mirror of
https://git.anonymousland.org/anonymousland/anonymousland.git
synced 2024-10-01 11:49:49 -04:00
Compare commits
No commits in common. "9f031e2fa4fefe9070d76c8a8c63d6d0e7e464ba" and "29f4e798660885715cd15390a544e9a8aa67b7b1" have entirely different histories.
9f031e2fa4
...
29f4e79866
1
Gemfile
1
Gemfile
@ -8,4 +8,3 @@ gem "jekyll-sitemap"
|
|||||||
gem "kramdown-parser-gfm"
|
gem "kramdown-parser-gfm"
|
||||||
gem "bundler"
|
gem "bundler"
|
||||||
gem "webrick"
|
gem "webrick"
|
||||||
gem "github-pages"
|
|
17
README.md
17
README.md
@ -1,22 +1,5 @@
|
|||||||
# **[Anonymousland](https://anonymousland.org)** v1.10
|
# **[Anonymousland](https://anonymousland.org)** v1.10
|
||||||
|
|
||||||
## Notice:
|
|
||||||
|
|
||||||
We are temporary using GitHub pages.
|
|
||||||
This provides an easier maintenance-free system of hosting.
|
|
||||||
This is beneficial as it does not require an additional VPS and configuration.
|
|
||||||
Until our infrastructure is restored, the site will remain on GitHub pages.
|
|
||||||
|
|
||||||
|
|
||||||
SERVICES OFFLINE.
|
|
||||||
VPS PROVIDER DELETED ENTIRE VPS WITHOUT NOTICE.
|
|
||||||
|
|
||||||
Our VPS provider- 1984 deleted the entire VPS without notice.
|
|
||||||
All data regarding **ALL** of our services is gone.
|
|
||||||
Only the Git mirrors remain.
|
|
||||||
|
|
||||||
> Hosing publicly usable services which provides benefits to anonymity are a great way to help the community. Unfortunately, these become difficult to manage & maintain. Many services including our Tor node and Matrix server were prone to being abused. To effectively combat abuse, this would require us to use privacy-invasive measures. Our hosting provider - 1984, the host we used for everything, decided to delete the entire VPS without notice. We received no emails or alerts on such actions. There could be a number of reasons for this - primarily being abuse. Our Tor exit node hosted on Njalla was shutdown after malicious user(s) conducted several brute-force attacks. Njalla has become ridiculously expensive to operate with, providing no real upgrades, and you are limited to a small amount of storage. While hosting services is great, it's even more difficult to do such with little to no donations, and a wide variety of malicious actors conducting abuse on such services. Services may be available in the future, but for now we best stick with this website, and this website only.
|
|
||||||
|
|
||||||
> Anonymity, Privacy, Security
|
> Anonymity, Privacy, Security
|
||||||
|
|
||||||
<div align="center">
|
<div align="center">
|
||||||
|
@ -1 +0,0 @@
|
|||||||
{"m.server": "matrix.anonymousland.org:443"}
|
|
@ -1,6 +1,5 @@
|
|||||||
repository: anonymousland/anonymousland
|
repository: anonymousland/anonymousland
|
||||||
remote_theme: luxedo/jekyll-theme-potato-hacker
|
theme: jekyll-theme-potato-hacker
|
||||||
#theme: jekyll-theme-potato-hacker
|
|
||||||
theme_base: "dark"
|
theme_base: "dark"
|
||||||
theme_switch: off
|
theme_switch: off
|
||||||
title: Anonymousland
|
title: Anonymousland
|
||||||
|
@ -59,10 +59,8 @@ _Disclaimer: This is for education / research._
|
|||||||
-\>> [Important Concepts](#important-concepts) <br>
|
-\>> [Important Concepts](#important-concepts) <br>
|
||||||
|
|
||||||
- -\> _[Tor](#tor)_ <br>
|
- -\> _[Tor](#tor)_ <br>
|
||||||
- -\> _[Tor with VPN](#tor-with-vpn)_ <br>
|
|
||||||
- -\> _[Tor Usage](#tor-usage)_ <br>
|
- -\> _[Tor Usage](#tor-usage)_ <br>
|
||||||
- -\> _[Tor Operating Systems](#tor-operating-systems)_ <br>
|
- -\> _[Tor Operating Systems](#tor-operating-systems)_ <br>
|
||||||
- -\> _[Tor Browser(s)](#tor-browsers)_ <br>
|
|
||||||
- -\> _[Contributing to Tor](#contributing-to-tor)_ <br>
|
- -\> _[Contributing to Tor](#contributing-to-tor)_ <br>
|
||||||
