Compare commits
40 commits
24abac7aaf
...
d1193aa140
Author | SHA1 | Date | |
---|---|---|---|
![]() |
d1193aa140 | ||
210b2b4632 | |||
![]() |
d275a9ee09 | ||
![]() |
70629bb9ab | ||
![]() |
b1128e473f | ||
![]() |
8a42f82534 | ||
![]() |
dc7d886fa2 | ||
![]() |
700c3f5280 | ||
![]() |
34289b4440 | ||
![]() |
d7096bc866 | ||
![]() |
a6f190336a | ||
![]() |
d2f56a8128 | ||
286e99ca76 | |||
![]() |
660b97a496 | ||
![]() |
c1dbde0e77 | ||
![]() |
fb0067d890 | ||
![]() |
acb5942b39 | ||
![]() |
dd83120407 | ||
![]() |
69d1403463 | ||
![]() |
e71a951757 | ||
![]() |
5a1c7ef601 | ||
![]() |
e07862e0dc | ||
![]() |
b424f9e73e | ||
![]() |
a20cdeaacb | ||
![]() |
19a891eb6f | ||
![]() |
c8aebd0c4a | ||
46591e593e | |||
![]() |
96a130f1bb | ||
![]() |
78b4bab236 | ||
![]() |
c93618a200 | ||
![]() |
b8bb433767 | ||
![]() |
2012e29978 | ||
![]() |
43763f936b | ||
![]() |
56ed1d655b | ||
![]() |
f40bbc80ef | ||
![]() |
0cd997d0f8 | ||
![]() |
748488b035 | ||
![]() |
f04c6ff34a | ||
![]() |
d6b598bb84 | ||
![]() |
145ebfa2a4 |
|
@ -6,7 +6,7 @@ xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAU
|
|||
---
|
||||
# Roadmap Progress (as of May 2025)
|
||||
|
||||
Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The opsec blog covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability.
|
||||
Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The Opsec Bible covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability.
|
||||
|
||||
Beyond our Privacy/Anonymity/Deniability classification we have 3 types of tutorials:
|
||||
|
||||
|
@ -22,7 +22,7 @@ Our roadmap is based on those critical tutorials first and foremost, as they are
|
|||
|
||||
## Clientside tutorials (85% completed)
|
||||
|
||||
This is where the opsec blog shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec.
|
||||
This is where The Opsec Bible shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec.
|
||||
|
||||
Currently this section is only missing the following tutorials:
|
||||
|
||||
|
@ -36,7 +36,7 @@ We are also missing some improvements for the following tutorials:
|
|||
|
||||
## Serverside Self-Hosting tutorials (20% completed)
|
||||
|
||||
This is the part where the opsec blog needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most.
|
||||
This is the part where The Opsec Bible needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most.
|
||||
|
||||
Currently this section is missing the following tutorials:
|
||||
|
||||
|
|
BIN
agorism/image-1.png
Normal file
After Width: | Height: | Size: 59 KiB |
BIN
agorism/image-10.png
Normal file
After Width: | Height: | Size: 28 KiB |
BIN
agorism/image-11.png
Normal file
After Width: | Height: | Size: 20 KiB |
BIN
agorism/image-12.png
Normal file
After Width: | Height: | Size: 59 KiB |
BIN
agorism/image-13.png
Normal file
After Width: | Height: | Size: 16 KiB |
BIN
agorism/image-14.png
Normal file
After Width: | Height: | Size: 73 KiB |
BIN
agorism/image-15.png
Normal file
After Width: | Height: | Size: 145 KiB |
BIN
agorism/image-16.png
Normal file
After Width: | Height: | Size: 15 KiB |
BIN
agorism/image-17.png
Normal file
After Width: | Height: | Size: 46 KiB |
BIN
agorism/image-18.png
Normal file
After Width: | Height: | Size: 24 KiB |
BIN
agorism/image-19.png
Normal file
After Width: | Height: | Size: 41 KiB |
BIN
agorism/image-2.png
Normal file
After Width: | Height: | Size: 23 KiB |
BIN
agorism/image-20.png
Normal file
After Width: | Height: | Size: 35 KiB |
BIN
agorism/image-21.png
Normal file
After Width: | Height: | Size: 181 KiB |
BIN
agorism/image-22.png
Normal file
After Width: | Height: | Size: 15 KiB |
BIN
agorism/image-23.png
Normal file
After Width: | Height: | Size: 24 KiB |
BIN
agorism/image-24.png
Normal file
After Width: | Height: | Size: 116 KiB |
BIN
agorism/image-25.png
Normal file
After Width: | Height: | Size: 13 KiB |
BIN
agorism/image-26.png
Normal file
After Width: | Height: | Size: 22 KiB |
BIN
agorism/image-27.png
Normal file
After Width: | Height: | Size: 29 KiB |
BIN
agorism/image-28.png
Normal file
After Width: | Height: | Size: 64 KiB |
BIN
agorism/image-29.png
Normal file
After Width: | Height: | Size: 38 KiB |
BIN
agorism/image-3.png
Normal file
After Width: | Height: | Size: 44 KiB |
BIN
agorism/image-30.png
Normal file
After Width: | Height: | Size: 34 KiB |
BIN
agorism/image-4.png
Normal file
After Width: | Height: | Size: 10 KiB |
BIN
agorism/image-5.png
Normal file
After Width: | Height: | Size: 87 KiB |
BIN
agorism/image-6.png
Normal file
After Width: | Height: | Size: 13 KiB |
BIN
agorism/image-7.png
Normal file
After Width: | Height: | Size: 6.5 KiB |
BIN
agorism/image-8.png
Normal file
After Width: | Height: | Size: 28 KiB |
BIN
agorism/image-9.png
Normal file
After Width: | Height: | Size: 31 KiB |
BIN
agorism/image.png
Normal file
After Width: | Height: | Size: 2.1 KiB |
220
agorism/index.md
Normal file
|
@ -0,0 +1,220 @@
|
|||
---
|
||||
author: Sam Bent
|
||||
date: 2025-06-09
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/347"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Agorism
|
||||
---
|
||||
|
||||
# What's Agorism ?
|
||||
|
||||
## Agorism: Building Freedom Through Counter-Economics
|
||||
Agorism is a form of economic guerrilla warfare against the state. Samuel Edward Konkin III developed this revolutionary philosophy in the 1970s as a strategy that rejects both the futility of political reform and the self-defeating nature of violent revolution. Instead of begging for freedom or fighting for it, agorists build it through direct economic action that makes the state irrelevant.
|
||||
|
||||

|
||||
|
||||
## The Core Concept
|
||||
At its heart, agorism recognizes a simple truth: the state is not a building in Washington or a group of politicians but a relationship of systematic theft and coercion. Every tax collected, every regulation enforced, and every license required represents a violent intervention in voluntary exchange. Konkin's insight was that we don't need to storm the castle when we can stop feeding the beast.
|
||||
|
||||

|
||||
|
||||
Think of agorism as economic secession in place. While political activists exhaust themselves trying to change a system designed to resist change, agorists have already opted out. They're building alternative institutions, trading through parallel markets, and creating the infrastructure of a free society right under the state's nose. Every untaxed transaction, every peer-to-peer exchange, and every regulatory bypass represents a small act of revolution that requires no violence, no voting, and no permission.
|
||||
|
||||

|
||||
|
||||
The genius of Konkin's approach lies in its alignment with human nature. People naturally seek to improve their lives through voluntary exchange. The state constantly interferes with this process, creating friction, extracting wealth, and prohibiting peaceful activities. Agorism encourages what people want to do anyway: trade freely, keep what they earn, and associate voluntarily. The revolution doesn't require converting anyone to a new ideology; it just helps them realize they're already practicing counter-economics.
|
||||
|
||||
## Counter-Economics: The Engine of Agorism
|
||||
Counter-economics encompasses ALL peaceful economic activity the state prohibits, regulates, or taxes. Every transaction that denies the state its cut falls somewhere on the counter-economic spectrum.
|
||||
|
||||

|
||||
|
||||
White markets consist of legal but unreported activities, such as cash jobs, barter networks, and informal services exchanged between neighbors. When your neighbor pays you $50 cash to fix their computer, when you trade car repairs for plumbing work, when the kid down the street mows lawns for unreported cash, these seemingly innocent exchanges form the foundation of the counter-economy. The state demands its percentage of every dollar that changes hands, but white market transactions slip entirely beneath their radar.
|
||||
|
||||

