard logs, etc, and unless if you remove each of those manually, you're never sure of wether or not the Host OS saved proof of the existence of the hidden volume onto the system drive. **That's why when you use zulucrypt to handle veracrypt hidden volumes (creating them or opening them) you absolutely need to use the Host OS in[live mode](../livemode/index.md) ONLY! ** By default, your host OS directly writes into the system drive all sorts of potential forensic evidence that an adversary may use against you, such as system logs, kernel logs, non-standard logs, etc, and unless if you remove each of those manually, you're never sure of whether or not the Host OS saved proof of the existence of the hidden volume onto the system drive. **That's why when you use zulucrypt to handle veracrypt hidden volumes (creating them or opening them) you absolutely need to use the Host OS in[live mode](../livemode/index.md) ONLY! **
![](../livemode/4.png) ![](../livemode/4.png)

View file

@ -39,7 +39,7 @@ You get the idea, we're here to reverse this trend, and bring back actual truth
This mountain of work that explaining operational security is, cannot be summarized in 1 afternoon, in a 4 hour effort post. This is a multiple thousand-hour effort, to effectively plan it out, list all the blogposts to explain all the concepts, all of the topics to be explored, to actually explore them, rewrite them whenever valid criticism gets thrown at it, on and on and on it goes. AND you have to apply a quality standard on ALL posts, to make sure that you effectively convey your knowledge to your audience properly. This mountain of work that explaining operational security is, cannot be summarized in 1 afternoon, in a 4 hour effort post. This is a multiple thousand-hour effort, to effectively plan it out, list all the blogposts to explain all the concepts, all of the topics to be explored, to actually explore them, rewrite them whenever valid criticism gets thrown at it, on and on and on it goes. AND you have to apply a quality standard on ALL posts, to make sure that you effectively convey your knowledge to your audience properly.
Not to mention the organization of the whole blogpost will affect wether or not you can reach that goal of making that one place to contain every possible opsec advice one needs under 3000 hours of work or 9000 hours of work. It needs to be correctly organized from the start, otherwise it will remain a distant target that you'll never reach. (not to mention that one needs to have enough humility to realize the enormity of the task, and also effectively organize recieving external contributions). Not to mention the organization of the whole blogpost will affect whether or not you can reach that goal of making that one place to contain every possible opsec advice one needs under 3000 hours of work or 9000 hours of work. It needs to be correctly organized from the start, otherwise it will remain a distant target that you'll never reach. (not to mention that one needs to have enough humility to realize the enormity of the task, and also effectively organize recieving external contributions).
**TLDR: if you're not serious about it, in the long run, you're bound to make a mess out of it.** **TLDR: if you're not serious about it, in the long run, you're bound to make a mess out of it.**
@ -80,7 +80,7 @@ Truth seeking is definitely required in Opsec, since it is about combining all v
## **Priority Number 2: Applicability to 90% of the people out there, to defeat 99% of the risks** ## **Priority Number 2: Applicability to 90% of the people out there, to defeat 99% of the risks**
When you're giving operational security advice, people need to care about it first of all. Everyone cares about privacy sooner or later in their life. Wether it is to do something private in the bedroom, or to have some private discussion about something, it is a clear topic that people want to know about. Especially on the digital side of things. When you're giving operational security advice, people need to care about it first of all. Everyone cares about privacy sooner or later in their life. Whether it is to do something private in the bedroom, or to have some private discussion about something, it is a clear topic that people want to know about. Especially on the digital side of things.
Thing is, **context matters immensely.** you can't give advice that applies to everyone in the world at once because you need to take into account threats that may exist in a country and not in another. For example, when to it comes to using VPNs in combination with Tor to protect your anonymity we need to contextualize it correctly: Thing is, **context matters immensely.** you can't give advice that applies to everyone in the world at once because you need to take into account threats that may exist in a country and not in another. For example, when to it comes to using VPNs in combination with Tor to protect your anonymity we need to contextualize it correctly: