Compare commits

..

40 commits

Author SHA1 Message Date
oxeo0
d1193aa140
add duresspin to index 2025-06-22 16:31:52 +02:00
210b2b4632 Merge pull request 'add duresspin' (#22) from XMRonly/opsec-blogposts:main into main
Reviewed-on: http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts/pulls/22
2025-06-22 16:03:02 +02:00
anon
d275a9ee09 fix 2025-06-22 15:34:20 +02:00
XMRonly
70629bb9ab add duresspin 2025-06-22 08:18:51 -04:00
anon
b1128e473f fix logos 2025-06-21 08:15:54 +02:00
anon
8a42f82534 fix 2025-06-20 22:28:00 +02:00
anon
dc7d886fa2 Merge remote-tracking branch 'refs/remotes/origin/main' 2025-06-20 22:26:14 +02:00
anon
700c3f5280 fix 2025-06-20 22:25:44 +02:00
nihilist
34289b4440 fix main index page 2025-06-20 08:20:56 +02:00
nihilist
d7096bc866 fix post rebranding 2025-06-20 08:12:48 +02:00
nihilist
a6f190336a rebranding from nihilism opsec blog to opsec bible 2025-06-19 08:38:48 +02:00
oxeo0
d2f56a8128
add minisign file verification 2025-06-16 21:35:08 +02:00
286e99ca76 Merge pull request 'minisign' (#20) from cynthia/opsec-blogposts:main into main
Reviewed-on: http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts/pulls/20
2025-06-16 20:12:45 +02:00
cynthia
660b97a496 minisign 2025-06-16 17:45:40 +01:00
cynthia
c1dbde0e77 remove parts 2025-06-15 21:37:09 +01:00
anon
fb0067d890 tagged ALL tutorials 2025-06-15 18:14:55 +02:00
anon
acb5942b39 fix tutorials 2025-06-15 15:40:10 +02:00
anon
dd83120407 new blogpost protesting is not enough 2025-06-13 18:51:16 +02:00
nihilist
69d1403463 Merge pull request 'protesting_is_not_enough' (#18) from crabmeat/opsec-blogposts:protesting_is_not_enough into main
Reviewed-on: http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts/pulls/18
2025-06-13 18:44:36 +02:00
crabmeat
e71a951757 adding images to avoid wall of text 2025-06-13 09:22:01 +02:00
crabmeat
5a1c7ef601 adding french article 49.3 usage and refs to what's agorism article 2025-06-11 16:20:36 +02:00
crabmeat
e07862e0dc expanding economic idea and polishing images 2025-06-10 19:09:48 +02:00
crabmeat
b424f9e73e closing real life part and conclusion 2025-06-10 16:42:12 +02:00
crabmeat
a20cdeaacb adding solution part 2025-06-10 09:54:16 +02:00
crabmeat
19a891eb6f adding infos in the solution part + articls 2025-06-09 20:35:25 +02:00
oxeo0
c8aebd0c4a
add pgp age encryption to recent tutorials 2025-06-09 19:55:58 +02:00
46591e593e Merge pull request 'age' (#17) from cynthia/opsec-blogposts:main into main
Reviewed-on: http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts/pulls/17
2025-06-09 19:44:58 +02:00
crabmeat
96a130f1bb adding examples and begining solution 2025-06-09 19:44:16 +02:00
oxeo0
78b4bab236
add 2 authors to pgp 2025-06-09 19:24:22 +02:00
oxeo0
c93618a200
compress images 2025-06-09 18:27:11 +02:00
crabmeat
b8bb433767 adding the intro about why people are protesting 2025-06-09 17:24:01 +02:00
anon
2012e29978 fix images 2025-06-09 15:13:58 +02:00
anon
43763f936b added images 2025-06-09 14:39:21 +02:00
anon
56ed1d655b fix formatting 2025-06-09 14:30:43 +02:00
anon
f40bbc80ef fix 2025-06-09 14:27:04 +02:00
anon
0cd997d0f8 new agorism tutorial 2025-06-09 14:21:59 +02:00
crabmeat
748488b035 setting up work environment 2025-06-09 12:28:10 +02:00
cynthia
f04c6ff34a move pics 2025-06-09 00:42:14 +01:00
cynthia
d6b598bb84 stufff 2025-06-08 01:47:04 +01:00
cynthia
145ebfa2a4 incomplete tutorial 2025-06-07 17:44:07 +01:00
236 changed files with 1219 additions and 121 deletions

View file

@ -6,7 +6,7 @@ xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAU
---
# Roadmap Progress (as of May 2025)
Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The opsec blog covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability.
Welcome to our new monthly activity recap of the Nihilism OPSEC Roadmap. The Opsec Bible covers a wide array of topics and tutorials, but all share the same goal: **empowering the individual, to tell them how to make themselves ungovernable.** Privacy comes first, then anonymity, and lastly deniability.
Beyond our Privacy/Anonymity/Deniability classification we have 3 types of tutorials:
@ -22,7 +22,7 @@ Our roadmap is based on those critical tutorials first and foremost, as they are
## Clientside tutorials (85% completed)
This is where the opsec blog shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec.
This is where The Opsec Bible shines currently, thanks to the work that has been done so far, we covered nearly everything that one can accomplish from his own computer, for his or her own opsec.
Currently this section is only missing the following tutorials:
@ -36,7 +36,7 @@ We are also missing some improvements for the following tutorials:
## Serverside Self-Hosting tutorials (20% completed)
This is the part where the opsec blog needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most.
This is the part where The Opsec Bible needs the most work, self-hosting as an operational security concept has been left largely unexplored, and that's where we currently are lacking the most.
Currently this section is missing the following tutorials:

BIN
agorism/image-1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 59 KiB

BIN
agorism/image-10.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 28 KiB

BIN
agorism/image-11.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 20 KiB

BIN
agorism/image-12.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 59 KiB

BIN
agorism/image-13.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

BIN
agorism/image-14.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 73 KiB

BIN
agorism/image-15.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 145 KiB

BIN
agorism/image-16.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 15 KiB

BIN
agorism/image-17.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 46 KiB

BIN
agorism/image-18.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 24 KiB

BIN
agorism/image-19.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 41 KiB

BIN
agorism/image-2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

BIN
agorism/image-20.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 35 KiB

BIN
agorism/image-21.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 181 KiB

BIN
agorism/image-22.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 15 KiB

BIN
agorism/image-23.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 24 KiB

BIN
agorism/image-24.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 116 KiB

BIN
agorism/image-25.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

BIN
agorism/image-26.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

BIN
agorism/image-27.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 29 KiB

BIN
agorism/image-28.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 64 KiB

BIN
agorism/image-29.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 38 KiB

BIN
agorism/image-3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

BIN
agorism/image-30.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 34 KiB