|
|
||||||
-\>> [Proper Mindset](#proper-mindset) <br>
|
-\>> [Proper Mindset](#proper-mindset) <br>
|
||||||
@ -78,6 +76,7 @@ _Disclaimer: This is for education / research._
|
|||||||
- -\>> _[Installation](#installation)_ <br>
|
- -\>> _[Installation](#installation)_ <br>
|
||||||
- -\>> _[Template Setup](#template-setup)_ <br>
|
- -\>> _[Template Setup](#template-setup)_ <br>
|
||||||
- -\>> _[Onionizing Repositories](#onionizing-repositories)_ <br>
|
- -\>> _[Onionizing Repositories](#onionizing-repositories)_ <br>
|
||||||
|
- -\>> _[Qubes Basic Setup](#qube-basic-setup)_ <br>
|
||||||
|
|
||||||
-\>> [Creating our Aliases](#creating-our-aliases) <br>
|
-\>> [Creating our Aliases](#creating-our-aliases) <br>
|
||||||
-\>> [Browsers](#browsers) <br>
|
-\>> [Browsers](#browsers) <br>
|
||||||
@ -87,13 +86,14 @@ _Disclaimer: This is for education / research._
|
|||||||
-\>> [Mobile](#mobile) <br>
|
-\>> [Mobile](#mobile) <br>
|
||||||
- -\>> _[GrapheneOS](#grapheneos)_ <br>
|
- -\>> _[GrapheneOS](#grapheneos)_ <br>
|
||||||
- -\>> _[GrapheneOS Hardening](#grapheneos-hardening)_ <br>
|
- -\>> _[GrapheneOS Hardening](#grapheneos-hardening)_ <br>
|
||||||
|
|
||||||
- -\>> _[External Applications](#external-applications)_ <br>
|
- -\>> _[External Applications](#external-applications)_ <br>
|
||||||
- -\>> _[Tor](#tor-1)_ <br>
|
- -\>> _[Tor](#tor-1)_ <br>
|
||||||
|
|
||||||
-\>> [Physical](#physical) <br>
|
-\>> [Physical](#physical) <br>
|
||||||
- -\>> _[Cars](#cars)_ <br>
|
- -\>> _[Cars](#cars)_ <br>
|
||||||
|
|
||||||
-\>> [Secure(ish) Communications](#secureish-communications) <br>
|
-\>> [Secure Communications](#secure-communications) <br>
|
||||||
-\>> [Secure Hardware](#secure-hardware) <br>
|
-\>> [Secure Hardware](#secure-hardware) <br>
|
||||||
-\>> [Plausible Deniability](#plausible-deniability) <br>
|
-\>> [Plausible Deniability](#plausible-deniability) <br>
|
||||||
-\>> [Tails](#tails) <br>
|
-\>> [Tails](#tails) <br>
|
||||||
@ -148,21 +148,6 @@ If you are using an "amnesic" setup such as Tails or anon-whonix on Qubes OS, yo
|
|||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
#### Tor with VPN
|
|
||||||
|
|
||||||
Using Tor with a VPN has both upsides and downfalls.
|
|
||||||
This setup will vary from person to person based upon usage, threat models and other factors only you can determine.
|
|
||||||
|
|
||||||
Using a VPN with Tor has its downfalls.
|
|
||||||
One of the main reasons you should use a VPN with Tor is if you are concerned with your ISP watching for Tor traffic and you can *reasonably* trust your VPN provider.
|
|
||||||
|
|
||||||
To prevent your ISP or another adversary from viewing Tor traffic, you are also able to use Tor bridges for such, but if it is not critical to use bridges, do not as there are other people who benefit from bridges.
|
|
||||||
Using a VPN will proxy your Tor traffic to another ISP, which hopefully is less malicious than an adversary you are hiding this traffic from.
|
|
||||||
|
|
||||||
Using a VPN will increase latency, along with potentially messing with the guard node selection.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
#### Tor Usage
|
#### Tor Usage
|
||||||
|
|
||||||
Tor is extremely important for our setup.
|
Tor is extremely important for our setup.
|
||||||
@ -180,7 +165,6 @@ Other applications such as [Briar](https://briarproject.org).
|
|||||||
Any application that has a `proxy` setting can be used.
|
Any application that has a `proxy` setting can be used.
|
||||||
|
|
||||||
The Orbot ports:
|
The Orbot ports:
|
||||||
|
|
||||||
SOCKS: `127.0.0.1:9050`
|
SOCKS: `127.0.0.1:9050`
|
||||||
HTTP: `127.0.0.1:8118`
|
HTTP: `127.0.0.1:8118`
|
||||||
|
|
||||||
@ -239,13 +223,6 @@ All of your applications will occur in `Whonix-Workstation`.
