diff --git a/opsec/MobileTor/0.jpeg b/opsec/MobileTor/0.jpeg new file mode 100644 index 0000000..45a9742 Binary files /dev/null and b/opsec/MobileTor/0.jpeg differ diff --git a/opsec/MobileTor/1.png b/opsec/MobileTor/1.png new file mode 100644 index 0000000..4c5fd77 Binary files /dev/null and b/opsec/MobileTor/1.png differ diff --git a/opsec/MobileTor/11.png b/opsec/MobileTor/11.png new file mode 100644 index 0000000..bf12ec7 Binary files /dev/null and b/opsec/MobileTor/11.png differ diff --git a/opsec/MobileTor/12.png b/opsec/MobileTor/12.png new file mode 100644 index 0000000..6bc7e3d Binary files /dev/null and b/opsec/MobileTor/12.png differ diff --git a/opsec/MobileTor/13.png b/opsec/MobileTor/13.png new file mode 100644 index 0000000..c4140b1 Binary files /dev/null and b/opsec/MobileTor/13.png differ diff --git a/opsec/MobileTor/14.png b/opsec/MobileTor/14.png new file mode 100644 index 0000000..0c9bf37 Binary files /dev/null and b/opsec/MobileTor/14.png differ diff --git a/opsec/MobileTor/15.png b/opsec/MobileTor/15.png new file mode 100644 index 0000000..949a0d9 Binary files /dev/null and b/opsec/MobileTor/15.png differ diff --git a/opsec/MobileTor/16.png b/opsec/MobileTor/16.png new file mode 100644 index 0000000..19857d9 Binary files /dev/null and b/opsec/MobileTor/16.png differ diff --git a/opsec/MobileTor/17.png b/opsec/MobileTor/17.png new file mode 100644 index 0000000..87ef1a7 Binary files /dev/null and b/opsec/MobileTor/17.png differ diff --git a/opsec/MobileTor/18.png b/opsec/MobileTor/18.png new file mode 100644 index 0000000..d3f5453 Binary files /dev/null and b/opsec/MobileTor/18.png differ diff --git a/opsec/MobileTor/19.png b/opsec/MobileTor/19.png new file mode 100644 index 0000000..c7ffa61 Binary files /dev/null and b/opsec/MobileTor/19.png differ diff --git a/opsec/MobileTor/2.png b/opsec/MobileTor/2.png new file mode 100644 index 0000000..dcd15c2 Binary files /dev/null and b/opsec/MobileTor/2.png differ diff --git a/opsec/MobileTor/20.png b/opsec/MobileTor/20.png new file mode 100644 index 0000000..f00d346 Binary files /dev/null and b/opsec/MobileTor/20.png differ diff --git a/opsec/MobileTor/21.png b/opsec/MobileTor/21.png new file mode 100644 index 0000000..e8a4d9d Binary files /dev/null and b/opsec/MobileTor/21.png differ diff --git a/opsec/MobileTor/3.png b/opsec/MobileTor/3.png new file mode 100644 index 0000000..b871ff9 Binary files /dev/null and b/opsec/MobileTor/3.png differ diff --git a/opsec/MobileTor/4.png b/opsec/MobileTor/4.png new file mode 100644 index 0000000..ad26f7f Binary files /dev/null and b/opsec/MobileTor/4.png differ diff --git a/opsec/MobileTor/5.png b/opsec/MobileTor/5.png new file mode 100644 index 0000000..4c27aca Binary files /dev/null and b/opsec/MobileTor/5.png differ diff --git a/opsec/MobileTor/6.png b/opsec/MobileTor/6.png new file mode 100644 index 0000000..e755d6f Binary files /dev/null and b/opsec/MobileTor/6.png differ diff --git a/opsec/MobileTor/7.png b/opsec/MobileTor/7.png new file mode 100644 index 0000000..c74dad6 Binary files /dev/null and b/opsec/MobileTor/7.png differ diff --git a/opsec/MobileTor/index.html b/opsec/MobileTor/index.html new file mode 100644 index 0000000..35816bf --- /dev/null +++ b/opsec/MobileTor/index.html @@ -0,0 +1,190 @@ + + + + + + + + + + + How to use the Tor Browser on Mobile + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ Previous Page

Will Jaget - 19 / 08 / 2024

+

How to use the Tor Browser on Mobile

+

Sometimes you are not always in front of your computer but need to browse the web anonymously while being away from your home. In this tutorial we're going to cover how to browse the web anonymously while on your mobile device.