BIN
agorism/image-4.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

BIN
agorism/image-5.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 87 KiB

BIN
agorism/image-6.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

BIN
agorism/image-7.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.5 KiB

BIN
agorism/image-8.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 28 KiB

BIN
agorism/image-9.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 31 KiB

BIN
agorism/image.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.1 KiB

220
agorism/index.md Normal file
View file

@ -0,0 +1,220 @@
---
author: Sam Bent
date: 2025-06-09
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/347"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Agorism
---
# What's Agorism ?
## Agorism: Building Freedom Through Counter-Economics
Agorism is a form of economic guerrilla warfare against the state. Samuel Edward Konkin III developed this revolutionary philosophy in the 1970s as a strategy that rejects both the futility of political reform and the self-defeating nature of violent revolution. Instead of begging for freedom or fighting for it, agorists build it through direct economic action that makes the state irrelevant.
![alt text](image-28.png)
## The Core Concept
At its heart, agorism recognizes a simple truth: the state is not a building in Washington or a group of politicians but a relationship of systematic theft and coercion. Every tax collected, every regulation enforced, and every license required represents a violent intervention in voluntary exchange. Konkin's insight was that we don't need to storm the castle when we can stop feeding the beast.
![alt text](image-25.png)
Think of agorism as economic secession in place. While political activists exhaust themselves trying to change a system designed to resist change, agorists have already opted out. They're building alternative institutions, trading through parallel markets, and creating the infrastructure of a free society right under the state's nose. Every untaxed transaction, every peer-to-peer exchange, and every regulatory bypass represents a small act of revolution that requires no violence, no voting, and no permission.
![alt text](image-26.png)
The genius of Konkin's approach lies in its alignment with human nature. People naturally seek to improve their lives through voluntary exchange. The state constantly interferes with this process, creating friction, extracting wealth, and prohibiting peaceful activities. Agorism encourages what people want to do anyway: trade freely, keep what they earn, and associate voluntarily. The revolution doesn't require converting anyone to a new ideology; it just helps them realize they're already practicing counter-economics.
## Counter-Economics: The Engine of Agorism
Counter-economics encompasses ALL peaceful economic activity the state prohibits, regulates, or taxes. Every transaction that denies the state its cut falls somewhere on the counter-economic spectrum.
![alt text](image-1.png)
White markets consist of legal but unreported activities, such as cash jobs, barter networks, and informal services exchanged between neighbors. When your neighbor pays you $50 cash to fix their computer, when you trade car repairs for plumbing work, when the kid down the street mows lawns for unreported cash, these seemingly innocent exchanges form the foundation of the counter-economy. The state demands its percentage of every dollar that changes hands, but white market transactions slip entirely beneath their radar.
![alt text](image-2.png)
Grey markets involve regulated activity done without state permission. The food truck operating without proper licenses, the hairdresser working from home without permits, and the contractor doing renovations without pulling building permits. These entrepreneurs provide genuine value to willing customers. Still, they skip the permission slips, fees, and regulations that exist primarily to extract revenue and protect established businesses from competition. In many developing nations, grey markets account for the majority of economic activity because the official regulatory burden renders legal compliance unfeasible for small operators.
![alt text](image-3.png)
Black markets handle prohibited goods and services outright. Drugs, weapons, banned information, prohibited services. These markets exist because the state has declared certain voluntary exchanges criminal, creating artificial scarcity and massive profit opportunities. The darknet markets you're familiar with represent pure agorism in digital form. Silk Road operated for over two years as a $1.2 billion proof of concept, demonstrating that complex commercial relationships, escrow systems, reputation networks, and quality control can flourish without any state oversight whatsoever. When Ross Ulbricht created the Silk Road, he explicitly cited agorist philosophy as his inspiration, viewing the marketplace as a means to demonstrate that voluntary exchange needs no external enforcement.
![alt text](image-16.png)
Red markets involve violence and coercion, which agorism explicitly rejects. Konkin was clear that aggression against persons or property violates the foundational principle of voluntary exchange. Agorism aims to render the state obsolete through peaceful competition rather than replicating its coercive methods. This distinction matters because critics often conflate all black market activity with violence when, in reality, most counter-economic transactions are as peaceful as buying groceries.
## Historical Examples That Prove It Works
### The System D Economy
In developing nations, "System D" (from French "débrouillardise"—making do) represents the informal economy. By 2020, System D was worth $10 trillion globally, making it the world's second-largest economy after the US.
![alt text](image-10.png)
In Lagos, Nigeria, approximately 80% of employment exists in System D, which encompasses street vendors, informal taxi networks, and unregistered businesses. This entire parallel economy operates successfully without government recognition. These aren't criminals; they're agorists by necessity.
### Soviet Black Markets
The USSR tried to control every economic transaction. To what end? By the 1980s, the shadow economy accounted for 20-30% of the Soviet GDP. Citizens traded everything from blue jeans to car parts through "blat" (informal exchange networks).
When official stores had empty shelves, black market dealers had full warehouses. The state's economic plans were rendered ineffective when citizens created their supply chains. The counter-economy sustained the population's basic needs while the official economy collapsed.
### Colonial America's Smuggling Networks
Before the American Revolution, colonists routinely violated British trade laws through sophisticated smuggling operations that prefigured modern agorism. John Hancock remembered as a patriot, made his fortune smuggling tea and wine past British customs. By 1760, smuggling had become so widespread that British customs collected only £2,000 annually from colonies that should have yielded £200,000 according to official trade volumes.
![alt text](image-4.png)
These colonial smugglers created elaborate networks of false compartments in ships bribed customs officials and established alternative ports of entry. They didn't see themselves as revolutionaries but as merchants pursuing profit in the face of unreasonable restrictions. The Molasses Act of 1733 aimed to compel colonists to purchase expensive British sugar instead of cheaper French alternatives. The colonists' response? They disregarded the law and established their trade routes. By the time of the revolution, the infrastructure for independence already existed in these smuggling networks. The same ships that smuggled molasses could carry weapons, the same merchants who avoided customs could finance rebellion, and the same networks that moved illegal goods could distribute revolutionary pamphlets.
The British response mirrors modern drug war tactics: increased enforcement, harsher penalties, and broader surveillance powers. The Writs of Assistance gave customs officials unlimited power to search any property without specific warrants. The colonists' counter-response? Better smuggling techniques, deeper corruption of officials, and eventually, revolution. However, note that economic resistance came first, and political resistance followed only when the state made normal business operations impossible.
### Prohibition Era (1920-1933)
Alcohol prohibition created the largest counter-economic network in US history. By 1925, there were 100,000 speakeasies in New York City alone, twice the number of legal bars that existed before Prohibition.
![alt text](image-5.png)
Bootleggers didn't lobby for repeal. They built distribution networks, corrupted enforcement, and served customer demand. The government surrendered not because of protests but because the counter-economy made the law unenforceable.
Modern Agorism in Practice
## Cryptocurrency Networks
Bitcoin emerged not from reformists politely asking the Federal Reserve to consider alternative monetary policies but from cypherpunks who built an alternative monetary system that operates without permission. Satoshi Nakamoto's whitepaper referenced no political movements, requested no regulatory approval, and asked no one's permission. The genesis block included a Times headline about bank bailouts, the only political statement needed.
![alt text](image-6.png)
Every cryptocurrency transaction that bypasses traditional banking represents a practical form of agorism. When Iranian programmers sell software for Bitcoin because sanctions block bank transfers, when Venezuelans preserve wealth in cryptocurrency while their government destroys the bolivar through hyperinflation, and when dark market vendors create more reliable reputation systems than eBay, they prove that monetary systems don't require states.
![alt text](image-29.png)
DeFi protocols now handle billions of dollars in value without the need for banks, regulators, or state oversight. Uniswap processes more daily volume than many national stock exchanges without a single regulatory license. Compound allows lending and borrowing without credit checks or financial surveillance. Smart contracts execute complex financial operations that would require armies of lawyers in the traditional system. Still, they do so with mathematical certainty and without any possibility of corruption. These systems don't compete with banks on the banks' terms; they make traditional financial intermediaries conceptually obsolete.
![alt text](image-30.png)
