Compare commits

...

32 Commits

Author SHA1 Message Date
deathrow
9f031e2fa4
Fix index 2023-07-06 14:09:18 -04:00
deathrow
d5eceac503
Add Articles 2023-07-05 23:57:20 -04:00
deathrow
6f67379d6e
Update Index 2023-07-05 15:19:35 -04:00
deathrow
17cd66a312
Add the additional pages on Index 2023-06-25 12:48:24 -04:00
deathrow
48ded5fba5
GitHub Pages Notice 2023-06-25 12:47:00 -04:00
deathrow
4bffa38200
Add CNAME 2023-06-25 12:45:14 -04:00
deathrow
692f1f33b0
Add Remote Theme to fix UI issues 2023-06-25 12:42:57 -04:00
deathrow
03d83770bb
Config Comment for Pages 2023-06-25 12:23:46 -04:00
deathrow
8309698158
Update Gemfile 2023-06-25 12:16:41 -04:00
deathrow
b844e938ff
Remove 2023-06-11 17:31:46 -04:00
deathrow
fbaf62abe2
Fix file name 2023-06-11 17:28:36 -04:00
deathrow
e917710573
Matrix well-known 2023-06-11 17:13:12 -04:00
deathrow
52699a231b
Started Tor with VPN section 2023-05-13 13:38:49 -04:00
deathrow
d78fafb6f2
Small changes + Njalla notice 2023-05-03 15:06:07 -04:00
deathrow
263d19ac8c
Update table of contents 2023-05-01 22:56:30 -04:00
deathrow
eeb79c72b9
Update Mullvad Browser information and update Qubes section 2023-05-01 14:53:32 -04:00
deathrow
8fb15c8d79
Facial Recognition Link 2023-04-30 22:42:28 -04:00
deathrow
13dec9279c
Update naming 2023-04-25 11:10:00 -04:00
deathrow
2812a838b0
Add notice & move pages 2023-04-25 11:07:35 -04:00
deathrow
c13bc536ae
Update index 2023-04-25 11:01:21 -04:00
deathrow
33e8431d2d
Minor formatting fixes and additional hardware key 2023-04-25 11:00:53 -04:00
deathrow
8298264d9a
Rename section 2023-04-25 10:55:00 -04:00
deathrow
c6546efdd8
Update email aliasing 2023-04-25 10:51:45 -04:00
deathrow
5e6ca88197
Tkey + Mullvad Browser 2023-04-24 23:34:56 -04:00
deathrow
cc48257876
Update Table of Contents to include New Tor Browsers section 2023-04-24 23:34:42 -04:00
deathrow
b0c4050cef
Mullvad Browser 2023-04-24 23:21:56 -04:00
deathrow
f8effec6f9
Move note 2023-04-19 22:19:28 -04:00
deathrow
6312cdd9e9
Fix typographical error 2023-04-19 22:12:55 -04:00
deathrow
13315a2c96
Add Note. 2023-04-19 22:12:14 -04:00
deathrow
28e6db92ca
NOTICE 2023-04-19 20:17:09 -04:00
deathrow
e858c56514
UPDATE NOTICE 2023-04-19 20:16:36 -04:00
deathrow
dd6e934421
URGENT UPDATE. 2023-04-19 20:11:06 -04:00
12 changed files with 149 additions and 227 deletions

1
CNAME Normal file
View File

@ -0,0 +1 @@
anonymousland.org

View File

@ -7,4 +7,5 @@ gem "jekyll-seo-tag"
gem "jekyll-sitemap"
gem "kramdown-parser-gfm"
gem "bundler"
gem "webrick"
gem "webrick"
gem "github-pages"

