updatd list of tutorials, with latest brainstorm

This commit is contained in:
nihilist 2024-09-15 14:06:09 +02:00
parent 027cc32a25
commit 60595ecb63
3 changed files with 42 additions and 20 deletions

View File

@ -114,7 +114,11 @@
</ol></br>
<p>💻 File Sharing</p>
<ol>
<li><a href="index.html">❌ One on One large file sharing (Syncthing over VPN)</a></li>
<li><a href="index.html">❌ P2P large file sharing (Torrents over VPN)</a></li>
</ol></br>
</div>
<div style="float: right; width: 50%;">
<p>💻 Privacy means Open Source (FOSS)</p>
@ -127,6 +131,7 @@
<li><a href="serversideencryption/index.html">✅ Serverside: Should I trust serverside encryption? Should I use PGP?</a></li>
<li><a href="pgp/index.html">✅ Private Messaging (PGP encryption)</a></li>
</ol></br>
<p>⚠️ Miscellaneous - In real life</p>
<ol>
<li><a href="index.html">❌ Hide the contents of a mail package</a></li>
@ -154,8 +159,8 @@
<li><a href="anonuse/index.html">✅ Why isn't Privacy enough for Anonymous use ? </a></li>
<li><a href="torvsvpns/index.html">✅ The main source of Anonymity: The Tor Network</a></li>
<li><a href="torthroughvpn/index.html">✅ Using Tor Safely: Tor through VPN or VPN through Tor ? </a></li>
<li><a href="anonpersona/index.html">🟠 Shifting from a public to an Anonymous online persona</a></li>
<li><a href="phonenumbers/index.html">🟠 Phone Numbers are incompatible with Anonymity</a></li>
<li><a href="index.html">❌ Stylography protection (Running a Local LLM and copy pasting messages)</a></li>
</ol></br>
<p>💻 Clientside - Getting Started (<a href="torthroughvpn/index.html">⚠️ Check if your ISP allows Tor or Not!</a>)</p>
@ -164,10 +169,15 @@
<li><a href="MobileTor/index.html">✅ How to use the Tor Browser on Mobile</a></li>
<li><a href="tailsqemuvm/index.html">✅ Tails OS QEMU VM for Temporary Anonymity</a></li>
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a></li>
<li><a href="index.html">❌ How to send files Anonymously (Onionshare)</a></li>
</ol></br>
<p>💻 File Sharing</p>
<ol>
<li><a href="index.html">❌ How to send small files Anonymously (Onionshare)</a></li>
<li><a href="index.html">❌ One on One large file sharing (Syncthing over Tor)</a></li>
<li><a href="index.html">❌ P2P large file sharing (Torrents over i2p or Tor)</a></li>
</ol></br>
<p>💻 Clientside - Decentralized Finances ⭐</p>
@ -261,27 +271,15 @@
<ol>
<li><a href="encryption/index.html">✅ What is Plausible Deniability ? Why is it Important ?</a></li>
<li><a href="anonsensitive/index.html">✅ Why Anonymity isnt enough for Sensitive use ? </a></li>
<li><a href="index.html">❌ The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
<li><a href="sensitiveremotevshome/index.html">🟠 Sensitive Services: Self-Host or Host Remotely ?</a></li>
</ol></br>
<p>💻 Clientside - Getting Started </p>
<ol>
<li><a href="veracrypt/index.html">Plausible Deniability (Veracrypt Hidden Partition)</a></li>
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Protection</a></li>
<li><a href="veracrypt/index.html">The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Backups</a></li>
<li><a href="anonymity/index.html">🟠 Plausibly Deniable Anonymity VMs (Whonix VMs in a Hidden Volume)⭐</a></li>
</ol></br>
</div>
<div style="float: right; width: 50%;">
<p>🧅 Serverside - Protecting Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
<ol>
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
<li><a href="physicalsecurity/index.html">✅ Physical Protection for an .onion Service (SSH + USB + Physical intrusion detection, automatic mail notifications, emergency shutdowns)</a></li>
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF service + Captcha) ⭐</a></li>
</ol></br>
<p>💻 Steganography - Hiding secrets in plain sight</p>
<ol>
<li><a href="index.html">❌ Other sources of Plausible Deniability: Steganography</a></li>
@ -289,6 +287,30 @@
<li><a href="anonzulucrypt/index.html">✅ Hiding entire zipfiles into videofiles files (zulucrypt)</a></li>
</ol></br>
</div>
<div style="float: right; width: 50%;">
<p>🧅 Serverside - Plausible Deniability at Home (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
<ol>
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
<li><a href="index.html">❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)</a></li>
<li><a href="physicalsecurity/index.html">✅ Automating Deniable Encryption Protection (USB Changes, detecting movements, and SSH bruteforce attempts)</a></li>
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a></li>
</ol></br>
<p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
<ol>
<li><a href="index.html">❌ When the Adversary is the cloud provider himself</a></li>
<li><a href="index.html">❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)</a></li>
<li><a href="index.html">❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)</a></li>
<li><a href="index.html">❌ Custom Linux OS making (debian-based)</a></li>
<li><a href="index.html">❌ Obtaining a non-KYC dedicated server, with a custom OS</a></li>
<li><a href="index.html">❌ Intrusion detection on remote servers </a></li>
</ol></br>

View File

@ -8,7 +8,7 @@
<meta name="author" content="">
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
<title>Plausibly Deniable Data Protection Setup</title>
<title>Plausibly Deniable Data Backups Setup</title>
<!-- Bootstrap core CSS -->
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
@ -61,7 +61,7 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-03-10</ba></p>
<h1>Plausibly Deniable Data Protection Setup</h1>
<h1>Plausibly Deniable Data Backups Setup</h1>
<img src="0.png" style="width:250px">
<p>In this tutorial we're going to look at how you can backup your critical data (Keepass accesses, pgp key, ssh key, etc) while still maintaining the plausible deniability. </p>
</br><b>DISCLAIMER: we're using only harddrives (HDDs) here, because using SSDs are not a secure way to have Plausible Deniability, that is due to hidden Volumes being detectable on devices that utilize wear-leveling</b>

View File

@ -87,7 +87,7 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Tails Setup </b></h2>
<p>First we download Tails OS as a USB image <a href="https://tails.net/install/download-iso/index.en.html">here</a>:</p>
<p>First we download Tails OS as a USB image <a href="https://tails.net/install/download/index.en.html">here</a>:</p>
<img src="1.png" class="imgRz">
<p>Then we resize the image size to be able to contain persistent storage (in this case, i'll make it 8Gbs):</p>
<pre><code class="nim">