The state's response reveals their fear. China has repeatedly banned cryptocurrency, with each ban becoming less effective than the last. The US Treasury attempts to regulate DeFi protocols that lack a central governing entity. They demand that mathematical protocols collect KYC information, showing that they don't understand they're fighting against mathematics itself. Every attempt at control drives innovation toward greater decentralization, increased privacy, and improved resistance to interference.
## Digital Nomadism and Flag Theory
Thousands of location-independent workers legally minimize taxes by choosing jurisdictions strategically. They're not evading—they're selecting which states deserve their economic participation—company in Estonia, bank account in Singapore, residence in Portugal, income from global clients. The state's geographical monopoly becomes irrelevant.
## The Gig Economy's Shadow Side
Officially, Uber drivers and DoorDash deliverers are tracked and taxed through elaborate digital systems designed to ensure compliance. The platforms automatically report earnings to tax authorities and issue Form 1099 for any amount exceeding $600. But beneath this veneer of compliance lies a thriving counter-economy that the platforms pretend not to see.
Cash tips disappear into pockets without a trace. Regular customers develop personal relationships with drivers, arranging rides outside the app for cash payment. The Uber driver who gives you his card for "airport runs" has just recruited you into the counter-economy. Pizza delivery drivers build networks of regular customers who pay cash directly, bypassing both the platform and the taxman. Every transaction that moves from the platform to personal arrangement represents a small victory for economic freedom.
DoorDash drivers share techniques for maximizing cash orders in online forums. They know which restaurants still accept cash, which neighborhoods tip in cash, and how to structure their acceptance patterns to avoid algorithmic detection while maximizing unreported income. The platforms are aware of this happening, but they can't stop it without destroying their business model. They need drivers more than drivers need them, creating space for counter-economic activity within supposedly controlled systems.
![alt text](image-8.png)
This shadow economy extends beyond simple tax avoidance. Drivers share accounts to bypass background checks, rent accounts to those who can't qualify officially, and create elaborate systems to game surge pricing and bonuses. What appears to be a highly regulated, technologically controlled market contains thousands of entrepreneurs practicing agorism daily, proving that human ingenuity in pursuing profit will always outpace corporate and government control systems.
## Why Agorism Beats Political Action
Political reformers operate within the system they claim to oppose, thereby begging the state to limit itself through the very mechanisms it controls. They spend decades achieving minor victories that get reversed by the next administration, always fighting yesterday's battle. At the same time, the state invents new forms of control. The drug reform movement spent fifty years and millions of dollars trying to change marijuana laws through lobbying and voting. Meanwhile, agorist entrepreneurs started selling cannabis through medical dispensaries, delivery services, and, yes, black markets, normalizing what politicians feared to touch. By the time legalization came to many states, the counter-economy had already made Prohibition irrelevant.
![alt text](image-9.png)
Violent revolutionaries seek to replace one violent monopoly with another. History shows us a pattern: the revolutionary often becomes the oppressor, sometimes more brutal than their predecessor. The French Revolution promised liberty, equality, and fraternity but delivered the Terror and Napoleon. The Russian Revolution promised workers' paradise but created the gulag. Every violent overthrow carries within it the seeds of the next tyranny because it accepts the fundamental premise that society needs violent monopoly control.
![alt text](image-24.png)
Agorists make the state irrelevant through superior alternatives. We build parallel systems that outcompete state offerings without asking permission or firing a shot. Consider which threatens banking cartels more: Occupy Wall Street camping in parks and holding signs or DeFi protocols that now handle billions in value without a single banking license? Which changed drug markets more fundamentally: decades of policy reform efforts or Ross Ulbricht proving that reputation systems and cryptocurrencies could create more orderly markets than state prohibition ever achieved?
## The Revolutionary Logic
Every government requires three things to survive, and agorism systematically attacks each pillar of state power.
First, states need economic compliance through taxes, regulations, and licensing. Every dollar that flows through counter-economic channels denies the state revenue while building alternative economic infrastructure. When a programmer accepts Bitcoin for freelance work, when a farmer sells produce directly to consumers for cash, and when a tutor teaches students without state credentials, they're not just avoiding taxes but creating proof that complex economic relationships work without state intermediation.
![alt text](image-11.png)
Second, states require information control through surveillance, censorship, and propaganda. **The cypherpunk movement, which gave us PGP, Tor, Bitcoin, and other privacy tools, aligns perfectly with the agorist strategy.** When Phil Zimmermann released PGP to the world in 1991, the US government attempted to prosecute him for "exporting munitions" because it understood that widespread encryption threatened its surveillance capabilities. Every encrypted message, every anonymous transaction, and every piece of information that flows outside state monitoring reduces their ability to control economic activity. Tor enables agorist marketplaces by making it impossible to trace connections between buyers and sellers. I2P goes even further, creating an entire parallel internet where surveillance becomes mathematically impossible. These tools transform agorism from a local phenomenon into a global revolutionary strategy.
![alt text](image-12.png)
Third, states depend on legitimacy, which is the widespread belief that their authority is necessary and beneficial. Every successful counter-economic transaction disproves this myth. When darknet markets provided better customer service than street dealers, when Bitcoin transfers moved money faster and cheaper than banks, and when homeschooling produced better educational outcomes than government schools, they didn't argue against state legitimacy; they demonstrated its obsolescence. The state's greatest fear isn't armed rebels but peaceful traders proving we don't need them.
## Practical Agorism for OPSEC-Minded Individuals
You're already thinking about operational security. Agorism represents economic OPSEC at its core, denying adversaries (the state) intelligence about your economic activity. Every privacy tool you use for OPSEC enables agorism by breaking the connection between identity and economic activity.
![alt text](image-13.png)
Tor didn't emerge from privacy advocates asking governments to respect anonymity. The Onion Router created a parallel communication system that makes surveillance computationally infeasible. When you route your traffic through Tor, you're not just protecting your privacy but enabling entire counter-economic ecosystems. The same relay network that protects dissidents also enables agorist marketplaces to operate beyond state reach. I2P takes this further by creating a completely separate network layer where every participant contributes to the anonymity of others, making it ideal for hosting hidden services that can't be traced or shut down.
![alt text](image-14.png)
Monero represents the evolution of cryptocurrency toward true agorist money. While Bitcoin transactions are pseudonymous but traceable on a public ledger, Monero implements ring signatures, stealth addresses, and confidential transactions that make financial surveillance impossible. When you use Monero, you're not just making a privacy choice but participating in the creation of a monetary system that operates entirely outside state observation. Every Monero transaction strengthens a financial network that can't be controlled, censored, or inflated by any government.
![alt text](image-15.png)
But agorism extends far beyond high-tech solutions. Paying contractors in cash keeps transactions entirely out of the banking system. Bartering skills with neighbors create value exchange without any monetary trail. Growing food breaks the agricultural cartel's monopoly on the supply chain. Teaching skills outside the credential monopoly of universities and licensing boards build human capital that owes nothing to state approval. Building local exchange networks fosters resilient communities that can meet their needs independently of corporate or government intermediaries.
The System D economy in developing nations shows how this works at scale. In cities like Mumbai or Cairo, entire neighborhoods operate through informal networks of trust and reputation. The street vendor who knows your coffee preference, the mechanic who fixes your car without paperwork, and the seamstress who tailors clothes from her apartment are all part of vast agorist networks that predate Konkin's philosophy by centuries. These aren't temporary arrangements but sophisticated economic systems that often work better than their "legitimate" counterparts.
## The Endgame
![alt text](image-27.png)
Konkin envisioned a world where the state withers away not through collapse but through irrelevance. His four-phase model of agorist revolution, laid out in "New Libertarian Manifesto," describes the progression from our current statist society to a free-market anarchist world. Phase 1 sees isolated agorists practicing counter-economics individually. Phase 2 involves small networks of traders and entrepreneurs who support one another. Phase 3 establishes large-scale counter-economic institutions that begin to displace state services. Phase 4 achieves a stateless society where all transactions are voluntary, and protection agencies compete in a free market.
![alt text](image-17.png)
We're currently somewhere between Phase 2 and 3. When people can trade freely without permission through cryptocurrency networks, resolve disputes without courts through smart contracts and decentralized arbitration, protect property without police through private security and mutual aid networks, and build infrastructure without permits through agorist construction collectives, the question becomes stark: what exactly do we need government for?