|
|||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
#### Tor Browser(s)
|
|
||||||
|
|
||||||
There are several different ways to access Tor, primarily through a browser.
|
|
||||||
Browsers such as Brave offer this, but this should **NOT** be used, as it contains a unique fingerprint.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
#### Contributing to Tor
|
#### Contributing to Tor
|
||||||
|
|
||||||
Tor is an amazing project.
|
Tor is an amazing project.
|
||||||
@ -283,14 +260,11 @@ Here is a general thought process...
|
|||||||
Let's eliminate user error.
|
Let's eliminate user error.
|
||||||
More on this subject will be later in this _guide._
|
More on this subject will be later in this _guide._
|
||||||
|
|
||||||
- Take over-procedures.
|
- Take over-procedures. Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
|
||||||
Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
|
|
||||||
|
|
||||||
- Do not compromise your security for a friend.
|
- Do not compromise your security for a friend. If they are your friend, they will respect your new-founded love for being secure.
|
||||||
If they are your friend, they will respect your new-founded love for being secure.
|
|
||||||
|
|
||||||
- Do not reveal more than you need to.
|
- Do not reveal more than you need to. MMJ doesn't need to know what you had for lunch.
|
||||||
MMJ doesn't need to know what you had for lunch.
|
|
||||||
|
|
||||||
(things to keep in mind)\* Reveal as little about yourself and origin as possible.
|
(things to keep in mind)\* Reveal as little about yourself and origin as possible.
|
||||||
|
|
||||||
@ -302,14 +276,7 @@ MMJ doesn't need to know what you had for lunch.
|
|||||||
|
|
||||||
- Do not be lazy.
|
- Do not be lazy.
|
||||||
|
|
||||||
- Do not have the misconception that just because it is open-source makes it secure.
|
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid. This will allow you to see the true realities of the world. If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should. Privacy and security are constantly evolving, which means that you will have to evolve with it. Are you ready for a data breach? What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
|
||||||
|
|
||||||
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid.
|
|
||||||
This will allow you to see the true realities of the world.
|
|
||||||
If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should.
|
|
||||||
Privacy and security are constantly evolving, which means that you will have to evolve with it.
|
|
||||||
Are you ready for a data breach?
|
|
||||||
What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -331,8 +298,7 @@ You need to properly identify a _threat model_, an _adversary_ along with perfor
|
|||||||
|
|
||||||
The most important part of your setup.
|
The most important part of your setup.
|
||||||
|
|
||||||
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity.
|
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity. You'll need to properly layout and identify what you are protecting yourself from.
|
||||||
You'll need to properly layout and identify what you are protecting yourself from.
|
|
||||||
Everyone has something to protect, whether it is passwords, location, internet activity, confidential documents, etc.
|
Everyone has something to protect, whether it is passwords, location, internet activity, confidential documents, etc.
|
||||||
The items you are trying to protect will be referred here as "assets".
|
The items you are trying to protect will be referred here as "assets".
|
||||||
|
|
||||||
@ -469,10 +435,6 @@ Some aliasing services:
|
|||||||
|
|
||||||
- [AnonAddy](https://anonaddy.com/)
|
- [AnonAddy](https://anonaddy.com/)
|
||||||
|
|
||||||
- [Duckduckgo Mail](https://duckduckgo.com/email/)
|
|
||||||
|
|
||||||
- [Firefox Relay](https://relay.firefox.com/)
|
|
||||||
|
|
||||||
- [SimpleLogin](https://simplelogin.io/)
|
- [SimpleLogin](https://simplelogin.io/)
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -489,7 +451,7 @@ _What is the point of using a secure messenger, if your desktop is compromised b
|
|||||||
A massive amount of information is stored on our desktop, meaning that it contains a trove of our personal information.
|
A massive amount of information is stored on our desktop, meaning that it contains a trove of our personal information.
|
||||||
From search results to private documents.
|
From search results to private documents.
|
||||||
These items are **NOT** private on "traditional" operating systems.
|
These items are **NOT** private on "traditional" operating systems.
|
||||||
The default desktop environment has a broken security model.
|
The default desktop enviroment has a broken security model.
|
||||||
This is due to the fact of lacking permissions and proper isolation as done on mobile operating systems such as Android with their per-app permission toggles.
|
This is due to the fact of lacking permissions and proper isolation as done on mobile operating systems such as Android with their per-app permission toggles.
|
||||||
Some services like Firejail, Bubblewrap, SELinux and Apparmor can fix a lot of these issues, but the fact is configuring these services for every application can be a daunting task and can lead to much user-error.
