diff --git a/_roadmap/index.md b/_roadmap/index.md index a96fa66..6e17637 100644 --- a/_roadmap/index.md +++ b/_roadmap/index.md @@ -6,7 +6,7 @@ xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAU --- # Roadmap Progress (as of May 2025) -Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The opsec blog covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability. +Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The Opsec Bible covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability. Beyond our Privacy/Anonymity/Deniability classification we have 3 types of tutorials: @@ -22,7 +22,7 @@ Our roadmap is based on those critical tutorials first and foremost, as they are ## Clientside tutorials (85% completed) -This is where the opsec blog shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec. +This is where The Opsec Bible shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec. Currently this section is only missing the following tutorials: @@ -36,7 +36,7 @@ We are also missing some improvements for the following tutorials: ## Serverside Self-Hosting tutorials (20% completed) -This is the part where the opsec blog needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most. +This is the part where The Opsec Bible needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most. Currently this section is missing the following tutorials: diff --git a/agorism/image-1.png b/agorism/image-1.png new file mode 100644 index 0000000..e4ff88d Binary files /dev/null and b/agorism/image-1.png differ diff --git a/agorism/image-10.png b/agorism/image-10.png new file mode 100644 index 0000000..7c000a2 Binary files /dev/null and b/agorism/image-10.png differ diff --git a/agorism/image-11.png b/agorism/image-11.png new file mode 100644 index 0000000..988ca50 Binary files /dev/null and b/agorism/image-11.png differ diff --git a/agorism/image-12.png b/agorism/image-12.png new file mode 100644 index 0000000..344ac7e Binary files /dev/null and b/agorism/image-12.png differ diff --git a/agorism/image-13.png b/agorism/image-13.png new file mode 100644 index 0000000..fe30ff8 Binary files /dev/null and b/agorism/image-13.png differ diff --git a/agorism/image-14.png b/agorism/image-14.png new file mode 100644 index 0000000..ae526f5 Binary files /dev/null and b/agorism/image-14.png differ diff --git a/agorism/image-15.png b/agorism/image-15.png new file mode 100644 index 0000000..2834e3b Binary files /dev/null and b/agorism/image-15.png differ diff --git a/agorism/image-16.png b/agorism/image-16.png new file mode 100644 index 0000000..7515b74 Binary files /dev/null and b/agorism/image-16.png differ diff --git a/agorism/image-17.png b/agorism/image-17.png new file mode 100644 index 0000000..6a0f2b3 Binary files /dev/null and b/agorism/image-17.png differ diff --git a/agorism/image-18.png b/agorism/image-18.png new file mode 100644 index 0000000..bc14e58 Binary files /dev/null and b/agorism/image-18.png differ diff --git a/agorism/image-19.png b/agorism/image-19.png new file mode 100644 index 0000000..8942252 Binary files /dev/null and b/agorism/image-19.png differ diff --git a/agorism/image-2.png b/agorism/image-2.png new file mode 100644 index 0000000..a18fe8a Binary files /dev/null and b/agorism/image-2.png differ diff --git a/agorism/image-20.png b/agorism/image-20.png new file mode 100644 index 0000000..7b8ef9e Binary files /dev/null and b/agorism/image-20.png differ diff --git a/agorism/image-21.png b/agorism/image-21.png new file mode 100644 index 0000000..0f8bc69 Binary files /dev/null and b/agorism/image-21.png differ diff --git a/agorism/image-22.png b/agorism/image-22.png new file mode 100644 index 0000000..1b2478b Binary files /dev/null and b/agorism/image-22.png differ diff --git a/agorism/image-23.png b/agorism/image-23.png new file mode 100644 index 0000000..2db5422 Binary files /dev/null and b/agorism/image-23.png differ diff --git a/agorism/image-24.png b/agorism/image-24.png new file mode 100644 index 0000000..499408e Binary files /dev/null and b/agorism/image-24.png differ diff --git a/agorism/image-25.png b/agorism/image-25.png new file mode 100644 index 0000000..a54b9fa Binary files /dev/null and b/agorism/image-25.png differ diff --git a/agorism/image-26.png b/agorism/image-26.png new file mode 100644 index 0000000..48ffc54 Binary files /dev/null and b/agorism/image-26.png differ diff --git a/agorism/image-27.png b/agorism/image-27.png new file mode 100644 index 0000000..b00eb42 Binary files /dev/null and b/agorism/image-27.png differ diff --git a/agorism/image-28.png b/agorism/image-28.png new file mode 100644 index 0000000..c516c2e Binary files /dev/null and b/agorism/image-28.png differ diff --git a/agorism/image-29.png b/agorism/image-29.png new file mode 100644 index 0000000..a50903a Binary files /dev/null and b/agorism/image-29.png differ diff --git a/agorism/image-3.png b/agorism/image-3.png new file mode 100644 index 0000000..0905c12 Binary files /dev/null and b/agorism/image-3.png differ diff --git a/agorism/image-30.png b/agorism/image-30.png new file mode 100644 index 0000000..7bf7f37 Binary files /dev/null and b/agorism/image-30.png differ diff --git a/agorism/image-4.png b/agorism/image-4.png new file mode 100644 index 0000000..77036af Binary files /dev/null and b/agorism/image-4.png differ diff --git a/agorism/image-5.png b/agorism/image-5.png new file mode 100644 index 0000000..ccaee37 Binary files /dev/null and b/agorism/image-5.png differ diff --git a/agorism/image-6.png b/agorism/image-6.png new file mode 100644 index 0000000..306237b Binary files /dev/null and b/agorism/image-6.png differ diff --git a/agorism/image-7.png b/agorism/image-7.png new file mode 100644 index 0000000..f9dee7e Binary files /dev/null and b/agorism/image-7.png differ diff --git a/agorism/image-8.png b/agorism/image-8.png new file mode 100644 index 0000000..2ae008b Binary files /dev/null and b/agorism/image-8.png differ diff --git a/agorism/image-9.png b/agorism/image-9.png new file mode 100644 index 0000000..d4f318c Binary files /dev/null and b/agorism/image-9.png differ diff --git a/agorism/image.png b/agorism/image.png new file mode 100644 index 0000000..3c36512 Binary files /dev/null and b/agorism/image.png differ diff --git a/agorism/index.md b/agorism/index.md new file mode 100644 index 0000000..b45fb7e --- /dev/null +++ b/agorism/index.md @@ -0,0 +1,220 @@ +--- +author: Sam Bent +date: 2025-06-09 +gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/347" +xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Agorism +--- + +# What's Agorism ? + +## Agorism: Building Freedom Through Counter-Economics +Agorism is a form of economic guerrilla warfare against the state. Samuel Edward Konkin III developed this revolutionary philosophy in the 1970s as a strategy that rejects both the futility of political reform and the self-defeating nature of violent revolution. Instead of begging for freedom or fighting for it, agorists build it through direct economic action that makes the state irrelevant. + +![alt text](image-28.png) + +## The Core Concept +At its heart, agorism recognizes a simple truth: the state is not a building in Washington or a group of politicians but a relationship of systematic theft and coercion. Every tax collected, every regulation enforced, and every license required represents a violent intervention in voluntary exchange. Konkin's insight was that we don't need to storm the castle when we can stop feeding the beast. + +![alt text](image-25.png) + +Think of agorism as economic secession in place. While political activists exhaust themselves trying to change a system designed to resist change, agorists have already opted out. They're building alternative institutions, trading through parallel markets, and creating the infrastructure of a free society right under the state's nose. Every untaxed transaction, every peer-to-peer exchange, and every regulatory bypass represents a small act of revolution that requires no violence, no voting, and no permission. + +![alt text](image-26.png) + +The genius of Konkin's approach lies in its alignment with human nature. People naturally seek to improve their lives through voluntary exchange. The state constantly interferes with this process, creating friction, extracting wealth, and prohibiting peaceful activities. Agorism encourages what people want to do anyway: trade freely, keep what they earn, and associate voluntarily. The revolution doesn't require converting anyone to a new ideology; it just helps them realize they're already practicing counter-economics. + +## Counter-Economics: The Engine of Agorism +Counter-economics encompasses ALL peaceful economic activity the state prohibits, regulates, or taxes. Every transaction that denies the state its cut falls somewhere on the counter-economic spectrum. + +![alt text](image-1.png) + +White markets consist of legal but unreported activities, such as cash jobs, barter networks, and informal services exchanged between neighbors. When your neighbor pays you $50 cash to fix their computer, when you trade car repairs for plumbing work, when the kid down the street mows lawns for unreported cash, these seemingly innocent exchanges form the foundation of the counter-economy. The state demands its percentage of every dollar that changes hands, but white market transactions slip entirely beneath their radar. + +![alt text](image-2.png) + +Grey markets involve regulated activity done without state permission. The food truck operating without proper licenses, the hairdresser working from home without permits, and the contractor doing renovations without pulling building permits. These entrepreneurs provide genuine value to willing customers. Still, they skip the permission slips, fees, and regulations that exist primarily to extract revenue and protect established businesses from competition. In many developing nations, grey markets account for the majority of economic activity because the official regulatory burden renders legal compliance unfeasible for small operators. + +![alt text](image-3.png) + +Black markets handle prohibited goods and services outright. Drugs, weapons, banned information, prohibited services. These markets exist because the state has declared certain voluntary exchanges criminal, creating artificial scarcity and massive profit opportunities. The darknet markets you're familiar with represent pure agorism in digital form. Silk Road operated for over two years as a $1.2 billion proof of concept, demonstrating that complex commercial relationships, escrow systems, reputation networks, and quality control can flourish without any state oversight whatsoever. When Ross Ulbricht created the Silk Road, he explicitly cited agorist philosophy as his inspiration, viewing the marketplace as a means to demonstrate that voluntary exchange needs no external enforcement. + +![alt text](image-16.png) + +Red markets involve violence and coercion, which agorism explicitly rejects. Konkin was clear that aggression against persons or property violates the foundational principle of voluntary exchange. Agorism aims to render the state obsolete through peaceful competition rather than replicating its coercive methods. This distinction matters because critics often conflate all black market activity with violence when, in reality, most counter-economic transactions are as peaceful as buying groceries. + +## Historical Examples That Prove It Works + +### The System D Economy +In developing nations, "System D" (from French "débrouillardise"—making do) represents the informal economy. By 2020, System D was worth $10 trillion globally, making it the world's second-largest economy after the US. + + +![alt text](image-10.png) + +In Lagos, Nigeria, approximately 80% of employment exists in System D, which encompasses street vendors, informal taxi networks, and unregistered businesses. This entire parallel economy operates successfully without government recognition. These aren't criminals; they're agorists by necessity. + +### Soviet Black Markets +The USSR tried to control every economic transaction. To what end? By the 1980s, the shadow economy accounted for 20-30% of the Soviet GDP. Citizens traded everything from blue jeans to car parts through "blat" (informal exchange networks). +When official stores had empty shelves, black market dealers had full warehouses. The state's economic plans were rendered ineffective when citizens created their supply chains. The counter-economy sustained the population's basic needs while the official economy collapsed. + +### Colonial America's Smuggling Networks +Before the American Revolution, colonists routinely violated British trade laws through sophisticated smuggling operations that prefigured modern agorism. John Hancock remembered as a patriot, made his fortune smuggling tea and wine past British customs. By 1760, smuggling had become so widespread that British customs collected only £2,000 annually from colonies that should have yielded £200,000 according to official trade volumes. + +![alt text](image-4.png) + +These colonial smugglers created elaborate networks of false compartments in ships bribed customs officials and established alternative ports of entry. They didn't see themselves as revolutionaries but as merchants pursuing profit in the face of unreasonable restrictions. The Molasses Act of 1733 aimed to compel colonists to purchase expensive British sugar instead of cheaper French alternatives. The colonists' response? They disregarded the law and established their trade routes. By the time of the revolution, the infrastructure for independence already existed in these smuggling networks. The same ships that smuggled molasses could carry weapons, the same merchants who avoided customs could finance rebellion, and the same networks that moved illegal goods could distribute revolutionary pamphlets. + +The British response mirrors modern drug war tactics: increased enforcement, harsher penalties, and broader surveillance powers. The Writs of Assistance gave customs officials unlimited power to search any property without specific warrants. The colonists' counter-response? Better smuggling techniques, deeper corruption of officials, and eventually, revolution. However, note that economic resistance came first, and political resistance followed only when the state made normal business operations impossible. + +### Prohibition Era (1920-1933) +Alcohol prohibition created the largest counter-economic network in US history. By 1925, there were 100,000 speakeasies in New York City alone, twice the number of legal bars that existed before Prohibition. + +![alt text](image-5.png) + +Bootleggers didn't lobby for repeal. They built distribution networks, corrupted enforcement, and served customer demand. The government surrendered not because of protests but because the counter-economy made the law unenforceable. +Modern Agorism in Practice + +## Cryptocurrency Networks +Bitcoin emerged not from reformists politely asking the Federal Reserve to consider alternative monetary policies but from cypherpunks who built an alternative monetary system that operates without permission. Satoshi Nakamoto's whitepaper referenced no political movements, requested no regulatory approval, and asked no one's permission. The genesis block included a Times headline about bank bailouts, the only political statement needed. + +![alt text](image-6.png) + +Every cryptocurrency transaction that bypasses traditional banking represents a practical form of agorism. When Iranian programmers sell software for Bitcoin because sanctions block bank transfers, when Venezuelans preserve wealth in cryptocurrency while their government destroys the bolivar through hyperinflation, and when dark market vendors create more reliable reputation systems than eBay, they prove that monetary systems don't require states. + +![alt text](image-29.png) + +DeFi protocols now handle billions of dollars in value without the need for banks, regulators, or state oversight. Uniswap processes more daily volume than many national stock exchanges without a single regulatory license. Compound allows lending and borrowing without credit checks or financial surveillance. Smart contracts execute complex financial operations that would require armies of lawyers in the traditional system. Still, they do so with mathematical certainty and without any possibility of corruption. These systems don't compete with banks on the banks' terms; they make traditional financial intermediaries conceptually obsolete. + +![alt text](image-30.png) + +The state's response reveals their fear. China has repeatedly banned cryptocurrency, with each ban becoming less effective than the last. The US Treasury attempts to regulate DeFi protocols that lack a central governing entity. They demand that mathematical protocols collect KYC information, showing that they don't understand they're fighting against mathematics itself. Every attempt at control drives innovation toward greater decentralization, increased privacy, and improved resistance to interference. + +## Digital Nomadism and Flag Theory +Thousands of location-independent workers legally minimize taxes by choosing jurisdictions strategically. They're not evading—they're selecting which states deserve their economic participation—company in Estonia, bank account in Singapore, residence in Portugal, income from global clients. The state's geographical monopoly becomes irrelevant. + +## The Gig Economy's Shadow Side +Officially, Uber drivers and DoorDash deliverers are tracked and taxed through elaborate digital systems designed to ensure compliance. The platforms automatically report earnings to tax authorities and issue Form 1099 for any amount exceeding $600. But beneath this veneer of compliance lies a thriving counter-economy that the platforms pretend not to see. + +Cash tips disappear into pockets without a trace. Regular customers develop personal relationships with drivers, arranging rides outside the app for cash payment. The Uber driver who gives you his card for "airport runs" has just recruited you into the counter-economy. Pizza delivery drivers build networks of regular customers who pay cash directly, bypassing both the platform and the taxman. Every transaction that moves from the platform to personal arrangement represents a small victory for economic freedom. + +DoorDash drivers share techniques for maximizing cash orders in online forums. They know which restaurants still accept cash, which neighborhoods tip in cash, and how to structure their acceptance patterns to avoid algorithmic detection while maximizing unreported income. The platforms are aware of this happening, but they can't stop it without destroying their business model. They need drivers more than drivers need them, creating space for counter-economic activity within supposedly controlled systems. + +![alt text](image-8.png) + +This shadow economy extends beyond simple tax avoidance. Drivers share accounts to bypass background checks, rent accounts to those who can't qualify officially, and create elaborate systems to game surge pricing and bonuses. What appears to be a highly regulated, technologically controlled market contains thousands of entrepreneurs practicing agorism daily, proving that human ingenuity in pursuing profit will always outpace corporate and government control systems. + +## Why Agorism Beats Political Action +Political reformers operate within the system they claim to oppose, thereby begging the state to limit itself through the very mechanisms it controls. They spend decades achieving minor victories that get reversed by the next administration, always fighting yesterday's battle. At the same time, the state invents new forms of control. The drug reform movement spent fifty years and millions of dollars trying to change marijuana laws through lobbying and voting. Meanwhile, agorist entrepreneurs started selling cannabis through medical dispensaries, delivery services, and, yes, black markets, normalizing what politicians feared to touch. By the time legalization came to many states, the counter-economy had already made Prohibition irrelevant. + +![alt text](image-9.png) + +Violent revolutionaries seek to replace one violent monopoly with another. History shows us a pattern: the revolutionary often becomes the oppressor, sometimes more brutal than their predecessor. The French Revolution promised liberty, equality, and fraternity but delivered the Terror and Napoleon. The Russian Revolution promised workers' paradise but created the gulag. Every violent overthrow carries within it the seeds of the next tyranny because it accepts the fundamental premise that society needs violent monopoly control. + +![alt text](image-24.png) + +Agorists make the state irrelevant through superior alternatives. We build parallel systems that outcompete state offerings without asking permission or firing a shot. Consider which threatens banking cartels more: Occupy Wall Street camping in parks and holding signs or DeFi protocols that now handle billions in value without a single banking license? Which changed drug markets more fundamentally: decades of policy reform efforts or Ross Ulbricht proving that reputation systems and cryptocurrencies could create more orderly markets than state prohibition ever achieved? + +## The Revolutionary Logic +Every government requires three things to survive, and agorism systematically attacks each pillar of state power. +First, states need economic compliance through taxes, regulations, and licensing. Every dollar that flows through counter-economic channels denies the state revenue while building alternative economic infrastructure. When a programmer accepts Bitcoin for freelance work, when a farmer sells produce directly to consumers for cash, and when a tutor teaches students without state credentials, they're not just avoiding taxes but creating proof that complex economic relationships work without state intermediation. + +![alt text](image-11.png) + +Second, states require information control through surveillance, censorship, and propaganda. **The cypherpunk movement, which gave us PGP, Tor, Bitcoin, and other privacy tools, aligns perfectly with the agorist strategy.