This progression is already visible. In Detroit's abandoned neighborhoods, agorist entrepreneurs have created entire communities outside of official systems. They've installed their streetlights, organized their security patrols, created their dispute resolution systems, and built thriving local economies while the city government retreated.
In Greece, during the economic crisis, parallel economies utilizing alternative currencies and barter networks helped keep communities functioning when the official economy collapsed. In Argentina, when the government destroyed the currency through inflation, people spontaneously created their exchange networks that operated more efficiently than the state system.
## The Agorist Paradox
Here's what terrifies authoritarians: Agorism is anti-fragile. Every crackdown creates more agorists. Every new restriction teaches people to value freedom. Every enforcement action becomes a marketing campaign for our alternatives.
When governments ban cash transactions above certain amounts, people discover cryptocurrency. When they regulate cryptocurrency exchanges, people become aware of decentralized exchanges and privacy coins. When they increase surveillance, people become experts in encryption and operational security. The state's attempts to control create the very expertise and motivation that undermines their control.
![alt text](image-20.png)
Silk Road's destruction spawned dozens of more secure markets that learned from its mistakes. Each iteration becomes more resilient, more decentralized, and more difficult to stop. Banking restrictions on marijuana businesses forced an entire industry to develop sophisticated cash management and cryptocurrency systems that now serve other industries facing financial discrimination. COVID lockdowns, intended to increase state control, instead created an explosion in grey market services as people discovered they could work, trade, and live without official permission.
![alt text](image-18.png)
The state creates its opposition through its oppression. Every person who loses their business to arbitrary regulations, every entrepreneur crushed by licensing requirements, and every peaceful trader imprisoned for voluntary exchanges becomes a potential agorist. The system manufactures resistance by making legal compliance either impossible or worthless for an increasing number of people.
## The Philosophy Behind the Practice
Agorism rests on solid philosophical foundations that distinguish it from mere tax evasion or black market profiteering. Konkin built his system on the non-aggression principle, recognizing that all government action ultimately rests on the threat of violence. Every regulation, no matter how trivial, carries the implicit threat: comply or face an escalating force that ends with death if you resist sufficiently. A business license isn't a piece of paper but a threat of violence against peaceful trade.
This understanding leads to the central agorist insight: the state is not reformable because its essential nature is aggression. You cannot vote violence into peace any more than you can regulate theft into charity. Political action within the system legitimizes the system. Even libertarian political parties end up reinforcing the idea that change must come through state mechanisms. Agorism rejects this entirely, recognizing that freedom comes from rendering the state irrelevant, not from capturing its machinery.
![alt text](image-7.png)
The moral dimension of agorism stems from the principle of self-ownership. If you own yourself, you own your labor. If you own your labor, you own its products. Any interference with voluntary exchange between self-owners violates this fundamental principle. The state claims the right to control what you can buy, sell, or trade, inserting itself as a parasitic third party in every transaction. Agorism asserts the right to ignore this claimed authority and trade freely.
However, agorism extends beyond individual philosophy to encompass a comprehensive theory of social change. Konkin observed that successful state resistance creates momentum. As counter-economic networks grow, they attract more participants through superior service and lower costs. A drug dealer who never cheats on customers builds a reputation. The grey market contractor who does quality work gets referrals. The cryptocurrency trader who enables international transactions gets repeat business. Quality and reliability create growth in counter-economic enterprises just as in any market.
This leads to Konkin's revolutionary optimism. Unlike Marxists, who wait for capitalism's contradictions to create a revolution, or anarcho-capitalists, who hope for eventual enlightenment, agorists see freedom emerging from human action in the present. Every agorist transaction makes the next one easier. Every person practicing counter-economics makes the practice more normal. Every parallel institution that functions well makes state services look worse by comparison. The revolution proceeds one transaction at a time, building tomorrow's free society within today's authoritarian one.
## Essential Agorist Literature
Understanding agorism deeply requires engaging with the foundational texts that shaped this philosophy. Samuel Edward Konkin III's "New Libertarian Manifesto" stands as the core document of agorist thought. Written in 1983, it outlines the theoretical framework for counter-economics and the path from a statist society to free market anarchism. Konkin writes with the fire of a revolutionary but the precision of an economist, explaining how market forces themselves will destroy the state once people stop feeding it through taxation and regulation.
"An Agorist Primer" by the same author serves as the practical companion to the Manifesto. Where the Manifesto provides theory, the Primer offers concrete examples and strategies. Konkin explains how to identify counter-economic opportunities in your own life, how to evaluate risk versus reward, and how to build networks of fellow travelers. He emphasizes that agorism works at every scale, from individual transactions to entire parallel economies.
J. Neil Schulman's "Alongside Night" deserves special mention as the first explicitly agorist novel. Written in 1979 with Konkin's direct input, it depicts a near-future America where hyperinflation and economic collapse drive the creation of a massive agorist underground. The novel doesn't just tell a story but also demonstrates how counter-economic networks might function at scale, complete with alternative currencies, private protection agencies, and underground markets that operate more efficiently than the ailing official economy. Schulman shows how crisis creates an opportunity for those prepared to offer alternatives.
![alt text](image-23.png)
For historical context, Murray Rothbard's "For a New Liberty" provides the anarcho-capitalist foundation that Konkin built upon and eventually transcended. While Rothbard focused on education and eventual political change, his economic analysis of why free markets work and governments fail remains an essential reading. The chapter on police and courts without government particularly complements agorist thinking about parallel institutions.
More recently, "The Starfish and the Spider" by Ori Brafman and Rod Beckstrom, while not explicitly agorist, explains why decentralized organizations defeat centralized ones. Their analysis of how Napster, Wikipedia, and Al Qaeda succeeded through decentralization applies perfectly to counter-economic networks. When there's no head to cut off, no central point of failure, the system becomes unstoppable.
"The Sovereign Individual" by James Dale Davidson and Lord William Rees-Mogg, published in 1997, predicted how information technology would enable individuals to escape state control. Their vision of cyber-economies operating beyond geographical jurisdiction reads like an agorist manual written by investment bankers. They saw how encryption and digital currencies would render taxation voluntary and nation-states obsolete. However, they focused more on wealthy individuals than on mass counter-economics.
For those interested in the cypherpunk roots of crypto-agorism, "Applied Cryptography" by Bruce Schneier provides the technical foundation for understanding how mathematical principles can enforce contracts and protect privacy without state involvement. While dense with technical details, it demonstrates that cryptography isn't just about hiding secrets but about creating new forms of social organization.
## Your Move
Agorism offers a choice fundamentally different from what the system presents. The state frames your options as obey or rebel, comply or resist, vote or revolt. These false choices keep you trapped in their paradigm, where they define the terms of engagement. Agorism transcends this trap entirely. You don't join agorism like a political party or a revolution. You practice agorism through countless daily decisions that build freedom incrementally.
![alt text](image-22.png)
Every time you choose cash over tracked payments, you deny the surveillance state visibility into your economic life. When you trade directly with neighbors instead of through corporate intermediaries, you build community resilience while avoiding taxes and regulations. Sharing skills outside credentialed systems breaks the knowledge monopolies that keep people dependent. Building solutions rather than begging for reforms creates the parallel institutions that will outlast the dying system. Encrypting communications rather than accepting surveillance as inevitable preserves the privacy necessary for free association. Routing around damage rather than trying to repair a fundamentally broken system acknowledges that some institutions are beyond reform.
The revolution Konkin envisioned is already here, operating in millions of small transactions every day. From the programmer in Pakistan earning Bitcoin for code to the farmer in Vermont selling raw milk to willing customers to the teacher in Detroit offering classes outside the school system, the counter-economy grows. At the same time, the state economy stagnates due to its internal contradictions.
The state wants you to believe that society would collapse without its control, that chaos would reign without its regulations, and that people couldn't possibly cooperate without their coercion. Every agorist transaction proves them wrong. Every peaceful exchange outside their system demonstrates that order emerges from voluntary interaction, not from dictates and threats.
They can't stop what they can't see. They can't tax what they can't track. They can't regulate what they can't find. And most importantly, they can't govern those who have already withdrawn their consent and built something better.
Welcome to the counter-economy. You're already here. Now it's time to build.

