add context to tutorials

This commit is contained in:
nihilist 2024-07-31 23:07:35 +02:00
parent 03bbc48250
commit d8fdd85e9e
15 changed files with 127 additions and 6 deletions

View File

@ -122,6 +122,7 @@
<li><a href="compilation/index.html">✅ How to compile open source software + How to verify software integrity </a></li>
<li><a href="hypervisorsetup/index.html">✅ How to Virtualize Machines (QEMU/KVM Hypervisor)</a></li>
<li><a href="vpn/index.html">✅ How to get privacy from your ISP using a VPN</a></li>
<li><a href="vpn/index.html">❌ Route QEMU VMs network through a VPN (from the Host OS)</a></li>
<li><a href="passwordmanagement/index.html">✅ Password Management 101 (How to use Keepass)</a></li>
<li><a href="serversideencryption/index.html">✅ Serverside: Should I trust serverside encryption? Should I use PGP?</a></li>
<li><a href="pgp/index.html">✅ Private Messaging (PGP encryption)</a></li>
@ -164,7 +165,7 @@
</ol></br>
<p>💻 Clientside - Getting Started (<a href="torthroughvpn/index.html">⚠️ Check if your ISP allows Tor or Not!</a>)</p>
<ol>
<li><a href="torbrowsing/index.html">🟠 Tor Web Browser setup</a></li>
<li><a href="torbrowsing/index.html"> Tor Web Browser setup</a></li>
<li><a href="tailsqemuvm/index.html">🟠 Tails OS QEMU VM for Temporary Anonymity</a></li>
<li><a href="whonixqemuvms/index.html">🟠 VMs for Long-term Anonymity (Whonix QEMU VMs)</a></li>
@ -207,7 +208,7 @@
<li><a href="anon.html">❌ Haveno Seed Node</a></li>
</ol></br>
<p>🧅 Serverside - Onion Services (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<p>🧅 Serverside - Self-Hosting Hidden Services (⚠️ <a href="sensitiveremotevshome/index.html">Self-Hosting = Non-Sensitive!</a>)</p>
<ol>
<li><a href="torwebsite/index.html">🟠 .onion website with custom .onion Vanity V3 address</a></li>
<li><a href="anon.html">❌ Basic Webserver setup (NGINX / PHP / MYSQL)</a></li>
@ -219,7 +220,7 @@
<li><a href="anon.html">❌ Discourse .onion setup (Forums)</a></li>
</br>
</ol></br>
<p>🧅 Serverside - Anonymous Clearnet Services (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<p>🧅 Serverside - Remote Clearnet Services (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<ol>
<li><a href="anonymousremoteserver/index.html">✅ How to rent remote servers anonymously (Cloud resellers) ⭐</a></li>
<li><a href="anonaccess/index.html">✅ Remote anonymous access setup (cockpit + ssh through tor)</a></li>

View File

@ -62,6 +62,13 @@
<div class="col-lg-8 col-lg-offset-2">
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-28</ba></p>
<h1>How to compile open source software + How to verify software integrity </h1>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : PC / Laptop / Homeserver / Remote Server</p></li>
<li><p>OS : <a href="../linux/index.html">Linux</a></p></li>
</ol>
<p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->

View File

@ -66,6 +66,13 @@
<p>In this tutorial we're going to setup graphene OS, an open source android operating system for google pixel phones. (Yes google phones, if you don't like it then you'll have to wait for functionnal <a href="../openhardware/index.html">open hardware</a> alternatives to arrive on the market.) Currently GrapheneOS is one of the most privacy-focused mobile operating systems given that it's fully <a href="https://grapheneos.org/source">open source</a>. and that they refuse to implement google services by default, unlike their competitors like LineageOS.</p>
<p><u>DISCLAIMER:</u> yes the quality of the photos taken are garbage :)</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Phone (google Pixel model))</p></li>
</ol>
<p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->