|
||||
|
||||
Grey markets involve regulated activity done without state permission. The food truck operating without proper licenses, the hairdresser working from home without permits, and the contractor doing renovations without pulling building permits. These entrepreneurs provide genuine value to willing customers. Still, they skip the permission slips, fees, and regulations that exist primarily to extract revenue and protect established businesses from competition. In many developing nations, grey markets account for the majority of economic activity because the official regulatory burden renders legal compliance unfeasible for small operators.
|
||||
|
||||

|
||||
|
||||
Black markets handle prohibited goods and services outright. Drugs, weapons, banned information, prohibited services. These markets exist because the state has declared certain voluntary exchanges criminal, creating artificial scarcity and massive profit opportunities. The darknet markets you're familiar with represent pure agorism in digital form. Silk Road operated for over two years as a $1.2 billion proof of concept, demonstrating that complex commercial relationships, escrow systems, reputation networks, and quality control can flourish without any state oversight whatsoever. When Ross Ulbricht created the Silk Road, he explicitly cited agorist philosophy as his inspiration, viewing the marketplace as a means to demonstrate that voluntary exchange needs no external enforcement.
|
||||
|
||||

|
||||
|
||||
Red markets involve violence and coercion, which agorism explicitly rejects. Konkin was clear that aggression against persons or property violates the foundational principle of voluntary exchange. Agorism aims to render the state obsolete through peaceful competition rather than replicating its coercive methods. This distinction matters because critics often conflate all black market activity with violence when, in reality, most counter-economic transactions are as peaceful as buying groceries.
|
||||
|
||||
## Historical Examples That Prove It Works
|
||||
|
||||
### The System D Economy
|
||||
In developing nations, "System D" (from French "débrouillardise"—making do) represents the informal economy. By 2020, System D was worth $10 trillion globally, making it the world's second-largest economy after the US.
|
||||
|
||||
|
||||

|
||||
|
||||
In Lagos, Nigeria, approximately 80% of employment exists in System D, which encompasses street vendors, informal taxi networks, and unregistered businesses. This entire parallel economy operates successfully without government recognition. These aren't criminals; they're agorists by necessity.
|
||||
|
||||
### Soviet Black Markets
|
||||
The USSR tried to control every economic transaction. To what end? By the 1980s, the shadow economy accounted for 20-30% of the Soviet GDP. Citizens traded everything from blue jeans to car parts through "blat" (informal exchange networks).
|
||||
When official stores had empty shelves, black market dealers had full warehouses. The state's economic plans were rendered ineffective when citizens created their supply chains. The counter-economy sustained the population's basic needs while the official economy collapsed.
|
||||
|
||||
### Colonial America's Smuggling Networks
|
||||
Before the American Revolution, colonists routinely violated British trade laws through sophisticated smuggling operations that prefigured modern agorism. John Hancock remembered as a patriot, made his fortune smuggling tea and wine past British customs. By 1760, smuggling had become so widespread that British customs collected only £2,000 annually from colonies that should have yielded £200,000 according to official trade volumes.
|
||||
|
||||

|
||||
|
||||
These colonial smugglers created elaborate networks of false compartments in ships bribed customs officials and established alternative ports of entry. They didn't see themselves as revolutionaries but as merchants pursuing profit in the face of unreasonable restrictions. The Molasses Act of 1733 aimed to compel colonists to purchase expensive British sugar instead of cheaper French alternatives. The colonists' response? They disregarded the law and established their trade routes. By the time of the revolution, the infrastructure for independence already existed in these smuggling networks. The same ships that smuggled molasses could carry weapons, the same merchants who avoided customs could finance rebellion, and the same networks that moved illegal goods could distribute revolutionary pamphlets.
|
||||
|
||||
The British response mirrors modern drug war tactics: increased enforcement, harsher penalties, and broader surveillance powers. The Writs of Assistance gave customs officials unlimited power to search any property without specific warrants. The colonists' counter-response? Better smuggling techniques, deeper corruption of officials, and eventually, revolution. However, note that economic resistance came first, and political resistance followed only when the state made normal business operations impossible.
|
||||
|
||||
### Prohibition Era (1920-1933)
|
||||
Alcohol prohibition created the largest counter-economic network in US history. By 1925, there were 100,000 speakeasies in New York City alone, twice the number of legal bars that existed before Prohibition.
|
||||
|
||||

|
||||
|
||||
Bootleggers didn't lobby for repeal. They built distribution networks, corrupted enforcement, and served customer demand. The government surrendered not because of protests but because the counter-economy made the law unenforceable.
|
||||
Modern Agorism in Practice
|
||||
|
||||
## Cryptocurrency Networks
|
||||
Bitcoin emerged not from reformists politely asking the Federal Reserve to consider alternative monetary policies but from cypherpunks who built an alternative monetary system that operates without permission. Satoshi Nakamoto's whitepaper referenced no political movements, requested no regulatory approval, and asked no one's permission. The genesis block included a Times headline about bank bailouts, the only political statement needed.
|
||||
|
||||

|
||||
|
||||
Every cryptocurrency transaction that bypasses traditional banking represents a practical form of agorism. When Iranian programmers sell software for Bitcoin because sanctions block bank transfers, when Venezuelans preserve wealth in cryptocurrency while their government destroys the bolivar through hyperinflation, and when dark market vendors create more reliable reputation systems than eBay, they prove that monetary systems don't require states.
|
||||
|
||||

|
||||
|
||||
DeFi protocols now handle billions of dollars in value without the need for banks, regulators, or state oversight. Uniswap processes more daily volume than many national stock exchanges without a single regulatory license. Compound allows lending and borrowing without credit checks or financial surveillance. Smart contracts execute complex financial operations that would require armies of lawyers in the traditional system. Still, they do so with mathematical certainty and without any possibility of corruption. These systems don't compete with banks on the banks' terms; they make traditional financial intermediaries conceptually obsolete.
|
||||
|
||||

|
||||
|
||||
The state's response reveals their fear. China has repeatedly banned cryptocurrency, with each ban becoming less effective than the last. The US Treasury attempts to regulate DeFi protocols that lack a central governing entity. They demand that mathematical protocols collect KYC information, showing that they don't understand they're fighting against mathematics itself. Every attempt at control drives innovation toward greater decentralization, increased privacy, and improved resistance to interference.
|
||||
|
||||
## Digital Nomadism and Flag Theory
|
||||
Thousands of location-independent workers legally minimize taxes by choosing jurisdictions strategically. They're not evading—they're selecting which states deserve their economic participation—company in Estonia, bank account in Singapore, residence in Portugal, income from global clients. The state's geographical monopoly becomes irrelevant.
|
||||
|
||||
## The Gig Economy's Shadow Side
|
||||
Officially, Uber drivers and DoorDash deliverers are tracked and taxed through elaborate digital systems designed to ensure compliance. The platforms automatically report earnings to tax authorities and issue Form 1099 for any amount exceeding $600. But beneath this veneer of compliance lies a thriving counter-economy that the platforms pretend not to see.
|
||||
|
||||
Cash tips disappear into pockets without a trace. Regular customers develop personal relationships with drivers, arranging rides outside the app for cash payment. The Uber driver who gives you his card for "airport runs" has just recruited you into the counter-economy. Pizza delivery drivers build networks of regular customers who pay cash directly, bypassing both the platform and the taxman. Every transaction that moves from the platform to personal arrangement represents a small victory for economic freedom.
|
||||
|
||||
DoorDash drivers share techniques for maximizing cash orders in online forums. They know which restaurants still accept cash, which neighborhoods tip in cash, and how to structure their acceptance patterns to avoid algorithmic detection while maximizing unreported income. The platforms are aware of this happening, but they can't stop it without destroying their business model. They need drivers more than drivers need them, creating space for counter-economic activity within supposedly controlled systems.
|
||||
|
||||

|
||||
|
||||
This shadow economy extends beyond simple tax avoidance. Drivers share accounts to bypass background checks, rent accounts to those who can't qualify officially, and create elaborate systems to game surge pricing and bonuses. What appears to be a highly regulated, technologically controlled market contains thousands of entrepreneurs practicing agorism daily, proving that human ingenuity in pursuing profit will always outpace corporate and government control systems.
|
||||
|
||||
## Why Agorism Beats Political Action
|
||||
Political reformers operate within the system they claim to oppose, thereby begging the state to limit itself through the very mechanisms it controls. They spend decades achieving minor victories that get reversed by the next administration, always fighting yesterday's battle. At the same time, the state invents new forms of control. The drug reform movement spent fifty years and millions of dollars trying to change marijuana laws through lobbying and voting. Meanwhile, agorist entrepreneurs started selling cannabis through medical dispensaries, delivery services, and, yes, black markets, normalizing what politicians feared to touch. By the time legalization came to many states, the counter-economy had already made Prohibition irrelevant.
|
||||
|
||||