** When Phil Zimmermann released PGP to the world in 1991, the US government attempted to prosecute him for "exporting munitions" because it understood that widespread encryption threatened its surveillance capabilities. Every encrypted message, every anonymous transaction, and every piece of information that flows outside state monitoring reduces their ability to control economic activity. Tor enables agorist marketplaces by making it impossible to trace connections between buyers and sellers. I2P goes even further, creating an entire parallel internet where surveillance becomes mathematically impossible. These tools transform agorism from a local phenomenon into a global revolutionary strategy. + +![alt text](image-12.png) + +Third, states depend on legitimacy, which is the widespread belief that their authority is necessary and beneficial. Every successful counter-economic transaction disproves this myth. When darknet markets provided better customer service than street dealers, when Bitcoin transfers moved money faster and cheaper than banks, and when homeschooling produced better educational outcomes than government schools, they didn't argue against state legitimacy; they demonstrated its obsolescence. The state's greatest fear isn't armed rebels but peaceful traders proving we don't need them. + +## Practical Agorism for OPSEC-Minded Individuals +You're already thinking about operational security. Agorism represents economic OPSEC at its core, denying adversaries (the state) intelligence about your economic activity. Every privacy tool you use for OPSEC enables agorism by breaking the connection between identity and economic activity. + +![alt text](image-13.png) + +Tor didn't emerge from privacy advocates asking governments to respect anonymity. The Onion Router created a parallel communication system that makes surveillance computationally infeasible. When you route your traffic through Tor, you're not just protecting your privacy but enabling entire counter-economic ecosystems. The same relay network that protects dissidents also enables agorist marketplaces to operate beyond state reach. I2P takes this further by creating a completely separate network layer where every participant contributes to the anonymity of others, making it ideal for hosting hidden services that can't be traced or shut down. + +![alt text](image-14.png) + +Monero represents the evolution of cryptocurrency toward true agorist money. While Bitcoin transactions are pseudonymous but traceable on a public ledger, Monero implements ring signatures, stealth addresses, and confidential transactions that make financial surveillance impossible. When you use Monero, you're not just making a privacy choice but participating in the creation of a monetary system that operates entirely outside state observation. Every Monero transaction strengthens a financial network that can't be controlled, censored, or inflated by any government. + +![alt text](image-15.png) + +But agorism extends far beyond high-tech solutions. Paying contractors in cash keeps transactions entirely out of the banking system. Bartering skills with neighbors create value exchange without any monetary trail. Growing food breaks the agricultural cartel's monopoly on the supply chain. Teaching skills outside the credential monopoly of universities and licensing boards build human capital that owes nothing to state approval. Building local exchange networks fosters resilient communities that can meet their needs independently of corporate or government intermediaries. + +The System D economy in developing nations shows how this works at scale. In cities like Mumbai or Cairo, entire neighborhoods operate through informal networks of trust and reputation. The street vendor who knows your coffee preference, the mechanic who fixes your car without paperwork, and the seamstress who tailors clothes from her apartment are all part of vast agorist networks that predate Konkin's philosophy by centuries. These aren't temporary arrangements but sophisticated economic systems that often work better than their "legitimate" counterparts. + +## The Endgame + +![alt text](image-27.png) + +Konkin envisioned a world where the state withers away not through collapse but through irrelevance. His four-phase model of agorist revolution, laid out in "New Libertarian Manifesto," describes the progression from our current statist society to a free-market anarchist world. Phase 1 sees isolated agorists practicing counter-economics individually. Phase 2 involves small networks of traders and entrepreneurs who support one another. Phase 3 establishes large-scale counter-economic institutions that begin to displace state services. Phase 4 achieves a stateless society where all transactions are voluntary, and protection agencies compete in a free market. + +![alt text](image-17.png) + +We're currently somewhere between Phase 2 and 3. When people can trade freely without permission through cryptocurrency networks, resolve disputes without courts through smart contracts and decentralized arbitration, protect property without police through private security and mutual aid networks, and build infrastructure without permits through agorist construction collectives, the question becomes stark: what exactly do we need government for? + +This progression is already visible. In Detroit's abandoned neighborhoods, agorist entrepreneurs have created entire communities outside of official systems. They've installed their streetlights, organized their security patrols, created their dispute resolution systems, and built thriving local economies while the city government retreated. + +In Greece, during the economic crisis, parallel economies utilizing alternative currencies and barter networks helped keep communities functioning when the official economy collapsed. In Argentina, when the government destroyed the currency through inflation, people spontaneously created their exchange networks that operated more efficiently than the state system. + +## The Agorist Paradox +Here's what terrifies authoritarians: Agorism is anti-fragile. Every crackdown creates more agorists. Every new restriction teaches people to value freedom. Every enforcement action becomes a marketing campaign for our alternatives. + +When governments ban cash transactions above certain amounts, people discover cryptocurrency. When they regulate cryptocurrency exchanges, people become aware of decentralized exchanges and privacy coins. When they increase surveillance, people become experts in encryption and operational security. The state's attempts to control create the very expertise and motivation that undermines their control. + +![alt text](image-20.png) + +Silk Road's destruction spawned dozens of more secure markets that learned from its mistakes. Each iteration becomes more resilient, more decentralized, and more difficult to stop. Banking restrictions on marijuana businesses forced an entire industry to develop sophisticated cash management and cryptocurrency systems that now serve other industries facing financial discrimination. COVID lockdowns, intended to increase state control, instead created an explosion in grey market services as people discovered they could work, trade, and live without official permission. + +![alt text](image-18.png) + +The state creates its opposition through its oppression. Every person who loses their business to arbitrary regulations, every entrepreneur crushed by licensing requirements, and every peaceful trader imprisoned for voluntary exchanges becomes a potential agorist. The system manufactures resistance by making legal compliance either impossible or worthless for an increasing number of people. + +## The Philosophy Behind the Practice +Agorism rests on solid philosophical foundations that distinguish it from mere tax evasion or black market profiteering. Konkin built his system on the non-aggression principle, recognizing that all government action ultimately rests on the threat of violence. Every regulation, no matter how trivial, carries the implicit threat: comply or face an escalating force that ends with death if you resist sufficiently. A business license isn't a piece of paper but a threat of violence against peaceful trade. + +This understanding leads to the central agorist insight: the state is not reformable because its essential nature is aggression. You cannot vote violence into peace any more than you can regulate theft into charity. Political action within the system legitimizes the system. Even libertarian political parties end up reinforcing the idea that change must come through state mechanisms. Agorism rejects this entirely, recognizing that freedom comes from rendering the state irrelevant, not from capturing its machinery. + +![alt text](image-7.png) + +The moral dimension of agorism stems from the principle of self-ownership. If you own yourself, you own your labor. If you own your labor, you own its products. Any interference with voluntary exchange between self-owners violates this fundamental principle. The state claims the right to control what you can buy, sell, or trade, inserting itself as a parasitic third party in every transaction. Agorism asserts the right to ignore this claimed authority and trade freely. +However, agorism extends beyond individual philosophy to encompass a comprehensive theory of social change. Konkin observed that successful state resistance creates momentum. As counter-economic networks grow, they attract more participants through superior service and lower costs. A drug dealer who never cheats on customers builds a reputation. The grey market contractor who does quality work gets referrals. The cryptocurrency trader who enables international transactions gets repeat business. Quality and reliability create growth in counter-economic enterprises just as in any market. + +This leads to Konkin's revolutionary optimism. Unlike Marxists, who wait for capitalism's contradictions to create a revolution, or anarcho-capitalists, who hope for eventual enlightenment, agorists see freedom emerging from human action in the present. Every agorist transaction makes the next one easier. Every person practicing counter-economics makes the practice more normal. Every parallel institution that functions well makes state services look worse by comparison. The revolution proceeds one transaction at a time, building tomorrow's free society within today's authoritarian one. + +## Essential Agorist Literature + + +Understanding agorism deeply requires engaging with the foundational texts that shaped this philosophy. Samuel Edward Konkin III's "New Libertarian Manifesto" stands as the core document of agorist thought. Written in 1983, it outlines the theoretical framework for counter-economics and the path from a statist society to free market anarchism. Konkin writes with the fire of a revolutionary but the precision of an economist, explaining how market forces themselves will destroy the state once people stop feeding it through taxation and regulation. + +"An Agorist Primer" by the same author serves as the practical companion to the Manifesto. Where the Manifesto provides theory, the Primer offers concrete examples and strategies. Konkin explains how to identify counter-economic opportunities in your own life, how to evaluate risk versus reward, and how to build networks of fellow travelers. He emphasizes that agorism works at every scale, from individual transactions to entire parallel economies. + +J. Neil Schulman's "Alongside Night" deserves special mention as the first explicitly agorist novel. Written in 1979 with Konkin's direct input, it depicts a near-future America where hyperinflation and economic collapse drive the creation of a massive agorist underground. The novel doesn't just tell a story but also demonstrates how counter-economic networks might function at scale, complete with alternative currencies, private protection agencies, and underground markets that operate more efficiently than the ailing official economy. Schulman shows how crisis creates an opportunity for those prepared to offer alternatives. + +![alt text](image-23.png) + +For historical context, Murray Rothbard's "For a New Liberty" provides the anarcho-capitalist foundation that Konkin built upon and eventually transcended. While Rothbard focused on education and eventual political change, his economic analysis of why free markets work and governments fail remains an essential reading. The chapter on police and courts without government particularly complements agorist thinking about parallel institutions. + +More recently, "The Starfish and the Spider" by Ori Brafman and Rod Beckstrom, while not explicitly agorist, explains why decentralized organizations defeat centralized ones. Their analysis of how Napster, Wikipedia, and Al Qaeda succeeded through decentralization applies perfectly to counter-economic networks. When there's no head to cut off, no central point of failure, the system becomes unstoppable. + +"The Sovereign Individual" by James Dale Davidson and Lord William Rees-Mogg, published in 1997, predicted how information technology would enable individuals to escape state control. Their vision of cyber-economies operating beyond geographical jurisdiction reads like an agorist manual written by investment bankers. They saw how encryption and digital currencies would render taxation voluntary and nation-states obsolete. However, they focused more on wealthy individuals than on mass counter-economics. + +For those interested in the cypherpunk roots of crypto-agorism, "Applied Cryptography" by Bruce Schneier provides the technical foundation for understanding how mathematical principles can enforce contracts and protect privacy without state involvement. While dense with technical details, it demonstrates that cryptography isn't just about hiding secrets but about creating new forms of social organization. + + +## Your Move + +Agorism offers a choice fundamentally different from what the system presents. The state frames your options as obey or rebel, comply or resist, vote or revolt. These false choices keep you trapped in their paradigm, where they define the terms of engagement. Agorism transcends this trap entirely. You don't join agorism like a political party or a revolution. You practice agorism through countless daily decisions that build freedom incrementally. + + +![alt text](image-22.png) + +Every time you choose cash over tracked payments, you deny the surveillance state visibility into your economic life. When you trade directly with neighbors instead of through corporate intermediaries, you build community resilience while avoiding taxes and regulations. Sharing skills outside credentialed systems breaks the knowledge monopolies that keep people dependent. Building solutions rather than begging for reforms creates the parallel institutions that will outlast the dying system. Encrypting communications rather than accepting surveillance as inevitable preserves the privacy necessary for free association. Routing around damage rather than trying to repair a fundamentally broken system acknowledges that some institutions are beyond reform. + +The revolution Konkin envisioned is already here, operating in millions of small transactions every day. From the programmer in Pakistan earning Bitcoin for code to the farmer in Vermont selling raw milk to willing customers to the teacher in Detroit offering classes outside the school system, the counter-economy grows. At the same time, the state economy stagnates due to its internal contradictions. + +The state wants you to believe that society would collapse without its control, that chaos would reign without its regulations, and that people couldn't possibly cooperate without their coercion. Every agorist transaction proves them wrong. Every peaceful exchange outside their system demonstrates that order emerges from voluntary interaction, not from dictates and threats. + +They can't stop what they can't see. They can't tax what they can't track. They can't regulate what they can't find. And most importantly, they can't govern those who have already withdrawn their consent and built something better. +Welcome to the counter-economy. You're already here. Now it's time to build. \ No newline at end of file diff --git a/anonaccess/index.md b/anonaccess/index.md index 16571d7..0e8f3a3 100644 --- a/anonaccess/index.md +++ b/anonaccess/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-05-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/111" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity --- # Remote anonymous access setup (SSH through tor) diff --git a/anonclearnetservices/index.md b/anonclearnetservices/index.md index 2e3902a..aa334c4 100644 --- a/anonclearnetservices/index.md +++ b/anonclearnetservices/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2024-08-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/105" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Clearnet Services --- # Where to host Anonymous Clearnet Services ? diff --git a/anondomain/index.md b/anondomain/index.md index 6e31106..f7caf00 100644 --- a/anondomain/index.md +++ b/anondomain/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-09-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/110" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity --- # How to rent remote domains anonymously (Registrar resellers) diff --git a/anonemail/index.md b/anonemail/index.md index 8b433e8..c9f2409 100644 --- a/anonemail/index.md +++ b/anonemail/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2024-10-16 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/26" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Anonymity --- # How to Get an Email Account Anonymously (Emails as a Service) diff --git a/anonproxy/index.md b/anonproxy/index.md index 8726399..7eb3f27 100644 --- a/anonproxy/index.md +++ b/anonproxy/index.md @@ -3,6 +3,9 @@ author: prism_breaker date: null gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/268" xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa9jSfgyRbNNjswHKTzFVh +tags: + - Clientside Anonymity + - Censorship Evasion --- # How to get and use residential proxies anonymously @@ -39,10 +42,6 @@ Other useful reference: Tor -> residential proxy -> website) setup - - - - ## **Proxy Purchase** _Warning:_ Everything below needs to be done inside the dedicated new whonix workstation VM! diff --git a/anonsensitive/index.md b/anonsensitive/index.md index e25322d..7fdadff 100644 --- a/anonsensitive/index.md +++ b/anonsensitive/index.md @@ -3,6 +3,8 @@ author: Robert date: 2024-06-08 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/0" xmr: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK +tags: + - Deniability Explained --- # Why isn’t Anonymity enough for Sensitive Use? diff --git a/anonsimplex-server/index.md b/anonsimplex-server/index.md index a6d2ccd..238cf71 100644 --- a/anonsimplex-server/index.md +++ b/anonsimplex-server/index.md @@ -4,6 +4,9 @@ date: 2025-05-23 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/325" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Anonymity + - Self-Hosted + - Contributing to Anonymity - Core Tutorial --- # Anonymous Simplex SMP & XFTP Servers setup diff --git a/anonsimplex/index.md b/anonsimplex/index.md index 93a6629..69ae89e 100644 --- a/anonsimplex/index.md +++ b/anonsimplex/index.md @@ -4,6 +4,7 @@ date: 2025-05-23 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 42yco9t6qK98N191EZzKJUCH7cit5JT8mBJQvVULEPAPeBHurbFqGj2hK7kaFhqasv8AYLpbuP15Wg5suzyjUd5SMLqabRw tags: + - Clientside Anonymity - Core Tutorial --- # Anonymity - Easy Anonymous Chats Using SimpleX (and onion-only servers) diff --git a/anonsms/index.md b/anonsms/index.md index d1cdd95..0115e90 100644 --- a/anonsms/index.md +++ b/anonsms/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2024-10-13 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/27" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Anonymity --- # How to Receive Anonymous SMSes (Remote SMSes as a Service) diff --git a/anonuse/index.md b/anonuse/index.md index c3aa4be..fdab8b5 100644 --- a/anonuse/index.md +++ b/anonuse/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-08-14 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/87" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Anonymity Explained --- # Why isn’t Privacy enough for Anonymous Use? diff --git a/anonymityexplained/index.md b/anonymityexplained/index.md index af3592c..b80ef34 100644 --- a/anonymityexplained/index.md +++ b/anonymityexplained/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2025-03-15 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/86" xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY +tags: + - Anonymity Explained --- # What is Anonymity ? Why is it Important ? @@ -185,7 +187,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a ## **The Enemies of Anonymity: Surveillance, KYC procedures and Centralisation** -![](../su2.png) The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**. +![](../logos/su2.png) The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**. Example: @@ -200,7 +202,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md). -![](../on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not. +![](../logos/on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not. Example: @@ -223,7 +225,7 @@ Surveillance CANNOT be tolerated when you want Anonymity. So before you try to l -![](../ce2.png) But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users. +![](../logos/ce2.png) But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users. **There are only 2 possible long-term outcomes for Centralisation** : ** @@ -248,9 +250,9 @@ As we have discussed [previously](../governments/index.md), for a government's l And for the laws to be enforced, governments need: - 1. To know what happened (lack of ![](../su0.png)Privacy, using ![](../su2.png)Surveillance ) + 1. To know what happened (lack of ![](../logos/su0.png)Privacy, using ![](../logos/su2.png)Surveillance ) - 2. To know who did it (lack of ![](../on0.png)Anonymity, using ![](../on2.png)KYC procedures ) + 