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-05-02
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/111"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
---
# Remote anonymous access setup (SSH through tor)

View file

@ -3,6 +3,9 @@ author: nihilist
date: 2024-08-06
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/105"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Clearnet Services
---
# Where to host Anonymous Clearnet Services ?

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-09-05
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/110"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
---
# How to rent remote domains anonymously (Registrar resellers)

View file

@ -3,6 +3,8 @@ author: XMRonly
date: 2024-10-16
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/26"
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
tags:
- Clientside Anonymity
---
# How to Get an Email Account Anonymously (Emails as a Service)

View file

@ -3,6 +3,9 @@ author: prism_breaker
date: null
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/268"
xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa9jSfgyRbNNjswHKTzFVh
tags:
- Clientside Anonymity
- Censorship Evasion
---
# How to get and use residential proxies anonymously
@ -39,10 +42,6 @@ Other useful reference: <https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_b
4. Virtual Machine:[Whonix](../whonixqemuvms/index.md) (that must be dedicated to the (you -> Tor -> residential proxy -> website) setup
## **Proxy Purchase**
_Warning:_ Everything below needs to be done inside the dedicated new whonix workstation VM!

View file

@ -3,6 +3,8 @@ author: Robert
date: 2024-06-08
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/0"
xmr: 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK
tags:
- Deniability Explained
---
# Why isnt Anonymity enough for Sensitive Use?

View file

@ -4,6 +4,9 @@ date: 2025-05-23
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/325"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Self-Hosted
- Contributing to Anonymity
- Core Tutorial
---
# Anonymous Simplex SMP & XFTP Servers setup

View file

@ -4,6 +4,7 @@ date: 2025-05-23
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 42yco9t6qK98N191EZzKJUCH7cit5JT8mBJQvVULEPAPeBHurbFqGj2hK7kaFhqasv8AYLpbuP15Wg5suzyjUd5SMLqabRw
tags:
- Clientside Anonymity
- Core Tutorial
---
# Anonymity - Easy Anonymous Chats Using SimpleX (and onion-only servers)

View file

@ -3,6 +3,8 @@ author: XMRonly
date: 2024-10-13
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/27"
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
tags:
- Clientside Anonymity
---
# How to Receive Anonymous SMSes (Remote SMSes as a Service)

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-08-14
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/87"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Anonymity Explained
---
# Why isnt Privacy enough for Anonymous Use?

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2025-03-15
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/86"
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
tags:
- Anonymity Explained
---
# What is Anonymity ? Why is it Important ?
@ -185,7 +187,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
## **The Enemies of Anonymity: Surveillance, KYC procedures and Centralisation**
![](../su2.png) The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
![](../logos/su2.png) The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
Example:
@ -200,7 +202,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md).
![](../on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
![](../logos/on2.png)The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
Example:
@ -223,7 +225,7 @@ Surveillance CANNOT be tolerated when you want Anonymity. So before you try to l
![](../ce2.png) But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
![](../logos/ce2.png) But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
**There are only 2 possible long-term outcomes for Centralisation** : **
@ -248,9 +250,9 @@ As we have discussed [previously](../governments/index.md), for a government's l
And for the laws to be enforced, governments need:
1. To know what happened (lack of ![](../su0.png)Privacy, using ![](../su2.png)Surveillance )
1. To know what happened (lack of ![](../logos/su0.png)Privacy, using ![](../logos/su2.png)Surveillance )
2. To know who did it (lack of ![](../on0.png)Anonymity, using ![](../on2.png)KYC procedures )
2. To know who did it (lack of ![](../logos/on0.png)Anonymity, using ![](../logos/on2.png)KYC procedures )

View file

@ -3,6 +3,8 @@ author: zl
date: 2025-03-30
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237"
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
tags:
- Anonymity Explained
---
# Why is Metadata detrimental to Anonymity?

View file

@ -4,6 +4,7 @@ date: 2025-04-27
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/221"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Core Tutorial
---
# Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter)

View file

@ -4,6 +4,7 @@ date: 2024-05-02
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/109"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Core Tutorial
---
# Renting Remote VPS Servers Anonymously (non-KYC cloud resellers)

View file

@ -3,6 +3,8 @@ author: nileglorifier
date: 2024-08-18
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/273"
xmr: 84TTjteLVhkYuHosBoc1MjWaB1AmnFSWPgeM7Lts4NdigCmE9ndHTjsXEaxJFTb7JGj55GNERXfnJSFY3J3WE5Ha18BSeS1
tags:
- Clientside Deniability
---
# Hiding files in videos (small or large files) with zuluCrypt

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-04-30
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/67"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- OPSEC Concepts
---
# Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days

BIN
ce0.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.8 KiB

BIN
ce1.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.1 KiB

BIN
ce2.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.4 KiB

View file

@ -3,6 +3,10 @@ author: nihilist
date: 2024-09-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/96"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Anonymity
- Decentralized Finances
- Agorism
---
# Why can't I trust Centralised Exchanges, and random Monero nodes ?

View file

@ -3,6 +3,8 @@ author: XMRonly
date: 2025-04-19
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232"
xmr: 8AHNGepbz9844kfCqR4aVTCSyJvEKZhtxdyz6Qn8yhP2gLj5u541BqwXR7VTwYwMqbGc8ZGNj3RWMNQuboxnb1X4HobhSv3
tags:
- OPSEC Concepts
---
# Public Chats / Private Chats / Anonymous Chats / Deniable Chats

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-12-02
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/169"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Anonymity Explained
---
# Why is the Darknet superior to the Clearnet ?

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-04-29
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/261"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Privacy Explained
---
# Why can't I trust closed source software for Privacy?

View file

@ -3,6 +3,8 @@ author: Mulligan Security
date: 2025-02-06
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/36"
xmr: 86NCojqYmjwim4NGZzaoLS2ozbLkMaQTnd3VVa9MdW1jVpQbseigSfiCqYGrM1c5rmZ173mrp8RmvPsvspG8jGr99yK3PSs
tags:
- Serverside Deniability
---
# **When the Adversary is the cloud provider himself**

BIN
co0.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.3 KiB

BIN
co1.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.3 KiB

BIN
co2.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.3 KiB

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-06-28
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/79"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Privacy
---
# How to compile open source software + How to verify software integrity

View file

@ -3,14 +3,16 @@ author: nihilist
date: 2025-04-03
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/275"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Contribute
---
# How to become a Contributor
In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via Forgejo.
In this tutorial we're going to look at how you can contribute to The Opsec Bible, we'll look into how the work is being organized, and how to contribute via Forgejo.
## The Nihilism Blog Organisation
## The Opsec Bible Organisation
First of all, to know what tutorials we'd like to have completed, check out our [Opsec Forgejo Project board](http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/projects/1):

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2025-04-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Contribute
---
# How to write good Criticism
@ -84,7 +86,7 @@ Don't just contradict what we say, bring reasoning, arguments, logic, data and l
![](2.png)
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec blog like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec Bible like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
![](5.png)

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2025-01-25
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/266"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Anonymity Explained
---
# How to explore the Darknet? (Visibility and Discoverability)

View file

@ -3,6 +3,9 @@ author: nihilist
date: 2025-01-26
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/267"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Contributing to Anonymity
---
# How to run your own Darknet Lantern for Visibility and Discoverability
@ -280,7 +283,7 @@ Also, **please categorize links by their utility instead of trying to categorize
Is the website sensitive ? (ex: related to drugs) (y/n) n
[+] Add a new Website entry (into unverified.csv)
What is the Website name ? The Nihilism Blog
What is the Website name ? The Opsec Bible
What is the website Category ? Blogs
What is the website URL ? blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion
Description for the website ? (Optional)

BIN
de0.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.8 KiB

BIN
de1.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.2 KiB

BIN
de2.png

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.8 KiB

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-05-01
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/271"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Deniability Explained
---
# What is Plausible Deniability ? Why is it Important ?