View File

@ -65,6 +65,16 @@
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to cover how the Haveno DEX handles trade disputes, which can happen as, after all it's decentralised, and anonymous by default.</p>
<p>Check out <a href="../haveno-client-f2f/index.html">this tutorial</a> if you want to know how to install Haveno DEX on your device.</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
<li><p>Application: <a href="../hypervisorsetup/index.html">Haveno DEX Setup</a> </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, either for <a href="../privacy/index.html">Private use</a>, or <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)</p>
</div>
</div><!-- /row -->
@ -82,6 +92,7 @@
<img src="1.png" class="imgRz">
<p>In short, <b>both Bob and Alice need to put some XMR into the trade initially, so that if they try to scam each other, they will loose something in the process.</b></p>
<p>In this example, The trade will go wrong as <b>Bob will try to scam Alice with an invalid Amazon giftcard code</b>.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->

View File

@ -65,6 +65,16 @@
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to cover how to buy Monero, for cash by mail on the Haveno Decentralised Exchange. This was the most popular payment method back on LocalMonero, due to being an improvement over <a href="../haveno-sepa/index.html">bank transfers (like SEPA in the EU)</a> when it comes to trading larger volumes in the long run, as <b>Cash cannot easily be traced by adversaries unlike bank transfers</b>, making Cash by Mail one of the most private ways to exchange real world money for Monero.</p>
<img src="0.1.png" class="imgRz">
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
<li><p>Application: <a href="../hypervisorsetup/index.html">Haveno DEX Setup</a> </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, either for <a href="../privacy/index.html">Private use</a>, or <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)</p>
</div>
</div><!-- /row -->

View File

@ -62,6 +62,7 @@
<div class="col-lg-8 col-lg-offset-2">
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-05-14</ba></p>
<h1>Haveno DEX Direct Fiat to Monero transactions</h1>
<p>TODO: need context (private / anonymous use)</p>
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to cover how to do a Fiat to Monero trade from the brand new (and long awaited!) <b>Haveno Decentralised Exchange</b>, using the Face-to-Face (F2F) payment method.</p>
<img src="0.1.png" class="imgRz">
@ -75,6 +76,15 @@
<p>You can check out my quick coverage of Haveno DEX on Monero Topia <a href="https://iv.datura.network/watch?v=hWcwin8bDpc&t=1h9m11s">here</a>. (Definitely check out MoneroTopia for the latest news in the Monero world, awesome show!)</p>
<p><b>DISCLAIMER: THERE ARE NO OFFICIAL HAVENO NETWORK INSTANCES, THERE ARE ONLY THIRD PARTY HAVENO NETWORKS LIKE <a href="https://monero.town/post/3143272">HAVENO RETO</a>.</b></p>
<p><b> IF YOU SEE A HAVENO CLAIM TO BE THE OFFICIAL NETWORK <a href="https://monero.town/post/3260716">LIKE THIS ONE</a>, DONT FALL FOR THEIR SCAM!</b></p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, either for <a href="../privacy/index.html">Private use</a>, or <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)</p>
</div>
</div><!-- /row -->

View File

@ -78,6 +78,16 @@ If you get banned from a physical bank, they may put your name on a fraud regist
</pre></code>
<p>In short, keep in mind that this may not be a reliable way to purchase monero in the long run especially if you do large transactions each time. (thanks xmrfamily for the infos)</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
<li><p>Application: <a href="../hypervisorsetup/index.html">Haveno DEX Setup</a> </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, either for <a href="../privacy/index.html">Private use</a>, or <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)</p>
</div>
</div><!-- /row -->

View File

@ -65,6 +65,13 @@
<img src="999.png" style="width:250px">
<p>In this tutorial we're going to cover how to setup the open source hypervisor QEMU/KVM in <a href="../linux/index.html">Linux</a> host OS, using the libvirt technology.</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : PC / Laptop / Homeserver / Remote Server</p></li>
<li><p>Host OS : <a href="../linux/index.html">Linux</a></p></li>
</ol>
<p>I recommend using this setup first of all to <b>isolate your Public use</b>, and to <b>segment it from the other Uses</b> such as <a href="../privacy/index.html">Private use</a>, but it can later be used for <a href="../anonymityexplained/index.html">Anonymous use</a>, and also <a href="../encryption/index">Sensitive Use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->