2. To know who did it (lack of ![](../logos/on0.png)Anonymity, using ![](../logos/on2.png)KYC procedures ) diff --git a/anonymitymetadata/index.md b/anonymitymetadata/index.md index d28fa89..4716002 100644 --- a/anonymitymetadata/index.md +++ b/anonymitymetadata/index.md @@ -3,6 +3,8 @@ author: zl date: 2025-03-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237" xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY +tags: + - Anonymity Explained --- # Why is Metadata detrimental to Anonymity? diff --git a/anonymous_server_monitoring/index.md b/anonymous_server_monitoring/index.md index 8129d16..8badbd3 100644 --- a/anonymous_server_monitoring/index.md +++ b/anonymous_server_monitoring/index.md @@ -4,6 +4,7 @@ date: 2025-04-27 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/221" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Anonymity - Core Tutorial --- # Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter) diff --git a/anonymousremoteserver/index.md b/anonymousremoteserver/index.md index 4fcc3d4..3dcde20 100644 --- a/anonymousremoteserver/index.md +++ b/anonymousremoteserver/index.md @@ -4,6 +4,7 @@ date: 2024-05-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/109" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Anonymity - Core Tutorial --- # Renting Remote VPS Servers Anonymously (non-KYC cloud resellers) diff --git a/anonzulucrypt/index.md b/anonzulucrypt/index.md index 7cda25a..16f0421 100644 --- a/anonzulucrypt/index.md +++ b/anonzulucrypt/index.md @@ -3,6 +3,8 @@ author: nileglorifier date: 2024-08-18 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/273" xmr: 84TTjteLVhkYuHosBoc1MjWaB1AmnFSWPgeM7Lts4NdigCmE9ndHTjsXEaxJFTb7JGj55GNERXfnJSFY3J3WE5Ha18BSeS1 +tags: + - Clientside Deniability --- # Hiding files in videos (small or large files) with zuluCrypt diff --git a/aps/index.md b/aps/index.md index 450c42f..0f3cd5f 100644 --- a/aps/index.md +++ b/aps/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-04-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - OPSEC Concepts --- # Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days diff --git a/ce0.png b/ce0.png deleted file mode 100644 index 3dc87e2..0000000 Binary files a/ce0.png and /dev/null differ diff --git a/ce1.png b/ce1.png deleted file mode 100644 index 5a59933..0000000 Binary files a/ce1.png and /dev/null differ diff --git a/ce2.png b/ce2.png deleted file mode 100644 index e59b82c..0000000 Binary files a/ce2.png and /dev/null differ diff --git a/chainalysisattempts/index.md b/chainalysisattempts/index.md index 3876354..e934af5 100644 --- a/chainalysisattempts/index.md +++ b/chainalysisattempts/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-09-07 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/96" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # Why can't I trust Centralised Exchanges, and random Monero nodes ? diff --git a/chats/index.md b/chats/index.md index b321910..95608fc 100644 --- a/chats/index.md +++ b/chats/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2025-04-19 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - OPSEC Concepts --- # Public Chats / Private Chats / Anonymous Chats / Deniable Chats diff --git a/clearnetvsdarknet/index.md b/clearnetvsdarknet/index.md index 0453666..c51e405 100644 --- a/clearnetvsdarknet/index.md +++ b/clearnetvsdarknet/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-12-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/169" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Anonymity Explained --- # Why is the Darknet superior to the Clearnet ? diff --git a/closedsource/index.md b/closedsource/index.md index e85cd58..f2816d0 100644 --- a/closedsource/index.md +++ b/closedsource/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-04-29 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Privacy Explained --- # Why can't I trust closed source software for Privacy? diff --git a/cloud_provider_adversary/index.md b/cloud_provider_adversary/index.md index b1f6c1d..a7bfa3d 100644 --- a/cloud_provider_adversary/index.md +++ b/cloud_provider_adversary/index.md @@ -3,6 +3,8 @@ author: Mulligan Security date: 2025-02-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/36" xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs +tags: + - Serverside Deniability --- # **When the Adversary is the cloud provider himself** diff --git a/co0.png b/co0.png deleted file mode 100644 index 1a8e261..0000000 Binary files a/co0.png and /dev/null differ diff --git a/co1.png b/co1.png deleted file mode 100644 index b7f23d7..0000000 Binary files a/co1.png and /dev/null differ diff --git a/co2.png b/co2.png deleted file mode 100644 index dd59d52..0000000 Binary files a/co2.png and /dev/null differ diff --git a/compilation/index.md b/compilation/index.md index e3f9cbb..5e882a4 100644 --- a/compilation/index.md +++ b/compilation/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-28 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Privacy --- # How to compile open source software + How to verify software integrity diff --git a/contribute/index.md b/contribute/index.md index 39dc5d2..455b5db 100644 --- a/contribute/index.md +++ b/contribute/index.md @@ -3,14 +3,16 @@ author: nihilist date: 2025-04-03 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/275" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Contribute --- # How to become a Contributor -In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via Forgejo. +In this tutorial we're going to look at how you can contribute to The Opsec Bible, we'll look into how the work is being organized, and how to contribute via Forgejo. -## The Nihilism Blog Organisation +## The Opsec Bible Organisation First of all, to know what tutorials we'd like to have completed, check out our [Opsec Forgejo Project board](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1): diff --git a/criticism/index.md b/criticism/index.md index c4bbd94..f26939f 100644 --- a/criticism/index.md +++ b/criticism/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2025-04-07 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Contribute --- # How to write good Criticism @@ -84,7 +86,7 @@ Don't just contradict what we say, bring reasoning, arguments, logic, data and l ![](2.png) -In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec blog like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me. +In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec Bible like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me. ![](5.png) diff --git a/darknetexploration/index.md b/darknetexploration/index.md index 507e9a1..4e4dab4 100644 --- a/darknetexploration/index.md +++ b/darknetexploration/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2025-01-25 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/266" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Anonymity Explained --- # How to explore the Darknet? (Visibility and Discoverability) diff --git a/darknetlantern/index.md b/darknetlantern/index.md index b7597e6..5a2ea70 100644 --- a/darknetlantern/index.md +++ b/darknetlantern/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2025-01-26 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/267" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Contributing to Anonymity --- # How to run your own Darknet Lantern for Visibility and Discoverability @@ -280,7 +283,7 @@ Also, **please categorize links by their utility instead of trying to categorize Is the website sensitive ? (ex: related to drugs) (y/n) n [+] Add a new Website entry (into unverified.csv) - What is the Website name ? The Nihilism Blog + What is the Website name ? The Opsec Bible What is the website Category ? Blogs What is the website URL ? blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion Description for the website ? (Optional) diff --git a/de0.png b/de0.png deleted file mode 100644 index 1b7b0bb..0000000 Binary files a/de0.png and /dev/null differ diff --git a/de1.png b/de1.png deleted file mode 100644 index ba5a679..0000000 Binary files a/de1.png and /dev/null differ diff --git a/de2.png b/de2.png deleted file mode 100644 index ef41a49..0000000 Binary files a/de2.png and /dev/null differ diff --git a/deniability/index.md b/deniability/index.md index 6808db1..c5627cf 100644 --- a/deniability/index.md +++ b/deniability/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-05-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/271" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Deniability Explained --- # What is Plausible Deniability ? Why is it Important ? diff --git a/dns/index.md b/dns/index.md index 6105eb0..7639ecb 100644 --- a/dns/index.md +++ b/dns/index.md @@ -3,6 +3,9 @@ author: nothing@nowhere date: 2024-05-28 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/112" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Clearnet Services --- # bind9 DNS setup diff --git a/dnscrypt/index.md b/dnscrypt/index.md index 119774d..bd5aa37 100644 --- a/dnscrypt/index.md +++ b/dnscrypt/index.md @@ -3,6 +3,8 @@ author: cynthia date: 2025-06-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/311" xmr: 84ybq68PNqKL2ziGKfkmHqAxu1WpdSFwV3DreM88DfjHVbnCgEhoztM7T9cv5gUUEL7jRaA6LDuLDXuDw24MigbnGqyRfgp +tags: + - Clientside Privacy --- # DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you? diff --git a/docker-tor/index.md b/docker-tor/index.md new file mode 100644 index 0000000..35b7eb1 --- /dev/null +++ b/docker-tor/index.md @@ -0,0 +1,119 @@ +--- +author: Anonymous +date: 2025-01-31 +gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" +xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +--- +# How to use Docker containers on the whonix workstation + + +## How to install Docker + +As usual we install docker via apt like so: +```sh +[workstation user ~]% sudo apt install docker.io docker-compose -y +``` + +## How to make sure that Docker pulls images through Tor + +```sh +[workstation user ~]% sudo docker pull alpine +Using default tag: latest +Error response from daemon: Get "https://registry-1.docker.io/v2/": dial tcp: lookup registry-1.docker.io on 10.152.152.10:53: read udp 10.152.152.11:33883->10.152.152.10:53: i/o timeout +zsh: exit 1 sudo docker pull alpine +``` +Here as you can see when we try to pull an alpine image, docker can't pull it, to fix that we need to make sure that docker pulls through the localhost tor socks5 proxy on port 9050: + +```sh +[workstation user ~]% sudo mkdir /etc/systemd/system/docker.service.d/ +[workstation user ~]% sudo vim /etc/systemd/system/docker.service.d/proxy.conf +[workstation user ~]% cat /etc/systemd/system/docker.service.d/proxy.conf +[Service] +Environment="HTTP_PROXY=socks5://127.0.0.1:9050" +Environment="HTTPS_PROXY=socks5://127.0.0.1:9050" +``` + +Now that's created, we reload the systemd service and try to pull the alpine docker image again: +```sh +[workstation user ~]% sudo systemctl daemon-reload +[workstation user ~]% sudo systemctl restart docker +[workstation user ~]% docker pull alpine +Using default tag: latest +permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.24/images/create?fromImage=alpine&tag=latest": dial unix /var/run/docker.sock: connect: permission denied +zsh: exit 1 docker pull alpine +[workstation user ~]% sudo !! +[workstation user ~]% sudo docker pull alpine +Using default tag: latest +latest: Pulling from library/alpine +fe07684b16b8: Pull complete +Digest: sha256:8a1f59ffb675680d47db6337b49d22281a139e9d709335b492be023728e11715 +Status: Downloaded newer image for alpine:latest +docker.io/library/alpine:latest +``` + +And that's it! we managed to pull the alpine image as intended. + +## Sidenotes + +1) you can't connect to the internet from a docker container that is in a whonix workstation, and the [whonix developers won't bother providing support for it](https://forums.whonix.org/t/how-can-you-make-a-docker-container-inside-whonix-workstation-connect-to-the-internet/21772/2) +2) disabling the whonix firewall does not fix the issue either +3) you cant edit the socsk5 port on whonix workstation by editing /etc/tor/torrc to try and set SOCKSPort to 0.0.0.0:9050, which would make it easy to access the tor socks port from the docker container. +3) you can make a docker-compose.yml image with the docker container set to network_mode: host to be able to access the 9050 socks5 port on the 10.152.152.11 local IP, but it doesnt seem to be able to resolve domains either for some reason. + +``` +[workstation user ~]% cat docker-compose.yml +services: + myalpine: + image: alpine + tty: true + network_mode: host + environment: + - 'HTTP_PROXY=socks5://host.docker.internal:9050' + - 'HTTPS_PROXY=socks5://host.docker.internal:9050' + extra_hosts: + - host.docker.internal:host-gateway + +[workstation user ~]% sudo docker-compose down ; sudo docker-compose up -d +Stopping user_myalpine_1 ... done +Removing user_myalpine_1 ... done +Creating user_myalpine_1 ... done + +[workstation user ~]% sudo docker container ls +CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES +0752ecb83c6b alpine "/bin/sh" 43 seconds ago Up 42 seconds user_myalpine_1 +[workstation user ~]% sudo docker exec -it 0752 sh + +[workstation user ~]% sudo docker exec -it 0752 sh +/ # ip a +1: lo: mtu 65536 qdisc noqueue state UNKNOWN qlen 1000 + link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 + inet 127.0.0.1/8 scope host lo + valid_lft forever preferred_lft forever + inet6 ::1/128 scope host noprefixroute + valid_lft forever preferred_lft forever +2: eth0: mtu 1500 qdisc fq_codel state UP qlen 1000 + link/ether 52:54:00:e8:c3:50 brd ff:ff:ff:ff:ff:ff + inet 10.152.152.11/18 brd 10.152.191.255 scope global eth0 + valid_lft forever preferred_lft forever + inet6 fe80::5054:ff:fee8:c350/64 scope link + valid_lft forever preferred_lft forever +3: docker0: mtu 1500 qdisc noqueue state DOWN + link/ether 02:42:8c:ad:6a:cd brd ff:ff:ff:ff:ff:ff + inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0 + valid_lft forever preferred_lft forever + inet6 fe80::42:8cff:fead:6acd/64 scope link + valid_lft forever preferred_lft forever +15: br-973a58a1c943: mtu 1500 qdisc noqueue state DOWN + link/ether 02:42:35:83:6e:bc brd ff:ff:ff:ff:ff:ff + inet 172.19.0.1/16 brd 172.19.255.255 scope global br-973a58a1c943 + valid_lft forever preferred_lft forever + inet6 fe80::42:35ff:fe83:6ebc/64 scope link + valid_lft forever preferred_lft forever + +/ # nc 10.152.152.11 -p 9050 +nc: bind: Address in use +``` +4) tested with a forgejo container, with the socks5 proxy set onto 10.152.152.11 on port 9050, it is unable to mirror repositories that are on external clearnet git instances. + +TLDR: if you run a docker container inside of a whonix workstation VM, it will remain truly isolated and unable to communicate with the internet. + diff --git a/duresspin/0.png b/duresspin/0.png new file mode 100644 index 0000000..d72e55e Binary files /dev/null and b/duresspin/0.png differ diff --git a/duresspin/1.png b/duresspin/1.png new file mode 100644 index 0000000..d5bbde1 Binary files /dev/null and b/duresspin/1.png differ diff --git a/duresspin/2.png b/duresspin/2.png new file mode 100644 index 0000000..95bf655 Binary files /dev/null and b/duresspin/2.png differ diff --git a/duresspin/3.png b/duresspin/3.png new file mode 100644 index 0000000..15e2e69 Binary files /dev/null and b/duresspin/3.png differ diff --git a/duresspin/4.png b/duresspin/4.png new file mode 100644 index 0000000..c541d4a Binary files /dev/null and b/duresspin/4.png differ diff --git a/duresspin/5.png b/duresspin/5.png new file mode 100644 index 0000000..29cc6b9 Binary files /dev/null and b/duresspin/5.png differ diff --git a/duresspin/6.png b/duresspin/6.png new file mode 100644 index 0000000..74accbe Binary files /dev/null and b/duresspin/6.png differ diff --git a/duresspin/7.png b/duresspin/7.png new file mode 100644 index 0000000..91cc652 Binary files /dev/null and b/duresspin/7.png differ diff --git a/duresspin/index.md b/duresspin/index.md new file mode 100644 index 0000000..0e3171b --- /dev/null +++ b/duresspin/index.md @@ -0,0 +1,97 @@ +--- +author: XMRonly +date: 2025-06-22 +gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/331" +xmr: 86XU71dRkBcA1FmPeHf2UK9UQBy7c5KXKbUwkTZCry1G8MENNnp3jQnWYG3LdR5rQwEXJxTYXJBXcWupQAmb86RMGQ1DksF + +--- +# GrapheneOS Duress PIN + +![](0.png) + +## Introduction + +As discussed previously on this blog, using a VeraCrypt hidden volume is an ideal way to [plausibly deny](../veracrypt/index.md) the existence of certain materials. On mobile phones, however, this is not possible since VeraCrypt does not (yet) support mobile platforms. We must therefore seek an alternative tool to have plausible deniability over any materials we do not wish to expose in case of an emergency. One such alternative is the Duress PIN feature on GrapheneOS. Quoting from [https://grapheneos.org](https://grapheneos.org/features#duress): + +>GrapheneOS provides users with the ability to set a duress PIN/Password that will irreversibly wipe the device (along with any installed eSIMs) once entered anywhere where the device credentials are requested (on the lockscreen, along with any such prompt in the OS). + +The Duress PIN feature works seamlessly and as expected: upon entering the Duress PIN, the device is immediately wiped and the process is uninterruptible. There is no phone reset required nor any fumbling around with the bootloader in order for this to work. In this tutorial, we will explore how to set up and use the GrapheneOS Duress PIN feature, and how possible scenarios may play out when forced to unlock your phone against your will. + +## Setup + +Before setting up a Duress PIN, we will first need to set a PIN code for unlocking the phone. This is found under **Settings > Security & privacy > Device unlock > Screen lock**. Assuming this has already been set up, we can move to setting up a Duress PIN. Navigate to **Settings > Security & privacy > Device unlock > Duress password**. You will be prompted to enter your lock screen PIN to authenticate. + +![](1.png) + +We are now presented with a screen detailing the features of the Duress password. Click on "+ Add duress PIN and password". As noted in the text on screen, we will be entering both a numeric duress PIN and an alphanumeric duress password. Entering either one of these when prompted will trigger the duress feature wiping all data from the device. + + +![](2.png) + +We now proceed to fill out the duress PIN and duress password on screen and then click Add to finalize our input. + +![](3.png) + +We proceed past the final warning and our setup is complete. + +![](4.png) + +We can always update or remove our duress PIN and password by navigating back to **Settings > Security & privacy > Device unlock > Duress password**. + +![](5.png) + +To use the duress PIN, you simply enter it on any screen where the device credentials are requested by the GrapheneOS operating system. This will work from the lock screen, which most users would be familiar with, but also from other functions such as setting the Fingerprint Unlock function under **Settings > Security & privacy > Device unlock > Fingerpint Unlock** (remember how we were prompted to first authenticate before being able to set a Duress PIN? It's the same procedure here). + +If you were to set your duress PIN the same as the lock screen PIN code for unlocking the phone, you don't need to worry about accidentally wiping your device because the PIN code takes priority over the duress PIN. Entering it would only unlock the phone as normal. + +## Considerations + +Using your duress PIN in a confrontational scenario with law enforcement (LE) may have negative consequences based on your jurisdiction. It is therefore important to carefully assess the circumstances of the situation. + +Depending on your jurisdiction, inputting a duress PIN may be seen as tampering with evidence, destroying evidence or contempt of court, which could carry fines or prison sentences. This is clearly undesirable, although it may potential be a lesser offense then the offenses brought about by LE actually finding the materials concealed on your phone. + +As a general precaution, using a long and difficult to guess PIN code is recommended over using your fingerprint. This is because in the United States, the [Electronic Frontier Foundation](https://www.eff.org/deeplinks/2020/06/protecting-your-privacy-if-your-phone-taken-away) has noted that: + +>Some courts have found that you can be forced to unlock a phone protected with a biometric such as face or fingerprint identification without your consent, so it is advised to not enable either option. + +The EFF additionally [notes](https://www.eff.org/deeplinks/2020/06/surveillance-self-defense-attending-protests-age-covid-19) that: + +>Under current U.S. law—which is still in flux—using a memorized passcode generally provides a stronger legal footing to push back in court against compelled device unlocking/decryption. + +It might be worthwhile to consider **writing your duress PIN on a piece of paper and placing this paper in your phone case**. Should anyone find your phone or compel you to give it to them, they may inadvertedly enter your duress PIN thinking you were forgetful and had to write down you PIN. + +## Scenario + +You're at home minding your own business, when the adversary suddenly breaks down your door, arresting you and seizing all of your electronic devices. You are then taken to the police station. If you are in a jurisdiction that allows for it, [don't talk to the police](https://youtu.be/d-7o9xYp7eE), ask for a lawyer, then [shut the fuck up](https://files.catbox.moe/h7kpp5.mp4). + +If you are not in such a jurisdiction, you may be forced to unlock your phone under threats of physical violence. + +>LE: What's the code to your phone?! + +>You: I think my phone's on the fritz officer, it's not really working lately... + +>LE: Shut up! Open it NOW!! + +>You: OK, whatever you say officer... + +You enter the duress PIN. The screen briefly displays a message saying "Wrong PIN" then powers off the device. + +![](6.png) + +>LE: What the fuck? + +>You: Yeah officer, I told you it's been acting up lately... + +Powering the phone back on will cause it to boot as normal