View file

@ -3,6 +3,9 @@ author: nothing@nowhere
date: 2024-05-28
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/112"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
- Clearnet Services
---
# bind9 DNS setup

View file

@ -3,6 +3,8 @@ author: cynthia
date: 2025-06-05
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/311"
xmr: 84ybq68PNqKL2ziGKfkmHqAxu1WpdSFwV3DreM88DfjHVbnCgEhoztM7T9cv5gUUEL7jRaA6LDuLDXuDw24MigbnGqyRfgp
tags:
- Clientside Privacy
---
# DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?

119
docker-tor/index.md Normal file
View file

@ -0,0 +1,119 @@
---
author: Anonymous
date: 2025-01-31
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
---
# How to use Docker containers on the whonix workstation
## How to install Docker
As usual we install docker via apt like so:
```sh
[workstation user ~]% sudo apt install docker.io docker-compose -y
```
## How to make sure that Docker pulls images through Tor
```sh
[workstation user ~]% sudo docker pull alpine
Using default tag: latest
Error response from daemon: Get "https://registry-1.docker.io/v2/": dial tcp: lookup registry-1.docker.io on 10.152.152.10:53: read udp 10.152.152.11:33883->10.152.152.10:53: i/o timeout
zsh: exit 1 sudo docker pull alpine
```
Here as you can see when we try to pull an alpine image, docker can't pull it, to fix that we need to make sure that docker pulls through the localhost tor socks5 proxy on port 9050:
```sh
[workstation user ~]% sudo mkdir /etc/systemd/system/docker.service.d/
[workstation user ~]% sudo vim /etc/systemd/system/docker.service.d/proxy.conf
[workstation user ~]% cat /etc/systemd/system/docker.service.d/proxy.conf
[Service]
Environment="HTTP_PROXY=socks5://127.0.0.1:9050"
Environment="HTTPS_PROXY=socks5://127.0.0.1:9050"
```
Now that's created, we reload the systemd service and try to pull the alpine docker image again:
```sh
[workstation user ~]% sudo systemctl daemon-reload
[workstation user ~]% sudo systemctl restart docker
[workstation user ~]% docker pull alpine
Using default tag: latest
permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.24/images/create?fromImage=alpine&tag=latest": dial unix /var/run/docker.sock: connect: permission denied
zsh: exit 1 docker pull alpine
[workstation user ~]% sudo !!
[workstation user ~]% sudo docker pull alpine
Using default tag: latest
latest: Pulling from library/alpine
fe07684b16b8: Pull complete
Digest: sha256:8a1f59ffb675680d47db6337b49d22281a139e9d709335b492be023728e11715
Status: Downloaded newer image for alpine:latest
docker.io/library/alpine:latest
```
And that's it! we managed to pull the alpine image as intended.
## Sidenotes
1) you can't connect to the internet from a docker container that is in a whonix workstation, and the [whonix developers won't bother providing support for it](https://forums.whonix.org/t/how-can-you-make-a-docker-container-inside-whonix-workstation-connect-to-the-internet/21772/2)
2) disabling the whonix firewall does not fix the issue either
3) you cant edit the socsk5 port on whonix workstation by editing /etc/tor/torrc to try and set SOCKSPort to 0.0.0.0:9050, which would make it easy to access the tor socks port from the docker container.
3) you can make a docker-compose.yml image with the docker container set to network_mode: host to be able to access the 9050 socks5 port on the 10.152.152.11 local IP, but it doesnt seem to be able to resolve domains either for some reason.
```
[workstation user ~]% cat docker-compose.yml
services:
myalpine:
image: alpine
tty: true
network_mode: host
environment:
- 'HTTP_PROXY=socks5://host.docker.internal:9050'
- 'HTTPS_PROXY=socks5://host.docker.internal:9050'
extra_hosts:
- host.docker.internal:host-gateway
[workstation user ~]% sudo docker-compose down ; sudo docker-compose up -d
Stopping user_myalpine_1 ... done
Removing user_myalpine_1 ... done
Creating user_myalpine_1 ... done
[workstation user ~]% sudo docker container ls
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
0752ecb83c6b alpine "/bin/sh" 43 seconds ago Up 42 seconds user_myalpine_1
[workstation user ~]% sudo docker exec -it 0752 sh
[workstation user ~]% sudo docker exec -it 0752 sh
/ # ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP qlen 1000
link/ether 52:54:00:e8:c3:50 brd ff:ff:ff:ff:ff:ff
inet 10.152.152.11/18 brd 10.152.191.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fee8:c350/64 scope link
valid_lft forever preferred_lft forever
3: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN
link/ether 02:42:8c:ad:6a:cd brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
inet6 fe80::42:8cff:fead:6acd/64 scope link
valid_lft forever preferred_lft forever
15: br-973a58a1c943: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN
link/ether 02:42:35:83:6e:bc brd ff:ff:ff:ff:ff:ff
inet 172.19.0.1/16 brd 172.19.255.255 scope global br-973a58a1c943
valid_lft forever preferred_lft forever
inet6 fe80::42:35ff:fe83:6ebc/64 scope link
valid_lft forever preferred_lft forever
/ # nc 10.152.152.11 -p 9050
nc: bind: Address in use
```
4) tested with a forgejo container, with the socks5 proxy set onto 10.152.152.11 on port 9050, it is unable to mirror repositories that are on external clearnet git instances.
TLDR: if you run a docker container inside of a whonix workstation VM, it will remain truly isolated and unable to communicate with the internet.