View File

@ -1,5 +1,22 @@
# **[Anonymousland](https://anonymousland.org)** v1.10
## Notice:
We are temporary using GitHub pages.
This provides an easier maintenance-free system of hosting.
This is beneficial as it does not require an additional VPS and configuration.
Until our infrastructure is restored, the site will remain on GitHub pages.
SERVICES OFFLINE.
VPS PROVIDER DELETED ENTIRE VPS WITHOUT NOTICE.
Our VPS provider- 1984 deleted the entire VPS without notice.
All data regarding **ALL** of our services is gone.
Only the Git mirrors remain.
> Hosing publicly usable services which provides benefits to anonymity are a great way to help the community. Unfortunately, these become difficult to manage & maintain. Many services including our Tor node and Matrix server were prone to being abused. To effectively combat abuse, this would require us to use privacy-invasive measures. Our hosting provider - 1984, the host we used for everything, decided to delete the entire VPS without notice. We received no emails or alerts on such actions. There could be a number of reasons for this - primarily being abuse. Our Tor exit node hosted on Njalla was shutdown after malicious user(s) conducted several brute-force attacks. Njalla has become ridiculously expensive to operate with, providing no real upgrades, and you are limited to a small amount of storage. While hosting services is great, it's even more difficult to do such with little to no donations, and a wide variety of malicious actors conducting abuse on such services. Services may be available in the future, but for now we best stick with this website, and this website only.
> Anonymity, Privacy, Security
<div align="center">

View File

@ -0,0 +1 @@
{"m.server": "matrix.anonymousland.org:443"}

View File

@ -1,5 +1,6 @@
repository: anonymousland/anonymousland
theme: jekyll-theme-potato-hacker
remote_theme: luxedo/jekyll-theme-potato-hacker
#theme: jekyll-theme-potato-hacker
theme_base: "dark"
theme_switch: off
title: Anonymousland