before finally arriving at the GrapheneOS Recovery screen. + +![](7.png) + +The irreversible wipe has just occurred and all data and eSIMS are unrecoverable. The only thing that can be done is a factory reset. This can be done by navigating down to "Factory data reset" using the volume keys on the phone and clicking the power button to select that option. After allowing some time for the installation to complete, the phone is loaded with a fresh install of GrapheneOS. + +## Conclusion + +We've seen how to set up and use the GrapheneOS duress PIN feature. Due to the possible consequences of using the duress PIN for tampering with or destroying evidence in an adversarial scenario, this should be reserved as a last resort option if you have no other choice. + +##### Disclaimer + +This blog's [stance](../stancesensitive/index.md) is to not endorse sensitive activities and nothing in this article serves as legal advice. diff --git a/endgame/index.md b/endgame/index.md index 9ab2909..16a3449 100644 --- a/endgame/index.md +++ b/endgame/index.md @@ -4,6 +4,8 @@ date: 2024-04-13 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/178" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Deniability + - High Availability - Core Tutorial --- # EndGame V3 Setup diff --git a/everyoneisacriminal/applearticle.png b/everyoneisacriminal/applearticle.png index 94b40bc..6e72339 100644 Binary files a/everyoneisacriminal/applearticle.png and b/everyoneisacriminal/applearticle.png differ diff --git a/everyoneisacriminal/dumblawsarticle.png b/everyoneisacriminal/dumblawsarticle.png index 9c19909..e4c4ecd 100644 Binary files a/everyoneisacriminal/dumblawsarticle.png and b/everyoneisacriminal/dumblawsarticle.png differ diff --git a/everyoneisacriminal/eufarmsarticle.png b/everyoneisacriminal/eufarmsarticle.png index 37dd44a..f33e04f 100644 Binary files a/everyoneisacriminal/eufarmsarticle.png and b/everyoneisacriminal/eufarmsarticle.png differ diff --git a/everyoneisacriminal/index.md b/everyoneisacriminal/index.md index 02c2515..1007682 100644 --- a/everyoneisacriminal/index.md +++ b/everyoneisacriminal/index.md @@ -3,6 +3,8 @@ author: Crabmeat date: 2025-06-07 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/345" xmr: 89aWkJ8yabjWTDYcHYhS3ZCrNZiwurptzRZsEpuBLFpJgUfAK2aj74CPDSNZDRnRqeKNGTgrsi9LwGJiaQBQP4Yg5YtJw2U +tags: + - Anarchy --- # **Everyone is a criminal** diff --git a/everyoneisacriminal/lawsevolution.png b/everyoneisacriminal/lawsevolution.png index 01d48b1..168a5b8 100644 Binary files a/everyoneisacriminal/lawsevolution.png and b/everyoneisacriminal/lawsevolution.png differ diff --git a/everyoneisacriminal/lawslengh.png b/everyoneisacriminal/lawslengh.png index 34600db..9c18e61 100644 Binary files a/everyoneisacriminal/lawslengh.png and b/everyoneisacriminal/lawslengh.png differ diff --git a/everyoneisacriminal/warondrugsarticle.png b/everyoneisacriminal/warondrugsarticle.png index d09e315..0e32a63 100644 Binary files a/everyoneisacriminal/warondrugsarticle.png and b/everyoneisacriminal/warondrugsarticle.png differ diff --git a/failovers/index.md b/failovers/index.md index 110cf87..4d872d9 100644 --- a/failovers/index.md +++ b/failovers/index.md @@ -4,6 +4,9 @@ date: 2024-04-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/274" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Deniability + - Self-Hosted + - High Availability - Core Tutorial --- # Electrical Failover (basic UPS setup) diff --git a/file-verification/19.png b/file-verification/19.png new file mode 100644 index 0000000..6b14518 Binary files /dev/null and b/file-verification/19.png differ diff --git a/file-verification/index.md b/file-verification/index.md index d076d66..8e3faa2 100644 --- a/file-verification/index.md +++ b/file-verification/index.md @@ -3,6 +3,8 @@ author: Doctor Dev date: 2025-05-22 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/310" xmr: 89g3MMq1mo9C5C4vDisyAoCU5GuukXJ2FedUwyLXJWpmTsKHdi1rCPZaeT1d9V4NViTTXyaL9qtKzSbVdKGdEghhCH5oRiT +tags: + - Clientside Privacy --- # File Verification @@ -186,6 +188,81 @@ Now after this process you have ended with an hash that you authenticated, you c Now after this process you have ended with an hash that you authenticated, you can use this hash with the file verification process to finish and verify the origin of the file downloaded. +#### Minisign (CLI) +For this example, we'll be showing both sides (the project maintainer and user) + +Both sides must have Minisign installed + +```bash +root@localhost:~# apt install minisign +``` + +##### Maintainer +1. The maintainer generates their own key-pair for signing releases. This may prompt for a password to encrypt the secret key. + + ```bash + maintainer@localhost:~$ minisign -G + Please enter a password to protect the secret key. + + Password: + Password (one more time): + Deriving a key from the password in order to encrypt the secret key... done + + The secret key was saved as /home/maintainer/.minisign/minisign.key - Keep it secret! + The public key was saved as minisign.pub - That one can be public. + + Files signed using this key pair can be verified with the following command: + + minisign -Vm -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI + ``` + + The public key (which in this case is `RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI`) can be shared with others on a site, or where-ever the downloads are hosted. It can even be shared as a QR code or on the phone thanks to how small it is. + + ```bash + maintainer@localhost:~$ sudo apt install qrencode + maintainer@localhost:~$ qrencode -o pubkey_qr.png RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI + ``` + + ![](19.png) + +2. The maintainer generates a checksum file of the latest binary release, We'll be using SHA-512 for this. + + ```bash + maintainer@localhost:~$ sha512sum program > SHA512SUMS + ``` + +3. The maintainer signs the checksum file with their Minisign key. + + ```bash + maintainer@localhost:~$ minisign -S -m SHA512SUMS + Password: + Deriving a key from the password and decrypting the secret key... done + + ``` + +##### User + +1. The user downloads the program, the SHA512 checksum file, and the signature of that file. + +2. The user verifies the Minisign signature with the public key. + + If it's a good signature, Minisign's output may be something like this: + + ```bash + user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI + Signature and comment signature verified + Trusted comment: timestamp:1750090525 file:SHA512SUMS hashed + ``` + + However, if it's a **bad signature**, Minisign's output may be something like this instead: + + ```bash + user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI + Signature verification failed + ``` + +3. The user verifies the SHA-512 checksum file with the program, like normal + ----- ### **Zero Trust Policy** #### **!!! Important !!!** @@ -207,21 +284,3 @@ In this game its all about who has the better chances, no such thing as 100%, th - building projects - Taking the source code and building your own program, this is completely the best zero trust policy existing for software(especially if you know programming languages). check this [post](../compilation/index.md) to know more - - -## **Other Usage of PGP Keys** - -- Git Commit Verification - -- Encrypting Emails - -- General Encryption - -- SSH Authentication - -## **Finishing words** -The dark web its a big place with all the varieties of personalities, from good to bad, from smart to dumb, from kids to adults, you should always keep yourself safe here. - -opsec is important, don't take it lightly, at the end you are your only security. - -Be wary!, Be Paranoid!, Be Invisible! diff --git a/forgejo-anon/index.md b/forgejo-anon/index.md index 467b047..9c93dd6 100644 --- a/forgejo-anon/index.md +++ b/forgejo-anon/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-11-23 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/270" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity --- # Forgejo .onion Setup (Anonymous Code Repositories and Collaboration) @@ -276,8 +278,14 @@ Now in order to make sure our Forgejo instance is able to mirror external git re → cat gitea/gitea/conf/app.ini | tail -n 4 [proxy] PROXY_ENABLED = true - PROXY_URL = **socks://tor-forgejo:9050/** + PROXY_URL = socks5://tor-forgejo:9050/ PROXY_HOSTS = * + + [migrations] + ALLOW_LOCALNETWORKS = true + SKIP_TLS_VERIFY = true + ALLOWED_DOMAINS = * + BLOCKED_DOMAINS = [ Datura ] [ /dev/pts/13 ] [/srv/forgejo_onion] → docker-compose down ; docker-compose up -d @@ -286,6 +294,8 @@ Now in order to make sure our Forgejo instance is able to mirror external git re And now from there, we should be able to mirror external repositories on gitea by making the traffic go through Tor aswell. As an example, let's create a git mirror of the official [Monero](../monero2024/index.md) repository that currently sits on [Github](https://github.com/monero-project/monero): +**SIDENOTE:** [you can't mirror clone repositories that are on other forgejo onion-only instances](https://codeberg.org/forgejo/forgejo/issues/8193) due to an upstream issue in [curl](https://github.com/curl/curl/issues/17363) So in the meantime, you can only use the mirror function to clone other clearnet repositories. + ![](9.png) ![](10.png) ![](11.png) Now be aware that it's going to take longer than it usually would to get the repository due to the low bandwidth that Tor has, so be be patient and wait until it finishes: @@ -348,7 +358,7 @@ Then we can proceed with the rest of the instructions to push the commit to the → git remote add origin http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion/nihilist/my-very-cool-repository.git [ mainpc ] [ /dev/pts/9 ] [~/Documents/my-very-cool-repository] - → **torsocks git push -u origin main** + → torsocks git push -u origin main Username for 'http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion': nihilist Password for 'http://nihilist@daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion': Enumerating objects: 3, done. @@ -463,14 +473,9 @@ Next, if you want a custom CSS theme like the one i have, **first be aware that → cd css [ Datura ] [ /dev/pts/6 ] [public/assets/css] - → wget https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css - --2024-11-23 20:25:50-- https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css - Resolving git.nowhere.moe (git.nowhere.moe)... 65.109.30.253 - Connecting to git.nowhere.moe (git.nowhere.moe)|65.109.30.253|:443... connected. - HTTP request sent, awaiting response... 200 OK - Length: 22754 (22K) [text/plain] - Saving to: ‘theme-space.css’ - + → torsocks wget http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css + --2024-11-23 20:25:50-- http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css + theme-space.css 100%[=================================================>] 22.22K --.-KB/s in 0s 2024-11-23 20:25:50 (310 MB/s) - ‘theme-space.css’ saved [22754/22754] diff --git a/governments/index.md b/governments/index.md index fbdee0f..b6b3f02 100644 --- a/governments/index.md +++ b/governments/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-07 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - OPSEC Concepts --- # Governments, Centralisation, and Law Enforcement @@ -48,9 +50,9 @@ Businesses are centralised entities just like governments, they ALL can act as p For the Law to be enforceable the authorities need to know 2 things: - 1. ![](../su2.png)What happened ? (lack of Privacy) + 1. ![](../logos/su2.png)What happened ? (lack of Privacy) - 2. ![](../on2.png)Who did it ? (lack of Anonymity) + 2. ![](../logos/on2.png)Who did it ? (lack of Anonymity) ![](3.png) @@ -61,9 +63,9 @@ That is the basis of this whole Privacy and Anonymity talk. In short, For the la Modern governments know this very well, and some go to extreme lengths to make sure that every citizen is under surveillance. - 1. USA: [Edward Snowden's Revelations](https://iv.nowhere.moe/watch?v=9g_sqKH2z4I) + 1. USA: [Edward Snowden's Revelations](https://youtube.com/watch?v=9g_sqKH2z4I) - 2. China: [the Surveillance State](https://iv.nowhere.moe/watch?v=Np_C8647mK8) \- [See what it can lead to](https://iv.nowhere.moe/watch?v=v7AYyUqrMuQ) + 2. China: [the Surveillance State](https://youtube.com/watch?v=Np_C8647mK8) \- [See what it can lead to](https://youtube.com/watch?v=v7AYyUqrMuQ) diff --git a/govfear/index.md b/govfear/index.md index 3b04b88..25708d6 100644 --- a/govfear/index.md +++ b/govfear/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-07 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - OPSEC Concepts --- # Governments fear Decentralisation and Anonymity diff --git a/graphene/index.md b/graphene/index.md index 86e9cc0..47e43f9 100644 --- a/graphene/index.md +++ b/graphene/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-07-10 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Privacy --- # How to have Privacy on your Phone (GrapheneOS) diff --git a/haveno-arbitrator/index.md b/haveno-arbitrator/index.md index b3b31ff..b10387e 100644 --- a/haveno-arbitrator/index.md +++ b/haveno-arbitrator/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-05-19 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/97" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR) diff --git a/haveno-cashbymail/index.md b/haveno-cashbymail/index.md index c3e9c46..9a699fc 100644 --- a/haveno-cashbymail/index.md +++ b/haveno-cashbymail/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-05-19 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/99" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # Haveno DEX Cash by Mail -> XMR transaction diff --git a/haveno-client-f2f/index.md b/haveno-client-f2f/index.md index ce9e41f..282e9fe 100644 --- a/haveno-client-f2f/index.md +++ b/haveno-client-f2f/index.md @@ -5,6 +5,9 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: - Core Tutorial + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # Haveno DEX Direct Fiat to Monero transactions diff --git a/haveno-crypto/index.md b/haveno-crypto/index.md index adf9f55..f57c172 100644 --- a/haveno-crypto/index.md +++ b/haveno-crypto/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2025-02-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC) diff --git a/haveno-seednode/index.md b/haveno-seednode/index.md index 3aa322c..e1d8a06 100644 --- a/haveno-seednode/index.md +++ b/haveno-seednode/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-10-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/18" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # How to run a Haveno Seed Node diff --git a/haveno-sepa/index.md b/haveno-sepa/index.md index 460e665..2c9b9ae 100644 --- a/haveno-sepa/index.md +++ b/haveno-sepa/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-05-20 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/98" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Outdoors Anonymity --- # Haveno DEX Bank Transfer (ex: SEPA) -> XMR transaction diff --git a/hiddenservice/index.md b/hiddenservice/index.md index 67ce888..6285216 100644 --- a/hiddenservice/index.md +++ b/hiddenservice/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-08-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/105" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity --- # Where to host Anonymous Hidden Services ? diff --git a/high_availability/index.md b/high_availability/index.md index 7a254a9..789a2e4 100644 --- a/high_availability/index.md +++ b/high_availability/index.md @@ -4,6 +4,8 @@ date: 2024-12-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/186" xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs tags: + - Serverside Deniability + - High Availability - Core Tutorial --- # Why is High Availability Important for Deniability ? diff --git a/homeserver/index.md b/homeserver/index.md index e665ac4..04ac815 100644 --- a/homeserver/index.md +++ b/homeserver/index.md @@ -3,6 +3,9 @@ author: Anonymous date: 2025-05-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/318" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Privacy + - Self-Hosting --- # How to Self-Host a server at Home diff --git a/hypervisor_selfhosted/index.md b/hypervisor_selfhosted/index.md index 15f8fc3..2d133eb 100644 --- a/hypervisor_selfhosted/index.md +++ b/hypervisor_selfhosted/index.md @@ -3,6 +3,9 @@ author: Nihilist date: 2025-06-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/319" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Privacy + - Self-Hosting --- # Self-Hosting a Hypervisor on your Home Server diff --git a/hypervisorsetup/index.md b/hypervisorsetup/index.md index ba80815..271572b 100644 --- a/hypervisorsetup/index.md +++ b/hypervisorsetup/index.md @@ -5,6 +5,7 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: - Core Tutorial + - Clientside Privacy --- # Linux Hypervisor Setup (QEMU/KVM virtualisation) diff --git a/i2ptorrents/index.md b/i2ptorrents/index.md index b6b8038..ec47e97 100644 --- a/i2ptorrents/index.md +++ b/i2ptorrents/index.md @@ -3,6 +3,8 @@ author: oxeo0 date: 2025-03-14 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/17" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ +tags: + - Clientside Anonymity --- # Peer-to-Peer Large File Sharing (Torrents over I2P) diff --git a/index.md b/index.md index ede844e..a3b8938 100644 --- a/index.md +++ b/index.md @@ -1,14 +1,19 @@ # Operational Security: Privacy, Anonymity and Deniability -**BREAKING NEWS:** Welcome to the Nihilism Opsec Blog v2.0! We are now running mkdocs-material and all of our blogposts have been converted to Markdown to make it simplify the contribution process in the long run. + +``` +"You cannot be governed. You just didn't realize it yet." +``` ![](opsec4levels/0.png) [SHOWCASED TUTORIAL:](opsec4levels/index.md) Learn how to audit your own setup, to determine your Operational Security (OPSEC) Level, and find out what is the most appropriate internet use for it. +**BREAKING NEWS:** Welcome to The Opsec Bible v2.0! We are now running mkdocs-material and all of our blogposts have been converted to Markdown to make it simplify the contribution process in the long run. + With this new mkdocs blog version, we have completely changed how you can find blogposts that are relevant to your own situation. Thanks to the Mkdocs search plugin, **you can now search for specific terms (ex:Tor, Monero, Anonymity, Deniability) in the search bar at the top** to find the blogposts that are relevant to what you wish to know. Don't hesitate to combine search terms together to try and find what you need. -## What is the goal of the Opsec blog ? +## What is the goal of The Opsec Bible ? **In short, we're here to tell you why and how you can become ungovernable.** @@ -19,6 +24,11 @@ With this new mkdocs blog version, we have completely changed how you can find b (Check out [this blogpost](whytheblog/index.md) for more details on our mission) ## Our latest contributed tutorials: +- 2025-06-22: [GrapheneOS Duress PIN](duresspin/index.md) +- 2025-06-16: [File Verification (minisign update)](file-verification/index.md) +- 2025-06-13: [Protesting is not Enough](protestingisnotenough/index.md) +- 2025-06-09: [How to encrypt files and messages (Age and PGP)](pgp/index.md) +- 2025-06-09: [What's Agorism?](agorism/index.md) (Contributed by [Sam Bent](https://www.youtube.com/@Sam_Bent/videos)) - 2025-06-08: [How to hide your self-hosted service's home IP from the end users](vpsvpnrouting/index.md) - 2025-06-08: [Prevent IP leaks using a VPN on the Home Server Host OS](vpn_selfhosted/index.md) - 2025-06-08: [Everyone is a Criminal](everyoneisacriminal/index.md) @@ -31,7 +41,7 @@ With this new mkdocs blog version, we have completely changed how you can find b - 2025-05-30: [The Individual reigns supreme, no matter what the state says.](individualreignssupreme/index.md) - 2025-05-26: [The True Goal of Cryptocurrency](truecrypto/index.md) - 2025-05-25: [Why should I use Whonix for Self-hosted Hidden services ?](whonix_hiddenservice/index.md) -- 2025-05-22: [File Verifications (Shasums and PGP)](file-verification/index.md) +- 2025-05-22: [File Verification (Shasums and PGP)](file-verification/index.md) - 2025-05-21: [Realistic OPSEC Mistakes and Threat Scenarios](opsecmistakes/index.md) - 2025-05-16: [The State is the Enemy](stateistheenemy/index.md) - 2025-05-16: [Why can't I use signal to chat anonymously?](signalnoanonymity/index.md) @@ -39,16 +49,16 @@ With this new mkdocs blog version, we have completely changed how you can find b - 2025-05-01: [How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)](monerofirst/index.md) - 2025-05-01: [Why should I self-host my own services ?](selfhosting/index.md) - 2025-05-01: [Our stance on sensitive activities](stancesensitive/index.md) -- 2025-04-30: [What is the goal of the Opsec blog?](whytheblog/index.md) +- 2025-04-30: [What is the goal of The Opsec Bible?](whytheblog/index.md) - 2025-04-27: [Anonymous Monitoring (Grafana, Prometheus, Node-exporter)](anonymous_server_monitoring/index.md) - 2025-04-21: [Self-Hosted LLM Hidden Service](openwebuilocalllms/index.md) - 2025-04-20: [Where to Hide your Monero Wealth?](monerowealth/index.md) ## Our upcoming tutorials: -To know what's in store for the future of the Nihilism Opsec blog, you can check out our [Forgejo opsec project board](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1) +To know what's in store for the future of The Opsec Bible, you can check out our [Forgejo opsec project board](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1) -If there is a new tutorial that should be added in the opsec blog, let us know in our [SimpleX Chatrooms](http://nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/simplex.html) or as a new git issue our [Forgejo repository](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions) directly. +If there is a new tutorial that should be added in The Opsec Bible, let us know in our [SimpleX Chatrooms](http://nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/simplex.html) or as a new git issue our [Forgejo repository](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions) directly. ## The Blog is open to contributions: @@ -58,15 +68,17 @@ If you want to earn some Monero, you can write new blogposts for us (from 