+ +
+
+
+
+ + +
+
+
+
+

Technology Recommended:

+
    +
  • Hardware: Google Pixel

  • +
  • Host OS: Graphene OS

  • +
  • Configuration: Can be set in the Private or Anonymous Profile

  • +
+

+

Initial Download and Setup

+

You can download Tor Browser for Android from F-Droid (as we want to maintain the open source requirement), using the Guardian Repository, or the apk directly from the official Tor website. Please do not download it from any other source. There have been malicious versions passed around on social media in the past.

+ + + + + + + + + + + + + +

Note: To download from F-Droid you will have to enable Guardian Project Repositories under settings → My Apps → Guardian Project (guardianproject.info/fdroid/repo)

+ +

When you open the Tor app for the first time you will be greeted with this screen:

+

+ +

+

We'll do some slight configuration changes, starting with the automatic connection and then open settings: +toggle auto → settings +

+ +

+

In settings, scroll down to Privacy and security. Open Security Level:

+ +

+ +

+

Choose Safest for maximum security

+ +

+

Additionally in settings you can choose the Default search engine and to use (.onion) sites if you prefer.

+ +

+

And you are done, you should now be at the start page:

+

+ +

+

If your connection is being censored or you are unable to connect to the Tor network then you may have to configure a bridge. Choose “Config Bridge” on the opening screen or under settings:

+

+ +

+

Toggle “Use a Bridge” to open up three options: "obfs4", "meek-azure", and "snowflake".

+
    +
  1. Obfs4 is a pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.

  2. +
  3. Meek-Azure is a pluggable transport that makes it look like you are browsing a Microsoft web site instead of using Tor.

  4. +
  5. Snowflake involves a large number of volunteer proxies, which also makes them hard to pin point and prevents the blocking of proxy IP addresses.

  6. +
+

Additionally you can provide a trusted bridge to use if you know one.

+

+

Closing:

+
    +
  1. Orfox is a sunsetted privacy focused web browser based on Tor. It is no longer maintained and is not recommended.

  2. +
  3. Orbot is a proxy app that allows other apps on your device to encrypt your internet traffic through Tor. After installing Orbot go to Choose apps under settings in order to route the apps of your choice through Tor.

  4. +
  5. Currently there is no official Tor browser available for iOS on iPhone. Using Orbot with the open source Onion Browser is better than nothing but does not have the same privacy protections as Tor Browser. Use at your own risk.

  6. +
+ + + +
+
+
+
+ + + +
+
+
+
+

Nihilism

+

+ Until there is Nothing left. + +

+
+ +
+

My Links

+

+ + RSS Feed
Matrix Chat
+ +

+
+ +
+

About Will Jager

+

Donate XMR:8A96qyqg1t1EFtbSspTQpmiaUnyFAJZRQ9wFNTSJa11MWJLUcVVP1roQ3wQqqAPFxsMvZ1TX2oCHrX725rXA1X2MP46ckxg


Contact: willis.jager@proton.me

+
+ +
+ +
+
+ + + + + + + + diff --git a/opsec/index.html b/opsec/index.html index 114e587..675515b 100644 --- a/opsec/index.html +++ b/opsec/index.html @@ -40,7 +40,7 @@
Previous Page

OPSEC: Privacy, Anonymity and Plausible Deniability

Tutorials to show how to achieve Privacy, Anonymity and Plausible Deniability online. - I have a certain quality standard as to how i do these tutorials, if there are any improvements i can do on them please let me know. + I have a quality standard as to how i do these tutorials, if there are any improvements i can do on them please let me know.

SHOWCASED ARTICLE: Learn how to audit your own setup, to determine your Operational Security (OPSEC) Level, and find out what is the most appropriate internet use for it.


@@ -166,6 +166,7 @@

💻 Clientside - Getting Started (⚠️ Check if your ISP allows Tor or Not!)

  1. ✅ Tor Web Browser setup
  2. +
  3. ✅ How to use the Tor Browser on Mobile
  4. ✅ Tails OS QEMU VM for Temporary Anonymity
  5. ✅ VMs for Long-term Anonymity (Whonix QEMU VMs)
  6. diff --git a/opsec/tutorial/0.png b/opsec/tutorial/0.png new file mode 100644 index 0000000..75f6097 Binary files /dev/null and b/opsec/tutorial/0.png differ diff --git a/opsec/tutorial/index.html b/opsec/tutorial/index.html new file mode 100644 index 0000000..8371fc9 --- /dev/null +++ b/opsec/tutorial/index.html @@ -0,0 +1,190 @@ + + + + + + + + + + + How to write good Tutorials + + + + + + + + + + + + + + + + + + + + + + + +
    +
    +
    +
    + Previous Page

    nihilist@mainpc - 2024-08-19

    +

    How to write good Tutorials

    +

    Because after all, how can you expect people to write good tutorials without being shown how to write them in the first place ?