View File

@ -59,8 +59,10 @@ _Disclaimer: This is for education / research._
-\>> [Important Concepts](#important-concepts) <br>
- -\> _[Tor](#tor)_ <br>
- -\> _[Tor with VPN](#tor-with-vpn)_ <br>
- -\> _[Tor Usage](#tor-usage)_ <br>
- -\> _[Tor Operating Systems](#tor-operating-systems)_ <br>
- -\> _[Tor Browser(s)](#tor-browsers)_ <br>
- -\> _[Contributing to Tor](#contributing-to-tor)_ <br>
-\>> [Proper Mindset](#proper-mindset) <br>
@ -76,7 +78,6 @@ _Disclaimer: This is for education / research._
- -\>> _[Installation](#installation)_ <br>
- -\>> _[Template Setup](#template-setup)_ <br>
- -\>> _[Onionizing Repositories](#onionizing-repositories)_ <br>
- -\>> _[Qubes Basic Setup](#qube-basic-setup)_ <br>
-\>> [Creating our Aliases](#creating-our-aliases) <br>
-\>> [Browsers](#browsers) <br>
@ -86,14 +87,13 @@ _Disclaimer: This is for education / research._
-\>> [Mobile](#mobile) <br>
- -\>> _[GrapheneOS](#grapheneos)_ <br>
- -\>> _[GrapheneOS Hardening](#grapheneos-hardening)_ <br>
- -\>> _[External Applications](#external-applications)_ <br>
- -\>> _[Tor](#tor-1)_ <br>
-\>> [Physical](#physical) <br>
- -\>> _[Cars](#cars)_ <br>
-\>> [Secure Communications](#secure-communications) <br>
-\>> [Secure(ish) Communications](#secureish-communications) <br>
-\>> [Secure Hardware](#secure-hardware) <br>
-\>> [Plausible Deniability](#plausible-deniability) <br>
-\>> [Tails](#tails) <br>
@ -148,6 +148,21 @@ If you are using an "amnesic" setup such as Tails or anon-whonix on Qubes OS, yo
<br>
#### Tor with VPN
Using Tor with a VPN has both upsides and downfalls.
This setup will vary from person to person based upon usage, threat models and other factors only you can determine.
Using a VPN with Tor has its downfalls.
One of the main reasons you should use a VPN with Tor is if you are concerned with your ISP watching for Tor traffic and you can *reasonably* trust your VPN provider.
To prevent your ISP or another adversary from viewing Tor traffic, you are also able to use Tor bridges for such, but if it is not critical to use bridges, do not as there are other people who benefit from bridges.
Using a VPN will proxy your Tor traffic to another ISP, which hopefully is less malicious than an adversary you are hiding this traffic from.
Using a VPN will increase latency, along with potentially messing with the guard node selection.
<br>
#### Tor Usage
Tor is extremely important for our setup.
@ -165,6 +180,7 @@ Other applications such as [Briar](https://briarproject.org).
Any application that has a `proxy` setting can be used.
The Orbot ports:
SOCKS: `127.0.0.1:9050`
HTTP: `127.0.0.1:8118`
@ -223,6 +239,13 @@ All of your applications will occur in `Whonix-Workstation`.
<br>
#### Tor Browser(s)
There are several different ways to access Tor, primarily through a browser.
Browsers such as Brave offer this, but this should **NOT** be used, as it contains a unique fingerprint.
<br>
#### Contributing to Tor
Tor is an amazing project.
@ -260,11 +283,14 @@ Here is a general thought process...
Let's eliminate user error.
More on this subject will be later in this _guide._
- Take over-procedures. Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
- Take over-procedures.
Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
- Do not compromise your security for a friend. If they are your friend, they will respect your new-founded love for being secure.
- Do not compromise your security for a friend.
If they are your friend, they will respect your new-founded love for being secure.
- Do not reveal more than you need to. MMJ doesn't need to know what you had for lunch.
- Do not reveal more than you need to.
MMJ doesn't need to know what you had for lunch.
(things to keep in mind)\* Reveal as little about yourself and origin as possible.
@ -276,7 +302,14 @@ Here is a general thought process...
- Do not be lazy.
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid. This will allow you to see the true realities of the world. If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should. Privacy and security are constantly evolving, which means that you will have to evolve with it. Are you ready for a data breach? What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
- Do not have the misconception that just because it is open-source makes it secure.
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid.
This will allow you to see the true realities of the world.
If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should.
Privacy and security are constantly evolving, which means that you will have to evolve with it.
Are you ready for a data breach?
What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
<br>
@ -298,7 +331,8 @@ You need to properly identify a _threat model_, an _adversary_ along with perfor
The most important part of your setup.
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity. You'll need to properly layout and identify what you are protecting yourself from.
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity.