10 to ## Wall of Fame (as of May 2025) - [The Kicksecure Documentation](http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/wiki/Documentation) : One of the actual backbones of OPSEC in general, making Privacy, Anonymity and even Deniability possible on the operating system level and explaining how they achieved it -- [The Whonix Documentation](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Documentation) : One of the actual backbones of OPSEC in general, making Anonymity possible on the operating system level and explaining how they achieved it -- [The Hitchhiker's guide to Anonymity](https://anonymousplanet.org/guide/) : The main inspiration for the Opsec blog, an actual goldmine of information, even though i don't like how everything is in one page. -- [Hackliberty Resources](https://git.hackliberty.org/hackliberty.org/Hack-Liberty-Resources) : Community focused on Anarchy in general +- [The Whonix Documentation](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Documentation) : Another backbone of OPSEC, making Anonymity possible on the guest operating system level and explaining how they achieved it. +- [The Hitchhiker's guide to Anonymity](https://anonymousplanet.org/guide/) : The main inspiration for The Opsec Bible, an actual goldmine of information, even though i don't like how everything is in one page. +- [Hackliberty Resources](https://git.hackliberty.org/hackliberty.org/Hack-Liberty-Resources) : Community centered around Anarchism, Agorism, and Cypherpunk in general. - [Dread /d/opsec](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/opsec) : Dread being one of the largest darknet forums out there, their opsec board is a fertile ground for truth seeking - [Sam bent's youtube channel](https://www.youtube.com/@Sam_Bent) : Ex-darknet vendor, well versed in anything opsec-related, with solid background on the law in general. - [Monero Talk's youtube channel](https://www.youtube.com/@MoneroTalk) : Show focusing on growing the adoption of Monero to the masses. +- [/biz/'s Monero Info Dump](https://moneroinfodump.neocities.org/) : Website explaining why monero is the ultimate cryptocurrency ## Wall of Shame (as of May 2025) -- [Dread /d/opsec](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/opsec) : Dread being one of the largest darknet forums out there, their opsec board is also (sadly) a fertile ground for disinformation campaigns and dishonest debates, so make sure you double check and challenge everything they claim in there. +- [Dread /d/opsec](http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/opsec) : Dread being one of the largest darknet forums out there, their opsec board is also (sadly) a fertile ground for disinformation campaigns and dishonest debates, so make sure you double check and challenge everything they claim in there. Forums are anyway not ideal to actually take you from A to Z when it comes to exploring entire fields of study like operational security. - [PrivacyGuides](https://www.privacyguides.org/en/mobile-browsers/?h=mobile+browsers#legacy-adblock-settings) : Sadly a far too popular community of privacy laxists, [claiming that using closed-source software is supposedly suitable for private use](https://discuss.privacyguides.net/t/should-privacy-guides-require-open-source-source-first-or-source-available-as-a-criteria-for-all-tools/22684/83). -- [Techlore](https://www.youtube.com/watch?v=EA4KyQBdSu8) : Another privacy laxist community claiming that privacy is possible on Windows, or MacOS. +- [Techlore](https://www.youtube.com/watch?v=EA4KyQBdSu8) : Another privacy laxist community claiming that privacy is possible on Windows, or MacOS. + diff --git a/individualreignssupreme/index.md b/individualreignssupreme/index.md index 96d5910..e70084f 100644 --- a/individualreignssupreme/index.md +++ b/individualreignssupreme/index.md @@ -3,6 +3,8 @@ author: Mulligan Security date: 2025-05-19 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236" xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs +tags: + - Anarchy --- # The Individual reigns supreme, no matter what the state says. diff --git a/internetsegmentation/index.md b/internetsegmentation/index.md index 58cee4e..b183d3b 100644 --- a/internetsegmentation/index.md +++ b/internetsegmentation/index.md @@ -5,6 +5,7 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: - Core Tutorial + - OPSEC Concepts --- # Internet Usage Segmentation Setup diff --git a/lawsdonotstopcrime/crime.png b/lawsdonotstopcrime/crime.png index 91db6ff..5cee6c4 100644 Binary files a/lawsdonotstopcrime/crime.png and b/lawsdonotstopcrime/crime.png differ diff --git a/lawsdonotstopcrime/index.md b/lawsdonotstopcrime/index.md index 4432014..5aa1b7a 100644 --- a/lawsdonotstopcrime/index.md +++ b/lawsdonotstopcrime/index.md @@ -3,6 +3,8 @@ author: Crabmeat date: 2025-06-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/343" xmr: 89aWkJ8yabjWTDYcHYhS3ZCrNZiwurptzRZsEpuBLFpJgUfAK2aj74CPDSNZDRnRqeKNGTgrsi9LwGJiaQBQP4Yg5YtJw2U +tags: + - Anarchy --- # **Laws do not stop crimes** diff --git a/lawsdonotstopcrime/lawinterpretation.png b/lawsdonotstopcrime/lawinterpretation.png index 674d7d3..1d6e7a2 100644 Binary files a/lawsdonotstopcrime/lawinterpretation.png and b/lawsdonotstopcrime/lawinterpretation.png differ diff --git a/lawsdonotstopcrime/organized.png b/lawsdonotstopcrime/organized.png index 679009c..7dfa14c 100644 Binary files a/lawsdonotstopcrime/organized.png and b/lawsdonotstopcrime/organized.png differ diff --git a/linux/index.md b/linux/index.md index 9f21b39..3bba9fc 100644 --- a/linux/index.md +++ b/linux/index.md @@ -5,6 +5,7 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: - Core Tutorial + - Clientside Privacy --- # How to have Privacy on your Computer (Kicksecure Host OS) diff --git a/livemode/index.md b/livemode/index.md index ab97a92..0a0aff4 100644 --- a/livemode/index.md +++ b/livemode/index.md @@ -4,6 +4,7 @@ date: 2025-04-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/160" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Clientside Deniability - Core Tutorial --- # Using the Host-OS in live-mode to enable Sensitive Use diff --git a/mailprivate/index.md b/mailprivate/index.md index b75daeb..a71003f 100644 --- a/mailprivate/index.md +++ b/mailprivate/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2022-05-19 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/114" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Self-Hosted + - Clearnet Services --- # Anonymous self-hosted clearnet mail server Setup diff --git a/maintainers/image.png b/maintainers/image.png index 7dc5f1f..a86f35e 100644 Binary files a/maintainers/image.png and b/maintainers/image.png differ diff --git a/maintainers/index.md b/maintainers/index.md index c54801b..9271c70 100644 --- a/maintainers/index.md +++ b/maintainers/index.md @@ -3,12 +3,14 @@ author: nihilist date: 2025-03-21 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/203" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Contribute --- # How to become a Maintainer ![](0.png) -Becoming a Maintainer is the next step to contribute to the Opsec blog and Darknet Lantern projects, where you get to assist the other contributors contribute just like you did. The requirement is simple: **You should have contributed at least 3 times, having submitted contributions that were already nearly finished (95%) in one go.** If you are still submitting contributions that are 75% finished in one go, you are not ready to become a maintainer yet, maintainers are supposed to know the quality standard perfectly, to be able to enforce it [when doing contribution reviews](https://www.youtube.com/watch?v=jJuNQeG9Irc&t=4m14s), therefore i expect that they show that they understand it. +Becoming a Maintainer is the next step to contribute to The Opsec Bible and Darknet Lantern projects, where you get to assist the other contributors contribute just like you did. The requirement is simple: **You should have contributed at least 3 times, having submitted contributions that were already nearly finished (95%) in one go.** If you are still submitting contributions that are 75% finished in one go, you are not ready to become a maintainer yet, maintainers are supposed to know the quality standard perfectly, to be able to enforce it [when doing contribution reviews](https://www.youtube.com/watch?v=jJuNQeG9Irc&t=4m14s), therefore i expect that they show that they understand it. diff --git a/monero2024/index.md b/monero2024/index.md index 25c8ba9..a879b27 100644 --- a/monero2024/index.md +++ b/monero2024/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-01-31 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/103" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Self-Hosted + - Contributing to Anonymity --- # Monero Node Setup diff --git a/monerofirst/index.md b/monerofirst/index.md index fc5f005..464aca9 100644 --- a/monerofirst/index.md +++ b/monerofirst/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2025-01-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/50" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work) diff --git a/moneroinheritance/index.md b/moneroinheritance/index.md index fe6ef83..817fda8 100644 --- a/moneroinheritance/index.md +++ b/moneroinheritance/index.md @@ -4,7 +4,10 @@ date: 2025-01-29 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/48" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 tags: + - Serverside Anonymity - Core Tutorial + - Decentralized Finances + - Agorism --- # Monero Inheritence Management (VaultWarden Emergency Contacts) diff --git a/monerop2pool/index.md b/monerop2pool/index.md index 66e6101..2994cf6 100644 --- a/monerop2pool/index.md +++ b/monerop2pool/index.md @@ -3,6 +3,10 @@ author: null date: 2024-08-25 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/104" xmr: 46qeUbExxGSLT1pAkssG2LMBnLPsbiTNMcikp1B8PwFnShPkTRxt9c12Tcw2KaAagRTAju5j2NUYYNwCAp54zKMqBpoUZEg +tags: + - Serverside Anonymity + - Self-Hosted + - Contributing to Anonymity --- # Mine Monero with p2pool and xmrig diff --git a/monerowallet/index.md b/monerowallet/index.md index 1236a50..0329947 100644 --- a/monerowallet/index.md +++ b/monerowallet/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-01-31 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/52" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # How to setup your Monero wallet diff --git a/monerowealth/index.md b/monerowealth/index.md index 05eb725..c4cf240 100644 --- a/monerowealth/index.md +++ b/monerowealth/index.md @@ -4,6 +4,9 @@ date: 2025-04-20 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/167" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Clientside Deniability + - Decentralized Finances + - Agorism - Core Tutorial --- # Where to hide your Monero Wealth ? @@ -71,13 +74,13 @@ First of all, you need to remain aware of where your deniability starts and wher Following our general recommendations on [VM-based internet use segmentation](../internetsegmentation/index.md), we have our usual Public, Private, Anonymous and Sensitive use VMs. - * ![](../de2.png)Public use VM: **you cannot deny the existance of a monero wallet in it** + * ![](../logos/de2.png)Public use VM: **you cannot deny the existance of a monero wallet in it** - * ![](../de2.png)Private use VM: **you cannot deny the existance of a monero wallet in it** + * ![](../logos/de2.png)Private use VM: **you cannot deny the existance of a monero wallet in it** - * ![](../de2.png)[Anonymous use VM](../whonixqemuvms/index.md): **you cannot deny the existance of a monero wallet in it** + * ![](../logos/de2.png)[Anonymous use VM](../whonixqemuvms/index.md): **you cannot deny the existance of a monero wallet in it** - * ![](../de0.png)[Sensitive use VM](../sensitivevm/index.md): _ONLY HERE You can deny the existance of a monero wallet_! + * ![](../logos/de0.png)[Sensitive use VM](../sensitivevm/index.md): _ONLY HERE You can deny the existance of a monero wallet_! diff --git a/multiple_identities/index.md b/multiple_identities/index.md index 045bfe4..8e10c33 100644 --- a/multiple_identities/index.md +++ b/multiple_identities/index.md @@ -3,6 +3,8 @@ author: Hoover date: 2024-10-09 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/56" xmr: 42yco9t6qK98N191EZzKJUCH7cit5JT8mBJQvVULEPAPeBHurbFqGj2hK7kaFhqasv8AYLpbuP15Wg5suzyjUd5SMLqabRw +tags: + - OPSEC Concepts --- # How to Maintain Multiple Identities Online diff --git a/mysqlmastermaster/index.md b/mysqlmastermaster/index.md index c2efd5c..b85c599 100644 --- a/mysqlmastermaster/index.md +++ b/mysqlmastermaster/index.md @@ -4,6 +4,8 @@ date: 2025-02-21 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/188" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ tags: + - Serverside Deniability + - High Availability - Core Tutorial --- # How to setup a MySQL Master-Master replication over Tor diff --git a/nextcloud/index.md b/nextcloud/index.md index 92ab283..79cd298 100644 --- a/nextcloud/index.md +++ b/nextcloud/index.md @@ -3,6 +3,9 @@ author: Optimist date: 2025-03-27 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/233" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Self-Hosted --- # Nextcloud .onion Setup (Anonymous File Hosting) diff --git a/offtopic/index.md b/offtopic/index.md index bd0f4a7..06a7245 100644 --- a/offtopic/index.md +++ b/offtopic/index.md @@ -6,7 +6,7 @@ xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAU --- # What's On-topic and Off-topic ? -The Nihilism Blog's Operational Security tutorial category is on purpose restricted to a few topics to avoid the subject from being too vast and to remain fully explorable. +The Opsec Bible's Operational Security tutorial category is on purpose restricted to a few topics to avoid the subject from being too vast and to remain fully explorable. ## Topic 1: Privacy diff --git a/on0.png b/on0.png deleted file mode 100644 index b45b30a..0000000 Binary files a/on0.png and /dev/null differ diff --git a/on1.png b/on1.png deleted file mode 100644 index e540732..0000000 Binary files a/on1.png and /dev/null differ diff --git a/on2.png b/on2.png deleted file mode 100644 index 39f2467..0000000 Binary files a/on2.png and /dev/null differ diff --git a/onionbalancelb/index.md b/onionbalancelb/index.md index d516175..a0ee3c2 100644 --- a/onionbalancelb/index.md +++ b/onionbalancelb/index.md @@ -4,6 +4,8 @@ date: 2025-02-26 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/207" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ tags: + - Serverside Deniability + - High Availability - Core Tutorial --- # OnionBalance for .onion domains load balancing diff --git a/onionshare/index.md b/onionshare/index.md index 46107fc..b9972c6 100644 --- a/onionshare/index.md +++ b/onionshare/index.md @@ -3,6 +3,8 @@ author: nileglorifier date: 2024-09-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/15" xmr: 84TTjteLVhkYuHosBoc1MjWaB1AmnFSWPgeM7Lts4NdigCmE9ndHTjsXEaxJFTb7JGj55GNERXfnJSFY3J3WE5Ha18BSeS1 +tags: + - Clientside Anonymity --- # How to share files anonymously using OnionShare diff --git a/openhardware/index.md b/openhardware/index.md index 9517a78..1030236 100644 --- a/openhardware/index.md +++ b/openhardware/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-07-10 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/75" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Privacy Explained --- # The lack of Open Source Hardware (CPUs, Motherboards, GPUs) diff --git a/openwebuilocalllms/index.md b/openwebuilocalllms/index.md index 9b0327a..da6eda7 100644 --- a/openwebuilocalllms/index.md +++ b/openwebuilocalllms/index.md @@ -4,6 +4,8 @@ date: 2025-06-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/226" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ tags: + - Serverside Anonymity + - Self-Hosted - Core Tutorial --- # Anonymity - Self-Hosted LLM Hidden Service diff --git a/opsec/index.md b/opsec/index.md index 432eeb9..e0f54e4 100644 --- a/opsec/index.md +++ b/opsec/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/72" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - OPSEC Concepts --- # OPSEC: Using the right Technology and Behavior diff --git a/opsec4levels/index.md b/opsec4levels/index.md index a8d05ac..b15b957 100644 --- a/opsec4levels/index.md +++ b/opsec4levels/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-08 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/70" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - OPSEC Concepts --- # Audit your OPSEC and determine the appropriate internet use @@ -28,17 +30,17 @@ _Sidenote:_ If your setup is suitable only for public internet use, you CANNOT u ![](1.png) -![](../co0.png)_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was. +![](../logos/co0.png)_**Complexity:**_ Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was. -![](../tr2.png)_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing. +![](../logos/tr2.png)_Transparency:_ Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing. -![](../su2.png)_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer. +![](../logos/su2.png)_Surveillance:_ Since bob uses closed-source software, he is under constant surveillance while using his computer. -![](../ce2.png)_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services +![](../logos/ce2.png)_Centralisation:_ Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services -![](../on2.png)_Onymity:_ Because there is no privacy, anonymity is impossible for Bob. +![](../logos/on2.png)_Onymity:_ Because there is no privacy, anonymity is impossible for Bob. -![](../de2.png)_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity. +![](../logos/de2.png)_Deniability:_ Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity. _Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he is under constant surveillance while using it. @@ -46,17 +48,17 @@ _Conclusion:_ **Bob's setup is suitable only for Public internet use** , as he i ![](2.png) -![](../co1.png)_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC. +![](../logos/co1.png)_Complexity:_ Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC. -![](../tr0.png)_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do. +![](../logos/tr0.png)_Transparency:_ Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do. -![](../su0.png)_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her +![](../logos/su0.png)_**Surveillance:**_ Alice has verified that the open source software that she was using wasn't spying on her -![](../ce1.png)_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised. +![](../logos/ce1.png)_Centralisation:_ Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised. -![](../on1.png)_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet. +![](../logos/on1.png)_Onymity:_ Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet. -![](../de2.png)_Deniability:_ Alice cannot deny that she has used her current setup +![](../logos/de2.png)_Deniability:_ Alice cannot deny that she has used her current setup _Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to remove surveillance from her setup. @@ -64,17 +66,17 @@ _Conclusion:_ **Alice's setup is suitable for Private use** , as she managed to ![](3.png) -![](../co2.png)_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC +![](../logos/co2.png)_Complexity:_ Charlie is willing to go at great lengths to improve his OPSEC -![](../tr0.png)_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do. +![](../logos/tr0.png)_Transparency:_ Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do. -![](../su0.png)_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing +![](../logos/su0.png)_Surveillance:_ Charlie has verified that the software he is using, is not surveilling what he's doing -![](../ce0.png)_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse +![](../logos/ce0.png)_Centralisation:_ Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse -![](../on0.png)_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser +![](../logos/on0.png)_**Onymity:**_ Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser -![](../de1.png)_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it. +![](../logos/de1.png)_Deniability:_ Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it. _Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed to implement anonymity technologies into his setup. @@ -82,17 +84,17 @@ _Conclusion:_ **Charlie's setup is suitable for Anonymous use** , as he managed ![](4.png) -![](../co2.png)_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC +![](../logos/co2.png)_Complexity:_ Dave is willing to go at great lengths to improve his OPSEC -![](../tr0.png)_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do. +![](../logos/tr0.png)_Transparency:_ Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do. -![](../su0.png)_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing +![](../logos/u0.png)_Surveillance:_ Dave has verified that the software he is using, is not surveilling what he's doing -![](../ce0.png)_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse +![](../logos/ce0.png)_Centralisation:_ Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse -![](../on0.png)_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser +![](../logos/on0.png)_Onymity:_ Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser -![](../de0.png)_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of. +![](../logos/de0.png)_**Deniability:**_ Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of. _Conclusion:_ **Dave's setup is suitable for Sensitive use** , as he managed to implement plausible deniability on top of anonymity technologies into his setup. diff --git a/opsecmistakes/index.md b/opsecmistakes/index.md index 2b2fa27..c290910 100644 --- a/opsecmistakes/index.md +++ b/opsecmistakes/index.md @@ -3,6 +3,8 @@ author: Mulligan Security date: 2025-05-22 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/312" xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs +tags: + - OPSEC Concepts --- # Realistic OPSEC Mistakes and Threat Scenarios diff --git a/p2ptorrents/index.md b/p2ptorrents/index.md index ed201ea..5e1e964 100644 --- a/p2ptorrents/index.md +++ b/p2ptorrents/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2024-10-23 