BIN
duresspin/0.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

BIN
duresspin/1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 68 KiB

BIN
duresspin/2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.9 KiB

BIN
duresspin/3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.6 KiB

BIN
duresspin/4.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.4 KiB

BIN
duresspin/5.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.6 KiB

BIN
duresspin/6.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.8 KiB

BIN
duresspin/7.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.7 KiB

97
duresspin/index.md Normal file
View file

@ -0,0 +1,97 @@
---
author: XMRonly
date: 2025-06-22
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/331"
xmr: 86XU71dRkBcA1FmPeHf2UK9UQBy7c5KXKbUwkTZCry1G8MENNnp3jQnWYG3LdR5rQwEXJxTYXJBXcWupQAmb86RMGQ1DksF
---
# GrapheneOS Duress PIN
![](0.png)
## Introduction
As discussed previously on this blog, using a VeraCrypt hidden volume is an ideal way to [plausibly deny](../veracrypt/index.md) the existence of certain materials. On mobile phones, however, this is not possible since VeraCrypt does not (yet) support mobile platforms. We must therefore seek an alternative tool to have plausible deniability over any materials we do not wish to expose in case of an emergency. One such alternative is the Duress PIN feature on GrapheneOS. Quoting from [https://grapheneos.org](https://grapheneos.org/features#duress):
>GrapheneOS provides users with the ability to set a duress PIN/Password that will irreversibly wipe the device (along with any installed eSIMs) once entered anywhere where the device credentials are requested (on the lockscreen, along with any such prompt in the OS).
The Duress PIN feature works seamlessly and as expected: upon entering the Duress PIN, the device is immediately wiped and the process is uninterruptible. There is no phone reset required nor any fumbling around with the bootloader in order for this to work. In this tutorial, we will explore how to set up and use the GrapheneOS Duress PIN feature, and how possible scenarios may play out when forced to unlock your phone against your will.
## Setup
Before setting up a Duress PIN, we will first need to set a PIN code for unlocking the phone. This is found under **Settings > Security & privacy > Device unlock > Screen lock**. Assuming this has already been set up, we can move to setting up a Duress PIN. Navigate to **Settings > Security & privacy > Device unlock > Duress password**. You will be prompted to enter your lock screen PIN to authenticate.
![](1.png)
We are now presented with a screen detailing the features of the Duress password. Click on "+ Add duress PIN and password". As noted in the text on screen, we will be entering both a numeric duress PIN and an alphanumeric duress password. Entering either one of these when prompted will trigger the duress feature wiping all data from the device.
![](2.png)
We now proceed to fill out the duress PIN and duress password on screen and then click Add to finalize our input.
![](3.png)
We proceed past the final warning and our setup is complete.
![](4.png)
We can always update or remove our duress PIN and password by navigating back to **Settings > Security & privacy > Device unlock > Duress password**.
![](5.png)
To use the duress PIN, you simply enter it on any screen where the device credentials are requested by the GrapheneOS operating system. This will work from the lock screen, which most users would be familiar with, but also from other functions such as setting the Fingerprint Unlock function under **Settings > Security & privacy > Device unlock > Fingerpint Unlock** (remember how we were prompted to first authenticate before being able to set a Duress PIN? It's the same procedure here).
If you were to set your duress PIN the same as the lock screen PIN code for unlocking the phone, you don't need to worry about accidentally wiping your device because the PIN code takes priority over the duress PIN. Entering it would only unlock the phone as normal.
## Considerations
Using your duress PIN in a confrontational scenario with law enforcement (LE) may have negative consequences based on your jurisdiction. It is therefore important to carefully assess the circumstances of the situation.
Depending on your jurisdiction, inputting a duress PIN may be seen as tampering with evidence, destroying evidence or contempt of court, which could carry fines or prison sentences. This is clearly undesirable, although it may potential be a lesser offense then the offenses brought about by LE actually finding the materials concealed on your phone.
As a general precaution, using a long and difficult to guess PIN code is recommended over using your fingerprint. This is because in the United States, the [Electronic Frontier Foundation](https://www.eff.org/deeplinks/2020/06/protecting-your-privacy-if-your-phone-taken-away) has noted that:
>Some courts have found that you can be forced to unlock a phone protected with a biometric such as face or fingerprint identification without your consent, so it is advised to not enable either option.
The EFF additionally [notes](https://www.eff.org/deeplinks/2020/06/surveillance-self-defense-attending-protests-age-covid-19) that:
>Under current U.S. law—which is still in flux—using a memorized passcode generally provides a stronger legal footing to push back in court against compelled device unlocking/decryption.
It might be worthwhile to consider **writing your duress PIN on a piece of paper and placing this paper in your phone case**. Should anyone find your phone or compel you to give it to them, they may inadvertedly enter your duress PIN thinking you were forgetful and had to write down you PIN.
## Scenario
You're at home minding your own business, when the adversary suddenly breaks down your door, arresting you and seizing all of your electronic devices. You are then taken to the police station. If you are in a jurisdiction that allows for it, [don't talk to the police](https://youtu.be/d-7o9xYp7eE), ask for a lawyer, then [shut the fuck up](https://files.catbox.moe/h7kpp5.mp4).
If you are not in such a jurisdiction, you may be forced to unlock your phone under threats of physical violence.
>LE: What's the code to your phone?!
>You: I think my phone's on the fritz officer, it's not really working lately...
>LE: Shut up! Open it NOW!!
>You: OK, whatever you say officer...
You enter the duress PIN. The screen briefly displays a message saying "Wrong PIN" then powers off the device.
![](6.png)
>LE: What the fuck?
>You: Yeah officer, I told you it's been acting up lately...
Powering the phone back on will cause it to boot as normal before finally arriving at the GrapheneOS Recovery screen.
![](7.png)
The irreversible wipe has just occurred and all data and eSIMS are unrecoverable. The only thing that can be done is a factory reset. This can be done by navigating down to "Factory data reset" using the volume keys on the phone and clicking the power button to select that option. After allowing some time for the installation to complete, the phone is loaded with a fresh install of GrapheneOS.
## Conclusion
We've seen how to set up and use the GrapheneOS duress PIN feature. Due to the possible consequences of using the duress PIN for tampering with or destroying evidence in an adversarial scenario, this should be reserved as a last resort option if you have no other choice.
##### Disclaimer
This blog's [stance](../stancesensitive/index.md) is to not endorse sensitive activities and nothing in this article serves as legal advice.

View file

@ -4,6 +4,8 @@ date: 2024-04-13
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/178"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Deniability
- High Availability
- Core Tutorial
---
# EndGame V3 Setup

Binary file not shown.

Before

Width:  |  Height:  |  Size: 273 KiB

After

Width:  |  Height:  |  Size: 23 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 70 KiB

After

Width:  |  Height:  |  Size: 33 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 164 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Before After
Before After

View file

@ -3,6 +3,8 @@ author: Crabmeat
date: 2025-06-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/345"
xmr: 89aWkJ8yabjWTDYcHYhS3ZCrNZiwurptzRZsEpuBLFpJgUfAK2aj74CPDSNZDRnRqeKNGTgrsi9LwGJiaQBQP4Yg5YtJw2U
tags:
- Anarchy
---
# **Everyone is a criminal**

Binary file not shown.

Before

Width:  |  Height:  |  Size: 96 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 62 KiB

After

Width:  |  Height:  |  Size: 8.1 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 42 KiB

After

Width:  |  Height:  |  Size: 22 KiB

Before After
Before After

View file

@ -4,6 +4,9 @@ date: 2024-04-06
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/274"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Deniability
- Self-Hosted
- High Availability
- Core Tutorial
---
# Electrical Failover (basic UPS setup)

BIN
file-verification/19.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 356 B