|
Some services like Firejail, Bubblewrap, SELinux and Apparmor can fix a lot of these issues, but the fact is configuring these services for every application can be a daunting task and can lead to much user-error.
|
||||||
|
|
||||||
@ -661,10 +623,10 @@ qubes-usb-proxy
|
|||||||
qubes-gpg-split
|
qubes-gpg-split
|
||||||
```
|
```
|
||||||
|
|
||||||
Fedora-37:
|
Fedora-36:
|
||||||
|
|
||||||
```
|
```
|
||||||
sudo qubes-dom0-update qubes-template-fedora-37
|
sudo qubes-dom0-update qubes-template-fedora-36
|
||||||
```
|
```
|
||||||
|
|
||||||
Debian-11:
|
Debian-11:
|
||||||
@ -709,7 +671,7 @@ deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/de
|
|||||||
|
|
||||||
Fedora Templates:
|
Fedora Templates:
|
||||||
|
|
||||||
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncomment the onion `baseurl`
|
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncoment the onion `baseurl`
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -727,10 +689,101 @@ More thoughts:
|
|||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
#### Additional Setup
|
#### U2F-Proxy
|
||||||
|
|
||||||
We are able to use [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) along with [yubikey](https://qubes-os.org/doc/yubikey).
|
Using [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) allows you to "compartmentalize the browser in one qube and the USB stack in another so that they are always kept separate from each other".
|
||||||
Review the official documentation.
|
|
||||||
|
The Qubes documentation shows the following for installation:
|
||||||
|
|
||||||
|
dom0:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo qubes-dom0-update qubes-u2f-dom0
|
||||||
|
```
|
||||||
|
|
||||||
|
Now, execute this command for all the Qubes you will utilize u2f.
|
||||||
|
|
||||||
|
```
|
||||||
|
qvm-service --enable QUBE_NAME qubes-u2f-proxy
|
||||||
|
```
|
||||||
|
|
||||||
|
To install on our templates, use the following:
|
||||||
|
|
||||||
|
Fedora:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo dnf install qubes-u2f
|
||||||
|
```
|
||||||
|
|
||||||
|
Debian:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo apt install qubes-u2f
|
||||||
|
```
|
||||||
|
|
||||||
|
Finally, you must restart your Qubes.
|
||||||
|
It's suggested you read the [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) documentation.
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
#### YubiKey
|
||||||
|
|
||||||
|
Using a YubiKey can help mitigate certain attacks such as password "snooping", along with increasing security.
|
||||||
|
Read the [official documentation](https://qubes-os.org/doc/yubikey).
|
||||||
|
|
||||||
|
Installation for template qubes:
|
||||||
|
|
||||||
|
Fedora:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo dnf install ykpers yubikey-personalization-gui
|
||||||
|
```
|
||||||
|
|
||||||
|
Debian:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo apt-get install yubikey-personalization yubikey-personalization-gui
|
||||||
|
```
|
||||||
|
|
||||||
|
The GUI on for Debian can be run via the `yubikey-personalization-gui` command.
|
||||||
|
|
||||||
|
- Choose `configuration slot2`.
|
||||||
|
- Select `HMAC-SHA1 mode: fixed 64 bit input`.
|
||||||
|
- Ensure to backup the `Secret Key (20 bytes hex)`.
|
||||||
|
|
||||||
|
Now the following is required for dom0:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo qubes-dom0-update qubes-yubikey-dom0
|
||||||
|
```
|
||||||
|
|
||||||
|
If we had changed the name of `sys-usb` or are using something other than that, we would need to edit ``/etc/qubes/yk-keys/yk-vm'' in dom0.
|
||||||
|
|
||||||
|
- Paste the `Secret Key (20 bytes hex)` into `/etc/qubes/yk-keys/yk-secret-key.hex` in dom0.
|
||||||
|
|
||||||
|
- Paste your hashed password into `/etc/qubes/yk-keys/yk-login-pass-hashed.hex` in dom0.
|
||||||
|
|
||||||
|
To get your hashed password:
|
||||||
|
|
||||||
|
```
|
||||||
|
read -r password
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
echo -n "$password" | openssl dgst -sha1
|
||||||
|
```
|
||||||
|
|
||||||
|
Edit `/etc/pam.d/login` in dom0 and add:
|
||||||
|
|
||||||
|
```
|
||||||
|
auth include yubikey
|
||||||
|
```
|
||||||
|
|
||||||
|
Now, edit `/etc/pam.d/xscreensaver` to include:
|
||||||
|
|
||||||
|
```
|
||||||
|
auth include yubikey
|
||||||
|
```
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -931,7 +984,6 @@ LibreWolf is a good alternative to utilizing Arkenfox on Qubes as we cannot reas
|
|||||||
|
|
||||||
#### General Notes
|
#### General Notes
|
||||||
|
|
||||||
- For using Tor, you should only use the *official* Tor Browser.