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/12" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Privacy --- # Peer-to-Peer Large File Sharing (Torrents over VPN) diff --git a/passwordmanagement/index.md b/passwordmanagement/index.md index 25c06ec..9c92e2f 100644 --- a/passwordmanagement/index.md +++ b/passwordmanagement/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-16 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/83" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Privacy --- # Password Management 101 (How to use Keepass) diff --git a/pgp/0a.png b/pgp/0a.png new file mode 100644 index 0000000..5630bf1 Binary files /dev/null and b/pgp/0a.png differ diff --git a/pgp/index.md b/pgp/index.md index b24d01f..a30dfff 100644 --- a/pgp/index.md +++ b/pgp/index.md @@ -1,32 +1,45 @@ --- -author: nihilist -date: 2022-12-05 -gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/85" -xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +author: + - cynthia (age) + - nihilist (pgp) +date: + - 2025-06-09 + - 2022-12-05 +gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/226" +xmr: + - 84ybq68PNqKL2ziGKfkmHqAxu1WpdSFwV3DreM88DfjHVbnCgEhoztM7T9cv5gUUEL7jRaA6LDuLDXuDw24MigbnGqyRfgp + - 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Core Tutorial + - Serverside Privacy --- -# How to use PGP encryption -![](0.png) +# How to encrypt files and messages (Age and PGP) -In this tutorial we're going to look at how to setup PGP keys, and use them to encrypt messages +In this tutorial we're going to look at how to setup Age and PGP keys, and use them to encrypt messages ![](../context/private_remote.png) -## **Initial Setup** -### Analogy +## Analogy Bob wants to send a sensitive message to Alice. Bob intends to send his sensitive message to Alice through various means, for example on Teams, Discord or even on Wickr. However Bob knows that these service providers will never respect his privacy, they will always spy on Bob's conversation: ![](1.png) -Bob then decides that noone other than Alice will be able to decrypt his message. So, Bob decides to use PGP encryption, to be able to send a sensitive message to Alice **on any platform** he wishes, because he knows that only Alice will be able to decrypt it: +Bob then decides that noone other than Alice will be able to decrypt his message. So, Bob decides to use some encryption tool, to be able to send a sensitive message to Alice **on any platform** he wishes, because he knows that only Alice will be able to decrypt it: ![](2.png) -Why should you even care about PGP ? Simple, you only want one person to be able to read your message, so you use PGP. You can use it when you do not trust the chat platform you are using, or the email provider, or any other form of communication with text. PGP gives you a simple way of encrypting your messages with others' public key, so that way you're sure that noone can read your messages. +Why should you even care about encryption? Simple, you only want one person to be able to read your message, so you use an encryption tool. You can use it when you do not trust the chat platform you are using, or the email provider, or any other form of communication with text. They give you a simple way of encrypting your messages with others' public key, so that way you're sure that noone can read your messages. + +## PGP + +![](0.png) + +### **Initial Setup** Let's begin by generating your first key: @@ -38,7 +51,7 @@ Let's begin by generating your first key: There is NO WARRANTY, to the extent permitted by law. Note: Use "gpg --full-generate-key" for a full featured key generation dialog. - + GnuPG needs to construct a user ID to identify your key. Real name: nihilist @@ -138,7 +151,7 @@ Now let's export our public key like so: This can be put publicly on your website, so that users will be able to encrypt their messages before sending it to you. -## **Encrypt/Decrypt messages** +### **Encrypt/Decrypt messages** Now let's encrypt our messages with alice's public key after she generates her pgp keys: @@ -317,7 +330,7 @@ To sign the message while also remaining in plaintext, we use the second option K307GR4mNIyMy3VRgtuVdONau4X8p68tRS+wqoVRFB8GDLXTkzJsaULwghm8RQaV x0NOx60kgmXckP00uQM+ySDRqpHoVb5HYRqPrbOhJ6L1AFnexyhuhclvQoS4Zm0e PkvcMFaWOevQnbS8Vh2fVby4fsq5YdzSig4mu6KjQeR+Gu29xkAJp+lgMT1Ia0pL - DVZaUw+AVHyaeQzdokdw0eoU01gl+dzPyaPamAGTbqI5Z7+DMOMgtgC9cpPP+26F +DVZaUw+AVHyaeQzdokdw0eoU01gl+dzPyaPamAGTbqI5Z7+DMOMgtgC9cpPP+26F jTpmq7fFxQ3fpAbEIlcahZzNBSyd1QGu6uKs/V4hqx4Fj7qg4puq+raxgg0JlyEZ greVnUYBONlTTIDgIKqI8D5iFhW6cCHQzXvYjLqCCuY35ZHP0TRkSycZaNjO1/4/ EaNNvLm/uzi3+HhvPW57a9+bcGiVvTLhhje8sVUxioDd36DA4fYkd8BqBNkYvjRa @@ -419,3 +432,101 @@ Once decrypted, she can see that the message has our PGP signature. And that's it! That covers the basics of how to use PGP + +## Age + +![](0a.png) + +You may be thinking: what's the difference between PGP and Age? PGP is a traditional way of encrypting files and messages, while Age is meant to be a more modern alternative to PGP. + +Age has really tiny keys (compared to PGP key sizes), uses modern cryptographic algorithms by default, while still being more secure and simpler to use than PGP. + +### **Initial Setup** + +Let's begin by installing age first. + +```bash +root@localhost:~# apt install age +``` + +Generate your key and output the private key into a text file. We will be outputting the private and public key to a file named `key.txt` + +```bash +bob@localhost:~$ age-keygen -o key.txt +Public key: age1gme6y93jm9nx7thzfu7ma8q7t0qhxae6m4r37m23f83d3phheejs25m8h0 +``` + +Now we can give people the public key that age gave us. It can be put publicly on your website, so that users will be able to encrypt their messages before sending it to you. + +The keys are so tiny, that if we want, we can encode the public key into a little QR code for people to scan + +```bash +bob@localhost:~$ sudo apt install qrencode +bob@localhost:~$ qrencode -o pubkey_qr.png age1gme6y93jm9nx7thzfu7ma8q7t0qhxae6m4r37m23f83d3phheejs25m8h0 +``` + +![](qr.png) + +### **Encrypt/Decrypt messages** + +Since age doesn't have the concept of a keyring like PGP, we have to store Alice's key somewhere in a text file to use. + +```bash +alice@localhost:~$ age-keygen -o key.txt +Public key: age1y7gjjkrukaxzueae3dh60f57cn893d8y38vwh774kye7p8wm850q80ehvm +bob@localhost:~$ mkdir keyring/ +bob@localhost:~$ echo "age1y7gjjkrukaxzueae3dh60f57cn893d8y38vwh774kye7p8wm850q80ehvm" > keyring/alice.txt +``` + +After this, we can encrypt our special file for Alice. + +This special file will be a message in a text file. + +```bash +bob@localhost:~$ vim message.txt +bob@localhost:~$ cat message.txt +This is a very secret message! +``` + +We can then encrypt the file with Alice's key. + +```bash +bob@localhost:~$ age -R keyring/alice.txt -o encrypted_message --armor message.txt +bob@localhost:~$ cat encrypted_message +-----BEGIN AGE ENCRYPTED FILE----- +YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBjR29MQkg2UVQ2Q2VSbmlP +RmE0QzJ0d0NQQ2tEN2VaL2kxWEZEK2hqeGpZClFVNUNlbmJxL1E3dDNBaFFkbzhN +MnU4OHZneExGWk5pekdsWU9yNE5QeTAKLS0tIG0yWlMwMSs4cXM0Skg4UUtyOGJ2 +b2paVnd1WkdLL1RDdDBJYWdHT3krQTAKL+g6Z7DKLXfmYfW4I3AT9HSimwixmLyx +D5Cc55tVZRk2BPj683U8wqSAZWqFoqJgu/97PCY/BvmBpX3KrnOc +-----END AGE ENCRYPTED FILE----- +``` + +Alternatively, we can also encrypt it in binary-mode, by omitting `--armor` + +```bash +bob@localhost:~$ age -R keyring/alice.txt -o encrypted_message message.txt +bob@localhost:~$ xxd encrypted_message +00000000: 6167 652d 656e 6372 7970 7469 6f6e 2e6f age-encryption.o +00000010: 7267 2f76 310a 2d3e 2058 3235 3531 3920 rg/v1.-> X25519 +00000020: 6337 3053 314c 6753 6767 5568 675a 3733 c70S1LgSggUhgZ73 +00000030: 5030 426e 6442 7277 674c 6465 564e 4245 P0BndBrwgLdeVNBE +00000040: 5557 5473 3077 396b 5979 490a 3936 6236 UWTs0w9kYyI.96b6 +00000050: 6378 5979 4734 7155 5a63 684c 5832 4b76 cxYyG4qUZchLX2Kv +00000060: 464d 4365 4f6c 5a45 5662 6d67 3936 696c FMCeOlZEVbmg96il +00000070: 6b35 3164 3761 340a 2d2d 2d20 654c 6950 k51d7a4.--- eLiP +00000080: 544d 4e53 7a4f 6556 744e 644f 484a 5258 TMNSzOeVtNdOHJRX +00000090: 754f 7979 424d 3438 344a 612b 364c 4f6b uOyyBM484Ja+6LOk +000000a0: 4a63 6d41 2f75 630a c9c7 7824 3919 06c8 JcmA/uc...x$9... +000000b0: ba74 5e39 5c89 118a 4091 3722 7741 f098 .t^9\...@.7"wA.. +000000c0: 5d84 6af2 3cb8 03fa e7a6 8b84 1a20 bf7a ].j.<........ .z +000000d0: e948 32c6 7db9 2f1f abed a677 d5fe 5b80 .H2.}./....w..[. +000000e0: ad2e 837b 5ed9 77 ...{^.w +``` + +Alice can now download and decrypt this file with her key and get the messsage that Bob wanted to send her. + +```bash +alice@localhost:~$ age --decrypt -i key.txt encrypted_message +This is a very secret message! +``` diff --git a/pgp/qr.png b/pgp/qr.png new file mode 100644 index 0000000..f539d0e Binary files /dev/null and b/pgp/qr.png differ diff --git a/pgpcanary/index.md b/pgpcanary/index.md index ccd4400..a149c8a 100644 --- a/pgpcanary/index.md +++ b/pgpcanary/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2025-04-10 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/179" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Serverside Anonymity --- # How to Verify One's Identity While Maintaining Anonymity Using PGP Canaries diff --git a/phonenumbers/index.md b/phonenumbers/index.md index 64e8c86..66289c6 100644 --- a/phonenumbers/index.md +++ b/phonenumbers/index.md @@ -3,6 +3,8 @@ author: user@Whonix date: 2024-05-26 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/14" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Anonymity Explained --- # Phone Numbers are incompatible with Anonymity @@ -18,9 +20,9 @@ Naturally, law enforcement agencies LOVE to keep their hands on this data. They As we discussed [previously](../governments/index.md) for the law to be respected, it needs to be enforced. And to be enforced, the authorities need to know: - 1. ![](../su2.png)What happened ? (lack of Privacy) + 1. ![](../logos/su2.png)What happened ? (lack of Privacy) - 2. ![](../on2.png)Who did it ? (lack of Anonymity) + 2. ![](../logos/on2.png)Who did it ? (lack of Anonymity) diff --git a/physicalsecurity/index.md b/physicalsecurity/index.md index a0215cb..26f6b84 100644 --- a/physicalsecurity/index.md +++ b/physicalsecurity/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2024-03-28 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/33" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Deniability + - Self-Hosted --- # Plausible Deniability Protection for an .onion Service diff --git a/plausiblydeniabledataprotection/index.md b/plausiblydeniabledataprotection/index.md index d2f6436..c244267 100644 --- a/plausiblydeniabledataprotection/index.md +++ b/plausiblydeniabledataprotection/index.md @@ -4,6 +4,7 @@ date: 2025-04-06 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Clientside Deniability - Core Tutorial --- # Sensitive Critical Data Backup Procedure diff --git a/privacy/index.md b/privacy/index.md index cf75b8a..01fed2a 100644 --- a/privacy/index.md +++ b/privacy/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-14 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/73" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Privacy Explained --- # What is Privacy ? Why is it Important ? @@ -22,7 +24,7 @@ When you are looking for Privacy, always ask yourself : **Privacy from what ? Pr ## **The Enemy of Privacy is Surveillance** -Make no mistake, as we discussed [previously](../govfear/index.md), governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: ![](../su2.png)**They need to know what happened.** To be able to know what happened, **they need surveillance to be implemented wherever they can** , and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. +Make no mistake, as we discussed [previously](../govfear/index.md), governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: ![](../logos/su2.png)**They need to know what happened.** To be able to know what happened, **they need surveillance to be implemented wherever they can** , and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their [closed source](../closedsource/index.md) software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see [FISA 702](https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf)). diff --git a/privatesimplex-server/index.md b/privatesimplex-server/index.md index 030f646..888f087 100644 --- a/privatesimplex-server/index.md +++ b/privatesimplex-server/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2025-05-22 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/322" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Serverside Privacy --- # **Remote Hosting SimpleX Servers** diff --git a/privatesimplex/index.md b/privatesimplex/index.md index 8eec367..6cad7c4 100644 --- a/privatesimplex/index.md +++ b/privatesimplex/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2025-05-22 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/61" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Privacy --- # Easy Private Chats - SimpleX @@ -19,7 +21,7 @@ Online communication is one of the most ubiquitous activities on all of the inte Telegram is a very popular messaging app that boasts close to [1 billion](https://www.statista.com/statistics/258749/most-popular-global-mobile-messenger-apps/) active users worldwide. With support for massive chatrooms, Telegram is almost more akin to social media than to a traditional messaging app. Many companies offer news, updates, and support through their official Telegram channels making it a very convenient place for users to stay up to date with various interests. Due to its strong stance on free speech, Telegram built a reputation for not cooperating with law enforcement investigations. However, after the arrest of CEO Pavel Durov in part relating to Telegram's refusal hand over user data in lawful orders, Telegram changed their [privacy policy](https://files.catbox.moe/988lhl.png) to say they may share user phone numbers and IP addresses and indeed have [done so](https://www.404media.co/telegram-confirms-it-gave-u-s-user-data-to-the-cops/). Telegram supports E2EE but this is not enabled by default, which is probably its most significant drawback. -Signal is a champion for user freedom and its state-of-the-art security is the foundation upon which other chat applications are built. Signal is very intuitive to use, supporting all of the usual text/image/voice/video/etc features that users expect. Unlike Telegram, Signal is E2EE by default and the only information it knows about users are their phone number and time of registration. Numerous [court orders](https://signal.org/bigbrother/) have solidified how Signal has nothing else to hand over to law enforcement. The phone number requirement for SMS verification, while concretely a drawback if not [acquired anonymously](https://blog.nowhere.moe/opsec/anonsms/index.md), is an intentional decision for Signal's target audience (normies) as everyday users can be notified if other stored contacts join Signal. +Signal is a champion for user freedom and its state-of-the-art security is the foundation upon which other chat applications are built. Signal is very intuitive to use, supporting all of the usual text/image/voice/video/etc features that users expect. Unlike Telegram, Signal is E2EE by default and the only information it knows about users are their phone number and time of registration. Numerous [court orders](https://signal.org/bigbrother/) have solidified how Signal has nothing else to hand over to law enforcement. The phone number requirement for SMS verification, while concretely a drawback if not [acquired anonymously](../anonsms/index.md), is an intentional decision for Signal's target audience (normies) as everyday users can be notified if other stored contacts join Signal. SimpleX is a relative newcomer on the scene and has a unique angle in that there are no user identifies of any kind. As such, users can create unlimited profiles (and even hidden profiles to improve plausible deniability) and connect with others anonymously. Unlike Signal, SimpleX supports native onion routing as well as the ability to self-host servers. Because of its default E2EE, servers are not able to see message contents and self-hosted servers can be shared with others, contributing to decentralization and thus making SimpleX more resilient. SimpleX's founder, in an [interview](https://www.wired.com/story/neo-nazis-flee-telegram-encrypted-app-simplex/), implied that SimpleX sees no information about its users but since it is new, it remains to be seen how they would respond to actual court orders. SimpleX has received some criticism for its reliance on Venture Capital to establish itself while it works to develop a business model. @@ -27,7 +29,7 @@ A comparison from [privacyspreadsheet.com](https://privacyspreadsheet.com/messag ![](1.png) -When selecting a messaging app, certain [OPSEC criteria](https://blog.nowhere.moe/opsec/anonsimplex/index.md) should be considered. +When selecting a messaging app, certain [OPSEC criteria](../anonsimplex/index.md) should be considered. Privacy: 1\. The application is free and open source (FOSS). @@ -185,7 +187,7 @@ Once your friends connect, you can start messaging. Out of the box, SimpleX works perfectly fine. However, more advanced users may wish to tweak a few settings or self-host their own servers. -if you want to setup your own private simplex server, check out this [tutorial](../simplex-server/index.md) +if you want to setup your own private simplex server, check out this [tutorial](../privatesimplex-server/index.md) ## **Conclusion** diff --git a/protestingisnotenough/493.png b/protestingisnotenough/493.png new file mode 100644 index 0000000..a17797f Binary files /dev/null and b/protestingisnotenough/493.png differ diff --git a/protestingisnotenough/arabspring.png b/protestingisnotenough/arabspring.png new file mode 100644 index 0000000..70766bb Binary files /dev/null and b/protestingisnotenough/arabspring.png differ diff --git a/protestingisnotenough/atlas.png b/protestingisnotenough/atlas.png new file mode 100644 index 0000000..6acb249 Binary files /dev/null and b/protestingisnotenough/atlas.png differ diff --git a/protestingisnotenough/brazil.png b/protestingisnotenough/brazil.png new file mode 100644 index 0000000..153b893 Binary files /dev/null and b/protestingisnotenough/brazil.png differ diff --git a/protestingisnotenough/deadlyprotests.png b/protestingisnotenough/deadlyprotests.png new file mode 100644 index 0000000..8f116cf Binary files /dev/null and b/protestingisnotenough/deadlyprotests.png differ diff --git a/protestingisnotenough/index.md b/protestingisnotenough/index.md new file mode 100644 index 0000000..f9abebc --- /dev/null +++ b/protestingisnotenough/index.md @@ -0,0 +1,225 @@ +--- +author: Crabmeat +date: 2025-06-09 +gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/344" +xmr: 89aWkJ8yabjWTDYcHYhS3ZCrNZiwurptzRZsEpuBLFpJgUfAK2aj74CPDSNZDRnRqeKNGTgrsi9LwGJiaQBQP4Yg5YtJw2U +tags: + - Agorism +--- +# **Protesting is not enough** + +## **Why are people protesting?