View file

@ -3,6 +3,8 @@ author: Doctor Dev
date: 2025-05-22
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/310"
xmr: 89g3MMq1mo9C5C4vDisyAoCU5GuukXJ2FedUwyLXJWpmTsKHdi1rCPZaeT1d9V4NViTTXyaL9qtKzSbVdKGdEghhCH5oRiT
tags:
- Clientside Privacy
---
# File Verification
@ -186,6 +188,81 @@ Now after this process you have ended with an hash that you authenticated, you c
Now after this process you have ended with an hash that you authenticated, you can use this hash with the file verification process to finish and verify the origin of the file downloaded.
#### Minisign (CLI)
For this example, we'll be showing both sides (the project maintainer and user)
Both sides must have Minisign installed
```bash
root@localhost:~# apt install minisign
```
##### Maintainer
1. The maintainer generates their own key-pair for signing releases. This may prompt for a password to encrypt the secret key.
```bash
maintainer@localhost:~$ minisign -G
Please enter a password to protect the secret key.
Password:
Password (one more time):
Deriving a key from the password in order to encrypt the secret key... done
The secret key was saved as /home/maintainer/.minisign/minisign.key - Keep it secret!
The public key was saved as minisign.pub - That one can be public.
Files signed using this key pair can be verified with the following command:
minisign -Vm <file> -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
```
The public key (which in this case is `RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI`) can be shared with others on a site, or where-ever the downloads are hosted. It can even be shared as a QR code or on the phone thanks to how small it is.
```bash
maintainer@localhost:~$ sudo apt install qrencode
maintainer@localhost:~$ qrencode -o pubkey_qr.png RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
```
![](19.png)
2. The maintainer generates a checksum file of the latest binary release, We'll be using SHA-512 for this.
```bash
maintainer@localhost:~$ sha512sum program > SHA512SUMS
```
3. The maintainer signs the checksum file with their Minisign key.
```bash
maintainer@localhost:~$ minisign -S -m SHA512SUMS
Password:
Deriving a key from the password and decrypting the secret key... done
```
##### User
1. The user downloads the program, the SHA512 checksum file, and the signature of that file.
2. The user verifies the Minisign signature with the public key.
If it's a good signature, Minisign's output may be something like this:
```bash
user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
Signature and comment signature verified
Trusted comment: timestamp:1750090525 file:SHA512SUMS hashed
```
However, if it's a **bad signature**, Minisign's output may be something like this instead:
```bash
user@localhost:~$ minisign -Vm SHA512SUMS -P RWQDhZjc3QZsu74vMEd2MGRi0eYv3PXIVQGMSx+lQL1iVptYFn7p2GeI
Signature verification failed
```
3. The user verifies the SHA-512 checksum file with the program, like normal
-----
### **Zero Trust Policy**
#### **!!! Important !!!**
@ -207,21 +284,3 @@ In this game its all about who has the better chances, no such thing as 100%, th
- <b>building projects</b> - Taking the source code and building your own program, this is completely the best zero trust policy existing for software(especially if you know programming languages).
check this [post](../compilation/index.md) to know more
## **Other Usage of PGP Keys**
- <b>Git Commit Verification</b>
- <b>Encrypting Emails</b>
- <b>General Encryption</b>
- <b>SSH Authentication</b>
## **Finishing words**
The dark web its a big place with all the varieties of personalities, from good to bad, from smart to dumb, from kids to adults, you should always keep yourself safe here.
opsec is important, don't take it lightly, at the end you are your only security.
Be wary!, Be Paranoid!, Be Invisible!

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-11-23
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/270"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Serverside Anonymity
---
# Forgejo .onion Setup (Anonymous Code Repositories and Collaboration)
@ -276,8 +278,14 @@ Now in order to make sure our Forgejo instance is able to mirror external git re
→ cat gitea/gitea/conf/app.ini | tail -n 4
[proxy]
PROXY_ENABLED = true
PROXY_URL = **socks://tor-forgejo:9050/**
PROXY_URL = socks5://tor-forgejo:9050/
PROXY_HOSTS = *
[migrations]
ALLOW_LOCALNETWORKS = true
SKIP_TLS_VERIFY = true
ALLOWED_DOMAINS = *
BLOCKED_DOMAINS =
[ Datura ] [ /dev/pts/13 ] [/srv/forgejo_onion]
→ docker-compose down ; docker-compose up -d
@ -286,6 +294,8 @@ Now in order to make sure our Forgejo instance is able to mirror external git re
And now from there, we should be able to mirror external repositories on gitea by making the traffic go through Tor aswell. As an example, let's create a git mirror of the official [Monero](../monero2024/index.md) repository that currently sits on [Github](https://github.com/monero-project/monero):
**SIDENOTE:** [you can't mirror clone repositories that are on other forgejo onion-only instances](https://codeberg.org/forgejo/forgejo/issues/8193) due to an upstream issue in [curl](https://github.com/curl/curl/issues/17363) So in the meantime, you can only use the mirror function to clone other clearnet repositories.
![](9.png) ![](10.png) ![](11.png)
Now be aware that it's going to take longer than it usually would to get the repository due to the low bandwidth that Tor has, so be be patient and wait until it finishes:
@ -348,7 +358,7 @@ Then we can proceed with the rest of the instructions to push the commit to the
→ git remote add origin http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion/nihilist/my-very-cool-repository.git
[ mainpc ] [ /dev/pts/9 ] [~/Documents/my-very-cool-repository]
**torsocks git push -u origin main**
→ torsocks git push -u origin main
Username for 'http://daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion': nihilist
Password for 'http://nihilist@daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion':
Enumerating objects: 3, done.
@ -463,14 +473,9 @@ Next, if you want a custom CSS theme like the one i have, **first be aware that
→ cd css
[ Datura ] [ /dev/pts/6 ] [public/assets/css]
→ wget https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
--2024-11-23 20:25:50-- https://git.nowhere.moe/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
Resolving git.nowhere.moe (git.nowhere.moe)... 65.109.30.253
Connecting to git.nowhere.moe (git.nowhere.moe)|65.109.30.253|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 22754 (22K) [text/plain]
Saving to: theme-space.css
→ torsocks wget http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
--2024-11-23 20:25:50-- http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/Datura-Network/raw/branch/main/2-Decentralization/gitea/gitea/gitea/public/assets/css/theme-space.css
theme-space.css 100%[=================================================>] 22.22K --.-KB/s in 0s
2024-11-23 20:25:50 (310 MB/s) - theme-space.css saved [22754/22754]

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-06-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/68"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- OPSEC Concepts
---
# Governments, Centralisation, and Law Enforcement
@ -48,9 +50,9 @@ Businesses are centralised entities just like governments, they ALL can act as p
For the Law to be enforceable the authorities need to know 2 things:
1. ![](../su2.png)What happened ? (lack of Privacy)
1. ![](../logos/su2.png)What happened ? (lack of Privacy)
2. ![](../on2.png)Who did it ? (lack of Anonymity)
2. ![](../logos/on2.png)Who did it ? (lack of Anonymity)
![](3.png)
@ -61,9 +63,9 @@ That is the basis of this whole Privacy and Anonymity talk. In short, For the la
Modern governments know this very well, and some go to extreme lengths to make sure that every citizen is under surveillance.
1. USA: [Edward Snowden's Revelations](https://iv.nowhere.moe/watch?v=9g_sqKH2z4I)
1. USA: [Edward Snowden's Revelations](https://youtube.com/watch?v=9g_sqKH2z4I)
2. China: [the Surveillance State](https://iv.nowhere.moe/watch?v=Np_C8647mK8) \- [See what it can lead to](https://iv.nowhere.moe/watch?v=v7AYyUqrMuQ)
2. China: [the Surveillance State](https://youtube.com/watch?v=Np_C8647mK8) \- [See what it can lead to](https://youtube.com/watch?v=v7AYyUqrMuQ)

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-06-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/69"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- OPSEC Concepts
---
# Governments fear Decentralisation and Anonymity

View file

@ -3,6 +3,8 @@ author: nihilist
date: 2024-07-10
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/78"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Privacy
---
# How to have Privacy on your Phone (GrapheneOS)

View file

@ -3,6 +3,10 @@ author: nihilist
date: 2024-05-19
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/97"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Anonymity
- Decentralized Finances
- Agorism
---
# Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)

View file

@ -3,6 +3,10 @@ author: nihilist
date: 2024-05-19
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/99"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Anonymity
- Decentralized Finances
- Agorism
---
# Haveno DEX Cash by Mail -> XMR transaction

View file

@ -5,6 +5,9 @@ gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Core Tutorial
- Clientside Anonymity
- Decentralized Finances
- Agorism
---
# Haveno DEX Direct Fiat to Monero transactions

View file

@ -3,6 +3,10 @@ author: nihilist
date: 2025-02-05
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
tags:
- Clientside Anonymity
- Decentralized Finances
- Agorism
---
# Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)

Some files were not shown because too many files have changed in this diff Show more