|
|
||||||
- For an ideal browser setup focused around privacy, you should **NOT** store any browser history, cookies or cache.
|
- For an ideal browser setup focused around privacy, you should **NOT** store any browser history, cookies or cache.
|
||||||
- HTTPS-Only should be activated on all browsers.
|
- HTTPS-Only should be activated on all browsers.
|
||||||
- Disable saving of passwords, logins, credit cards, etc. as this is a security concern saving all of this in a web browser.
|
- Disable saving of passwords, logins, credit cards, etc. as this is a security concern saving all of this in a web browser.
|
||||||
@ -948,10 +1000,6 @@ There are a variety of tools to test your different browser configurations in a
|
|||||||
|
|
||||||
- [SSL Test](https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html)
|
- [SSL Test](https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html)
|
||||||
|
|
||||||
[Mullvad](https://mullvad.net) has released the [Mullvad Browser](https://mullvad.net/en/browser), which focuses on minimizing the browser fingerprint and to minimize tracking.
|
|
||||||
It comes installed with UBlock Origin by-default.
|
|
||||||
With this browser being brand-new, it would be advisable to proceed with caution, but this browser does appear promising.
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
---
|
---
|
||||||
@ -1033,12 +1081,12 @@ If your device has the ability to create multiple profiles, you can create a "To
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## **Secure(ish) Communications**
|
## **Secure Communications**
|
||||||
|
|
||||||
Having a secure operating system is only 1 part that we need.
|
Having a secure operating system is only 1 part that we need.
|
||||||
We need to ensure that all of our communications stay secure.
|
We need to ensure that all of our communications stay secure.
|
||||||
The most common method to this is using E2EE (End-to-end encryption).
|
The most common method to this is using E2EE (End-to-end encryption).
|
||||||
This encrypts your messages locally on your device before sending them out.
|
anThis encrypts your messages locally on your device before sending them out.
|
||||||
Let's take a look at some of the basic types of messengers.
|
Let's take a look at some of the basic types of messengers.
|
||||||
|
|
||||||
Centralized: Meaning there is a single server / point of failure.
|
Centralized: Meaning there is a single server / point of failure.
|
||||||
@ -1058,7 +1106,6 @@ Here's a list of "great" messengers and services that you'll be able to use.
|
|||||||
Session has built-in onion-routing.
|
Session has built-in onion-routing.
|
||||||
|
|
||||||
- [Matrix](https://matrix.org) Matrix provides a federated platform, which allows for anyone to host their own server, meaning that it is resistent to censorship as the network does not rely on a single server.
|
- [Matrix](https://matrix.org) Matrix provides a federated platform, which allows for anyone to host their own server, meaning that it is resistent to censorship as the network does not rely on a single server.
|
||||||
*Note: Matrix has issues regarding metadata.*
|
|
||||||
|
|
||||||
- [Briar](https://briarproject.org) A P2P messenger app which is designed for extreme threat models.
|
- [Briar](https://briarproject.org) A P2P messenger app which is designed for extreme threat models.
|
||||||
Allows for Bluetooth communication along with routing communications over Tor network.
|
Allows for Bluetooth communication along with routing communications over Tor network.
|
||||||
@ -1183,11 +1230,6 @@ Your walking style is a unique identifier, and can be used to track you.
|
|||||||
To change this, you are able to do a variety of things to change your normal behavior / pattern.
|
To change this, you are able to do a variety of things to change your normal behavior / pattern.
|
||||||
The easiest method would be to put a coin inside your shoe.
|
The easiest method would be to put a coin inside your shoe.
|
||||||
|
|
||||||
- [Generating digital signatures with the gait of people](https://towardsdatascience.com/generating-digital-signatures-with-the-gait-of-people-3a66f0c44b7b)
|
|
||||||
|
|
||||||
|
|
||||||
- [From Learning Gait Signatures of Many Individuals to Reconstructing Gait Dynamics of One Single Individual](https://www.frontiersin.org/articles/10.3389/fams.2020.564935/full)
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
### Heart Rate
|
### Heart Rate
|
||||||
@ -1200,8 +1242,6 @@ Doing such will raise / lower your heart rate based upon what you do.
|
|||||||
To hide your heart rate from such technology, it is advisable to use tinfoil to block the signal.