** + +All around the world, people protest when they want political change. In some countries, protests have been suppressed by military forces or militias deployed by the government, but in general, protesting remains the most common way for people to demand changes from the state. But why is this the preferred method instead of others? + +At its core, protesting is essentially a nonviolent way of trying to obtain something you want from someone. In many cases, violence can escalate quickly during protests, but it is often the result of external factors, such as violence initiated by government forces. + +People tend to think that protesting is an effective way to get the authorities’ attention without facing any major consequences. In reality, as we will see later, no one is truly listened to while protesting. + +Sometimes, protesters choose to resort to violence in an attempt to strengthen their message. However, in any case, the fight is never balanced against the governments in power, and this often only makes things worse. + +Another reason people choose protest over other methods of seeking change is its visibility. Public demonstrations can attract media attention and, in some cases, pressure governments into responding to demands. In reality, however, the media is often influenced—or even controlled—by governments, meaning protests may receive little or biased coverage. + +On the other hand, protesting is widely seen as a fundamental right by people living in so-called “democracies,” and many hope it will bring about change. As we discussed in our [article](http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/stateistheenemy/) titled The State is the Enemy, democracy often resembles an illusion more than a reality in many countries that claim the label. + +![](protest.png) + +## **Examples of useless protests around the world** + +I'd like to share some examples of protests from around the world that either failed to bring about any change or ended up making the situation worse. + +1) The Tiananmen Square Protests (China, 1989) + +What Happened: Students and civilians protested in Beijing, calling for political change, particularly regarding personal freedoms and government corruption. + +Outcome: The Chinese government responded with martial law and a brutal suppression of the protests. Thousands of people were killed or arrested, and the government became even more authoritarian. These events are still heavily censored in China. + +Here is the [Wikipedia](https://en.wikipedia.org/wiki/1989_Tiananmen_Square_protests_and_massacre) page that relates this events. + +![](tiananmen.png) + +2) The Yellow Vest Protests (France, 2018-2019) + +What Happened: The protests started after the announcement of a fuel tax increase, but the protesters quickly expanded their demands to include opposition to economic inequality and government policies. The main method of protest was to pacefuly block streets and roads across the country. + +Outcome: The protests failed to bring about the systemic changes that the protesters had hoped for. As violence escalated, driven by the government's lack of engagement, public support for the movement waned. In response, the government decided to use force against the protesters. Many people were injured by police, including independent journalists who were attempting to cover the events. + +Here is the [Wikipedia](https://en.wikipedia.org/wiki/Yellow_vests_protests) page relating this events. + +![](yellow.png) + +Under Emmanuel Macron's reign, many unpopular reforms were presented to the public, leading to widespread protests. Here is a list of the major reforms passed using Article 49.3 (which allows the government to pass legislation without a parliamentary vote, bypassing opposition): + +*Labor Market Reform (2017)* + +Law Name: Loi Travail (Labor Law Reform) +Date: September 2017 +Explanation: This reform aimed to make France’s labor market more flexible by allowing companies to negotiate directly with employees (bypassing national labor unions) and simplifying the rules around layoffs. It was said it was designed to encourage hiring and improve competitiveness but faced widespread opposition, particularly from trade unions. + +*Pension Reform (2019-2020)* + +Law Name: Réforme des Retraites (Pension Reform) +Date: March 2020 (after a long period of debate and protests) +Explanation: Macron’s government aimed to overhaul France’s complex pension system by implementing a universal points-based system. This would have replaced the 42 existing pension schemes with one single system. The reform was highly controversial and led to massive strikes and protests, particularly among public sector workers. The main protest reason was that it involved working longer than usual. (Until 67 years old VS 65 years old) + +*2020 Social Security Budget (Health & Social Spending)* + +Law Name: Loi de Financement de la Sécurité Sociale 2020 (2020 Social Security Finance Law) +Date: December 2019 +Explanation: This annual law set the framework for the financing of France’s social security system, addressing deficits in healthcare and other areas. It was passed under 49.3 to quickly manage increasing spending due to healthcare demands. + +*2020 Emergency Law for Covid-19* + +Law Name: Loi d'Urgence pour Faire Face à l'Épidémie de Covid-19 (Covid-19 Emergency Law) +Date: March 2020 +Explanation: With the Covid-19 crisis unfolding, Macron’s government passed emergency measures using 49.3 to implement a national lockdown, introduce quarantine protocols, and provide economic support to businesses and workers impacted by the pandemic. Most of the reform was considered as hostile to freedom by the population. + +*2020 Rectified Finance Law (Covid-19 Economic Response)* + +Law Name: Loi de Finances Rectificative 2020 (Rectified Finance Law 2020) +Date: July 2020 +Explanation: This law was aimed at addressing the economic fallout from the Covid-19 crisis, providing significant financial support to businesses, workers, and the healthcare sector. It included measures for loans, subsidies, and economic recovery plans. Most of opponents argued that it would cause an economic nightmare in the country, and it did. + +![](493.png) + +*2022 Security Law* + +Law Name: Loi Sécurité Globale (Global Security Law) +Date: November 2020 +Explanation: This controversial law expanded police powers, including the right to control video footage of police actions, and introduced stricter regulations around demonstrations. Critics argued it could lead to increased surveillance and curb press freedoms. It was fiercely opposed by civil rights groups. + +*2022 Budget Law* + +Law Name: Loi de Finances 2022 (2022 Finance Law) +Date: October 2021 +Explanation: The national budget for 2022, which included tax cuts, increased spending on public services, and provisions for dealing with inflation and rising energy costs, was passed under 49.3 due to the lack of a parliamentary majority after Macron's party lost seats in the 2022 elections. + +*2022 Covid-19 Health Pass Law* + +Law Name: Loi sur le Pass Sanitaire (Health Pass Law) +Date: July 2021 +Explanation: To combat the Covid-19 pandemic, this law mandated the use of a health pass for individuals wishing to access certain public spaces, including restaurants, theaters, and long-distance travel. It was heavily criticized by anti-vaxxers and others as an infringement on personal freedoms. + +*2022 Energy Law* + +Law Name: Loi Climat et Résilience (Climate and Resilience Law) +Date: July 2021 +Explanation: This law aimed to combat climate change by reducing carbon emissions and promoting renewable energy. It included measures to improve energy efficiency, promote public transportation, and ban certain plastic products. The law was passed quickly to meet EU climate targets. + +*2023 Budget Law* + +Law Name: Loi de Finances 2023 (2023 Finance Law) +Date: December 2022 +Explanation: The 2023 budget, which included measures to tackle inflation, reduce public debt, and enhance public spending on various sectors, was passed using 49.3 due to political gridlock in the National Assembly, following Macron's loss of a parliamentary majority in the 2022 legislative elections. + +All these examples show that governments often act against the will of the population, even in the face of mass protests. They can force through any reform simply by invoking Article 49.3. Since this article is part of the Constitution, it essentially provides a legal framework for bypassing both parliamentary debate and public opinion — making it constitutionally acceptable to ignore the voice of the people. And as you can see, the changes imposed by the French government were truly life-altering for the population. + +3) The Arab Spring (Various countries in the Middle East and North Africa, 2010-2012) + +What Happened: The Middle East and North Africa were shaken by a wave of protests demanding better living conditions and the end of authoritarian rule. + +Outcome: In many cases, the consequances of these uprisings were chaotic and violent. While some countries, like Tunisia, made strides toward democracy, others, such as Libya and Syria, descended into civil war. In many cases, authoritarian regimes were replaced with instability, violence, and ongoing human rights abuses. + +Here is the [Wikipedia](https://en.wikipedia.org/wiki/Arab_Spring) page relating this events. + +![](arabspring.png) + +4) The 2013 Brazilian Protests (Brazil) + +What Happened: Initially sparked by a rise in public transport fares, the protests in Brazil quickly morphed into demonstrations against corruption, poor public services, and government spending priorities. + +Outcome: The protests led to the government reversing the transport fare hikes, but little was done to address the root causes of the unrest, such as corruption and inequality. As a result, the protests did not lead to lasting changes, and political instability grew in the years following, culminating in the impeachment of President Dilma Rousseff in 2016. + +Here is the [Wikipedia](https://en.wikipedia.org/wiki/2013_protests_in_Brazil) page about this events. + +![](brazil.png) + +These examples show that even large protests, whether violent or non-violent and often supported by a significant portion of the population, rarely lead to the expected outcomes. Protest is an ancient method of resistance, but it is no longer an effective strategy today, as the balance of power between the population and government forces is deeply skewed. Governments have the legal authority to use force against citizens, while protesting itself can be deemed illegal. It’s nearly impossible to win against an institution that can deploy an army to control crowds, simply through protesting. + +![](deadlyprotests.png) + +As the media are often influenced or controlled by governments, public support can also be manipulated: + +![](perception.png) + +## **So, what's the solution?** + +As we've seen, protesting is no longer an effective strategy against governments that don't hesitate to harm or even kill their citizens, all while being protected by the very laws they create. So, what is the solution? + +The solution is to render governments completely ineffective. If we can strip them of all their power by completely stepping outside their system, they will collapse on their own. + +To make governments irrelevant, it's necessary to build an alternative system outside of the existing one—starting with a parallel economy, since the economy is what primarily sustains governments. If people stop allowing them to take their money and succeed in making government decisions meaningless in their lives, it would gradually choke the system and render it powerless. + +![](parallel.png) + +To achieve this, people need to live without paying taxes. You must be compensated for your work in a currency that is not controlled by states. For example, [Monero](https://en.wikipedia.org/wiki/Monero) (XMR) is a cryptocurrency that operates independently of any government control and ensures that your transactions are untraceable. + +If you keep your transactions secret and stay off the radar, and if you work hard to maintain your anonymity online—following the advice shared in this blog, for example—you’ll be much more effective than just protesting. Governments survive only because they’re siphoning money from the population. By stopping this racket, you stop feeding the institutions that are taking advantage of you. + +The goal is to take what you want, not wait for it to come to you. + +Our [article](http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/agorism/) "What is Agorism", written by the fantastic Sam Bent, is describing it as "Agorism is a form of economic guerrilla warfare against the state. Samuel Edward Konkin III developed this revolutionary philosophy in the 1970s as a strategy that rejects both the futility of political reform and the self-defeating nature of violent revolution. Instead of begging for freedom or fighting for it, agorists build it through direct economic action that makes the state irrelevant.". That's what we are trying to describe here. Here is the illustration used to describe it: + +![](../agorism/image-26.png) + +In addition, creating small, self-sustaining communities independent of government control could help promote shared values such as sustainability, self-reliance, and decentralized governance. These communities could establish education systems that operate outside of traditional, government-controlled institutions. This could involve community-based learning, unschooling, and homeschooling models. + +Openware.com publised an interresting [article](https://www.openware.com/news/articles/overview-of-decentralized-communities) bout decentralized communities and how to build it. + +![](screencomunities.png) + +In order to help people stay informed about world events without external influence, we need to create decentralized media platforms, with independent journalists, bloggers, and activists. Access to information should not depend on government decisions, which is why such communities must find ways to sustain basic needs outside of the current system—where food, water, electricity, and medicine are often controlled by governments that profit from them. + +The following [article](https://techbullion.com/independent-media-and-the-rise-of-alternative-news-platforms/) covers how independent medias are starting to rise. + +![](screenmedia.png) + +Developing collaborative, peer-to-peer networks for sharing resources, services, aid, and knowledge—bypassing traditional hierarchical structures—would significantly reduce the power of the state. + +Renewable energy projects, led by independent thinkers outside the current system, would help these communities become entirely self-sufficient. Encouraging individuals and communities to become energy-independent by using renewable energy sources like solar, wind, and hydro power would lessen reliance on national grids and energy companies, which are often controlled by both governments and corporations. + +This [article](https://www.power-and-beyond.com/ten-of-the-worlds-largest-renewable-energy-projects-a-1bbd49e672adb3070f0b14207f506003/) list the ten of the worlds largest renewable energy projects that could help independent comunities. + +![](screenenergy.png) + +Perhaps one of the most important aspects of building independent communities is developing a new social contract. This would allow communities to define their own rules, structures, and systems without government oversight. This can include setting up community councils, cooperatives, and governance systems based on mutual aid and voluntary participation. + +If you want additional information about social contract, please refer to this [Wikipedia](https://en.wikipedia.org/wiki/Social_contract) page that explains everything about it. + +As you can see, fighting against governments can't be done simply through protesting—it requires organization and teamwork. And that’s the key point to understand. Just like protesting, building a system outside of the system requires multiple people working together. Competent and knowledgeable individuals need to come together to build what could be the future of humanity. + +In his [article](http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/agorism/) Sam is illustrating the power of this actions in the section "The Endgame". + +## Real life examples + +Some projects and actions have been successfully implemented based on the idea of creating a system outside of the system, and they can serve as inspiration for us: + +Many people use cryptocurrency for transactions in countries with unstable currencies, or to avoid government surveillance of their financial activities. As an example, [xmrbazaar](https://xmrbazaar.com/) is a market only using Monero. + +![](screenxmr.png) + +The Bristol Pound (UK) and the Bristol Pound Community Bank are examples where local businesses and residents use a currency that is not tied to the central banking system. You can find more details about it [here](https://en.wikipedia.org/wiki/Bristol_pound) + +The [Findhorn](https://en.wikipedia.org/wiki/Findhorn_Foundation) Foundation in Scotland is an intentional community that focuses on environmental sustainability and spiritual growth, while the [Damanhur](https://en.wikipedia.org/wiki/Federation_of_Damanhur) community in Italy is based on collective living and a decentralized governance structure. + +Obviously, the Dark Web is an example where individuals engage in anonymous activities, often using decentralized platforms like Tor to avoid surveillance and censorship. It is a place of freedom where governments watch is not accepted. But, if you are here, you already know that! + +Linux is an open-source operating system developed collaboratively by a global community of developers, and Wikipedia is a user-generated, open-access resource that runs outside of corporate control. This examples are showing that the union of people sharing values can create protjects laregly used. + +Detroit’s Urban Farming Movement includes community-led efforts to grow food on vacant city lots, reducing dependency on commercial agriculture and government-run food programs. If you want to learn more about this program, the following [article](https://efarmer.com/2025/01/27/urban-farming-in-detroit-a-story-of-resilience-and-renewal/) should help you. + +![](screendetroit.png) + +The Herbalism Network and other alternative medicine communities allow people to practice and share traditional healing methods without reliance on government health systems. + +Based on this, as small and larger individual projects succeed, we can assume that with a bit of organization, these practices can be combined to create a global system outside of the system. Of course, it can't be done in a day, but sharing information, raising awareness, training people, and recruiting the right individuals would accelerate the process. + +Please refer to Sam's [article](http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/agorism/), in the chapter "Historical Examples That Prove It Works" to find more examples where Agorsim worked. + +## **Conclusion** + +As we've seen, protesting alone is not enough; we need to hit the states where it hurts — through the economy. By becoming independent and self-sufficient, we can render them useless and weak. I typically reference many books when writing an article, but this time, there's one book that covers it all: Atlas Shrugged by Ayn Rand. If you're looking for a mind-changing book that will open your eyes to a whole new world of subversion, take a look at it. + +![](atlas.png) + +[Here](https://en.wikipedia.org/wiki/Atlas_Shrugged)’s more information about this masterpiece. \ No newline at end of file diff --git a/protestingisnotenough/parallel.png b/protestingisnotenough/parallel.png new file mode 100644 index 0000000..b3b4890 Binary files /dev/null and b/protestingisnotenough/parallel.png differ diff --git a/protestingisnotenough/perception.png b/protestingisnotenough/perception.png new file mode 100644 index 0000000..66df3ec Binary files /dev/null and b/protestingisnotenough/perception.png differ diff --git a/protestingisnotenough/protest.png b/protestingisnotenough/protest.png new file mode 100644 index 0000000..3de350f Binary files /dev/null and b/protestingisnotenough/protest.png differ diff --git a/protestingisnotenough/screencomunities.png b/protestingisnotenough/screencomunities.png new file mode 100644 index 0000000..e94f1a2 Binary files /dev/null and b/protestingisnotenough/screencomunities.png differ diff --git a/protestingisnotenough/screendetroit.png b/protestingisnotenough/screendetroit.png new file mode 100644 index 0000000..dd82552 Binary files /dev/null and b/protestingisnotenough/screendetroit.png differ diff --git a/protestingisnotenough/screenenergy.png b/protestingisnotenough/screenenergy.png new file mode 100644 index 0000000..fde365c Binary files /dev/null and b/protestingisnotenough/screenenergy.png differ diff --git a/protestingisnotenough/screenmedia.png b/protestingisnotenough/screenmedia.png new file mode 100644 index 0000000..64c5a1c Binary files /dev/null and b/protestingisnotenough/screenmedia.png differ diff --git a/protestingisnotenough/screenxmr.png b/protestingisnotenough/screenxmr.png new file mode 100644 index 0000000..7e50757 Binary files /dev/null and b/protestingisnotenough/screenxmr.png differ diff --git a/protestingisnotenough/tiananmen.png b/protestingisnotenough/tiananmen.png new file mode 100644 index 0000000..999fe9b Binary files /dev/null and b/protestingisnotenough/tiananmen.png differ diff --git a/protestingisnotenough/yellow.png b/protestingisnotenough/yellow.png new file mode 100644 index 0000000..427f2e9 Binary files /dev/null and b/protestingisnotenough/yellow.png differ diff --git a/qualitystandard/index.md b/qualitystandard/index.md index 7d43665..72b2705 100644 --- a/qualitystandard/index.md +++ b/qualitystandard/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2025-03-22 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/200" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Contribute --- # The Quality Standard diff --git a/runtheblog/index.md b/runtheblog/index.md index 4586c07..38fd1b7 100644 --- a/runtheblog/index.md +++ b/runtheblog/index.md @@ -3,8 +3,10 @@ author: nihilist date: 2024-11-12 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/153" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Contribute --- -# How to run the Nihilism Blog Yourself +# How to run the Opsec Bible Yourself ## **Why are you letting me run the blog ?** @@ -194,7 +196,7 @@ And there you go! you now have a platform to receive criticism, collaborate and ## **Setting up a Mirror List** -And then to make sure the nihilism blog remains resistant to takedowns, you can list it on your own [Darknet Lantern](../darknetlantern/index.md) instance, under the [Blogs](http://lantern.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/index.php?query=Blogs) category: +And then to make sure the Opsec Bible remains resistant to takedowns, you can list it on your own [Darknet Lantern](../darknetlantern/index.md) instance, under the [Blogs](http://lantern.