View File

@ -64,6 +64,12 @@
<h1>How to install Linux from a Windows PC </h1>
<img src="0.png" style="width:250px">
<p>In this tutorial, we're going to look at the first and foremost thing anyone can do to remove surveillance from their digital lives, by installing a free and open source software (FOSS) host operating system: Linux, in this case we're going to setup the latest Debian.</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
</ol>
<p>I recommend using this setup on your main PC, laptop, but also as a home server or a remote server. For <a href="../privacy/index.html">Privacy use</a>, and potentially <a href="../anonymityexplained/index.html">Anonymous use</a> if you implement the correct technology for it later on, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->

View File

@ -64,6 +64,13 @@
<h1>How to install and update programs on Linux </h1>
<img src="0.png" style="width:250px">
<p>In this tutorial, we're going to take a look at how you can install and update your programs on linux:</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : PC / Laptop / Homeserver / Remote Server</p></li>
<li><p>OS : <a href="../linux/index.html">Linux</a></p></li>
</ol>
<p>I recommend using this setup for <a href="../privacy/index.html">Private use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->

View File

@ -64,6 +64,15 @@
<h1>How to acquire and use Monero </h1>
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to take a look at how to setup a monero wallet locally, how to recieve some monero there, and how to send monero to someone else.</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, either for <a href="../privacy/index.html">Private use</a>, or <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->

View File

@ -64,7 +64,16 @@
<h1>Tails OS QEMU VM for Temporary Anonymity </h1>
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to look at how you can run Tails OS (The Amnesic Incognito Linux System) in a QEMU VM, following the official documentation <a href="https://tails.net/doc/advanced_topics/virtualization/virt-manager/index.en.html">here</a>. </p>
<p>TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Application: <a href="../anon.html">Host-based VPN</a> (if your ISP doesn't allow Tor traffic) </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, for <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p>TODO: force a VPN through Tor</p>
</div>

View File

@ -64,7 +64,16 @@
<h1>Tor Browsing Setup </h1>
<img src="0.jpeg" style="width:250px">
<p>In this tutorial we're going to cover how to browse the web anonymously, and some simple rules to follow to protect your anonymity. </p>
<p>TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Virtual Machine: <a href="../hypervisorsetup/index.html">Linux</a> or <a href="../whonixqemuvms/index.html">Whonix</a> or <a href="../tailsqemuvm/index.html">Tails</a> </p></li>
<li><p>Application: <a href="../vpn/index.html">VPN</a> (if your ISP doesn't allow Tor traffic) </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, for <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
</div>
</div><!-- /row -->

View File

@ -62,6 +62,15 @@
<div class="col-lg-8 col-lg-offset-2">
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-27</ba></p>
<h1>How to get privacy from your ISP using a VPN </h1>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : PC / Laptop / Homeserver / Remote Server</p></li>
<li><p>Host OS : <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>VM : <a href="../hypervisor/index.html">Linux</a></p></li>
</ol>
<p>I recommend to use that setup as part of your <a href="../privacy/index.html">Privacy Use</a> online, to hide what you are browsing online from your ISP</p>
</div>
</div><!-- /row -->

View File

@ -64,7 +64,16 @@
<h1>Whonix QEMU Setup </h1>
<img src="0.png" style="width:250px">
<p>Whonix is an open-source OS made specifically for general anonymous activities. In this tutorial we're going to set it up using the QEMU virtualization setup we installed previously.</p>
<p>TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic</p>
<p><h2><u>OPSEC Recommendations:</u></h2></p>
<ol>
<li><p>Hardware : (Personal Computer / Laptop)</p></li>
<li><p>Host OS: <a href="../linux/index.html">Linux</a></p></li>
<li><p>Hypervisor: <a href="../hypervisorsetup/index.html">libvirtd QEMU/KVM</a></p></li>
<li><p>Application: <a href="../anon.html">Host-based VPN</a> (if your ISP doesn't allow Tor traffic) </p></li>
</ol>
<p>I recommend using this setup into one of the above mentionned VMs, for <a href="../anonymityexplained/index.html">Anonymous use</a>, as per the <a href="../opsec4levels/index.html">4 basic OPSEC levels</a>.</p>
<p>TODO: force a VPN through Tor</p>
</div>