|
||||
|
||||
Violent revolutionaries seek to replace one violent monopoly with another. History shows us a pattern: the revolutionary often becomes the oppressor, sometimes more brutal than their predecessor. The French Revolution promised liberty, equality, and fraternity but delivered the Terror and Napoleon. The Russian Revolution promised workers' paradise but created the gulag. Every violent overthrow carries within it the seeds of the next tyranny because it accepts the fundamental premise that society needs violent monopoly control.
|
||||
|
||||

|
||||
|
||||
Agorists make the state irrelevant through superior alternatives. We build parallel systems that outcompete state offerings without asking permission or firing a shot. Consider which threatens banking cartels more: Occupy Wall Street camping in parks and holding signs or DeFi protocols that now handle billions in value without a single banking license? Which changed drug markets more fundamentally: decades of policy reform efforts or Ross Ulbricht proving that reputation systems and cryptocurrencies could create more orderly markets than state prohibition ever achieved?
|
||||
|
||||
## The Revolutionary Logic
|
||||
Every government requires three things to survive, and agorism systematically attacks each pillar of state power.
|
||||
First, states need economic compliance through taxes, regulations, and licensing. Every dollar that flows through counter-economic channels denies the state revenue while building alternative economic infrastructure. When a programmer accepts Bitcoin for freelance work, when a farmer sells produce directly to consumers for cash, and when a tutor teaches students without state credentials, they're not just avoiding taxes but creating proof that complex economic relationships work without state intermediation.
|
||||
|
||||

|
||||
|
||||
Second, states require information control through surveillance, censorship, and propaganda. **The cypherpunk movement, which gave us PGP, Tor, Bitcoin, and other privacy tools, aligns perfectly with the agorist strategy.** When Phil Zimmermann released PGP to the world in 1991, the US government attempted to prosecute him for "exporting munitions" because it understood that widespread encryption threatened its surveillance capabilities. Every encrypted message, every anonymous transaction, and every piece of information that flows outside state monitoring reduces their ability to control economic activity. Tor enables agorist marketplaces by making it impossible to trace connections between buyers and sellers. I2P goes even further, creating an entire parallel internet where surveillance becomes mathematically impossible. These tools transform agorism from a local phenomenon into a global revolutionary strategy.
|
||||
|
||||

|
||||
|
||||
Third, states depend on legitimacy, which is the widespread belief that their authority is necessary and beneficial. Every successful counter-economic transaction disproves this myth. When darknet markets provided better customer service than street dealers, when Bitcoin transfers moved money faster and cheaper than banks, and when homeschooling produced better educational outcomes than government schools, they didn't argue against state legitimacy; they demonstrated its obsolescence. The state's greatest fear isn't armed rebels but peaceful traders proving we don't need them.
|
||||
|
||||
## Practical Agorism for OPSEC-Minded Individuals
|
||||
You're already thinking about operational security. Agorism represents economic OPSEC at its core, denying adversaries (the state) intelligence about your economic activity. Every privacy tool you use for OPSEC enables agorism by breaking the connection between identity and economic activity.
|
||||
|
||||

|
||||
|
||||
Tor didn't emerge from privacy advocates asking governments to respect anonymity. The Onion Router created a parallel communication system that makes surveillance computationally infeasible. When you route your traffic through Tor, you're not just protecting your privacy but enabling entire counter-economic ecosystems. The same relay network that protects dissidents also enables agorist marketplaces to operate beyond state reach. I2P takes this further by creating a completely separate network layer where every participant contributes to the anonymity of others, making it ideal for hosting hidden services that can't be traced or shut down.
|
||||
|
||||

|
||||
|
||||
Monero represents the evolution of cryptocurrency toward true agorist money. While Bitcoin transactions are pseudonymous but traceable on a public ledger, Monero implements ring signatures, stealth addresses, and confidential transactions that make financial surveillance impossible. When you use Monero, you're not just making a privacy choice but participating in the creation of a monetary system that operates entirely outside state observation. Every Monero transaction strengthens a financial network that can't be controlled, censored, or inflated by any government.
|
||||
|
||||

|
||||
|
||||
But agorism extends far beyond high-tech solutions. Paying contractors in cash keeps transactions entirely out of the banking system. Bartering skills with neighbors create value exchange without any monetary trail. Growing food breaks the agricultural cartel's monopoly on the supply chain. Teaching skills outside the credential monopoly of universities and licensing boards build human capital that owes nothing to state approval. Building local exchange networks fosters resilient communities that can meet their needs independently of corporate or government intermediaries.
|
||||
|
||||
The System D economy in developing nations shows how this works at scale. In cities like Mumbai or Cairo, entire neighborhoods operate through informal networks of trust and reputation. The street vendor who knows your coffee preference, the mechanic who fixes your car without paperwork, and the seamstress who tailors clothes from her apartment are all part of vast agorist networks that predate Konkin's philosophy by centuries. These aren't temporary arrangements but sophisticated economic systems that often work better than their "legitimate" counterparts.
|
||||
|
||||
## The Endgame
|
||||
|
||||

|
||||
|
||||
Konkin envisioned a world where the state withers away not through collapse but through irrelevance. His four-phase model of agorist revolution, laid out in "New Libertarian Manifesto," describes the progression from our current statist society to a free-market anarchist world. Phase 1 sees isolated agorists practicing counter-economics individually. Phase 2 involves small networks of traders and entrepreneurs who support one another. Phase 3 establishes large-scale counter-economic institutions that begin to displace state services. Phase 4 achieves a stateless society where all transactions are voluntary, and protection agencies compete in a free market.
|
||||
|
||||

|
||||
|
||||
We're currently somewhere between Phase 2 and 3. When people can trade freely without permission through cryptocurrency networks, resolve disputes without courts through smart contracts and decentralized arbitration, protect property without police through private security and mutual aid networks, and build infrastructure without permits through agorist construction collectives, the question becomes stark: what exactly do we need government for?
|
||||
|
||||
This progression is already visible. In Detroit's abandoned neighborhoods, agorist entrepreneurs have created entire communities outside of official systems. They've installed their streetlights, organized their security patrols, created their dispute resolution systems, and built thriving local economies while the city government retreated.
|
||||
|
||||
In Greece, during the economic crisis, parallel economies utilizing alternative currencies and barter networks helped keep communities functioning when the official economy collapsed. In Argentina, when the government destroyed the currency through inflation, people spontaneously created their exchange networks that operated more efficiently than the state system.
|
||||
|
||||
## The Agorist Paradox
|
||||
Here's what terrifies authoritarians: Agorism is anti-fragile. Every crackdown creates more agorists. Every new restriction teaches people to value freedom. Every enforcement action becomes a marketing campaign for our alternatives.
|
||||
|
||||
When governments ban cash transactions above certain amounts, people discover cryptocurrency. When they regulate cryptocurrency exchanges, people become aware of decentralized exchanges and privacy coins. When they increase surveillance, people become experts in encryption and operational security. The state's attempts to control create the very expertise and motivation that undermines their control.
|
||||
|
||||

|
||||
|
||||
Silk Road's destruction spawned dozens of more secure markets that learned from its mistakes. Each iteration becomes more resilient, more decentralized, and more difficult to stop. Banking restrictions on marijuana businesses forced an entire industry to develop sophisticated cash management and cryptocurrency systems that now serve other industries facing financial discrimination. COVID lockdowns, intended to increase state control, instead created an explosion in grey market services as people discovered they could work, trade, and live without official permission.
|
||||
|
||||

|
||||
|
||||
The state creates its opposition through its oppression. Every person who loses their business to arbitrary regulations, every entrepreneur crushed by licensing requirements, and every peaceful trader imprisoned for voluntary exchanges becomes a potential agorist. The system manufactures resistance by making legal compliance either impossible or worthless for an increasing number of people.
|
||||
|
||||
## The Philosophy Behind the Practice
|
||||
Agorism rests on solid philosophical foundations that distinguish it from mere tax evasion or black market profiteering. Konkin built his system on the non-aggression principle, recognizing that all government action ultimately rests on the threat of violence. Every regulation, no matter how trivial, carries the implicit threat: comply or face an escalating force that ends with death if you resist sufficiently. A business license isn't a piece of paper but a threat of violence against peaceful trade.
|
||||
|
||||
This understanding leads to the central agorist insight: the state is not reformable because its essential nature is aggression. You cannot vote violence into peace any more than you can regulate theft into charity. Political action within the system legitimizes the system. Even libertarian political parties end up reinforcing the idea that change must come through state mechanisms. Agorism rejects this entirely, recognizing that freedom comes from rendering the state irrelevant, not from capturing its machinery.
|
||||
|
||||

