From b01d2b88ce02d6e8e73319f68c19bb042aedb4aa Mon Sep 17 00:00:00 2001 From: nihilist Date: Sat, 28 Sep 2024 16:07:45 +0200 Subject: [PATCH] updated --- opsec/index.html | 84 ++++++++++++++++++++++++------------------------ 1 file changed, 42 insertions(+), 42 deletions(-) diff --git a/opsec/index.html b/opsec/index.html index 6fd8a8e..ab4596f 100644 --- a/opsec/index.html +++ b/opsec/index.html @@ -49,7 +49,7 @@
  • ⭐: Personal Favorite
  • ✅: Completed
  • 🟠: Work in progress
  • -
  • ❌: Not started yet
  • +
  • ❌: Not started yet (can be brainstormed on their assigned gitea issues here)

  • ⚠️ This Blog is open to contributions: @@ -83,7 +83,7 @@
  • ✅ Audit your OPSEC and determine the appropriate internet use
  • ✅ Internet usage segmentation (QEMU VMs + Identity Management)
  • ✅ OPSEC: Using the right Technology and Behavior
  • -
  • ❌ How to maintain multiple Identities Online
  • +
  • ❌ How to maintain multiple Identities Online



  • @@ -112,14 +112,14 @@
  • ✅ How to install Linux from a Windows PC ⭐
  • ✅ How to install and update programs on Linux
  • ✅ How to install GrapheneOS on a Pixel Phone
  • -
  • ❌ Easy Private Chats - Simplex
  • +
  • ❌ Easy Private Chats - Simplex

  • 💻 File Sharing

      -
    1. ❌ One on One large file sharing (Syncthing over VPN)
    2. -
    3. ❌ P2P large file sharing (Torrents over VPN)
    4. +
    5. ❌ One on One large file sharing (Syncthing over VPN)
    6. +
    7. ❌ P2P large file sharing (Torrents over VPN)

    @@ -132,7 +132,7 @@
  • ✅ Password Management 101 (How to use Keepass)
  • ✅ Serverside: Should I trust serverside encryption? Should I use PGP?
  • ✅ Private Messaging (PGP encryption)
  • -
  • ❌ How to use GPG SmartCards to secure your PGP keys
  • +
  • ❌ How to use GPG SmartCards to secure your PGP keys

  • ⚠️ Miscellaneous - In real life

    @@ -163,13 +163,13 @@
  • ✅ The main source of Anonymity: The Tor Network
  • ✅ Using Tor Safely: Tor through VPN or VPN through Tor ?
  • 🟠 Phone Numbers are incompatible with Anonymity
  • -
  • ❌ How to protect against fingerprinting (persona, text, files)
  • -
  • ❌ How to run a local LLM to change your writing style (and it's use in whonix VM)
  • +
  • ❌ How to protect against fingerprinting (persona, text, files)
  • +
  • ❌ Stylography protection (Running a Local LLM and copy pasting messages)

  • 💻 Clientside - Getting Started (⚠️ Check if your ISP allows Tor or Not!)

      -
    1. ❌ How to setup and navigate Qubes OS
    2. +
    3. ❌ How to setup and navigate Qubes OS
    4. ✅ Tor Web Browser setup
    5. ✅ How to use the Tor Browser on Mobile
    6. ✅ Tails OS QEMU VM for Temporary Anonymity
    7. @@ -180,18 +180,18 @@

      💻 Clientside - Censorship Evasion

      1. ✅ How to access Tor when it is being blocked, using VPNs
      2. -
      3. ❌ How to temporarily access Tor when VPNs are blocked, using Tor bridges
      4. -
      5. ❌ How to access Tor when VPNs are blocked, using VPSes (SSH port forwarding / OpenVPN port sharing)
      6. -
      7. ❌ How to access Tor when you are in Russia or China using v2ray (vmess / vless)
      8. +
      9. ❌ How to temporarily access Tor when VPNs are blocked, using Tor bridges
      10. +
      11. ❌ How to access Tor when VPNs are blocked, using VPSes (SSH port forwarding / OpenVPN port sharing)
      12. +
      13. ❌ How to access Tor when you are in Russia or China using v2ray (vmess / vless)

      💻 File Sharing

        -
      1. ❌ How to send small files Anonymously (Onionshare)
      2. -
      3. ❌ One on One large file sharing (Syncthing over Tor)
      4. -
      5. ❌ P2P large file sharing (Torrents over i2p or Tor)
      6. +
      7. ❌ How to send small files Anonymously (Onionshare)
      8. +
      9. ❌ One on One large file sharing (Syncthing over Tor)
      10. +
      11. ❌ P2P large file sharing (Torrents over Tor)