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/index.php?query=Blogs) category: ![](25.png) diff --git a/selfhosting/index.md b/selfhosting/index.md index 22ae71e..27ecfb2 100644 --- a/selfhosting/index.md +++ b/selfhosting/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2025-01-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/294" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Privacy + - Self-Hosting --- # Why should I self-host my own services? diff --git a/sensitiveremotevshome/index.md b/sensitiveremotevshome/index.md index 5985009..993cc60 100644 --- a/sensitiveremotevshome/index.md +++ b/sensitiveremotevshome/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2024-04-29 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/177" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Deniability + - Self-Hosted --- # Sensitive .onion Services: Self-Host or Host Remotely ? diff --git a/sensitivevm/index.md b/sensitivevm/index.md index af49c6a..32ce7b1 100644 --- a/sensitivevm/index.md +++ b/sensitivevm/index.md @@ -4,6 +4,7 @@ date: 2025-04-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/256" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Clientside Deniability - Core Tutorial --- # Sensitive VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) diff --git a/serversideencryption/index.md b/serversideencryption/index.md index 6c3d6c3..46f5e7e 100644 --- a/serversideencryption/index.md +++ b/serversideencryption/index.md @@ -5,6 +5,7 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: - Core Tutorial + - Privacy Explained --- # Why can't I trust Server-side Encryption ? diff --git a/signalnoanonymity/index.md b/signalnoanonymity/index.md index a7d67a1..28a4032 100644 --- a/signalnoanonymity/index.md +++ b/signalnoanonymity/index.md @@ -3,6 +3,8 @@ author: oxeo0 date: 2025-05-16 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/278" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ +tags: + - Anonymity Explained --- # Anonymity - Why can't I use Signal to chat anonymously? diff --git a/simplexalerts/alert.png b/simplexalerts/alert.png index 445b1e0..35c6ec0 100644 Binary files a/simplexalerts/alert.png and b/simplexalerts/alert.png differ diff --git a/simplexalerts/alert_rules.png b/simplexalerts/alert_rules.png index 185cd09..e3a2649 100644 Binary files a/simplexalerts/alert_rules.png and b/simplexalerts/alert_rules.png differ diff --git a/simplexalerts/architecture.png b/simplexalerts/architecture.png index 6e67cfe..57ae2bd 100644 Binary files a/simplexalerts/architecture.png and b/simplexalerts/architecture.png differ diff --git a/simplexalerts/available_alerters.png b/simplexalerts/available_alerters.png index be40e10..57521d0 100644 Binary files a/simplexalerts/available_alerters.png and b/simplexalerts/available_alerters.png differ diff --git a/simplexalerts/contact_points.png b/simplexalerts/contact_points.png index 9139398..1b8c2fa 100644 Binary files a/simplexalerts/contact_points.png and b/simplexalerts/contact_points.png differ diff --git a/simplexalerts/create_group.png b/simplexalerts/create_group.png index 848e1fd..0d0b48a 100644 Binary files a/simplexalerts/create_group.png and b/simplexalerts/create_group.png differ diff --git a/simplexalerts/example_infra.png b/simplexalerts/example_infra.png index 5dd93bd..466dd04 100644 Binary files a/simplexalerts/example_infra.png and b/simplexalerts/example_infra.png differ diff --git a/simplexalerts/group_link.png b/simplexalerts/group_link.png index 6d7494d..87e1631 100644 Binary files a/simplexalerts/group_link.png and b/simplexalerts/group_link.png differ diff --git a/simplexalerts/index.md b/simplexalerts/index.md index 28828f0..194e3f7 100644 --- a/simplexalerts/index.md +++ b/simplexalerts/index.md @@ -4,6 +4,7 @@ date: 2025-06-04 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/223" xmr: 82htErcFXbSigdhK9tbfMoJngZmjGtDUacQxxUFwSvtb9MY8uPSuYSGAuN1UvsXiXJ8BR9BVUUhgFBYDPvhrSmVkGneb91j tags: + - Serverside Anonymity - Core Tutorial --- diff --git a/simplexalerts/insecure_channel.png b/simplexalerts/insecure_channel.png index 4ab55b1..5acdf00 100644 Binary files a/simplexalerts/insecure_channel.png and b/simplexalerts/insecure_channel.png differ diff --git a/simplexalerts/name_group.png b/simplexalerts/name_group.png index 6fcefd1..7dde03a 100644 Binary files a/simplexalerts/name_group.png and b/simplexalerts/name_group.png differ diff --git a/simplexalerts/new_alert.png b/simplexalerts/new_alert.png index 618aed6..db57f28 100644 Binary files a/simplexalerts/new_alert.png and b/simplexalerts/new_alert.png differ diff --git a/simplexalerts/new_contact_point.png b/simplexalerts/new_contact_point.png index f7c18f6..09e87a1 100644 Binary files a/simplexalerts/new_contact_point.png and b/simplexalerts/new_contact_point.png differ diff --git a/simplexalerts/pyroscope_tracing.png b/simplexalerts/pyroscope_tracing.png index bdecb03..538963f 100644 Binary files a/simplexalerts/pyroscope_tracing.png and b/simplexalerts/pyroscope_tracing.png differ diff --git a/simplexalerts/releases.png b/simplexalerts/releases.png index 3ab3bb7..d06be70 100644 Binary files a/simplexalerts/releases.png and b/simplexalerts/releases.png differ diff --git a/simplexalerts/test_alert.png b/simplexalerts/test_alert.png index 5039c7d..482371b 100644 Binary files a/simplexalerts/test_alert.png and b/simplexalerts/test_alert.png differ diff --git a/simplexalerts/test_alert_2.png b/simplexalerts/test_alert_2.png index f336052..f97a230 100644 Binary files a/simplexalerts/test_alert_2.png and b/simplexalerts/test_alert_2.png differ diff --git a/simplexalerts/test_alert_3.png b/simplexalerts/test_alert_3.png index c4581d4..7c87d53 100644 Binary files a/simplexalerts/test_alert_3.png and b/simplexalerts/test_alert_3.png differ diff --git a/simplexalerts/test_alert_3_1.png b/simplexalerts/test_alert_3_1.png index bc39966..9eb7bc6 100644 Binary files a/simplexalerts/test_alert_3_1.png and b/simplexalerts/test_alert_3_1.png differ diff --git a/simplexalerts/test_alert_4.png b/simplexalerts/test_alert_4.png index ba6b645..ac3e946 100644 Binary files a/simplexalerts/test_alert_4.png and b/simplexalerts/test_alert_4.png differ diff --git a/simplexalerts/test_alert_5.png b/simplexalerts/test_alert_5.png index 37f6482..23ee792 100644 Binary files a/simplexalerts/test_alert_5.png and b/simplexalerts/test_alert_5.png differ diff --git a/simplexalerts/test_alert_6.png b/simplexalerts/test_alert_6.png index 1f14c85..f8bc9fa 100644 Binary files a/simplexalerts/test_alert_6.png and b/simplexalerts/test_alert_6.png differ diff --git a/simplexalerts/test_alert_7.png b/simplexalerts/test_alert_7.png index 95e7d3f..27d46ca 100644 Binary files a/simplexalerts/test_alert_7.png and b/simplexalerts/test_alert_7.png differ diff --git a/stancesensitive/index.md b/stancesensitive/index.md index 2360401..b898a28 100644 --- a/stancesensitive/index.md +++ b/stancesensitive/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2025-01-05 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/301" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Deniability Explained --- # Our stance on sensitive activities @@ -80,7 +82,7 @@ If you've read my blogposts from the productivity section, you'd realize that [i I don't believe one bit that doing drugs is worth it, given the havoc it can wreck upon your life. Having been addicted myself to substances in the past, i find that sobriety is way more worth it, because that's when you get to do what you truly want to do [(pleasure seeking is not what you truly need in your life)](../../productivity/rightthing/index.md). -I used to dabble in sensitive activites here and there when i started the opsec blog, but after a while i realized that the paranoia is not worth it. However, i respect those that are willing to put their lives on the line for some sensitive activity that they actually believe could change the world for the better. +I used to dabble in sensitive activites here and there when i started The Opsec Bible, but after a while i realized that the paranoia is not worth it. However, i respect those that are willing to put their lives on the line for some sensitive activity that they actually believe could change the world for the better. **All of this to say, if you intend to do any sensitive activity, don't do it unless if you pondered all of the risks (especially if that includes ending up in jail), decide if it is actually worth it or not**. If you intend to actually do any sensitive activity after thinking through all the risks that come with it, i recommend that you read all of our deniability tutorials in order to familiarize yourself with the overall concept and setups, learn how to protect your activities in the case of you being forced to type a password, and make sure you implement it correctly. **Deniability is definitely a WAY stricter practice than that of maintaining anonymity, as this is where every small details can make the difference between a small sentence and a life sentence.** diff --git a/stateistheenemy/index.md b/stateistheenemy/index.md index bfddafc..fe5bba5 100644 --- a/stateistheenemy/index.md +++ b/stateistheenemy/index.md @@ -3,6 +3,8 @@ author: Mulligan Security date: 2025-05-16 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235" xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs +tags: + - Anarchy --- # The State is the Enemy diff --git a/steganography/index.md b/steganography/index.md index 7b2844c..fd9f704 100644 --- a/steganography/index.md +++ b/steganography/index.md @@ -3,6 +3,8 @@ author: Zesc date: 2024-08-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/45" xmr: 46BYryUrGcrcRbXFFgTZMYKg8UVY1FpwVfNfHc4GxCXMFwvVtg2YDuf8x8pF36yh4XFWpC3V2WrDgZh7w46MYZEQ3zJQhhR +tags: + - Clientside Deniability --- # Other sources of Plausible Deniability: Steganography diff --git a/steghide/index.md b/steghide/index.md index 6f10c0b..0889cf3 100644 --- a/steghide/index.md +++ b/steghide/index.md @@ -3,6 +3,8 @@ author: Zesc date: 2024-08-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/46" xmr: 46BYryUrGcrcRbXFFgTZMYKg8UVY1FpwVfNfHc4GxCXMFwvVtg2YDuf8x8pF36yh4XFWpC3V2WrDgZh7w46MYZEQ3zJQhhR +tags: + - Clientside Deniability --- # **Using Steghide to hide data in images** diff --git a/stylometry/index.md b/stylometry/index.md index 791bcb1..8ef553c 100644 --- a/stylometry/index.md +++ b/stylometry/index.md @@ -5,6 +5,7 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd. xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY tags: - Core Tutorial + - Clientside Anonymity --- # Stylometry Protection (Using Local LLMs) diff --git a/su0.png b/su0.png deleted file mode 100644 index df8fe52..0000000 Binary files a/su0.png and /dev/null differ diff --git a/su2.png b/su2.png deleted file mode 100644 index d6b60b2..0000000 Binary files a/su2.png and /dev/null differ diff --git a/syncthinganon/index.md b/syncthinganon/index.md index 87b5a07..f75c086 100644 --- a/syncthinganon/index.md +++ b/syncthinganon/index.md @@ -3,6 +3,8 @@ author: Prism_Breaker date: null gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/16" xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa9jSfgyRbNNjswHKTzFVh +tags: + - Clientside Anonymity --- # One on One large file sharing (Syncthing over Tor) diff --git a/syncthingvpn/index.md b/syncthingvpn/index.md index b32d1c0..13c77a2 100644 --- a/syncthingvpn/index.md +++ b/syncthingvpn/index.md @@ -3,6 +3,8 @@ author: XMRonly date: 2024-11-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/11" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Privacy --- # One-on-One Large File Sharing (Syncthing over VPN) diff --git a/tailsqemuvm/index.md b/tailsqemuvm/index.md index c68b3bf..5c6a9cf 100644 --- a/tailsqemuvm/index.md +++ b/tailsqemuvm/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-10-03 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/92" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Deniability Explained --- # Tails OS for Easy Temporary Sensitive Use diff --git a/tor/bridge/index.md b/tor/bridge/index.md index b06f250..fa4acaa 100644 --- a/tor/bridge/index.md +++ b/tor/bridge/index.md @@ -3,6 +3,10 @@ author: nihilist date: 2024-01-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/100" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Contributing to Anonymity + - Censorship Circumvention --- # TOR Bridge (November 2024 update) diff --git a/tor/exit_node/index.md b/tor/exit_node/index.md index acf1ccf..63bec54 100644 --- a/tor/exit_node/index.md +++ b/tor/exit_node/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2024-01-29 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/102" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Contributing to Anonymity --- # TOR Exit Node diff --git a/tor/relay/index.md b/tor/relay/index.md index f3aae0e..a4d3b9f 100644 --- a/tor/relay/index.md +++ b/tor/relay/index.md @@ -3,6 +3,9 @@ author: nihilist date: 2024-01-02 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/101" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Anonymity + - Contributing to Anonymity --- # TOR Relay diff --git a/torbrowsing/index.md b/torbrowsing/index.md index 3a79a7a..95b5585 100644 --- a/torbrowsing/index.md +++ b/torbrowsing/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-01-31 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/90" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity --- # Using the Tor browser to browse the web Anonymously diff --git a/tornginxphpmysql/index.md b/tornginxphpmysql/index.md index 00bff4c..1d65a8e 100644 --- a/tornginxphpmysql/index.md +++ b/tornginxphpmysql/index.md @@ -3,6 +3,9 @@ author: oxeo0 date: 2025-02-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/187" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ +tags: + - Serverside Deniability + - High Availability --- # How to setup a basic NGINX / PHP / MySQL app diff --git a/torthroughvpn/index.md b/torthroughvpn/index.md index dd0d4b8..da2033d 100644 --- a/torthroughvpn/index.md +++ b/torthroughvpn/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-04-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity --- # Using Tor Safely: Tor through VPN or VPN through Tor? @@ -14,17 +16,17 @@ As we went over this comparison in the previous blogpost [here](../torvsvpns/ind **VPNS:** -VPNs can provide Privacy from your ISP ![](../su0.png), but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.![](../su2.png) +VPNs can provide Privacy from your ISP ![](../logos/su0.png), but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.![](../logos/su2.png) -In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity ![](../ce2.png)to another +In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity ![](../logos/ce2.png)to another **Tor:** The Tor Network provides Anonymity by routing your traffic through 3 random servers that are spread across the world. -Using Tor means you are employing Decentralisation, ![](../ce0.png)by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. ![](../on0.png) +Using Tor means you are employing Decentralisation, ![](../logos/ce0.png)by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. ![](../logos/on0.png) -There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. ![](../on2.png) +There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. ![](../logos/on2.png) diff --git a/torvsvpns/index.md b/torvsvpns/index.md index ace5b89..2bbd741 100644 --- a/torvsvpns/index.md +++ b/torvsvpns/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-04-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/88" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Anonymity Explained --- # The main source of Anonymity: The Tor Network diff --git a/torwebsite/index.md b/torwebsite/index.md index 41d95c8..228e845 100644 --- a/torwebsite/index.md +++ b/torwebsite/index.md @@ -4,6 +4,7 @@ date: 2024-02-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/156" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Anonymity - Core Tutorial --- # Hidden Service with custom .onion Vanity V3 address diff --git a/tr0.png b/tr0.png deleted file mode 100644 index 5ec2f3c..0000000 Binary files a/tr0.png and /dev/null differ diff --git a/tr2.png b/tr2.png deleted file mode 100644 index b57eecf..0000000 Binary files a/tr2.png and /dev/null differ diff --git a/truecrypto/index.md b/truecrypto/index.md index 0326ad0..75c011a 100644 --- a/truecrypto/index.md +++ b/truecrypto/index.md @@ -3,6 +3,10 @@ author: XMRonly date: 2025-05-26 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/95" xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3 +tags: + - Clientside Anonymity + - Decentralized Finances + - Agorism --- # The True Goal of Cryptocurrency diff --git a/v2ray/index.md b/v2ray/index.md index 822afab..240e30e 100644 --- a/v2ray/index.md +++ b/v2ray/index.md @@ -3,6 +3,9 @@ author: Zer0 date: 2023-12-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/0" xmr: 42wqdQbr4QBSU4BVKkoAANENY6SDzbdib8mUmNBybYAePfkVzmcQKyGNuJ3GbFr4S9fsQaWQB9gxnip611poq89f1ETjK9R +tags: + - Clientside Anonymity + - Censorship Evasion --- # How to access Tor when you are in a heavily-censored country using v2ray (vmess / vless) diff --git a/veracrypt/index.md b/veracrypt/index.md index 5ed0dd6..29fd485 100644 --- a/veracrypt/index.md +++ b/veracrypt/index.md @@ -4,6 +4,7 @@ date: 2025-04-01 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/255" xmr: 862Sp3N5Y8NByFmPVLTPrJYzwdiiVxkhQgAdt65mpYKJLdVDHyYQ8swLgnVr8D3jKphDUcWUCVK1vZv9u8cvtRJCUBFb8MQ tags: + - Clientside Deniability - Core Tutorial --- # The main source of Plausible Deniability: Deniable Encryption diff --git a/vpn/index.md b/vpn/index.md index 0e9cdf6..a1afdd0 100644 --- a/vpn/index.md +++ b/vpn/index.md @@ -3,6 +3,8 @@ author: nihilist date: 2024-06-27 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/81" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Privacy --- # How to get privacy from your ISP using a VPN diff --git a/vpn_selfhosted/image-1.png b/vpn_selfhosted/image-1.png index baf4cbb..361d7cc 100644 Binary files a/vpn_selfhosted/image-1.png and b/vpn_selfhosted/image-1.png differ diff --git a/vpn_selfhosted/image-3.png b/vpn_selfhosted/image-3.png index cc188a6..5093bfd 100644 Binary files a/vpn_selfhosted/image-3.png and b/vpn_selfhosted/image-3.png differ diff --git a/vpn_selfhosted/image.png b/vpn_selfhosted/image.png index 542194c..41d5005 100644 Binary files a/vpn_selfhosted/image.png and b/vpn_selfhosted/image.png differ diff --git a/vpn_selfhosted/index.md b/vpn_selfhosted/index.md index ee0d0f6..6e4fad1 100644 --- a/vpn_selfhosted/index.md +++ b/vpn_selfhosted/index.md @@ -3,6 +3,9 @@ author: Nihilist date: 2025-06-08 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/350" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Privacy + - Self-Hosting --- # Prevent IP leaks using a VPN on the Home Server Host OS diff --git a/vpnqemu/20.png b/vpnqemu/20.png index 1bc0590..ebc3c12 100644 Binary files a/vpnqemu/20.png and b/vpnqemu/20.png differ diff --git a/vpnqemu/21.png b/vpnqemu/21.png index 392151c..66a86ee 100644 Binary files a/vpnqemu/21.png and b/vpnqemu/21.png differ diff --git a/vpnqemu/index.md b/vpnqemu/index.md index 8d5338b..fcb2b4b 100644 --- a/vpnqemu/index.md +++ b/vpnqemu/index.md @@ -3,6 +3,8 @@ author: Anonymous date: 2025-01-31 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Privacy --- # Prevent IP leaks using a VPN on the Clientside Host OS diff --git a/vpsvpnrouting/image-3.png b/vpsvpnrouting/image-3.png index 41463f4..8f978a3 100644 Binary files a/vpsvpnrouting/image-3.png and b/vpsvpnrouting/image-3.png differ diff --git a/vpsvpnrouting/image.png b/vpsvpnrouting/image.png index 5abc8d5..abd5ad7 100644 Binary files a/vpsvpnrouting/image.png and b/vpsvpnrouting/image.png differ diff --git a/vpsvpnrouting/index.md b/vpsvpnrouting/index.md index 3130145..4e50803 100644 --- a/vpsvpnrouting/index.md +++ b/vpsvpnrouting/index.md @@ -3,6 +3,9 @@ author: Nihilist date: 2025-06--8 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/320" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Serverside Privacy + - Self-Hosting --- # How to hide your self-hosted service's home IP from the end users @@ -190,7 +193,7 @@ verb 3 ## Serverside Self-hosted PrivateVM Setup : OpenVPN client -Now that the openvpn server is setup properly we can log on the private vm that we [previously](../hypervisor_selfhosted/) setup on our homeserver: +Now that the openvpn server is setup properly we can log on the private vm that we [previously](../hypervisor_selfhosted/index.md) setup on our homeserver: ```sh user@clientside ~ $ ssh privatevm diff --git a/whentorisblocked/index.md b/whentorisblocked/index.md index 587a032..5c9b175 100644 --- a/whentorisblocked/index.md +++ b/whentorisblocked/index.md @@ -3,6 +3,9 @@ author: nothing@nowhere date: 2023-10-12 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/54" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 +tags: + - Clientside Anonymity + - Censorship Evasion --- # How to Anonymously access websites that block Tor diff --git a/whonix_hiddenservice/index.md b/whonix_hiddenservice/index.md index 871cd87..3c08868 100644 --- a/whonix_hiddenservice/index.md +++ b/whonix_hiddenservice/index.md @@ -4,6 +4,8 @@ date: 2025-05-25 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/324" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Serverside Anonymity + - Self-Hosted - Core Tutorial --- # Why should I use Whonix for Self-hosted Hidden services ? diff --git a/whonixqemuvms/index.md b/whonixqemuvms/index.md index 43e8b18..65097aa 100644 --- a/whonixqemuvms/index.md +++ b/whonixqemuvms/index.md @@ -4,6 +4,7 @@ date: 2025-05-24 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/93" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 tags: + - Clientside Anonymity - Core Tutorial --- # Anonymous VM Setup - Whonix QEMU VMs diff --git a/whytheblog/index.md b/whytheblog/index.md index 85935de..4c9e576 100644 --- a/whytheblog/index.md +++ b/whytheblog/index.md @@ -4,7 +4,7 @@ date: 2025-04-30 gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260" xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8 --- -# What is the goal of the Opsec blog ? +# What is the goal of The Opsec Bible ? @@ -107,8 +107,6 @@ Anonymity for example also has a serverside context. [You may want to anonymousl All of this to say, **we seek to give advice that is applicable to 90% of the people out there, to defeat 99% of the risks one may face**. We don't care about the advice that only 10% of the people can actually pull off, to protect against the 1% most unlikely risk that could happen. We want to make sure that as many people as possible actually get to have relevant opsec advice for their day to day lives, wheter it be privacy, anonymity or deniability related. -![](../contribute/65.png) - For instance, we won't recommend you to hook up wires to your motherboard, risk bricking your laptop permanently, all to just hopefully disable some closed-source software that came with the closed-source hardware you bought. that's a 1% unlikely risk whose protective action only 1% of the people can actually pull off. No, instead we're going to recommend you purchase a laptop that is open-hardware by default once it hits the market, and you won't have any closed-source hardware backdoor to remove in the first place. **_TLDR:_ We put forward realistic advice only that can be applied to 90% of the people out there to defeat 99% of the risks** @@ -123,7 +121,6 @@ For example, recommending to use signal to message someone privately is more com Every complication needs to be justified, and requiring a phone number to chat privately with someone is not justifiable. You need to realize that sometimes there exists a huge amount of possible solutions to solve a given problem (yes there exists a TON of chat apps out there). The only difference is that some solutions are overly complex, while others are simpler. **The simpler solution that actually delivers opsec-wise IS the best solution.** -![](../contribute/64.png) The first goal is to make sure to show that privacy, anonymity and deniability is required AND achievable, but then we need to make sure that as many people as possible can achieve it, by simplifying it as much as possible, without making the individual vulnerable to any statist threat.