|
||||
|
||||
The moral dimension of agorism stems from the principle of self-ownership. If you own yourself, you own your labor. If you own your labor, you own its products. Any interference with voluntary exchange between self-owners violates this fundamental principle. The state claims the right to control what you can buy, sell, or trade, inserting itself as a parasitic third party in every transaction. Agorism asserts the right to ignore this claimed authority and trade freely.
|
||||
However, agorism extends beyond individual philosophy to encompass a comprehensive theory of social change. Konkin observed that successful state resistance creates momentum. As counter-economic networks grow, they attract more participants through superior service and lower costs. A drug dealer who never cheats on customers builds a reputation. The grey market contractor who does quality work gets referrals. The cryptocurrency trader who enables international transactions gets repeat business. Quality and reliability create growth in counter-economic enterprises just as in any market.
|
||||
|
||||
This leads to Konkin's revolutionary optimism. Unlike Marxists, who wait for capitalism's contradictions to create a revolution, or anarcho-capitalists, who hope for eventual enlightenment, agorists see freedom emerging from human action in the present. Every agorist transaction makes the next one easier. Every person practicing counter-economics makes the practice more normal. Every parallel institution that functions well makes state services look worse by comparison. The revolution proceeds one transaction at a time, building tomorrow's free society within today's authoritarian one.
|
||||
|
||||
## Essential Agorist Literature
|
||||
|
||||
|
||||
Understanding agorism deeply requires engaging with the foundational texts that shaped this philosophy. Samuel Edward Konkin III's "New Libertarian Manifesto" stands as the core document of agorist thought. Written in 1983, it outlines the theoretical framework for counter-economics and the path from a statist society to free market anarchism. Konkin writes with the fire of a revolutionary but the precision of an economist, explaining how market forces themselves will destroy the state once people stop feeding it through taxation and regulation.
|
||||
|
||||
"An Agorist Primer" by the same author serves as the practical companion to the Manifesto. Where the Manifesto provides theory, the Primer offers concrete examples and strategies. Konkin explains how to identify counter-economic opportunities in your own life, how to evaluate risk versus reward, and how to build networks of fellow travelers. He emphasizes that agorism works at every scale, from individual transactions to entire parallel economies.
|
||||
|
||||
J. Neil Schulman's "Alongside Night" deserves special mention as the first explicitly agorist novel. Written in 1979 with Konkin's direct input, it depicts a near-future America where hyperinflation and economic collapse drive the creation of a massive agorist underground. The novel doesn't just tell a story but also demonstrates how counter-economic networks might function at scale, complete with alternative currencies, private protection agencies, and underground markets that operate more efficiently than the ailing official economy. Schulman shows how crisis creates an opportunity for those prepared to offer alternatives.
|
||||
|
||||

|
||||
|
||||
For historical context, Murray Rothbard's "For a New Liberty" provides the anarcho-capitalist foundation that Konkin built upon and eventually transcended. While Rothbard focused on education and eventual political change, his economic analysis of why free markets work and governments fail remains an essential reading. The chapter on police and courts without government particularly complements agorist thinking about parallel institutions.
|
||||
|
||||
More recently, "The Starfish and the Spider" by Ori Brafman and Rod Beckstrom, while not explicitly agorist, explains why decentralized organizations defeat centralized ones. Their analysis of how Napster, Wikipedia, and Al Qaeda succeeded through decentralization applies perfectly to counter-economic networks. When there's no head to cut off, no central point of failure, the system becomes unstoppable.
|
||||
|
||||
"The Sovereign Individual" by James Dale Davidson and Lord William Rees-Mogg, published in 1997, predicted how information technology would enable individuals to escape state control. Their vision of cyber-economies operating beyond geographical jurisdiction reads like an agorist manual written by investment bankers. They saw how encryption and digital currencies would render taxation voluntary and nation-states obsolete. However, they focused more on wealthy individuals than on mass counter-economics.
|
||||
|
||||
For those interested in the cypherpunk roots of crypto-agorism, "Applied Cryptography" by Bruce Schneier provides the technical foundation for understanding how mathematical principles can enforce contracts and protect privacy without state involvement. While dense with technical details, it demonstrates that cryptography isn't just about hiding secrets but about creating new forms of social organization.
|
||||
|
||||
|
||||
## Your Move
|
||||
|
||||
Agorism offers a choice fundamentally different from what the system presents. The state frames your options as obey or rebel, comply or resist, vote or revolt. These false choices keep you trapped in their paradigm, where they define the terms of engagement. Agorism transcends this trap entirely. You don't join agorism like a political party or a revolution. You practice agorism through countless daily decisions that build freedom incrementally.
|
||||
|
||||
|
||||

