updated css + some tutorials
9
assets/css/bootstrap.css
vendored
@ -907,8 +907,8 @@ pre code {
|
|||||||
.col-lg-12 {
|
.col-lg-12 {
|
||||||
position: relative;
|
position: relative;
|
||||||
min-height: 1px;
|
min-height: 1px;
|
||||||
padding-right: 15px;
|
padding-right: 1px;
|
||||||
padding-left: 15px;
|
padding-left: 1px;
|
||||||
}
|
}
|
||||||
|
|
||||||
.col-xs-1,
|
.col-xs-1,
|
||||||
@ -1498,7 +1498,7 @@ pre code {
|
|||||||
width: 75%;
|
width: 75%;
|
||||||
}
|
}
|
||||||
.col-lg-8 {
|
.col-lg-8 {
|
||||||
width: 66.66666666666666%;
|
width: 90%;
|
||||||
}
|
}
|
||||||
.col-lg-7 {
|
.col-lg-7 {
|
||||||
width: 58.333333333333336%;
|
width: 58.333333333333336%;
|
||||||
@ -1630,7 +1630,8 @@ pre code {
|
|||||||
margin-left: 25%;
|
margin-left: 25%;
|
||||||
}
|
}
|
||||||
.col-lg-offset-2 {
|
.col-lg-offset-2 {
|
||||||
margin-left: 16.666666666666664%;
|
/*margin-left: 16.666666666666664%;*/
|
||||||
|
margin-left: 5%;
|
||||||
}
|
}
|
||||||
.col-lg-offset-1 {
|
.col-lg-offset-1 {
|
||||||
margin-left: 8.333333333333332%;
|
margin-left: 8.333333333333332%;
|
||||||
|
@ -10,6 +10,68 @@
|
|||||||
/*@import url(http://fonts.googleapis.com/css?family=Montserrat:400,700);*/
|
/*@import url(http://fonts.googleapis.com/css?family=Montserrat:400,700);*/
|
||||||
/*@import url(montserrat.css);*/
|
/*@import url(montserrat.css);*/
|
||||||
|
|
||||||
|
|
||||||
|
/* CSS FORMATTING FOR MOBILE SCREENS */
|
||||||
|
|
||||||
|
@media screen and (max-width: 1000px) {
|
||||||
|
.container-m{
|
||||||
|
display: flex;
|
||||||
|
flex-direction: column;
|
||||||
|
/*align-items: center;*/
|
||||||
|
padding: 2px 5px 2px 2px;
|
||||||
|
justify-content: left;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
.container-m{
|
||||||
|
display: flex;
|
||||||
|
flex-direction: row;
|
||||||
|
/*align-items: center;*/
|
||||||
|
padding: 2px 5px 2px 2px;
|
||||||
|
justify-content: left;
|
||||||
|
}
|
||||||
|
|
||||||
|
.column-m{
|
||||||
|
display: flex;
|
||||||
|
flex-direction: column;
|
||||||
|
padding: 5px 10px 5px 5px;
|
||||||
|
font-size: 18px;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
.column-m:nth-child(1){
|
||||||
|
border-top-left-radius: 5px;
|
||||||
|
border-bottom-left-radius: 5px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.column-m:nth-child(4){
|
||||||
|
border-top-right-radius: 5px;
|
||||||
|
border-bottom-right-radius: 5px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.column-container-m{
|
||||||
|
width: 100%;
|
||||||
|
height: 100vh;
|
||||||
|
display: flex;
|
||||||
|
flex-direction: row;
|
||||||
|
align-items: left;
|
||||||
|
justify-content: left;
|
||||||
|
}
|
||||||
|
|
||||||
|
.column-container-main-m{
|
||||||
|
width: 100%;
|
||||||
|
height: 100vh;
|
||||||
|
display: flex;
|
||||||
|
flex-direction: row;
|
||||||
|
/*align-items: center;
|
||||||
|
justify-content: center;*/
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/* END OF CSS FORMATTING FOR MOBILE */
|
||||||
|
|
||||||
|
|
||||||
body {
|
body {
|
||||||
background-color: #000000;
|
background-color: #000000;
|
||||||
font-family: sans-serif;
|
font-family: sans-serif;
|
||||||
|
@ -8,7 +8,7 @@
|
|||||||
<meta name="author" content="">
|
<meta name="author" content="">
|
||||||
<link rel="shortcut icon" href="../../../../../assets/img/favicon.png">
|
<link rel="shortcut icon" href="../../../../../assets/img/favicon.png">
|
||||||
|
|
||||||
<title>nihilist - Categories </title>
|
<title>The Nihilism Blog </title>
|
||||||
<!-- cp index.html blog.html-->
|
<!-- cp index.html blog.html-->
|
||||||
<!-- Bootstrap core CSS! -->
|
<!-- Bootstrap core CSS! -->
|
||||||
<link href="assets/css/bootstrap.css" rel="stylesheet">
|
<link href="assets/css/bootstrap.css" rel="stylesheet">
|
||||||
|
@ -84,9 +84,7 @@
|
|||||||
<li><a href="internetsegmentation/index.html">✅ Internet usage segmentation (QEMU VMs + Identity Management)</a></li>
