Merge branch 'uranuspucksaxophone-master' into master1

This commit is contained in:
deathrow 2022-09-04 15:36:28 -04:00
commit 5ac1dafe11
No known key found for this signature in database
GPG Key ID: FF39D67A22069F73
5 changed files with 34 additions and 39 deletions

View File

@ -75,7 +75,7 @@ sudo apt-get -t bullseye-backports --no-install-recommends install linux-image-a
```
```
grub-install /dev/xvda
sudo grub-install /dev/xvda
```
Adding the Kicksecure repository:
@ -226,5 +226,3 @@ rm /var/tmp/template-upgrade-cache.img
- [Hardened-Kernel](https://www.kicksecure.com/wiki/Hardened-kernel) <button type="button" class="btn btn-xs btn-xs"><a href="http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/wiki/Hardened-kernel">Tor</a></button>
- [VM Fingerprinting](https://www.whonix.org/wiki/VM_Fingerprinting) <button type="button" class="btn btn-xs btn-xs"><a href="http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/wiki/VM_Fingerprinting">Tor</a></button>
-

View File

@ -23,9 +23,6 @@ priority: 1
---
Well... I never thought i'd be making a guide so, here we go.... I guess....
Let's define a few important things here:
`Adversary: Your threat.`
`Privacy: The act of your personal activities being hidden from public.`
@ -84,7 +81,7 @@ You'll be able to make and choose your own model based upon this guide.
* Understanding benefits and negatives of a VPN <!--(PUT LINK HERE) -->
* Understanding important privacy concepts <!--(PUT LINK HERE) -->
* Understanding important security concepts <!--(PUT LINK HERE or make a section) -->
* [Understanding the principles of thread modeling](https://invidious.esmailelbob.xyz/watch?v=DHZRhboZhfI)
* [Understanding the principles of threat modeling](https://invidious.esmailelbob.xyz/watch?v=DHZRhboZhfI)
* Understanding how the internet functions
General Ideas:
@ -101,7 +98,7 @@ General Ideas:
Tor or The Onion Router was originally developed to keep U.S. military communications secure, and is now used world-wide to bypass censorship.
Tor will route your network traffic through 3 servers worldwide randomly.
``entry-node`` -> ``middle-node`` -> ``exit-node``.
``entry-node (aka Guard node)`` -> ``middle-node`` -> ``exit-node``.
This setup means that the ``entry-node`` will only have your IP address, the ``middle-node`` will only see the IP of ``entry-node`` __NOT__ your IP address.
``exit-node`` is the only node which will see *all* of your network traffic.
@ -151,7 +148,7 @@ More on this subject will be later in this _guide._
* Your life will change drastically.
* Do not be lazy
* Do not be lazy.
People may think you are paranoid, but in a world like this it *is* useful to be even a bit paranoid. This will allow you to see the true realities of the world. If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should. Privacy and security are constantly evolving, which means that you will have to evolve with it. Are you ready for a data breach? What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
@ -315,15 +312,15 @@ Those who are looking for some excitement or extremely into privacy, security an
What is Qubes OS? Simply put, Qubes OS is a "reasonably secure operating system" and it will be the basis of our secure setup.
It uses a method known as "security by compartmentalization".
Simply put, most aspects of the OS are split into Qubes which can be thought of as virtual machines, meaning that if something gets compromised, the rest of the system can be safely used.
Simply put, most aspects of the OS are split into Qubes which are virtual machines, meaning that if something gets compromised, the rest of the system can be safely used.
Due to the way Qubes OS is built, requirements will be heavy.
Recommend at *least* 16GB of RAM with plenty of storage.
Recommend at *least* 8GB of RAM with plenty of storage.
The official requirements can be found [here](https://www.qubes-os.org/doc/system-requirements/).
Note: QubesOS / Qubes generally refers to the operating system, and the term qube is used describe the individual "VMs".
Why should we use Qubes OS?
Note: Qubes OS / Qubes generally refers to the operating system, and the term qube is used describe the individual "VMs".
- It is commonly regarded as one of the most secure operating systems
- Provides amazing potential for creativity
- Still can be considered trusted even if a section is compromised