|
||||
|
||||
Every time you choose cash over tracked payments, you deny the surveillance state visibility into your economic life. When you trade directly with neighbors instead of through corporate intermediaries, you build community resilience while avoiding taxes and regulations. Sharing skills outside credentialed systems breaks the knowledge monopolies that keep people dependent. Building solutions rather than begging for reforms creates the parallel institutions that will outlast the dying system. Encrypting communications rather than accepting surveillance as inevitable preserves the privacy necessary for free association. Routing around damage rather than trying to repair a fundamentally broken system acknowledges that some institutions are beyond reform.
|
||||
|
||||
The revolution Konkin envisioned is already here, operating in millions of small transactions every day. From the programmer in Pakistan earning Bitcoin for code to the farmer in Vermont selling raw milk to willing customers to the teacher in Detroit offering classes outside the school system, the counter-economy grows. At the same time, the state economy stagnates due to its internal contradictions.
|
||||
|
||||
The state wants you to believe that society would collapse without its control, that chaos would reign without its regulations, and that people couldn't possibly cooperate without their coercion. Every agorist transaction proves them wrong. Every peaceful exchange outside their system demonstrates that order emerges from voluntary interaction, not from dictates and threats.
|
||||
|
||||
They can't stop what they can't see. They can't tax what they can't track. They can't regulate what they can't find. And most importantly, they can't govern those who have already withdrawn their consent and built something better.
|
||||
Welcome to the counter-economy. You're already here. Now it's time to build.
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-05-02
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/111"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
---
|
||||
# Remote anonymous access setup (SSH through tor)
|
||||
|
||||
|
|
|
@ -3,6 +3,9 @@ author: nihilist
|
|||
date: 2024-08-06
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/105"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Clearnet Services
|
||||
---
|
||||
# Where to host Anonymous Clearnet Services ?
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-09-05
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/110"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
---
|
||||
# How to rent remote domains anonymously (Registrar resellers)
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: XMRonly
|
|||
date: 2024-10-16
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/26"
|
||||
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
---
|
||||
# How to Get an Email Account Anonymously (Emails as a Service)
|
||||
|
||||
|
|
|
@ -3,6 +3,9 @@ author: prism_breaker
|
|||
date: null
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/268"
|
||||
xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa9jSfgyRbNNjswHKTzFVh
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Censorship Evasion
|
||||
---
|
||||
# How to get and use residential proxies anonymously
|
||||
|
||||
|
@ -39,10 +42,6 @@ Other useful reference: <https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_b
|
|||
4. Virtual Machine:[Whonix](../whonixqemuvms/index.md) (that must be dedicated to the (you -> Tor -> residential proxy -> website) setup
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## **Proxy Purchase**
|
||||
|
||||
_Warning:_ Everything below needs to be done inside the dedicated new whonix workstation VM!
|
||||
|
|
|
@ -3,6 +3,8 @@ author: Robert
|
|||
date: 2024-06-08
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/0"
|
||||
xmr: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK
|
||||
tags:
|
||||
- Deniability Explained
|
||||
---
|
||||
# Why isn’t Anonymity enough for Sensitive Use?
|
||||
|
||||
|
|
|
@ -4,6 +4,9 @@ date: 2025-05-23
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/325"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Self-Hosted
|
||||
- Contributing to Anonymity
|
||||
- Core Tutorial
|
||||
---
|
||||
# Anonymous Simplex SMP & XFTP Servers setup
|
||||
|
|
|
@ -4,6 +4,7 @@ date: 2025-05-23
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
|
||||
xmr: 42yco9t6qK98N191EZzKJUCH7cit5JT8mBJQvVULEPAPeBHurbFqGj2hK7kaFhqasv8AYLpbuP15Wg5suzyjUd5SMLqabRw
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Core Tutorial
|
||||
---
|
||||
# Anonymity - Easy Anonymous Chats Using SimpleX (and onion-only servers)
|
||||
|
|
|
@ -3,6 +3,8 @@ author: XMRonly
|
|||
date: 2024-10-13
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/27"
|
||||
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
---
|
||||
# How to Receive Anonymous SMSes (Remote SMSes as a Service)
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-08-14
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/87"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Anonymity Explained
|
||||
---
|
||||
# Why isn’t Privacy enough for Anonymous Use?
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2025-03-15
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/86"
|
||||
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
|
||||
tags:
|
||||
- Anonymity Explained
|
||||
---
|
||||
# What is Anonymity ? Why is it Important ?
|
||||
|
||||
|
@ -185,7 +187,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
## **The Enemies of Anonymity: Surveillance, KYC procedures and Centralisation**
|
||||
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -200,7 +202,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md).
|
||||
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -223,7 +225,7 @@ Surveillance CANNOT be tolerated when you want Anonymity. So before you try to l
|
|||
|
||||
|
||||
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
|
||||
**There are only 2 possible long-term outcomes for Centralisation** : **
|
||||
|
||||
|
@ -248,9 +250,9 @@ As we have discussed [previously](../governments/index.md), for a government's l
|
|||
|
||||
And for the laws to be enforced, governments need:
|
||||
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: zl
|
|||
date: 2025-03-30
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237"
|
||||
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
|
||||
tags:
|
||||
- Anonymity Explained
|
||||
---
|
||||
# Why is Metadata detrimental to Anonymity?
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@ date: 2025-04-27
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/221"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Core Tutorial
|
||||
---
|
||||
# Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter)
|
||||
|
|
|
@ -4,6 +4,7 @@ date: 2024-05-02
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/109"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Core Tutorial
|
||||
---
|
||||
# Renting Remote VPS Servers Anonymously (non-KYC cloud resellers)
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nileglorifier
|
|||
date: 2024-08-18
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/273"
|
||||
xmr: 84TTjteLVhkYuHosBoc1MjWaB1AmnFSWPgeM7Lts4NdigCmE9ndHTjsXEaxJFTb7JGj55GNERXfnJSFY3J3WE5Ha18BSeS1
|
||||
tags:
|
||||
- Clientside Deniability
|
||||
---
|
||||
# Hiding files in videos (small or large files) with zuluCrypt
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-04-30
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- OPSEC Concepts
|
||||
---
|
||||
# Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days
|
||||
|
||||
|
|
BIN
ce0.png
Before Width: | Height: | Size: 2.8 KiB |
BIN
ce1.png
Before Width: | Height: | Size: 3.1 KiB |
BIN
ce2.png
Before Width: | Height: | Size: 2.4 KiB |
|
@ -3,6 +3,10 @@ author: nihilist
|
|||
date: 2024-09-07
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/96"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Decentralized Finances
|
||||
- Agorism
|
||||
---
|
||||
# Why can't I trust Centralised Exchanges, and random Monero nodes ?
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: XMRonly
|
|||
date: 2025-04-19
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232"
|
||||
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
|
||||
tags:
|
||||
- OPSEC Concepts
|
||||
---
|
||||
# Public Chats / Private Chats / Anonymous Chats / Deniable Chats
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-12-02
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/169"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Anonymity Explained
|
||||
---
|
||||
# Why is the Darknet superior to the Clearnet ?
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-04-29
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Privacy Explained
|
||||
---
|
||||
# Why can't I trust closed source software for Privacy?
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: Mulligan Security
|
|||
date: 2025-02-06
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/36"
|
||||
xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs
|
||||
tags:
|
||||
- Serverside Deniability
|
||||
---
|
||||
# **When the Adversary is the cloud provider himself**
|
||||
|
||||
|
|
BIN
co0.png
Before Width: | Height: | Size: 2.3 KiB |
BIN
co1.png
Before Width: | Height: | Size: 2.3 KiB |
BIN
co2.png
Before Width: | Height: | Size: 2.3 KiB |
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-06-28
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Privacy
|
||||
---
|
||||
# How to compile open source software + How to verify software integrity
|
||||
|
||||
|
|
|
@ -3,14 +3,16 @@ author: nihilist
|
|||
date: 2025-04-03
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/275"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Contribute
|
||||
---
|
||||
# How to become a Contributor
|
||||
|
||||
In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via Forgejo.
|
||||
In this tutorial we're going to look at how you can contribute to The Opsec Bible, we'll look into how the work is being organized, and how to contribute via Forgejo.
|
||||
|
||||
|
||||
|
||||
## The Nihilism Blog Organisation
|
||||
## The Opsec Bible Organisation
|
||||
|
||||
First of all, to know what tutorials we'd like to have completed, check out our [Opsec Forgejo Project board](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1):
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2025-04-07
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Contribute
|
||||
---
|
||||
# How to write good Criticism
|
||||
|
||||
|
@ -84,7 +86,7 @@ Don't just contradict what we say, bring reasoning, arguments, logic, data and l
|
|||
|
||||

|
||||
|
||||
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec blog like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
|
||||
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec Bible like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
|
||||
|
||||