You'll need to properly layout and identify what you are protecting yourself from.
Everyone has something to protect, whether it is passwords, location, internet activity, confidential documents, etc.
The items you are trying to protect will be referred here as "assets".
@ -309,7 +343,7 @@ Ask yourself these basic questions:
- What happens if I fail to protect this?
These are some basic questions to ask yourself when creating your threat model.
Based upon your answers to these questions, will determine the route you must go.
Based upon your answers to these questions, will determine the route you must go.
Example - You don't want your neighbor Joe to see you sleeping, so you close your blinds.
Developing a threat model will require a lot of time and effort.
@ -435,6 +469,10 @@ Some aliasing services:
- [AnonAddy](https://anonaddy.com/)
- [Duckduckgo Mail](https://duckduckgo.com/email/)
- [Firefox Relay](https://relay.firefox.com/)
- [SimpleLogin](https://simplelogin.io/)
<br>
@ -451,7 +489,7 @@ _What is the point of using a secure messenger, if your desktop is compromised b
A massive amount of information is stored on our desktop, meaning that it contains a trove of our personal information.
From search results to private documents.
These items are **NOT** private on "traditional" operating systems.
The default desktop enviroment has a broken security model.
The default desktop environment has a broken security model.
This is due to the fact of lacking permissions and proper isolation as done on mobile operating systems such as Android with their per-app permission toggles.
Some services like Firejail, Bubblewrap, SELinux and Apparmor can fix a lot of these issues, but the fact is configuring these services for every application can be a daunting task and can lead to much user-error.
@ -623,10 +661,10 @@ qubes-usb-proxy
qubes-gpg-split
```
Fedora-36:
Fedora-37:
```
sudo qubes-dom0-update qubes-template-fedora-36
sudo qubes-dom0-update qubes-template-fedora-37
```
Debian-11:
@ -671,7 +709,7 @@ deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/de
Fedora Templates:
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncoment the onion `baseurl`
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncomment the onion `baseurl`
<br>
@ -689,101 +727,10 @@ More thoughts:
<br>
#### U2F-Proxy
#### Additional Setup
Using [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) allows you to "compartmentalize the browser in one qube and the USB stack in another so that they are always kept separate from each other".
The Qubes documentation shows the following for installation:
dom0:
```
sudo qubes-dom0-update qubes-u2f-dom0
```
Now, execute this command for all the Qubes you will utilize u2f.
```
qvm-service --enable QUBE_NAME qubes-u2f-proxy
```
To install on our templates, use the following:
Fedora:
```
sudo dnf install qubes-u2f
```
Debian:
```
sudo apt install qubes-u2f
```
Finally, you must restart your Qubes.
It's suggested you read the [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) documentation.
<br>
#### YubiKey
Using a YubiKey can help mitigate certain attacks such as password "snooping", along with increasing security.
Read the [official documentation](https://qubes-os.org/doc/yubikey).
Installation for template qubes:
Fedora:
```
sudo dnf install ykpers yubikey-personalization-gui
```
Debian:
```
sudo apt-get install yubikey-personalization yubikey-personalization-gui
```
The GUI on for Debian can be run via the `yubikey-personalization-gui` command.
- Choose `configuration slot2`.
- Select `HMAC-SHA1 mode: fixed 64 bit input`.
- Ensure to backup the `Secret Key (20 bytes hex)`.
Now the following is required for dom0:
```
sudo qubes-dom0-update qubes-yubikey-dom0
```
If we had changed the name of `sys-usb` or are using something other than that, we would need to edit ``/etc/qubes/yk-keys/yk-vm'' in dom0.
- Paste the `Secret Key (20 bytes hex)` into `/etc/qubes/yk-keys/yk-secret-key.hex` in dom0.
- Paste your hashed password into `/etc/qubes/yk-keys/yk-login-pass-hashed.hex` in dom0.
To get your hashed password:
```
read -r password
```
```
echo -n "$password" | openssl dgst -sha1
```
Edit `/etc/pam.d/login` in dom0 and add:
```
auth include yubikey
```
Now, edit `/etc/pam.d/xscreensaver` to include:
```
auth include yubikey
```
We are able to use [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) along with [yubikey](https://qubes-os.org/doc/yubikey).
Review the official documentation.
<br>
@ -984,6 +931,7 @@ LibreWolf is a good alternative to utilizing Arkenfox on Qubes as we cannot reas
#### General Notes
- For using Tor, you should only use the *official* Tor Browser.
- For an ideal browser setup focused around privacy, you should **NOT** store any browser history, cookies or cache.
- HTTPS-Only should be activated on all browsers.
- Disable saving of passwords, logins, credit cards, etc. as this is a security concern saving all of this in a web browser.