|
To hide your heart rate from such technology, it is advisable to use tinfoil to block the signal.
|
||||||
This can be done via foil clothing or line a jacket with the proper tinfoil material.
|
This can be done via foil clothing or line a jacket with the proper tinfoil material.
|
||||||
|
|
||||||
- [Heart rate prediction from facial video with masks using eye location and corrected by convolutional neural networks](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8906658/)
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
### Fingerprints
|
### Fingerprints
|
||||||
@ -1292,7 +1332,6 @@ You can be tracked physically with a wide array of technologies including but no
|
|||||||
- [Real Time Object Tracking System using Thermal Camera](https://medium.com/analytics-vidhya/real-time-object-tracking-system-using-thermal-camera-b4d077a20f16)
|
- [Real Time Object Tracking System using Thermal Camera](https://medium.com/analytics-vidhya/real-time-object-tracking-system-using-thermal-camera-b4d077a20f16)
|
||||||
|
|
||||||
- Facial recognition
|
- Facial recognition
|
||||||
- [The T-Shirt Invisibility Cloak](https://yewtu.be/watch?v=NyofHyRm5CQ)
|
|
||||||
- [Wearable face projector](https://inv.bp.projectsegfau.lt/watch?v=_PoudPCevN0)
|
- [Wearable face projector](https://inv.bp.projectsegfau.lt/watch?v=_PoudPCevN0)
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -1351,7 +1390,7 @@ Very useful if you're at an airport, hotel or other public area in which you nee
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
[PortaPow USB Data Blocker](https://www.amazon.com/PortaPow-3rd-Gen-Data-Blocker/dp/B00QRRZ2QM/) - The gold standard of USB data blocking.
|
[PortaPow USB Data Blocker](https://www.amazon.com/PortaPow-3rd-Gen-Data-Blocker/dp/B00QRRZ2QM/) - The gold standard of USB data blocking.
|
||||||
This is a USB-A connector with a built-in "SmartChip" designed to increase charging speeds.
|
This is a USB-A connector withqubesqubes a built-in "SmartChip" designed to increase charging speeds.
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -1456,14 +1495,13 @@ Security Keys:
|
|||||||
|
|
||||||
- [NitroKey](https://www.nitrokey.com/)
|
- [NitroKey](https://www.nitrokey.com/)
|
||||||
|
|
||||||
- [Tkey](https://www.tillitis.se/)
|
|
||||||
|
|
||||||
- [YubiKey](https://www.yubico.com/)
|
- [YubiKey](https://www.yubico.com/)
|
||||||
|
|
||||||
Crypto Wallets:
|
Crypto Wallets:
|
||||||
|
|
||||||
- [Trezor](https://trezor.io/)
|
- [Trezor](https://trezor.io/)
|
||||||
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
---
|
---
|
||||||
@ -1503,8 +1541,6 @@ These range from Amazon Azure, to Linode.
|
|||||||
For a server, it's advisable to pay with crypto-currency, such as Monero, Zcash or some other type of "privacy"-respecting currency.
|
For a server, it's advisable to pay with crypto-currency, such as Monero, Zcash or some other type of "privacy"-respecting currency.
|
||||||
|
|
||||||
If you need a domain, it's advisable to use [Njalla](https://njal.la) <button type="button" class="btn btn-default btn-xs"><a href="http://njallalafimoej5i4eg7vlnqjvmb6zhdh27qxcatdn647jtwwwui3nad.onion/">Tor</a></button> as they do not collect any personal information, and they are well-known for their strong privacy.
|
If you need a domain, it's advisable to use [Njalla](https://njal.la) <button type="button" class="btn btn-default btn-xs"><a href="http://njallalafimoej5i4eg7vlnqjvmb6zhdh27qxcatdn647jtwwwui3nad.onion/">Tor</a></button> as they do not collect any personal information, and they are well-known for their strong privacy.
|
||||||
While Njalla is a fantastic privacy-respecting service, their VPS plans are lacking.
|
|
||||||
For hosting a simple web server or private service, this should be sufficient, but the idea here is that we have separate providers for our VPS and our domain.
|
|
||||||
|
|
||||||
For the actual server, you can use [1984](https://1984.is/) or the listed options below:
|
For the actual server, you can use [1984](https://1984.is/) or the listed options below:
|
||||||
|
|
||||||
@ -1526,7 +1562,7 @@ This is an advanced attack which requires equipment and the technical skill to s
|
|||||||
|
|
||||||
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
|
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
|
||||||
|
|
||||||
To take certain precautions, it's advisable to unplug and power off all devices not currently in-use.