|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2025-01-25
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/266"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Anonymity Explained
|
||||
---
|
||||
# How to explore the Darknet? (Visibility and Discoverability)
|
||||
|
||||
|
|
|
@ -3,6 +3,9 @@ author: nihilist
|
|||
date: 2025-01-26
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/267"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Contributing to Anonymity
|
||||
---
|
||||
# How to run your own Darknet Lantern for Visibility and Discoverability
|
||||
|
||||
|
@ -280,7 +283,7 @@ Also, **please categorize links by their utility instead of trying to categorize
|
|||
Is the website sensitive ? (ex: related to drugs) (y/n) n
|
||||
|
||||
[+] Add a new Website entry (into unverified.csv)
|
||||
What is the Website name ? The Nihilism Blog
|
||||
What is the Website name ? The Opsec Bible
|
||||
What is the website Category ? Blogs
|
||||
What is the website URL ? blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion
|
||||
Description for the website ? (Optional)
|
||||
|
|
BIN
de0.png
Before Width: | Height: | Size: 2.8 KiB |
BIN
de1.png
Before Width: | Height: | Size: 2.2 KiB |
BIN
de2.png
Before Width: | Height: | Size: 1.8 KiB |
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-05-01
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/271"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Deniability Explained
|
||||
---
|
||||
# What is Plausible Deniability ? Why is it Important ?
|
||||
|
||||
|
|
|
@ -3,6 +3,9 @@ author: nothing@nowhere
|
|||
date: 2024-05-28
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/112"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
- Clearnet Services
|
||||
---
|
||||
# bind9 DNS setup
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: cynthia
|
|||
date: 2025-06-05
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/311"
|
||||
xmr: 84ybq68PNqKL2ziGKfkmHqAxu1WpdSFwV3DreM88DfjHVbnCgEhoztM7T9cv5gUUEL7jRaA6LDuLDXuDw24MigbnGqyRfgp
|
||||
tags:
|
||||
- Clientside Privacy
|
||||
---
|
||||
# DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?
|
||||
|
||||
|
|
119
docker-tor/index.md
Normal file
|
@ -0,0 +1,119 @@
|
|||
---
|
||||
author: Anonymous
|
||||
date: 2025-01-31
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
---
|
||||
# How to use Docker containers on the whonix workstation
|
||||
|
||||
|
||||
## How to install Docker
|
||||
|
||||
As usual we install docker via apt like so:
|
||||
```sh
|
||||
[workstation user ~]% sudo apt install docker.io docker-compose -y
|
||||
```
|
||||
|
||||
## How to make sure that Docker pulls images through Tor
|
||||
|
||||
```sh
|
||||
[workstation user ~]% sudo docker pull alpine
|
||||
Using default tag: latest
|
||||
Error response from daemon: Get "https://registry-1.docker.io/v2/": dial tcp: lookup registry-1.docker.io on 10.152.152.10:53: read udp 10.152.152.11:33883->10.152.152.10:53: i/o timeout
|
||||
zsh: exit 1 sudo docker pull alpine
|
||||
```
|
||||
Here as you can see when we try to pull an alpine image, docker can't pull it, to fix that we need to make sure that docker pulls through the localhost tor socks5 proxy on port 9050:
|
||||
|
||||
```sh
|
||||
[workstation user ~]% sudo mkdir /etc/systemd/system/docker.service.d/
|
||||
[workstation user ~]% sudo vim /etc/systemd/system/docker.service.d/proxy.conf
|
||||
[workstation user ~]% cat /etc/systemd/system/docker.service.d/proxy.conf
|
||||
[Service]
|
||||
Environment="HTTP_PROXY=socks5://127.0.0.1:9050"
|
||||
Environment="HTTPS_PROXY=socks5://127.0.0.1:9050"
|
||||
```
|
||||
|
||||
Now that's created, we reload the systemd service and try to pull the alpine docker image again:
|
||||
```sh
|
||||
[workstation user ~]% sudo systemctl daemon-reload
|
||||
[workstation user ~]% sudo systemctl restart docker
|
||||
[workstation user ~]% docker pull alpine
|
||||
Using default tag: latest
|
||||
permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.24/images/create?fromImage=alpine&tag=latest": dial unix /var/run/docker.sock: connect: permission denied
|
||||
zsh: exit 1 docker pull alpine
|
||||
[workstation user ~]% sudo !!
|
||||
[workstation user ~]% sudo docker pull alpine
|
||||
Using default tag: latest
|
||||
latest: Pulling from library/alpine
|
||||
fe07684b16b8: Pull complete
|
||||
Digest: sha256:8a1f59ffb675680d47db6337b49d22281a139e9d709335b492be023728e11715
|
||||
Status: Downloaded newer image for alpine:latest
|
||||
docker.io/library/alpine:latest
|
||||
```
|
||||
|
||||
And that's it! we managed to pull the alpine image as intended.
|
||||
|
||||
## Sidenotes
|
||||
|
||||
1) you can't connect to the internet from a docker container that is in a whonix workstation, and the [whonix developers won't bother providing support for it](https://forums.whonix.org/t/how-can-you-make-a-docker-container-inside-whonix-workstation-connect-to-the-internet/21772/2)
|
||||
2) disabling the whonix firewall does not fix the issue either
|
||||
3) you cant edit the socsk5 port on whonix workstation by editing /etc/tor/torrc to try and set SOCKSPort to 0.0.0.0:9050, which would make it easy to access the tor socks port from the docker container.
|
||||
3) you can make a docker-compose.yml image with the docker container set to network_mode: host to be able to access the 9050 socks5 port on the 10.152.152.11 local IP, but it doesnt seem to be able to resolve domains either for some reason.
|
||||
|
||||
```
|
||||
[workstation user ~]% cat docker-compose.yml
|
||||
services:
|
||||
myalpine:
|
||||
image: alpine
|
||||
tty: true
|
||||
network_mode: host
|
||||
environment:
|
||||
- 'HTTP_PROXY=socks5://host.docker.internal:9050'
|
||||
- 'HTTPS_PROXY=socks5://host.docker.internal:9050'
|
||||
extra_hosts:
|
||||
- host.docker.internal:host-gateway
|
||||
|
||||
[workstation user ~]% sudo docker-compose down ; sudo docker-compose up -d
|
||||
Stopping user_myalpine_1 ... done
|
||||
Removing user_myalpine_1 ... done
|
||||
Creating user_myalpine_1 ... done
|
||||
|
||||
[workstation user ~]% sudo docker container ls
|
||||
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
|
||||
0752ecb83c6b alpine "/bin/sh" 43 seconds ago Up 42 seconds user_myalpine_1
|
||||
[workstation user ~]% sudo docker exec -it 0752 sh
|
||||
|
||||
[workstation user ~]% sudo docker exec -it 0752 sh
|
||||
/ # ip a
|
||||
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
|
||||
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
|
||||
inet 127.0.0.1/8 scope host lo
|
||||
valid_lft forever preferred_lft forever
|
||||
inet6 ::1/128 scope host noprefixroute
|
||||
valid_lft forever preferred_lft forever
|
||||
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP qlen 1000
|
||||
link/ether 52:54:00:e8:c3:50 brd ff:ff:ff:ff:ff:ff
|
||||
inet 10.152.152.11/18 brd 10.152.191.255 scope global eth0
|
||||
valid_lft forever preferred_lft forever
|
||||
inet6 fe80::5054:ff:fee8:c350/64 scope link
|
||||
valid_lft forever preferred_lft forever
|
||||
3: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN
|
||||
link/ether 02:42:8c:ad:6a:cd brd ff:ff:ff:ff:ff:ff
|
||||
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
|
||||
valid_lft forever preferred_lft forever
|
||||
inet6 fe80::42:8cff:fead:6acd/64 scope link
|
||||
valid_lft forever preferred_lft forever
|
||||
15: br-973a58a1c943: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN
|
||||
link/ether 02:42:35:83:6e:bc brd ff:ff:ff:ff:ff:ff
|
||||
inet 172.19.0.1/16 brd 172.19.255.255 scope global br-973a58a1c943
|
||||
valid_lft forever preferred_lft forever
|
||||
inet6 fe80::42:35ff:fe83:6ebc/64 scope link
|
||||
valid_lft forever preferred_lft forever
|
||||
|
||||
/ # nc 10.152.152.11 -p 9050
|
||||
nc: bind: Address in use
|
||||
```
|
||||
4) tested with a forgejo container, with the socks5 proxy set onto 10.152.152.11 on port 9050, it is unable to mirror repositories that are on external clearnet git instances.
|
||||
|
||||
TLDR: if you run a docker container inside of a whonix workstation VM, it will remain truly isolated and unable to communicate with the internet.
|
||||
|
BIN
duresspin/0.png
Normal file
After Width: | Height: | Size: 1.6 KiB |
BIN
duresspin/1.png
Normal file
After Width: | Height: | Size: 68 KiB |
BIN
duresspin/2.png
Normal file
After Width: | Height: | Size: 6.9 KiB |
BIN
duresspin/3.png
Normal file
After Width: | Height: | Size: 4.6 KiB |
BIN
duresspin/4.png
Normal file
After Width: | Height: | Size: 4.4 KiB |
BIN
duresspin/5.png
Normal file
After Width: | Height: | Size: 7.6 KiB |
BIN
duresspin/6.png
Normal file
After Width: | Height: | Size: 9.8 KiB |
BIN
duresspin/7.png
Normal file
After Width: | Height: | Size: 4.7 KiB |
97
duresspin/index.md
Normal file
|
@ -0,0 +1,97 @@
|
|||
---
|
||||
author: XMRonly
|
||||
date: 2025-06-22
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/331"
|
||||
xmr: 86XU71dRkBcA1FmPeHf2UK9UQBy7c5KXKbUwkTZCry1G8MENNnp3jQnWYG3LdR5rQwEXJxTYXJBXcWupQAmb86RMGQ1DksF
|
||||
|
||||
---
|
||||
# GrapheneOS Duress PIN
|
||||
|
||||

|
||||
|
||||
## Introduction
|
||||
|
||||
As discussed previously on this blog, using a VeraCrypt hidden volume is an ideal way to [plausibly deny](../veracrypt/index.md) the existence of certain materials. On mobile phones, however, this is not possible since VeraCrypt does not (yet) support mobile platforms. We must therefore seek an alternative tool to have plausible deniability over any materials we do not wish to expose in case of an emergency. One such alternative is the Duress PIN feature on GrapheneOS. Quoting from [https://grapheneos.org](https://grapheneos.org/features#duress):
|
||||
|
||||
>GrapheneOS provides users with the ability to set a duress PIN/Password that will irreversibly wipe the device (along with any installed eSIMs) once entered anywhere where the device credentials are requested (on the lockscreen, along with any such prompt in the OS).
|
||||
|
||||
The Duress PIN feature works seamlessly and as expected: upon entering the Duress PIN, the device is immediately wiped and the process is uninterruptible. There is no phone reset required nor any fumbling around with the bootloader in order for this to work. In this tutorial, we will explore how to set up and use the GrapheneOS Duress PIN feature, and how possible scenarios may play out when forced to unlock your phone against your will.
|
||||
|
||||
## Setup
|
||||
|
||||
Before setting up a Duress PIN, we will first need to set a PIN code for unlocking the phone. This is found under **Settings > Security & privacy > Device unlock > Screen lock**. Assuming this has already been set up, we can move to setting up a Duress PIN. Navigate to **Settings > Security & privacy > Device unlock > Duress password**. You will be prompted to enter your lock screen PIN to authenticate.
|
||||
|
||||

|
||||
|
||||
We are now presented with a screen detailing the features of the Duress password. Click on "+ Add duress PIN and password". As noted in the text on screen, we will be entering both a numeric duress PIN and an alphanumeric duress password. Entering either one of these when prompted will trigger the duress feature wiping all data from the device.
|
||||
|
||||
|
||||

|
||||
|
||||
We now proceed to fill out the duress PIN and duress password on screen and then click Add to finalize our input.
|
||||
|
||||

|
||||
|
||||
We proceed past the final warning and our setup is complete.
|
||||
|
||||

|
||||
|
||||
We can always update or remove our duress PIN and password by navigating back to **Settings > Security & privacy > Device unlock > Duress password**.
|
||||
|
||||

