Compare commits

...

54 Commits
v1.11 ... main

Author SHA1 Message Date
deathrow
9f031e2fa4
Fix index 2023-07-06 14:09:18 -04:00
deathrow
d5eceac503
Add Articles 2023-07-05 23:57:20 -04:00
deathrow
6f67379d6e
Update Index 2023-07-05 15:19:35 -04:00
deathrow
17cd66a312
Add the additional pages on Index 2023-06-25 12:48:24 -04:00
deathrow
48ded5fba5
GitHub Pages Notice 2023-06-25 12:47:00 -04:00
deathrow
4bffa38200
Add CNAME 2023-06-25 12:45:14 -04:00
deathrow
692f1f33b0
Add Remote Theme to fix UI issues 2023-06-25 12:42:57 -04:00
deathrow
03d83770bb
Config Comment for Pages 2023-06-25 12:23:46 -04:00
deathrow
8309698158
Update Gemfile 2023-06-25 12:16:41 -04:00
deathrow
b844e938ff
Remove 2023-06-11 17:31:46 -04:00
deathrow
fbaf62abe2
Fix file name 2023-06-11 17:28:36 -04:00
deathrow
e917710573
Matrix well-known 2023-06-11 17:13:12 -04:00
deathrow
52699a231b
Started Tor with VPN section 2023-05-13 13:38:49 -04:00
deathrow
d78fafb6f2
Small changes + Njalla notice 2023-05-03 15:06:07 -04:00
deathrow
263d19ac8c
Update table of contents 2023-05-01 22:56:30 -04:00
deathrow
eeb79c72b9
Update Mullvad Browser information and update Qubes section 2023-05-01 14:53:32 -04:00
deathrow
8fb15c8d79
Facial Recognition Link 2023-04-30 22:42:28 -04:00
deathrow
13dec9279c
Update naming 2023-04-25 11:10:00 -04:00
deathrow
2812a838b0
Add notice & move pages 2023-04-25 11:07:35 -04:00
deathrow
c13bc536ae
Update index 2023-04-25 11:01:21 -04:00
deathrow
33e8431d2d
Minor formatting fixes and additional hardware key 2023-04-25 11:00:53 -04:00
deathrow
8298264d9a
Rename section 2023-04-25 10:55:00 -04:00
deathrow
c6546efdd8
Update email aliasing 2023-04-25 10:51:45 -04:00
deathrow
5e6ca88197
Tkey + Mullvad Browser 2023-04-24 23:34:56 -04:00
deathrow
cc48257876
Update Table of Contents to include New Tor Browsers section 2023-04-24 23:34:42 -04:00
deathrow
b0c4050cef
Mullvad Browser 2023-04-24 23:21:56 -04:00
deathrow
f8effec6f9
Move note 2023-04-19 22:19:28 -04:00
deathrow
6312cdd9e9
Fix typographical error 2023-04-19 22:12:55 -04:00
deathrow
13315a2c96
Add Note. 2023-04-19 22:12:14 -04:00
deathrow
28e6db92ca
NOTICE 2023-04-19 20:17:09 -04:00
deathrow
e858c56514
UPDATE NOTICE 2023-04-19 20:16:36 -04:00
deathrow
dd6e934421
URGENT UPDATE. 2023-04-19 20:11:06 -04:00
deathrow
29f4e79866
Services Notice 2023-03-07 22:55:55 -05:00
deathrow
2575fc3280
URGENT: DONATIONS NEEDED 2023-02-20 19:42:58 -05:00
deathrow
221c1aa546
Updated Spacing 2023-02-20 17:04:30 -05:00
deathrow
de606a8307
Fix spacing 2023-02-20 14:56:40 -05:00
deathrow
3dc04b1da8
Power Analysis Section 2023-02-14 11:24:00 -05:00
deathrow
5ae1b5e0d8
Update Format 2023-02-14 11:11:53 -05:00
deathrow
a98c721e80
Various wording 2023-02-14 11:04:24 -05:00
deathrow
16f24fe23d
Add Hackliberty 2023-02-14 11:04:10 -05:00
NebulaOnion
2373fa1952 Remove Gitea Actions (broken) 2023-02-03 21:35:44 +00:00
deathrow
7122f8c37e
Tor exit node 2023-02-02 20:36:03 -05:00
deathrow
cb0b69ed63
Paste onion service 2023-02-02 20:32:54 -05:00
deathrow
03374f9a39
Vehicle Privacy Section 2023-02-02 20:12:10 -05:00
deathrow
c5f4353278
Update mobile section 2023-02-02 20:09:15 -05:00
deathrow
051b78f64d
Merge branch 'cars' 2023-02-02 20:05:49 -05:00
deathrow
34d8f8b502
Update build instructions 2023-02-02 19:14:38 -05:00
deathrow
fad10f60d9
Add docker-build.sh 2023-02-02 19:13:18 -05:00
deathrow
5f856e8f0e
Update OTS 2023-02-02 19:11:46 -05:00
deathrow
12c1247733
Update onion addresses 2023-02-02 18:40:20 -05:00
deathrow
283d8a062d
Remove section 2023-01-26 15:00:50 -05:00
deathrow
615f82677f
Car Section 2023-01-26 15:00:31 -05:00
deathrow
432d09be73
Started Security Section 2023-01-25 11:50:13 -05:00
deathrow
0d4d83b8f8
Initial Car section 2023-01-25 11:36:30 -05:00
15 changed files with 287 additions and 254 deletions