    + +
    +
    +
    +
    + + +
    +
    +
    +
    +

    Why?

    +

    Context: Suppose you are discovering OPSEC, Technology and all their abstract concepts, you are amazed at what you are finding, and you are now feeling very enthusiastic about sharing it to other people, but you don't know how to do it.

    +

    Situation: You go into that matrix chatroom you find that random dude called nihilist and you start to explain into great detail how you managed to implement QubesOS with that whonix Xen VM, and that he should also force a VPN through the SOCKS Tor proxy and you proclaim that this is the ultimate setup, and everyone should implement it. But before you can finish your ramblings the guy already ran away scared, he thought you were threatening him and his family.

    +

    Are you OK with how badly you just communicated ? Are you fine with being throwing your message out there and Noone is even properly recieving it ?

    +
    +
    +
    +
    + +
    +
    +
    +
    +

    What?



    +

    There exists a process, that this guy nihilist is using all the time on his OPSEC Blog, which is in 3 simple steps:

    +
      +
    1. Why ? Why the hell should others care about your message in the first place ? In which context ?

    2. +
    3. What ? If they care, What are the tools at their disposal to solve that problem ?

    4. +
    5. How ? How, step by step, can they use those tools to solve the problem ?

    6. +
    + +
    +
    +
    +
    + + + +
    +
    +
    +
    +

    How ?



    +

    Now that you are aware that there is a way to write good quality tutorials, let's look at how to write them, step by step.

    +

    First, ALWAYS start with the WHY, why the hell should all those mortals even care about your message. To do that, you need to tell them a story that highlights the problem. Most people are not even aware that there is a problem in the first place, so you must tell them.

    + +

    So you first contextualize your story, then you explain the situation, and then you ask them if they are ok with it.

    +
    
    +Context: In your house, in your bedroom, if there are windows to look outside
    +Situation: the annoying neighbor always stops by to look at what you're doing in your bedroom
    +Are you ok with this situation ?
    +
    +
    +

    Now that the problem has been highlighted, you can tell them WHAT their options are:

    +
    
    +You have a few options to prevent your annoying neighbor from seeing what you're doing in your bedroom:
    +1) get rid of all windows and have a house with only walls : expensive
    +2) install curtains on your windows : inexpensive
    +
    +
    +

    Now that you have listed their options, you can showcase HOW to implement an option you choose

    +

    WARNING: people don't want to read your wall of text, one way to make it fancy is to add graphs to help your readers visualize the idea you are trying to convey:

    + + +
    
    +Let's showcase how to install curtains, as it's the easiest and cheapest solution to prevent outsiders from seeing what you're doing in your bedroom.
    +
    +1) buy it, 
    +2) then you attach it above your windows, using screws and screwing it into the wall, (warning, if you're living in an apartment, ask your landlord's permission!)
    +3) then you can move the curtain to prevent outsiders from peeking in
    +
    +
    +

    Do not skip steps, otherwise your readers will get lost. and explain each step in great detail, that way there is no ambiguity. And if there are any important points that your readers need to be aware of, make sure you tell them, and how they can proceed in that second situation too.

    +

    And finally, congratulate your users as you conclude on what they managed to accomplish:

    +
    
    +Congratulations, you just managed to gain privacy at your own house / apartment ! You just reached OPSEC level 1!
    +
    +
    +

    Congratulations, you just managed to write a good tutorial, you highlighted why your users should care about your message, and if they care you just told them how they can solve the problem ! You now have the proper methodology to write top quality tutorials, and to communicate in a clear, and concise manner.

    + +
    +
    +
    +
    + + + +
    +
    +
    +
    +

    Nihilism

    +

    + Until there is Nothing left. + +

    +
    + +
    +

    My Links

    +

    + + RSS Feed
    Matrix Chat
    + +

    +
    + +
    +

    About nihilist

    +

    Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


    Contact: nihilist@nowhere.moe (PGP)

    +
    + +
    + +
    +
    + + + + + + + diff --git a/pushtoprod.sh b/pushtoprod.sh old mode 100644 new mode 100755