diff --git a/servers/anon.html b/servers/anon.html index b7aab78..1802306 100644 --- a/servers/anon.html +++ b/servers/anon.html @@ -122,6 +122,7 @@
  • ✅ How to compile open source software + How to verify software integrity
  • ✅ How to Virtualize Machines (QEMU/KVM Hypervisor)
  • ✅ How to get privacy from your ISP using a VPN
  • +
  • ❌ Route QEMU VMs network through a VPN (from the Host OS)
  • ✅ Password Management 101 (How to use Keepass)
  • ✅ Serverside: Should I trust serverside encryption? Should I use PGP?
  • ✅ Private Messaging (PGP encryption)
  • @@ -164,7 +165,7 @@

    💻 Clientside - Getting Started (⚠️ Check if your ISP allows Tor or Not!)

      -
    1. 🟠 Tor Web Browser setup
    2. +
    3. ✅ Tor Web Browser setup
    4. 🟠 Tails OS QEMU VM for Temporary Anonymity
    5. 🟠 VMs for Long-term Anonymity (Whonix QEMU VMs)
    6. @@ -207,7 +208,7 @@
    7. ❌ Haveno Seed Node

    -

    🧅 Serverside - Onion Services (⚠️ Remote Hosting = Safer!)

    +

    🧅 Serverside - Self-Hosting Hidden Services (⚠️ Self-Hosting = Non-Sensitive!)

    1. 🟠 .onion website with custom .onion Vanity V3 address
    2. ❌ Basic Webserver setup (NGINX / PHP / MYSQL)
    3. @@ -219,7 +220,7 @@
    4. ❌ Discourse .onion setup (Forums)


    -

    🧅 Serverside - Anonymous Clearnet Services (⚠️ Remote Hosting = Safer!)

    +

    🧅 Serverside - Remote Clearnet Services (⚠️ Remote Hosting = Safer!)

    1. ✅ How to rent remote servers anonymously (Cloud resellers) ⭐
    2. ✅ Remote anonymous access setup (cockpit + ssh through tor)
    3. diff --git a/servers/compilation/index.html b/servers/compilation/index.html index 3c2d9cb..a431cc2 100644 --- a/servers/compilation/index.html +++ b/servers/compilation/index.html @@ -62,6 +62,13 @@
      Previous Page

      nihilist@mainpc - 2024-06-28

      How to compile open source software + How to verify software integrity

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : PC / Laptop / Homeserver / Remote Server

      2. +
      3. OS : Linux

      4. +
      +

      I recommend using this setup for Private use, as per the 4 basic OPSEC levels.

      +
      diff --git a/servers/graphene/index.html b/servers/graphene/index.html index ec8dcb9..fd041fc 100644 --- a/servers/graphene/index.html +++ b/servers/graphene/index.html @@ -66,6 +66,13 @@

      In this tutorial we're going to setup graphene OS, an open source android operating system for google pixel phones. (Yes google phones, if you don't like it then you'll have to wait for functionnal open hardware alternatives to arrive on the market.) Currently GrapheneOS is one of the most privacy-focused mobile operating systems given that it's fully open source. and that they refuse to implement google services by default, unlike their competitors like LineageOS.

      DISCLAIMER: yes the quality of the photos taken are garbage :)

      + +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Phone (google Pixel model))

      2. +
      +

      I recommend using this setup for Private use, as per the 4 basic OPSEC levels.

      + diff --git a/servers/haveno-arbitrator/index.html b/servers/haveno-arbitrator/index.html index 90ae68f..b19ca92 100644 --- a/servers/haveno-arbitrator/index.html +++ b/servers/haveno-arbitrator/index.html @@ -65,6 +65,16 @@

      In this tutorial we're going to cover how the Haveno DEX handles trade disputes, which can happen as, after all it's decentralised, and anonymous by default.

      Check out this tutorial if you want to know how to install Haveno DEX on your device.

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      9. Application: Haveno DEX Setup

      10. +
      +

      I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)

      + @@ -82,6 +92,7 @@

      In short, both Bob and Alice need to put some XMR into the trade initially, so that if they try to scam each other, they will loose something in the process.