@ -1000,6 +948,10 @@ There are a variety of tools to test your different browser configurations in a
- [SSL Test](https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html)
[Mullvad](https://mullvad.net) has released the [Mullvad Browser](https://mullvad.net/en/browser), which focuses on minimizing the browser fingerprint and to minimize tracking.
It comes installed with UBlock Origin by-default.
With this browser being brand-new, it would be advisable to proceed with caution, but this browser does appear promising.
<br>
---
@ -1081,12 +1033,12 @@ If your device has the ability to create multiple profiles, you can create a "To
---
## **Secure Communications**
## **Secure(ish) Communications**
Having a secure operating system is only 1 part that we need.
We need to ensure that all of our communications stay secure.
The most common method to this is using E2EE (End-to-end encryption).
anThis encrypts your messages locally on your device before sending them out.
This encrypts your messages locally on your device before sending them out.
Let's take a look at some of the basic types of messengers.
Centralized: Meaning there is a single server / point of failure.
@ -1106,6 +1058,7 @@ Here's a list of "great" messengers and services that you'll be able to use.
Session has built-in onion-routing.
- [Matrix](https://matrix.org) Matrix provides a federated platform, which allows for anyone to host their own server, meaning that it is resistent to censorship as the network does not rely on a single server.
*Note: Matrix has issues regarding metadata.*
- [Briar](https://briarproject.org) A P2P messenger app which is designed for extreme threat models.
Allows for Bluetooth communication along with routing communications over Tor network.
@ -1230,6 +1183,11 @@ Your walking style is a unique identifier, and can be used to track you.
To change this, you are able to do a variety of things to change your normal behavior / pattern.
The easiest method would be to put a coin inside your shoe.
- [Generating digital signatures with the gait of people](https://towardsdatascience.com/generating-digital-signatures-with-the-gait-of-people-3a66f0c44b7b)
- [From Learning Gait Signatures of Many Individuals to Reconstructing Gait Dynamics of One Single Individual](https://www.frontiersin.org/articles/10.3389/fams.2020.564935/full)
<br>
### Heart Rate
@ -1242,6 +1200,8 @@ Doing such will raise / lower your heart rate based upon what you do.
To hide your heart rate from such technology, it is advisable to use tinfoil to block the signal.
This can be done via foil clothing or line a jacket with the proper tinfoil material.
- [Heart rate prediction from facial video with masks using eye location and corrected by convolutional neural networks](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8906658/)
<br>
### Fingerprints
@ -1332,6 +1292,7 @@ You can be tracked physically with a wide array of technologies including but no
- [Real Time Object Tracking System using Thermal Camera](https://medium.com/analytics-vidhya/real-time-object-tracking-system-using-thermal-camera-b4d077a20f16)
- Facial recognition
- [The T-Shirt Invisibility Cloak](https://yewtu.be/watch?v=NyofHyRm5CQ)
- [Wearable face projector](https://inv.bp.projectsegfau.lt/watch?v=_PoudPCevN0)
<br>
@ -1390,7 +1351,7 @@ Very useful if you're at an airport, hotel or other public area in which you nee
<br>
[PortaPow USB Data Blocker](https://www.amazon.com/PortaPow-3rd-Gen-Data-Blocker/dp/B00QRRZ2QM/) - The gold standard of USB data blocking.
This is a USB-A connector withqubesqubes a built-in "SmartChip" designed to increase charging speeds.
This is a USB-A connector with a built-in "SmartChip" designed to increase charging speeds.
<br>
@ -1495,13 +1456,14 @@ Security Keys:
- [NitroKey](https://www.nitrokey.com/)
- [Tkey](https://www.tillitis.se/)
- [YubiKey](https://www.yubico.com/)
Crypto Wallets:
- [Trezor](https://trezor.io/)
<br>
---
@ -1541,6 +1503,8 @@ These range from Amazon Azure, to Linode.
For a server, it's advisable to pay with crypto-currency, such as Monero, Zcash or some other type of "privacy"-respecting currency.
If you need a domain, it's advisable to use [Njalla](https://njal.la) <button type="button" class="btn btn-default btn-xs"><a href="http://njallalafimoej5i4eg7vlnqjvmb6zhdh27qxcatdn647jtwwwui3nad.onion/">Tor</a></button> as they do not collect any personal information, and they are well-known for their strong privacy.
While Njalla is a fantastic privacy-respecting service, their VPS plans are lacking.
For hosting a simple web server or private service, this should be sufficient, but the idea here is that we have separate providers for our VPS and our domain.
For the actual server, you can use [1984](https://1984.is/) or the listed options below:
@ -1562,7 +1526,7 @@ This is an advanced attack which requires equipment and the technical skill to s
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use.
To take certain precautions, it's advisable to unplug and power off all devices not currently in-use.