@ -674,7 +671,7 @@ Ensure that nothing will leave the qube.
Ensure that all the ``alias`` qubes are properly routed via VPN or Tor to ensure proper setup.
For a more advanced setup, you are able to utilize Whonix qubes.
Using multiple aliases outside QubeOS is definitely possible, and will require several things.
Using multiple aliases outside Qubes OS is definitely possible, and will require several things.
You'll need several browsers configured to wipe all history, cookies, and cache on closure, along with a KeePass or another password manager database.
Some accounts and aliases will need their own email, you can use [Proton](https://proton.me) for your mail provider.
@ -715,7 +712,7 @@ To make a list of browsers we should avoid can be exhaustive, so instead here is
#### [Brave](https://brave.com) <button type="button" class="btn btn-xs btn-xs"><a href="https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion/">Tor</a></button>
Brave is based upon Chrome and includes significant enabled-by-default [privacy protections](https://brave.com/privacy-features/) by default unlike a lot of other browsers.
Brave is based upon Chromium and includes significant enabled-by-default [privacy protections](https://brave.com/privacy-features/) by default unlike a lot of other browsers.
Certain built-in functions such as IPFS and crypto may want to be avoided.
<!--<i class="fa fa-arrow-right" aria-hidden="true"></i>-->
@ -727,7 +724,7 @@ Certain built-in functions such as IPFS and crypto may want to be avoided.
</div>
<div class="panel-body">
You should NOT use the built-in Tor function unless absolutely necessary!
This will leave a unique browser fingerprint over the Tor network, potentially leaving you vulnerable as there is no protection.
This will leave a unique browser fingerprint over the Tor network, potentially leaving you vulnerable as there is no FP protection.
</div>
</div>

View File

@ -42,9 +42,8 @@ This is up to you to decide which services if any you decide to use and how to u
Multi-factor authentication is extremely important as it provides multiple layers to your account even if your password is compromised.
- [Aegis](https://github.com/beemdevelopment/Aegis) (Mobile)
- [andOTP](https://github.com/andOTP/andOTP) (Mobile)
- [NitroKey](https://www.nitrokey.com/) (Hardware)
- [YubiKey](https://www.yubico.com/) (Hardware)
- [YubiKey](https://www.yubico.com/) (Hardware) (**Warning: proprietary**)
<br>
@ -74,9 +73,6 @@ None of these should be installed on Tor Browser.
- [ClearURL](https://github.com/ClearURLs/Addon)
- [UBlock Origin](https://github.com/gorhill/uBlock)
- [NoScript](https://github.com/hackademix/noscript)
- [LocalCDN](https://codeberg.org/nobody/LocalCDN)
- [CanvasBlocker](https://github.com/kkapsner/CanvasBlocker)
- [Libredirect](https://github.com/libredirect/libredirect)
<br>
@ -238,6 +234,7 @@ Password managers are a great way to both securely and remember all of your pass
Your passwords are saved in an encrypted database, which you only need to remember 1 password while generating secure passwords for all of your accounts.
- [KeePassXC](https://keepassxc.org)
- [Bitwarden](https://bitwarden.com/) (more convenient since it's cloud synced)
<br>

View File

@ -24,7 +24,7 @@ Things needed for this setup:
Choosing the host OS is by far the most critical part of this setup. This host OS will need to have proper security updates and have the ability for increased hardening. Here are a few that would be recommended.
* [Fedora](https://getfedora.org/)
* [Void Linux](https://voidlinux.org/)
* [Void Linux](https://voidlinux.org/) (hardened musl build is highly recommended)
* [Arch](https://archlinux.org/)
* [PlagueOS](https://git.arrr.cloud/whichdoc/plagueos) (Hardened by default which makes it perfect for this setup)

View File

@ -26,6 +26,9 @@ description: A fun happy place.
<button type="button" class="btn btn-md btn-default"><a href="https://codeberg.org/deathrow/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Repository</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://github.com/d-eathrow/anonymousland"> <i class="fa fa-github" aria-hidden="true">
</i> GitHub mirror</a></button>
<button type="button" class="btn btn-md btn-default"><a href="./rss"><i class="fa fa-rss-square" aria-hidden="true"></i> RSS</a></button>