|
To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use.
|
||||||
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
|
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
|
||||||
|
|
||||||
<br>
|
<br>
|
@ -9,25 +9,6 @@ permalink: /services
|
|||||||
<i>“There are too many of us, he thought. There are billions of us and that's too many. Nobody knows anyone. Strangers come and violate you. Strangers come and cut your heart out. Strangers come and take your blood. Good God, who were those men? I never saw them before in my life!” </i>
|
<i>“There are too many of us, he thought. There are billions of us and that's too many. Nobody knows anyone. Strangers come and violate you. Strangers come and cut your heart out. Strangers come and take your blood. Good God, who were those men? I never saw them before in my life!” </i>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
|
|
||||||
<div style="text-align:center">
|
|
||||||
<div class="alert alert-warning" role="alert">
|
|
||||||
<strong>
|
|
||||||
Notice
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
This page is outdated, and the information should be considered such.
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
</strong>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## __Services__
|
## __Services__
|
||||||
|
|
||||||
**Due to recent incidents with our Njalla VPS, some of our services will be offline.**
|
**Due to recent incidents with our Njalla VPS, some of our services will be offline.**
|
@ -44,7 +44,6 @@ Multi-factor authentication is extremely important as it provides multiple layer
|
|||||||
|
|
||||||
- [Aegis](https://github.com/beemdevelopment/Aegis) (Mobile)
|
- [Aegis](https://github.com/beemdevelopment/Aegis) (Mobile)
|
||||||
- [NitroKey](https://www.nitrokey.com/) (Hardware)
|
- [NitroKey](https://www.nitrokey.com/) (Hardware)
|
||||||
- [Tkey](https://www.tillitis.se/) (Hardware)
|
|
||||||
- [YubiKey](https://www.yubico.com/) (Hardware) <button type="button" class="btn btn-xs btn-warning"> <a href="https://www.yubico.com/blog/secure-hardware-vs-open-source/"> Proprietary </a> </button>
|
- [YubiKey](https://www.yubico.com/) (Hardware) <button type="button" class="btn btn-xs btn-warning"> <a href="https://www.yubico.com/blog/secure-hardware-vs-open-source/"> Proprietary </a> </button>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -62,7 +61,6 @@ Your browser contains everything you do.
|
|||||||
It is the main entry point onto your system, along with the main privacy & security risk.
|
It is the main entry point onto your system, along with the main privacy & security risk.
|
||||||
|
|
||||||
- [Tor Browser](https://torproject.org) <button type="button" class="btn btn-default btn-xs"><a href="http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/">Tor</a></button>
|
- [Tor Browser](https://torproject.org) <button type="button" class="btn btn-default btn-xs"><a href="http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/">Tor</a></button>
|
||||||
- [Mullvad Browser](https://mullvad.net/en/browser)
|
|
||||||
- [Librewolf](https://librewolf.net/)
|
- [Librewolf](https://librewolf.net/)
|
||||||
- [Vanadium](https://vanadium.app) (Mobile)
|
- [Vanadium](https://vanadium.app) (Mobile)
|
||||||
- [Bromite](https://bromite.org) (Mobile)
|
- [Bromite](https://bromite.org) (Mobile)
|
72
_items/Transparency.md
Normal file
72
_items/Transparency.md
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
layout: default1
|
||||||
|
title: Transparency
|
||||||
|
permalink: /transparency
|
||||||
|
---
|
||||||
|
|
||||||
|
<div style="text-align:center;">
|
||||||
|
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
## Servers
|
||||||
|
|
||||||
|
### 1984
|
||||||
|
|
||||||
|
6 Cores
|
||||||
|
|
||||||
|
16GB RAM
|
||||||
|
|
||||||
|
360 GB SSD
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
### Njalla
|
||||||
|
|
||||||
|
6 Cores
|
||||||
|
|
||||||
|
9GB RAM
|
||||||
|
|
||||||
|
90 GB SSD
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Total Cost: €139/month
|
||||||
|
|
||||||
|
Public Services:
|
||||||
|
|
||||||
|
- Matrix Clearnet
|
||||||
|
- Matrix Onion
|
||||||
|
- Element Clearnet
|
||||||
|
- Element Onion
|
||||||
|
- Element Onion
|
||||||
|
- Cinny Clearnet
|
||||||
|
- Cinny Onion
|
||||||
|
- Schild Clearnet
|
||||||
|
- Dimension Clearnet
|
||||||
|
- Gitea Clearnet
|
||||||
|
- Mastodon Clearnet
|