      In this example, The trade will go wrong as Bob will try to scam Alice with an invalid Amazon giftcard code.

      + diff --git a/servers/haveno-cashbymail/index.html b/servers/haveno-cashbymail/index.html index 018b972..ffc0554 100644 --- a/servers/haveno-cashbymail/index.html +++ b/servers/haveno-cashbymail/index.html @@ -65,6 +65,16 @@

      In this tutorial we're going to cover how to buy Monero, for cash by mail on the Haveno Decentralised Exchange. This was the most popular payment method back on LocalMonero, due to being an improvement over bank transfers (like SEPA in the EU) when it comes to trading larger volumes in the long run, as Cash cannot easily be traced by adversaries unlike bank transfers, making Cash by Mail one of the most private ways to exchange real world money for Monero.

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      9. Application: Haveno DEX Setup

      10. +
      +

      I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)

      + diff --git a/servers/haveno-client-f2f/index.html b/servers/haveno-client-f2f/index.html index 180fe9f..5240b8e 100644 --- a/servers/haveno-client-f2f/index.html +++ b/servers/haveno-client-f2f/index.html @@ -62,6 +62,7 @@
      Previous Page

      nihilist@mainpc - 2024-05-14

      Haveno DEX Direct Fiat to Monero transactions

      +

      TODO: need context (private / anonymous use)

      In this tutorial we're going to cover how to do a Fiat to Monero trade from the brand new (and long awaited!) Haveno Decentralised Exchange, using the Face-to-Face (F2F) payment method.

      @@ -75,6 +76,15 @@

      You can check out my quick coverage of Haveno DEX on Monero Topia here. (Definitely check out MoneroTopia for the latest news in the Monero world, awesome show!)

      DISCLAIMER: THERE ARE NO OFFICIAL HAVENO NETWORK INSTANCES, THERE ARE ONLY THIRD PARTY HAVENO NETWORKS LIKE HAVENO RETO.

      IF YOU SEE A HAVENO CLAIM TO BE THE OFFICIAL NETWORK LIKE THIS ONE, DONT FALL FOR THEIR SCAM!

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      +

      I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)

      +
      diff --git a/servers/haveno-sepa/index.html b/servers/haveno-sepa/index.html index c8ceaae..4fcbbe2 100644 --- a/servers/haveno-sepa/index.html +++ b/servers/haveno-sepa/index.html @@ -78,6 +78,16 @@ If you get banned from a physical bank, they may put your name on a fraud regist

      In short, keep in mind that this may not be a reliable way to purchase monero in the long run especially if you do large transactions each time. (thanks xmrfamily for the infos)

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      9. Application: Haveno DEX Setup

      10. +
      +

      I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)

      + diff --git a/servers/hypervisorsetup/index.html b/servers/hypervisorsetup/index.html index fbb3b9f..f3ebbd9 100644 --- a/servers/hypervisorsetup/index.html +++ b/servers/hypervisorsetup/index.html @@ -65,6 +65,13 @@

      In this tutorial we're going to cover how to setup the open source hypervisor QEMU/KVM in Linux host OS, using the libvirt technology.

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : PC / Laptop / Homeserver / Remote Server

      2. +
      3. Host OS : Linux

      4. +
      +

      I recommend using this setup first of all to isolate your Public use, and to segment it from the other Uses such as Private use, but it can later be used for Anonymous use, and also Sensitive Use, as per the 4 basic OPSEC levels.

      + diff --git a/servers/linux/index.html b/servers/linux/index.html index 6b43dd6..5369865 100644 --- a/servers/linux/index.html +++ b/servers/linux/index.html @@ -64,6 +64,12 @@

      How to install Linux from a Windows PC

      In this tutorial, we're going to look at the first and foremost thing anyone can do to remove surveillance from their digital lives, by installing a free and open source software (FOSS) host operating system: Linux, in this case we're going to setup the latest Debian.

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      +

      I recommend using this setup on your main PC, laptop, but also as a home server or a remote server. For Privacy use, and potentially Anonymous use if you implement the correct technology for it later on, as per the 4 basic OPSEC levels.

