updatd list of tutorials, with latest brainstorm
This commit is contained in:
parent
027cc32a25
commit
60595ecb63
@ -114,7 +114,11 @@
|
||||
</ol></br>
|
||||
|
||||
|
||||
|
||||
<p>💻 File Sharing</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ One on One large file sharing (Syncthing over VPN)</a></li>
|
||||
<li><a href="index.html">❌ P2P large file sharing (Torrents over VPN)</a></li>
|
||||
</ol></br>
|
||||
</div>
|
||||
<div style="float: right; width: 50%;">
|
||||
<p>💻 Privacy means Open Source (FOSS)</p>
|
||||
@ -127,6 +131,7 @@
|
||||
<li><a href="serversideencryption/index.html">✅ Serverside: Should I trust serverside encryption? Should I use PGP?</a></li>
|
||||
<li><a href="pgp/index.html">✅ Private Messaging (PGP encryption)</a></li>
|
||||
</ol></br>
|
||||
|
||||
<p>⚠️ Miscellaneous - In real life</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ Hide the contents of a mail package</a></li>
|
||||
@ -154,8 +159,8 @@
|
||||
<li><a href="anonuse/index.html">✅ Why isn't Privacy enough for Anonymous use ? </a></li>
|
||||
<li><a href="torvsvpns/index.html">✅ The main source of Anonymity: The Tor Network</a></li>
|
||||
<li><a href="torthroughvpn/index.html">✅ Using Tor Safely: Tor through VPN or VPN through Tor ? </a></li>
|
||||
<li><a href="anonpersona/index.html">🟠 Shifting from a public to an Anonymous online persona</a></li>
|
||||
<li><a href="phonenumbers/index.html">🟠 Phone Numbers are incompatible with Anonymity</a></li>
|
||||
<li><a href="index.html">❌ Stylography protection (Running a Local LLM and copy pasting messages)</a></li>
|
||||
|
||||
</ol></br>
|
||||
<p>💻 Clientside - Getting Started (<a href="torthroughvpn/index.html">⚠️ Check if your ISP allows Tor or Not!</a>)</p>
|
||||
@ -164,10 +169,15 @@
|
||||
<li><a href="MobileTor/index.html">✅ How to use the Tor Browser on Mobile</a></li>
|
||||
<li><a href="tailsqemuvm/index.html">✅ Tails OS QEMU VM for Temporary Anonymity</a></li>
|
||||
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a></li>
|
||||
<li><a href="index.html">❌ How to send files Anonymously (Onionshare)</a></li>
|
||||
|
||||
</ol></br>
|
||||
|
||||
<p>💻 File Sharing</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ How to send small files Anonymously (Onionshare)</a></li>
|
||||
<li><a href="index.html">❌ One on One large file sharing (Syncthing over Tor)</a></li>
|
||||
<li><a href="index.html">❌ P2P large file sharing (Torrents over i2p or Tor)</a></li>
|
||||
</ol></br>
|
||||
|
||||
|
||||
<p>💻 Clientside - Decentralized Finances ⭐</p>
|
||||
@ -261,27 +271,15 @@
|
||||
<ol>
|
||||
<li><a href="encryption/index.html">✅ What is Plausible Deniability ? Why is it Important ?</a></li>
|
||||
<li><a href="anonsensitive/index.html">✅ Why Anonymity isn’t enough for Sensitive use ? </a></li>
|
||||
<li><a href="index.html">❌ The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
|
||||
<li><a href="sensitiveremotevshome/index.html">🟠 Sensitive Services: Self-Host or Host Remotely ?</a></li>
|
||||
</ol></br>
|
||||
|
||||
<p>💻 Clientside - Getting Started </p>
|
||||
<ol>
|
||||
<li><a href="veracrypt/index.html">✅ Plausible Deniability (Veracrypt Hidden Partition)</a></li>
|
||||
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Protection</a></li>
|
||||
<li><a href="veracrypt/index.html">✅ The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
|
||||
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Backups</a></li>
|
||||
<li><a href="anonymity/index.html">🟠 Plausibly Deniable Anonymity VMs (Whonix VMs in a Hidden Volume)⭐</a></li>
|
||||
</ol></br>
|
||||
</div>
|
||||
<div style="float: right; width: 50%;">
|
||||
|
||||
<p>🧅 Serverside - Protecting Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
|
||||
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
|
||||
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
|
||||
<li><a href="physicalsecurity/index.html">✅ Physical Protection for an .onion Service (SSH + USB + Physical intrusion detection, automatic mail notifications, emergency shutdowns)</a></li>
|
||||
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF service + Captcha) ⭐</a></li>
|
||||
</ol></br>
|
||||
<p>💻 Steganography - Hiding secrets in plain sight</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ Other sources of Plausible Deniability: Steganography</a></li>
|
||||
@ -289,6 +287,30 @@
|
||||
<li><a href="anonzulucrypt/index.html">✅ Hiding entire zipfiles into videofiles files (zulucrypt)</a></li>
|
||||
</ol></br>
|
||||
|
||||
</div>
|
||||
|
||||
<div style="float: right; width: 50%;">
|
||||
|
||||
<p>🧅 Serverside - Plausible Deniability at Home (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
|
||||
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
|
||||
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
|
||||
<li><a href="index.html">❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)</a></li>
|
||||
<li><a href="physicalsecurity/index.html">✅ Automating Deniable Encryption Protection (USB Changes, detecting movements, and SSH bruteforce attempts)</a></li>
|
||||
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a></li>
|
||||
</ol></br>
|
||||
<p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ When the Adversary is the cloud provider himself</a></li>
|
||||
<li><a href="index.html">❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)</a></li>
|
||||
<li><a href="index.html">❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)</a></li>
|
||||
<li><a href="index.html">❌ Custom Linux OS making (debian-based)</a></li>
|
||||
<li><a href="index.html">❌ Obtaining a non-KYC dedicated server, with a custom OS</a></li>
|
||||
<li><a href="index.html">❌ Intrusion detection on remote servers </a></li>
|
||||
</ol></br>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -8,7 +8,7 @@
|
||||
<meta name="author" content="">
|
||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||
|
||||
<title>Plausibly Deniable Data Protection Setup</title>
|
||||
<title>Plausibly Deniable Data Backups Setup</title>
|
||||
|
||||
<!-- Bootstrap core CSS -->
|
||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||
@ -61,7 +61,7 @@
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-03-10</ba></p>
|
||||
<h1>Plausibly Deniable Data Protection Setup</h1>
|
||||
<h1>Plausibly Deniable Data Backups Setup</h1>
|
||||
<img src="0.png" style="width:250px">
|
||||
<p>In this tutorial we're going to look at how you can backup your critical data (Keepass accesses, pgp key, ssh key, etc) while still maintaining the plausible deniability. </p>
|
||||
</br><b>DISCLAIMER: we're using only harddrives (HDDs) here, because using SSDs are not a secure way to have Plausible Deniability, that is due to hidden Volumes being detectable on devices that utilize wear-leveling</b>
|
||||
|
@ -87,7 +87,7 @@
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<h2><b>Tails Setup </b></h2>
|
||||
<p>First we download Tails OS as a USB image <a href="https://tails.net/install/download-iso/index.en.html">here</a>:</p>
|
||||
<p>First we download Tails OS as a USB image <a href="https://tails.net/install/download/index.en.html">here</a>:</p>
|
||||
<img src="1.png" class="imgRz">
|
||||
<p>Then we resize the image size to be able to contain persistent storage (in this case, i'll make it 8Gbs):</p>
|
||||
<pre><code class="nim">
|
||||
|
Loading…
Reference in New Issue
Block a user