|
<li><a href="internetsegmentation/index.html">✅ Internet usage segmentation (QEMU VMs + Identity Management)</a></li>
|
||||||
<li><a href="opsec/index.html">✅ OPSEC: Using the right Technology and Behavior </a></li>
|
<li><a href="opsec/index.html">✅ OPSEC: Using the right Technology and Behavior </a></li>
|
||||||
<li><a href="multiple_identities/index.html">✅ How to maintain multiple Identities Online</a></li>
|
<li><a href="multiple_identities/index.html">✅ How to maintain multiple Identities Online</a></li>
|
||||||
</br>
|
|
||||||
</br>
|
|
||||||
</br>
|
|
||||||
</ol></br>
|
</ol></br>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
Before Width: | Height: | Size: 2.6 MiB After Width: | Height: | Size: 2.8 MiB |
BIN
opsec/privacy/2.JPG
Normal file
After Width: | Height: | Size: 760 KiB |
BIN
opsec/privacy/3.png
Normal file
After Width: | Height: | Size: 539 KiB |
@ -103,7 +103,6 @@
|
|||||||
<p>And it does not stop there, even when LE is not involved, <b>politicians can also request and pay to get private user data</b>, at the discretion of those large companies that specialize on infringing upon users' privacy for their own profit <a href="https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal">(see the cambridge analytica scandal)</a>.</p>
|
<p>And it does not stop there, even when LE is not involved, <b>politicians can also request and pay to get private user data</b>, at the discretion of those large companies that specialize on infringing upon users' privacy for their own profit <a href="https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal">(see the cambridge analytica scandal)</a>.</p>
|
||||||
<p>Your personal data is being sold by large corporations, for their own profit, and your consent is of no concern to them.</p>
|
<p>Your personal data is being sold by large corporations, for their own profit, and your consent is of no concern to them.</p>
|
||||||
|
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
</div> <!-- /container -->
|
</div> <!-- /container -->
|
||||||
@ -115,6 +114,27 @@
|
|||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
<h2><b>The Panopticon, Myth or Reality ?</b></h2> </br> </br>
|
||||||
|
<p>The Panopticon originally was a prison building design, which was designed by the social theorist Jeremy Bentham in the 18th century, where the core concept revolved around making all prisoners to be observed by a single cop, <b>without the inmates being able to know wether or not they are being watched</b>. </p>
|
||||||
|
<img src="2.JPG" class="imgRz">
|
||||||
|
<p>The idea is that every inmate, since they don't know wether or not they are being watched, <b>they would have to assume that they were under constant surveillance, forcing all of them to behave at their best</b>, even if the cop is not looking in their direction.</p>
|
||||||
|
<p>Now you probably get where i'm trying to go with this, <b>this is the narrative that governments are trying to push, that everyone's actions are under constant surveillance, that everyone must behave at their best at all times if they don't want to end up in jail.</b> And how convenient it must be for those governments, they have the vast majority of their populations giving away their privacy in the name of convenience by using closed-source software on their phones, on their computers, on their laptops, on their routers, etc. </p>
|
||||||
|
<p><b>If privacy doesn't matter, i hope you won't mind me installing a camera in your bedroom, filming you 24/7 right ?</b></p>
|
||||||
|
<img src="3.png" class="imgRz">
|
||||||
|
<p>For some reason, it is as if everyone is accepting the panopticon narrative as if it was normal, that everything they do is anyway being watched by big brother and for some reason that's supposed to be ok. Exhibitionism definitely isn't my thing, but governments and law enforcement certainly are into voyeurism, as it helps them prosecute whoever they don't like, to try and preserve the control they have over the masses.</p>