View File

@ -1,13 +0,0 @@
name: Jekyll build
on: [push]
jobs:
build:
runs-on: ruby:3.1.3
steps:
- run: npm install ruby
- run: npm install gem
- run: gem update
- run: gem install bundler
- run: bundle install
- run: bundle exec jekyll build

1
CNAME Normal file
View File

@ -0,0 +1 @@
anonymousland.org

View File

@ -7,4 +7,5 @@ gem "jekyll-seo-tag"
gem "jekyll-sitemap"
gem "kramdown-parser-gfm"
gem "bundler"
gem "webrick"
gem "webrick"
gem "github-pages"

View File

@ -1,5 +1,22 @@
# **[Anonymousland](https://anonymousland.org)** v1.10
## Notice:
We are temporary using GitHub pages.
This provides an easier maintenance-free system of hosting.
This is beneficial as it does not require an additional VPS and configuration.
Until our infrastructure is restored, the site will remain on GitHub pages.
SERVICES OFFLINE.
VPS PROVIDER DELETED ENTIRE VPS WITHOUT NOTICE.
Our VPS provider- 1984 deleted the entire VPS without notice.
All data regarding **ALL** of our services is gone.
Only the Git mirrors remain.
> Hosing publicly usable services which provides benefits to anonymity are a great way to help the community. Unfortunately, these become difficult to manage & maintain. Many services including our Tor node and Matrix server were prone to being abused. To effectively combat abuse, this would require us to use privacy-invasive measures. Our hosting provider - 1984, the host we used for everything, decided to delete the entire VPS without notice. We received no emails or alerts on such actions. There could be a number of reasons for this - primarily being abuse. Our Tor exit node hosted on Njalla was shutdown after malicious user(s) conducted several brute-force attacks. Njalla has become ridiculously expensive to operate with, providing no real upgrades, and you are limited to a small amount of storage. While hosting services is great, it's even more difficult to do such with little to no donations, and a wide variety of malicious actors conducting abuse on such services. Services may be available in the future, but for now we best stick with this website, and this website only.
> Anonymity, Privacy, Security
<div align="center">
@ -72,8 +89,12 @@ bundle install
jekyll build
```
Building with docker:
Ensure `docker` is installed, then execute `docker-build.sh`
**Make sure to be at the root of the repository.**
The built site files ready to host will be located at the *_site* directory.
The built site files ready to host will be located at the `_site` directory.
## Hosting

View File

@ -0,0 +1 @@
{"m.server": "matrix.anonymousland.org:443"}

View File

@ -1,5 +1,6 @@
repository: anonymousland/anonymousland
theme: jekyll-theme-potato-hacker
remote_theme: luxedo/jekyll-theme-potato-hacker
#theme: jekyll-theme-potato-hacker
theme_base: "dark"
theme_switch: off
title: Anonymousland

View File

@ -67,6 +67,8 @@ Articles and stories related to technology, security or privacy
A place for related various communities & media
- [Hackliberty](https://hackliberty.org) <button type="button" class="btn btn-default btn-xs"><a href="http://xj2i2lkzecitg6cq5ca3vrhlzq4evgz6qr2i4s7b4y57ktuaohff4vyd.onion">Tor</a></button>
- [PrivacyGuides](https://privacyguides.org) <button type="button" class="btn btn-default btn-xs"><a href="http://eter4u55b667kuo72ntpm7ut54sa2mxmr22iqgzns4jw7boeox3qgyid.onion">Tor</a></button>
- [Privsec](https://privsec.dev)

View File

@ -59,8 +59,10 @@ _Disclaimer: This is for education / research._
-\>> [Important Concepts](#important-concepts) <br>
- -\> _[Tor](#tor)_ <br>
- -\> _[Tor with VPN](#tor-with-vpn)_ <br>
- -\> _[Tor Usage](#tor-usage)_ <br>
- -\> _[Tor Operating Systems](#tor-operating-systems)_ <br>
- -\> _[Tor Browser(s)](#tor-browsers)_ <br>
- -\> _[Contributing to Tor](#contributing-to-tor)_ <br>
-\>> [Proper Mindset](#proper-mindset) <br>
@ -76,7 +78,6 @@ _Disclaimer: This is for education / research._
- -\>> _[Installation](#installation)_ <br>
- -\>> _[Template Setup](#template-setup)_ <br>
- -\>> _[Onionizing Repositories](#onionizing-repositories)_ <br>
- -\>> _[Qubes Basic Setup](#qube-basic-setup)_ <br>
-\>> [Creating our Aliases](#creating-our-aliases) <br>
-\>> [Browsers](#browsers) <br>
@ -86,18 +87,18 @@ _Disclaimer: This is for education / research._
-\>> [Mobile](#mobile) <br>
- -\>> _[GrapheneOS](#grapheneos)_ <br>
- -\>> _[GrapheneOS Hardening](#grapheneos-hardening)_ <br>
- -\>> _[External Applications](#external-applications)_ <br>