|
||||
|
||||
To use the duress PIN, you simply enter it on any screen where the device credentials are requested by the GrapheneOS operating system. This will work from the lock screen, which most users would be familiar with, but also from other functions such as setting the Fingerprint Unlock function under **Settings > Security & privacy > Device unlock > Fingerpint Unlock** (remember how we were prompted to first authenticate before being able to set a Duress PIN? It's the same procedure here).
|
||||
|
||||
If you were to set your duress PIN the same as the lock screen PIN code for unlocking the phone, you don't need to worry about accidentally wiping your device because the PIN code takes priority over the duress PIN. Entering it would only unlock the phone as normal.
|
||||
|
||||
## Considerations
|
||||
|
||||
Using your duress PIN in a confrontational scenario with law enforcement (LE) may have negative consequences based on your jurisdiction. It is therefore important to carefully assess the circumstances of the situation.
|
||||
|
||||
Depending on your jurisdiction, inputting a duress PIN may be seen as tampering with evidence, destroying evidence or contempt of court, which could carry fines or prison sentences. This is clearly undesirable, although it may potential be a lesser offense then the offenses brought about by LE actually finding the materials concealed on your phone.
|
||||
|
||||
As a general precaution, using a long and difficult to guess PIN code is recommended over using your fingerprint. This is because in the United States, the [Electronic Frontier Foundation](https://www.eff.org/deeplinks/2020/06/protecting-your-privacy-if-your-phone-taken-away) has noted that:
|
||||
|
||||
>Some courts have found that you can be forced to unlock a phone protected with a biometric such as face or fingerprint identification without your consent, so it is advised to not enable either option.
|
||||
|
||||
The EFF additionally [notes](https://www.eff.org/deeplinks/2020/06/surveillance-self-defense-attending-protests-age-covid-19) that:
|
||||
|
||||
>Under current U.S. law—which is still in flux—using a memorized passcode generally provides a stronger legal footing to push back in court against compelled device unlocking/decryption.
|
||||
|
||||
It might be worthwhile to consider **writing your duress PIN on a piece of paper and placing this paper in your phone case**. Should anyone find your phone or compel you to give it to them, they may inadvertedly enter your duress PIN thinking you were forgetful and had to write down you PIN.
|
||||
|
||||
## Scenario
|
||||
|
||||
You're at home minding your own business, when the adversary suddenly breaks down your door, arresting you and seizing all of your electronic devices. You are then taken to the police station. If you are in a jurisdiction that allows for it, [don't talk to the police](https://youtu.be/d-7o9xYp7eE), ask for a lawyer, then [shut the fuck up](https://files.catbox.moe/h7kpp5.mp4).
|
||||
|
||||
If you are not in such a jurisdiction, you may be forced to unlock your phone under threats of physical violence.
|
||||
|
||||
>LE: What's the code to your phone?!
|
||||
|
||||
>You: I think my phone's on the fritz officer, it's not really working lately...
|
||||
|
||||
>LE: Shut up! Open it NOW!!
|
||||
|
||||
>You: OK, whatever you say officer...
|
||||
|
||||
You enter the duress PIN. The screen briefly displays a message saying "Wrong PIN" then powers off the device.
|
||||
|
||||

|
||||
|
||||
>LE: What the fuck?
|
||||
|
||||
>You: Yeah officer, I told you it's been acting up lately...
|
||||
|
||||
Powering the phone back on will cause it to boot as normal before finally arriving at the GrapheneOS Recovery screen.
|
||||
|
||||

|
||||
|
||||
The irreversible wipe has just occurred and all data and eSIMS are unrecoverable. The only thing that can be done is a factory reset. This can be done by navigating down to "Factory data reset" using the volume keys on the phone and clicking the power button to select that option. After allowing some time for the installation to complete, the phone is loaded with a fresh install of GrapheneOS.
|
||||
|
||||
## Conclusion
|
||||
|
||||
We've seen how to set up and use the GrapheneOS duress PIN feature. Due to the possible consequences of using the duress PIN for tampering with or destroying evidence in an adversarial scenario, this should be reserved as a last resort option if you have no other choice.
|
||||
|
||||
##### Disclaimer
|
||||
|
||||
This blog's [stance](../stancesensitive/index.md) is to not endorse sensitive activities and nothing in this article serves as legal advice.
|
|
@ -4,6 +4,8 @@ date: 2024-04-13
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/178"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Deniability
|
||||
- High Availability
|
||||
- Core Tutorial
|
||||
---
|
||||
# EndGame V3 Setup
|
||||
|
|
Before Width: | Height: | Size: 273 KiB After Width: | Height: | Size: 23 KiB |
Before Width: | Height: | Size: 70 KiB After Width: | Height: | Size: 33 KiB |
Before Width: | Height: | Size: 164 KiB After Width: | Height: | Size: 11 KiB |
|
@ -3,6 +3,8 @@ author: Crabmeat
|
|||
date: 2025-06-07
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/345"
|
||||
xmr: 89aWkJ8yabjWTDYcHYhS3ZCrNZiwurptzRZsEpuBLFpJgUfAK2aj74CPDSNZDRnRqeKNGTgrsi9LwGJiaQBQP4Yg5YtJw2U
|
||||
tags:
|
||||
- Anarchy
|
||||
---
|
||||
# **Everyone is a criminal**
|
||||
|
||||
|
|
Before Width: | Height: | Size: 96 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 62 KiB After Width: | Height: | Size: 8.1 KiB |
Before Width: | Height: | Size: 42 KiB After Width: | Height: | Size: 22 KiB |
|
@ -4,6 +4,9 @@ date: 2024-04-06
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/274"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Deniability
|
||||
- Self-Hosted
|
||||
- High Availability
|
||||
- Core Tutorial
|
||||
---
|
||||
# Electrical Failover (basic UPS setup)
|
||||
|
|
BIN
file-verification/19.png
Normal file
After Width: | Height: | Size: 356 B |
|
@ -3,6 +3,8 @@ author: Doctor Dev
|
|||
date: 2025-05-22
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/310"
|
||||
xmr: 89g3MMq1mo9C5C4vDisyAoCU5GuukXJ2FedUwyLXJWpmTsKHdi1rCPZaeT1d9V4NViTTXyaL9qtKzSbVdKGdEghhCH5oRiT
|
||||
tags:
|
||||
- Clientside Privacy
|
||||
---
|
||||
# File Verification
|
||||
|
||||
|
@ -186,6 +188,81 @@ Now after this process you have ended with an hash that you authenticated, you c
|
|||
|
||||
Now after this process you have ended with an hash that you authenticated, you can use this hash with the file verification process to finish and verify the origin of the file downloaded.
|
||||
|
||||
#### Minisign (CLI)
|
||||
For this example, we'll be showing both sides (the project maintainer and user)
|
||||
|
||||
Both sides must have Minisign installed
|
||||
|
||||
```bash
|
||||
root@localhost:~# apt install minisign
|
||||
```
|
||||
|
||||
##### Maintainer
|
||||
1. The maintainer generates their own key-pair for signing releases. This may prompt for a password to encrypt the secret key.
|
||||
|
||||
```bash
|
||||
maintainer@localhost:~$ minisign -G
|
||||
Please enter a password to protect the secret key.
|
||||
|
||||
Password:
|
||||
Password (one more time):
|
||||
Deriving a key from the password in order to encrypt the secret key... done
|
||||
|
||||
The secret key was saved as /home/maintainer/.minisign/minisign.key - Keep it secret!
|
||||
The public key was saved as minisign.pub - That one can be public.
|
||||
|
||||
Files signed using this key pair can be verified with the following command:
|
||||
|
||||
minisign -Vm <file> -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
|
||||
```
|
||||
|
||||
The public key (which in this case is `RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI`) can be shared with others on a site, or where-ever the downloads are hosted. It can even be shared as a QR code or on the phone thanks to how small it is.
|
||||
|
||||
```bash
|
||||
maintainer@localhost:~$ sudo apt install qrencode
|
||||
maintainer@localhost:~$ qrencode -o pubkey_qr.png RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
|
||||
```
|
||||
|
||||