|
||||||
|
<p><b>The panopticon myth ends where you decide to put the effort to restore your privacy</b>, you could simply pull over the blinds to hide outsiders from looking into your bedroom, but there are a myriad of things you have to do to protect your privacy online. <b>It is all up to you if you are willing to put the effort to get it, or not.</b></p>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
</div><!-- /row -->
|
||||||
|
</div> <!-- /container -->
|
||||||
|
</div><!-- /white -->
|
||||||
|
|
||||||
|
|
||||||
|
<!-- +++++ Second Post +++++ -->
|
||||||
|
<div id="anon2">
|
||||||
|
<div class="container">
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>Why is Privacy Important?</b></h2> </br> </br>
|
<h2><b>Why is Privacy Important?</b></h2> </br> </br>
|
||||||
<p>Ask yourself this simple question: <b>"Who should be aware of what i do ?"</b></p>
|
<p>Ask yourself this simple question: <b>"Who should be aware of what i do ?"</b></p>
|
||||||
<p>Let's take the most common example you can encounter: <b>"Should a company (such as Microsoft) be able to spy on what I do with my computer ?"</b></p>
|
<p>Let's take the most common example you can encounter: <b>"Should a company (such as Microsoft) be able to spy on what I do with my computer ?"</b></p>
|
||||||
|
BIN
opsec/torthroughvpn/18.png
Normal file
After Width: | Height: | Size: 55 KiB |
BIN
opsec/torthroughvpn/19.png
Normal file
After Width: | Height: | Size: 41 KiB |
BIN
opsec/torthroughvpn/20.png
Normal file
After Width: | Height: | Size: 71 KiB |
BIN
opsec/torthroughvpn/21.png
Normal file
After Width: | Height: | Size: 35 KiB |
@ -122,6 +122,24 @@ you -> VPN -> Tor -> VPN -> service
|
|||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
<h2><b>Use DAITA when trying to use VPNs for Anonymity</b></h2> </br> </br>
|
||||||
|
<p>When trying to use VPNs for anonymity, take note that we need to prevent traffic correlation as much as possible, hence we want to protect against AI-guided traffic analysis, <b>in order to make sure our VPN traffic looks the same as with other users.</b> To do so we enable DAITA (Defense Against AI-guided traffic analysis) in the mullvad VPN:</p>
|
||||||
|
<img src="18.png" style="width:250px;">
|
||||||
|
<img src="19.png" style="width:250px;">
|
||||||
|
<img src="20.png" style="width:250px;">
|
||||||
|
<img src="21.png" style="width:250px;">
|
||||||
|
<p>Once enabled this will prevent an adversary watching connections to and from a VPN server to figure out which VPN user (that is currently using a VPN server) is visiting which website, based on the packet size and traffic patterns. (see <a href="https://mullvad.net/en/vpn/daita">this article</a> for more details on how DAITA works)</p>
|
||||||
|
|
||||||
|
|
||||||
|
</div>
|
||||||
|
</div><!-- /row -->
|
||||||
|
</div> <!-- /container -->
|
||||||
|
</div><!-- /white -->
|
||||||
|
|
||||||
|
<div id="anon1">
|
||||||
|
<div class="container">
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>First Goal: Accessing websites that block Tor</b></h2> </br> </br>
|
<h2><b>First Goal: Accessing websites that block Tor</b></h2> </br> </br>
|
||||||
<p>Great, you found out about Tor, you want to be anonymous while browsing the web, and now you start to use your favorite centralised services (google, youtube for example) <b>but you realize that they don't allow you to use their service while you use tor!</b></p>
|
<p>Great, you found out about Tor, you want to be anonymous while browsing the web, and now you start to use your favorite centralised services (google, youtube for example) <b>but you realize that they don't allow you to use their service while you use tor!</b></p>
|
||||||
<img src="1.png" class="imgRz">
|
<img src="1.png" class="imgRz">
|
||||||
|