      @@ -200,21 +200,21 @@
    8. ✅ Why Financial decentralisation ? (Cryptocurrencies, Exchanges and KYC) ⭐
    9. 🟠 How to setup your Monero Wallet
    10. ✅ Why can't I trust Centralised Exchanges, and random Monero nodes ?
    11. -
    12. ❌ How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats)
    13. +
    14. ❌ How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats)
    15. 🟠 Haveno Decentralised Exchange direct Fiat -> XMR transaction ⭐
    16. ✅ Haveno DEX Dispute resolution (Fiat -> XMR)
    17. ✅ Haveno DEX Bank Transfer (ex: SEPA) -> XMR transaction
    18. ✅ Haveno DEX Cash By Mail -> XMR transaction ⭐
    19. -
    20. ❌ Convert Monero into other Cryptos Anonymously (XMR -> BTC Atomic Swaps DEX)
    21. -
    22. ❌ Monero Inheritence Management (Threshold encryption (2of3)+ PGP)
    23. +
    24. ❌ Convert Monero into other Cryptos Anonymously (XMR -> BTC)
    25. +
    26. ❌ Monero Inheritence Management (Threshold encryption (2of3)+ PGP)

    💻 Clientside - Making use of Anonymity (Non-KYC Providers)

      -
    1. ❌ How to get a mail account anonymously (Mails as a service)
    2. -
    3. ❌ How to get a phone number anonymously (Remote SMSes as a service)
    4. -
    5. ❌ How to get a credit card anonymously (Credit cards as a service)
    6. -
    7. ❌ How to get a residential proxies anonymously
    8. +
    9. ❌ How to get a mail account anonymously (Mails as a service)
    10. +
    11. ❌ How to get a phone number anonymously (Remote SMSes as a service)
    12. +
    13. ❌ How to get a credit card anonymously (Credit cards as a service)
    14. +
    15. ❌ How to get residential proxies anonymously

    @@ -229,8 +229,8 @@
  • ✅ Tor Exit Node
  • ✅ Monero Node
  • ✅ Monero Mining with p2pool (help validate the network)
  • -
  • ❌ Haveno Seed Node
  • -
  • ❌ Haveno DEX Network
  • +
  • ❌ Haveno Seed Node
  • +
  • ❌ Haveno DEX Network

  • 🧅 Serverside - Anonymous Hidden Services

    @@ -238,14 +238,14 @@
  • ✅ Where to host Anonymous Hidden Services ?
  • ✅ Hidden Service with custom .onion Vanity V3 address
  • -
  • ❌ Basic Webserver setup (NGINX / PHP / MYSQL)
  • -
  • ❌ Minimalistic MoneroSSO .onion setup
  • +
  • ❌ Basic Webserver setup (NGINX / PHP / MYSQL)
  • +
  • ❌ Minimalistic MoneroSSO .onion setup
  • ✅ XMPP Chat Server Setup (Clearnet + Onion + OMEMO E2EE)
  • -
  • ❌ Gitea .onion setup (Code repositories)
  • -
  • ❌ Nextcloud .onion setup (cloud storage)
  • -
  • ❌ Mastodon .onion setup (Microblogging)
  • -
  • ❌ Discourse .onion setup (Forums)
  • -
  • ❌ How to setup Nerostr (Nostr blogging)
  • +
  • ❌ Gitea .onion setup (Code repositories)
  • +
  • ❌ Nextcloud .onion setup (cloud storage)
  • +
  • ❌ Mastodon .onion setup (Microblogging)
  • +
  • ❌ Discourse .onion setup (Forums)
  • +
  • ❌ How to setup Nerostr (Nostr blogging)


  • 🧅 Serverside - Anonymous Clearnet Services

    @@ -261,9 +261,9 @@

    ⚠️ Miscellaneous - In real life

      -
    1. ❌ How to send a mail package anonymously
    2. -
    3. ❌ How to recieve a mail package anonymously
    4. -
    5. ❌ How to remain Anonymous during a protest
    6. +
    7. ❌ How to send a mail package anonymously
    8. +
    9. ❌ How to recieve a mail package anonymously
    10. +
    11. ❌ How to remain Anonymous during a protest

    @@ -320,21 +320,21 @@
  • ✅ Internet Failover (Dual WAN pfsense setup)
  • ❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)
  • ✅ Automating Deniable Encryption Protection (USB Changes, detecting movements, and SSH bruteforce attempts)
  • -
  • ✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐
  • +
  • ✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐

  • 🧅 Serverside - Remote Plausible Deniability (⚠️ Remote Hosting = Safer!)

      -
    1. ❌ When the Adversary is the cloud provider himself
    2. -
    3. ❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)
    4. -
    5. ❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)
    6. -
    7. ❌ Custom Linux OS making (debian-based)
    8. -
    9. ❌ Obtaining a non-KYC dedicated server, with a custom OS
    10. -
    11. ❌ Intrusion detection on remote servers
    12. +
    13. ❌ When the Adversary is the cloud provider himself
    14. +
    15. ❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)
    16. +
    17. ❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)
    18. +
    19. ❌ Custom Linux OS making (debian-based)
    20. +
    21. ❌ Obtaining a non-KYC dedicated server, with a custom OS
    22. +
    23. ❌ Intrusion detection on remote servers

    ⚠️ Miscellaneous - In real life

      -
    1. ❌ When protests go wrong - SimpleX Disappearing Messages
    2. +
    3. ❌ When protests go wrong - SimpleX Disappearing Messages