||||||
|
- Status Clearnet
|
||||||
|
- OTS Clearnet
|
||||||
|
- Paste Clearnet
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
#### Matrix Clearnet
|
||||||
|
|
||||||
|
`media_store` : 31.6 GiB
|
||||||
|
|
||||||
|
`DB` : 61GB
|
||||||
|
|
||||||
|
**1984**
|
||||||
|
|
||||||
|
Total Price: €49/month
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
|
#### Other Services
|
||||||
|
|
||||||
|
**Njalla**
|
||||||
|
|
||||||
|
Total Price: €90/month
|
@ -9,16 +9,11 @@ permalink: /propagate
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
|
||||||
|
|
||||||
## Orbot
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
## Hosting Ideas
|
## Hosting Ideas
|
||||||
|
|
||||||
|
|
||||||
- [Awesome Self Hosted](https://github.com/awesome-selfhosted/awesome-selfhosted)
|
- [Awesome Self Hosted](https://github.com/awesome-selfhosted/awesome-selfhosted)
|
||||||
|
|
||||||
- [Mailcow](https://github.com/mailcow/mailcow-dockerized)
|
- [Mailcow](https://github.com/mailcow/mailcow-dockerized)
|
||||||
|
@ -1,15 +0,0 @@
|
|||||||
---
|
|
||||||
layout: default1
|
|
||||||
title: Transparency
|
|
||||||
permalink: /transparency
|
|
||||||
---
|
|
||||||
|
|
||||||
<div style="text-align:center;">
|
|
||||||
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Servers
|
|
||||||
|
|
||||||
As of now, we are currently only running a web server.
|
|
46
index.md
46
index.md
@ -15,12 +15,26 @@ description: A fun happy place.
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
|
<div style="text-align:center">
|
||||||
|
<div class="alert alert-danger" role="alert">
|
||||||
|
<strong>
|
||||||
|
**URGENT**
|
||||||
|
<br>
|
||||||
|
WE NEED DONATIONS TO HOST THE SERVERS
|
||||||
|
<br>
|
||||||
|
YOU ARE ABLE TO DONATE WITH XMR:
|
||||||
|
<br>
|
||||||
|
47teQv7uWPv9EALRDv9je6ckC83UYJiisHpmhNKHyPPTXinPJNRtvW8PcpEoLxex9ierqWvD89v9mVyGf77uLtS3RnGUk8K
|
||||||
|
<br>
|
||||||
|
</strong>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
<div style="text-align:center">
|
<div style="text-align:center">
|
||||||
<button type="button" class="btn btn-lg btn-default"><a href="./donate"> Donate</a></button>
|
<button type="button" class="btn btn-lg btn-default"><a href="./donate"> Donate</a></button>
|
||||||
|
|
||||||
@ -32,7 +46,7 @@ description: A fun happy place.
|
|||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
<button type="button" class="btn btn-md btn-default"><a href="https://codeberg.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
|
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
|
||||||
|
|
||||||
<button type="button" class="btn btn-md btn-default"><a href="./guide"><i class="fa fa-suitcase" aria-hidden="true"></i> Guide</a></button>
|
<button type="button" class="btn btn-md btn-default"><a href="./guide"><i class="fa fa-suitcase" aria-hidden="true"></i> Guide</a></button>
|
||||||
|
|
||||||
@ -42,12 +56,34 @@ description: A fun happy place.
|
|||||||
<button type="button" class="btn btn-md btn-default"><a href="./collections"><i class="fa fa-list" aria-hidden="true"></i> Collections</a></button>
|
<button type="button" class="btn btn-md btn-default"><a href="./collections"><i class="fa fa-list" aria-hidden="true"></i> Collections</a></button>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-lg btn-default"><a href="https://status.anonymousland.org"> Status Page</a></button>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-lg btn-default"><a href="./services"> Services Page</a></button>
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-md btn-default"><a href="https://element.anonymousland.org"> Matrix</a></button>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-md btn-default"><a href="https://mastodon.anonymousland.org"> Mastodon</a></button>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org"> Git</a></button>
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
|
<button type="button" class="btn btn-large btn-default"><a href="http://767biftqmqp5he5ero7n5qvly7pmvyqcqmmlsgzptfzshenis3xjlxid.onion/">Onion Site</a></button>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -84,10 +120,6 @@ Information from [collections](./collections)
|
|||||||
|
|
||||||
- [Qubes OS](./qubes)
|
- [Qubes OS](./qubes)
|
||||||
|
|
||||||
- [dvm-zulucrypt](./qubes/dvm-zulucrypt)
|
|
||||||
|
|
||||||
- [kicksecure-sys-dns](./qubes/kicksecure-sys-dns)
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user