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
<br>

View File

@ -44,6 +44,7 @@ Multi-factor authentication is extremely important as it provides multiple layer
- [Aegis](https://github.com/beemdevelopment/Aegis) (Mobile)
- [NitroKey](https://www.nitrokey.com/) (Hardware)
- [Tkey](https://www.tillitis.se/) (Hardware)
- [YubiKey](https://www.yubico.com/) (Hardware) <button type="button" class="btn btn-xs btn-warning"> <a href="https://www.yubico.com/blog/secure-hardware-vs-open-source/"> Proprietary </a> </button>
<br>
@ -61,6 +62,7 @@ Your browser contains everything you do.
It is the main entry point onto your system, along with the main privacy & security risk.
- [Tor Browser](https://torproject.org) <button type="button" class="btn btn-default btn-xs"><a href="http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/">Tor</a></button>
- [Mullvad Browser](https://mullvad.net/en/browser)
- [Librewolf](https://librewolf.net/)
- [Vanadium](https://vanadium.app) (Mobile)
- [Bromite](https://bromite.org) (Mobile)

View File

@ -1,72 +0,0 @@
---
layout: default1
title: Transparency
permalink: /transparency
---
<div style="text-align:center;">
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
</div>
## Servers
### 1984
6 Cores
16GB RAM
360 GB SSD
<br>
### Njalla
6 Cores
9GB RAM
90 GB SSD
<br>
---
Total Cost: €139/month
Public Services:
- Matrix Clearnet
- Matrix Onion
- Element Clearnet
- Element Onion
- Element Onion
- Cinny Clearnet
- Cinny Onion
- Schild Clearnet
- Dimension Clearnet
- Gitea Clearnet
- Mastodon Clearnet
- Status Clearnet
- OTS Clearnet
- Paste Clearnet
<br>
#### Matrix Clearnet
`media_store` : 31.6 GiB
`DB` : 61GB
**1984**
Total Price: €49/month
<br>
#### Other Services
**Njalla**
Total Price: €90/month

View File

@ -11,9 +11,14 @@ permalink: /propagate
<br>
<br>
## Hosting Ideas
## Orbot
<br>
## Hosting Ideas
- [Awesome Self Hosted](https://github.com/awesome-selfhosted/awesome-selfhosted)
- [Mailcow](https://github.com/mailcow/mailcow-dockerized)

View File

@ -9,6 +9,25 @@ permalink: /services
<i>“There are too many of us, he thought. There are billions of us and that's too many. Nobody knows anyone. Strangers come and violate you. Strangers come and cut your heart out. Strangers come and take your blood. Good God, who were those men? I never saw them before in my life!” </i>
</div>
<br>
<br>
<div style="text-align:center">
<div class="alert alert-warning" role="alert">
<strong>
Notice
<br>
<br>
This page is outdated, and the information should be considered such.
<br>
<br>
</strong>
</div>
</div>
<br>
<br>
## __Services__
**Due to recent incidents with our Njalla VPS, some of our services will be offline.**

15
_pages/Transparency.md Normal file
View File

@ -0,0 +1,15 @@
---
layout: default1
title: Transparency
permalink: /transparency
---
<div style="text-align:center;">
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
</div>
<br>
## Servers
As of now, we are currently only running a web server.

View File

@ -15,26 +15,12 @@ description: A fun happy place.
</div>
<br>
<div style="text-align:center">
<div class="alert alert-danger" role="alert">
<strong>
**URGENT**
<br>
WE NEED DONATIONS TO HOST THE SERVERS
<br>
YOU ARE ABLE TO DONATE WITH XMR:
<br>
47teQv7uWPv9EALRDv9je6ckC83UYJiisHpmhNKHyPPTXinPJNRtvW8PcpEoLxex9ierqWvD89v9mVyGf77uLtS3RnGUk8K
<br>
</strong>
</div>
</div>
<br>
---
<br>
<div style="text-align:center">
<button type="button" class="btn btn-lg btn-default"><a href="./donate"> Donate</a></button>
@ -46,7 +32,7 @@ description: A fun happy place.
<br>
<br>
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://codeberg.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
<button type="button" class="btn btn-md btn-default"><a href="./guide"><i class="fa fa-suitcase" aria-hidden="true"></i> Guide</a></button>
@ -56,35 +42,13 @@ description: A fun happy place.
<button type="button" class="btn btn-md btn-default"><a href="./collections"><i class="fa fa-list" aria-hidden="true"></i> Collections</a></button>
<br>
<br>
<button type="button" class="btn btn-lg btn-default"><a href="https://status.anonymousland.org"> Status Page</a></button>
<button type="button" class="btn btn-lg btn-default"><a href="./services"> Services Page</a></button>
<br>
<br>
<button type="button" class="btn btn-md btn-default"><a href="https://element.anonymousland.org"> Matrix</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://mastodon.anonymousland.org"> Mastodon</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org"> Git</a></button>
<br>
<br>
<button type="button" class="btn btn-large btn-default"><a href="http://767biftqmqp5he5ero7n5qvly7pmvyqcqmmlsgzptfzshenis3xjlxid.onion/">Onion Site</a></button>
<br>
<br>
</div>
<br>
<br>
---
---
<br>
@ -120,6 +84,10 @@ Information from [collections](./collections)
- [Qubes OS](./qubes)
- [dvm-zulucrypt](./qubes/dvm-zulucrypt)
- [kicksecure-sys-dns](./qubes/kicksecure-sys-dns)
<br>
<br>