      + diff --git a/servers/linuxprograms/index.html b/servers/linuxprograms/index.html index 37430d8..e29ebbd 100644 --- a/servers/linuxprograms/index.html +++ b/servers/linuxprograms/index.html @@ -64,6 +64,13 @@

      How to install and update programs on Linux

      In this tutorial, we're going to take a look at how you can install and update your programs on linux:

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : PC / Laptop / Homeserver / Remote Server

      2. +
      3. OS : Linux

      4. +
      +

      I recommend using this setup for Private use, as per the 4 basic OPSEC levels.

      + diff --git a/servers/monero2024/index.html b/servers/monero2024/index.html index 20bfa78..f54cb0e 100644 --- a/servers/monero2024/index.html +++ b/servers/monero2024/index.html @@ -64,6 +64,15 @@

      How to acquire and use Monero

      In this tutorial we're going to take a look at how to setup a monero wallet locally, how to recieve some monero there, and how to send monero to someone else.

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      +

      I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels.

      + diff --git a/servers/tailsqemuvm/index.html b/servers/tailsqemuvm/index.html index b2ac593..541243f 100644 --- a/servers/tailsqemuvm/index.html +++ b/servers/tailsqemuvm/index.html @@ -64,7 +64,16 @@

      Tails OS QEMU VM for Temporary Anonymity

      In this tutorial we're going to look at how you can run Tails OS (The Amnesic Incognito Linux System) in a QEMU VM, following the official documentation here.

      -

      TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic

      + +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Application: Host-based VPN (if your ISP doesn't allow Tor traffic)

      8. +
      +

      I recommend using this setup into one of the above mentionned VMs, for Anonymous use, as per the 4 basic OPSEC levels.

      +

      TODO: force a VPN through Tor

      diff --git a/servers/torbrowsing/index.html b/servers/torbrowsing/index.html index ef8f790..8b95192 100644 --- a/servers/torbrowsing/index.html +++ b/servers/torbrowsing/index.html @@ -64,7 +64,16 @@

      Tor Browsing Setup

      In this tutorial we're going to cover how to browse the web anonymously, and some simple rules to follow to protect your anonymity.

      -

      TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Virtual Machine: Linux or Whonix or Tails

      8. +
      9. Application: VPN (if your ISP doesn't allow Tor traffic)

      10. +
      +

      I recommend using this setup into one of the above mentionned VMs, for Anonymous use, as per the 4 basic OPSEC levels.

      + diff --git a/servers/vpn/index.html b/servers/vpn/index.html index 4f3bebb..c8cfea8 100644 --- a/servers/vpn/index.html +++ b/servers/vpn/index.html @@ -62,6 +62,15 @@
      Previous Page

      nihilist@mainpc - 2024-06-27

      How to get privacy from your ISP using a VPN

      +

      OPSEC Recommendations:

      +
        +
      1. Hardware : PC / Laptop / Homeserver / Remote Server

      2. +
      3. Host OS : Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. VM : Linux

      8. +
      +

      I recommend to use that setup as part of your Privacy Use online, to hide what you are browsing online from your ISP

      +
      diff --git a/servers/whonixqemuvms/index.html b/servers/whonixqemuvms/index.html index 4183160..724f0c0 100644 --- a/servers/whonixqemuvms/index.html +++ b/servers/whonixqemuvms/index.html @@ -64,7 +64,16 @@

      Whonix QEMU Setup

      Whonix is an open-source OS made specifically for general anonymous activities. In this tutorial we're going to set it up using the QEMU virtualization setup we installed previously.

      -

      TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns, 3) setup where the destination website doesnt allow tor traffic

      + +

      OPSEC Recommendations:

      +
        +
      1. Hardware : (Personal Computer / Laptop)

      2. +
      3. Host OS: Linux

      4. +
      5. Hypervisor: libvirtd QEMU/KVM

      6. +
      7. Application: Host-based VPN (if your ISP doesn't allow Tor traffic)

      8. +
      +

      I recommend using this setup into one of the above mentionned VMs, for Anonymous use, as per the 4 basic OPSEC levels.

      +

      TODO: force a VPN through Tor