|
||||
|
||||
2. The maintainer generates a checksum file of the latest binary release, We'll be using SHA-512 for this.
|
||||
|
||||
```bash
|
||||
maintainer@localhost:~$ sha512sum program > SHA512SUMS
|
||||
```
|
||||
|
||||
3. The maintainer signs the checksum file with their Minisign key.
|
||||
|
||||
```bash
|
||||
maintainer@localhost:~$ minisign -S -m SHA512SUMS
|
||||
Password:
|
||||
Deriving a key from the password and decrypting the secret key... done
|
||||
|
||||
```
|
||||
|
||||
##### User
|
||||
|
||||
1. The user downloads the program, the SHA512 checksum file, and the signature of that file.
|
||||
|
||||
2. The user verifies the Minisign signature with the public key.
|
||||
|
||||
If it's a good signature, Minisign's output may be something like this:
|
||||
|
||||
```bash
|
||||
user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
|
||||
Signature and comment signature verified
|
||||
Trusted comment: timestamp:1750090525 file:SHA512SUMS hashed
|
||||
```
|
||||
|
||||
However, if it's a **bad signature**, Minisign's output may be something like this instead:
|
||||
|
||||
```bash
|
||||
user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
|
||||
Signature verification failed
|
||||
```
|
||||
|
||||
3. The user verifies the SHA-512 checksum file with the program, like normal
|
||||
|
||||
-----
|
||||
### **Zero Trust Policy**
|
||||
#### **!!! Important !!!**
|
||||
|
@ -207,21 +284,3 @@ In this game its all about who has the better chances, no such thing as 100%, th
|
|||
|
||||
- <b>building projects</b> - Taking the source code and building your own program, this is completely the best zero trust policy existing for software(especially if you know programming languages).
|
||||
check this [post](../compilation/index.md) to know more
|
||||
|
||||
|
||||
## **Other Usage of PGP Keys**
|
||||
|
||||
- <b>Git Commit Verification</b>
|
||||
|
||||
- <b>Encrypting Emails</b>
|
||||
|
||||
- <b>General Encryption</b>
|
||||
|
||||
- <b>SSH Authentication</b>
|
||||
|
||||
## **Finishing words**
|
||||
The dark web its a big place with all the varieties of personalities, from good to bad, from smart to dumb, from kids to adults, you should always keep yourself safe here.
|
||||
|
||||
opsec is important, don't take it lightly, at the end you are your only security.
|
||||
|
||||
Be wary!, Be Paranoid!, Be Invisible!
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-11-23
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/270"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Serverside Anonymity
|
||||
---
|
||||
# Forgejo .onion Setup (Anonymous Code Repositories and Collaboration)
|
||||
|
||||
|
@ -276,8 +278,14 @@ Now in order to make sure our Forgejo instance is able to mirror external git re
|
|||
→ cat gitea/gitea/conf/app.ini | tail -n 4
|
||||
[proxy]
|
||||
PROXY_ENABLED = true
|
||||
PROXY_URL = **socks://tor-forgejo:9050/**
|
||||
PROXY_URL = socks5://tor-forgejo:9050/
|
||||
PROXY_HOSTS = *
|
||||
|
||||
[migrations]
|
||||
ALLOW_LOCALNETWORKS = true
|
||||
SKIP_TLS_VERIFY = true
|
||||
ALLOWED_DOMAINS = *
|
||||
BLOCKED_DOMAINS =
|
||||
|
||||
[ Datura ] [ /dev/pts/13 ] [/srv/forgejo_onion]
|
||||
→ docker-compose down ; docker-compose up -d
|
||||
|
@ -286,6 +294,8 @@ Now in order to make sure our Forgejo instance is able to mirror external git re
|
|||
|
||||
And now from there, we should be able to mirror external repositories on gitea by making the traffic go through Tor aswell. As an example, let's create a git mirror of the official [Monero](../monero2024/index.md) repository that currently sits on [Github](https://github.com/monero-project/monero):
|
||||
|
||||
**SIDENOTE:** [you can't mirror clone repositories that are on other forgejo onion-only instances](https://codeberg.org/forgejo/forgejo/issues/8193) due to an upstream issue in [curl](https://github.com/curl/curl/issues/17363) So in the meantime, you can only use the mirror function to clone other clearnet repositories.
|
||||
|
||||
  
|
||||
|
||||
Now be aware that it's going to take longer than it usually would to get the repository due to the low bandwidth that Tor has, so be be patient and wait until it finishes:
|
||||
|
@ -348,7 +358,7 @@ Then we can proceed with the rest of the instructions to push the commit to the
|
|||
→ git remote add origin http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion/nihilist/my-very-cool-repository.git
|
||||
|
||||
[ mainpc ] [ /dev/pts/9 ] [~/Documents/my-very-cool-repository]
|
||||
→ **torsocks git push -u origin main**
|
||||
→ torsocks git push -u origin main
|
||||
Username for 'http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion': nihilist
|
||||
Password for 'http://nihilist@daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion':
|
||||
Enumerating objects: 3, done.
|
||||
|
@ -463,14 +473,9 @@ Next, if you want a custom CSS theme like the one i have, **first be aware that
|
|||
→ cd css
|
||||
|
||||
[ Datura ] [ /dev/pts/6 ] [public/assets/css]
|
||||
→ wget https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
|
||||
--2024-11-23 20:25:50-- https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
|
||||
Resolving git.nowhere.moe (git.nowhere.moe)... 65.109.30.253
|
||||
Connecting to git.nowhere.moe (git.nowhere.moe)|65.109.30.253|:443... connected.
|
||||
HTTP request sent, awaiting response... 200 OK
|
||||
Length: 22754 (22K) [text/plain]
|
||||
Saving to: ‘theme-space.css’
|
||||
|
||||
→ torsocks wget http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
|
||||
--2024-11-23 20:25:50-- http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
|
||||
|
||||
theme-space.css 100%[=================================================>] 22.22K --.-KB/s in 0s
|
||||
|
||||
2024-11-23 20:25:50 (310 MB/s) - ‘theme-space.css’ saved [22754/22754]
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-06-07
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- OPSEC Concepts
|
||||
---
|
||||
# Governments, Centralisation, and Law Enforcement
|
||||
|
||||
|
@ -48,9 +50,9 @@ Businesses are centralised entities just like governments, they ALL can act as p
|
|||
|
||||
For the Law to be enforceable the authorities need to know 2 things:
|
||||
|
||||
1. What happened ? (lack of Privacy)
|
||||
1. What happened ? (lack of Privacy)
|
||||
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
2. Who did it ? (lack of Anonymity)
|
||||
|
||||
|
||||

|
||||
|
@ -61,9 +63,9 @@ That is the basis of this whole Privacy and Anonymity talk. In short, For the la
|
|||
|
||||
Modern governments know this very well, and some go to extreme lengths to make sure that every citizen is under surveillance.
|
||||
|
||||
1. USA: [Edward Snowden's Revelations](https://iv.nowhere.moe/watch?v=9g_sqKH2z4I)
|
||||
1. USA: [Edward Snowden's Revelations](https://youtube.com/watch?v=9g_sqKH2z4I)
|
||||
|
||||
2. China: [the Surveillance State](https://iv.nowhere.moe/watch?v=Np_C8647mK8) \- [See what it can lead to](https://iv.nowhere.moe/watch?v=v7AYyUqrMuQ)
|
||||
2. China: [the Surveillance State](https://youtube.com/watch?v=Np_C8647mK8) \- [See what it can lead to](https://youtube.com/watch?v=v7AYyUqrMuQ)
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-06-07
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- OPSEC Concepts
|
||||
---
|
||||
# Governments fear Decentralisation and Anonymity
|
||||
|
||||
|
|
|
@ -3,6 +3,8 @@ author: nihilist
|
|||
date: 2024-07-10
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Privacy
|
||||
---
|
||||
# How to have Privacy on your Phone (GrapheneOS)
|
||||
|
||||
|
|
|
@ -3,6 +3,10 @@ author: nihilist
|
|||
date: 2024-05-19
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/97"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Decentralized Finances
|
||||
- Agorism
|
||||
---
|
||||
# Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)
|
||||
|
||||
|
|
|
@ -3,6 +3,10 @@ author: nihilist
|
|||
date: 2024-05-19
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/99"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Decentralized Finances
|
||||
- Agorism
|
||||
---
|
||||
# Haveno DEX Cash by Mail -> XMR transaction
|
||||
|
||||
|
|
|
@ -5,6 +5,9 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.
|
|||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Core Tutorial
|
||||
- Clientside Anonymity
|
||||
- Decentralized Finances
|
||||
- Agorism
|
||||
---
|
||||
# Haveno DEX Direct Fiat to Monero transactions
|
||||
|
||||
|
|
|
@ -3,6 +3,10 @@ author: nihilist
|
|||
date: 2025-02-05
|
||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
|
||||
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
|
||||
tags:
|
||||
- Clientside Anonymity
|
||||
- Decentralized Finances
|
||||
- Agorism
|
||||
---
|
||||
# Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)
|
||||
|
||||
|
|