- -\>> _[Tor](#tor-1)_ <br>
-\>> [Physical](#physical) <br>
-\>> [Secure Communications](#secure-communications) <br>
- -\>> _[Cars](#cars)_ <br>
-\>> [Secure(ish) Communications](#secureish-communications) <br>
-\>> [Secure Hardware](#secure-hardware) <br>
-\>> [Plausible Deniability](#plausible-deniability) <br>
-\>> [Tails](#tails) <br>
-\>> [Anonymous Server](#anonymous-server) <br>
-\>> [Power Analysis](#power-analysis) <br>
-\>> [TLDR](#tldr) <br>
---
@ -147,6 +148,21 @@ If you are using an "amnesic" setup such as Tails or anon-whonix on Qubes OS, yo
<br>
#### Tor with VPN
Using Tor with a VPN has both upsides and downfalls.
This setup will vary from person to person based upon usage, threat models and other factors only you can determine.
Using a VPN with Tor has its downfalls.
One of the main reasons you should use a VPN with Tor is if you are concerned with your ISP watching for Tor traffic and you can *reasonably* trust your VPN provider.
To prevent your ISP or another adversary from viewing Tor traffic, you are also able to use Tor bridges for such, but if it is not critical to use bridges, do not as there are other people who benefit from bridges.
Using a VPN will proxy your Tor traffic to another ISP, which hopefully is less malicious than an adversary you are hiding this traffic from.
Using a VPN will increase latency, along with potentially messing with the guard node selection.
<br>
#### Tor Usage
Tor is extremely important for our setup.
@ -164,6 +180,7 @@ Other applications such as [Briar](https://briarproject.org).
Any application that has a `proxy` setting can be used.
The Orbot ports:
SOCKS: `127.0.0.1:9050`
HTTP: `127.0.0.1:8118`
@ -178,7 +195,7 @@ Orbot to start Tor and related services
`Isolate destination addresses`: Use a different circuit for each destination address
` Prefer IPv6 connections`: Tells exits that IPv6 addresses are preferred
`Prefer IPv6 connections`: Tells exits that IPv6 addresses are preferred
`Connecting padding`: Always enables connection padding to defend against some forms of traffic analysis. Default: auto
@ -222,6 +239,13 @@ All of your applications will occur in `Whonix-Workstation`.
<br>
#### Tor Browser(s)
There are several different ways to access Tor, primarily through a browser.
Browsers such as Brave offer this, but this should **NOT** be used, as it contains a unique fingerprint.
<br>
#### Contributing to Tor
Tor is an amazing project.
@ -259,11 +283,14 @@ Here is a general thought process...
Let's eliminate user error.
More on this subject will be later in this _guide._
- Take over-procedures. Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
- Take over-procedures.
Don't "skimp" out on encryption because you don't feel like entering in a password. Don't be lazy.
- Do not compromise your security for a friend. If they are your friend, they will respect your new-founded love for being secure.
- Do not compromise your security for a friend.
If they are your friend, they will respect your new-founded love for being secure.
- Do not reveal more than you need to. MMJ doesn't need to know what you had for lunch.
- Do not reveal more than you need to.
MMJ doesn't need to know what you had for lunch.
(things to keep in mind)\* Reveal as little about yourself and origin as possible.
@ -275,7 +302,14 @@ Here is a general thought process...
- Do not be lazy.
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid. This will allow you to see the true realities of the world. If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should. Privacy and security are constantly evolving, which means that you will have to evolve with it. Are you ready for a data breach? What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
- Do not have the misconception that just because it is open-source makes it secure.
People may think you are paranoid, but in a world like this it _is_ useful to be even a bit paranoid.
This will allow you to see the true realities of the world.
If you are always thinking of ways you can be compromised, you'd actually likely reduce your risk due to the fact of you constantly thinking about it, rather than just "not really thinking" about it, or rather as often as you should.
Privacy and security are constantly evolving, which means that you will have to evolve with it.
Are you ready for a data breach?
What are you going to do if your compromised? Questions like these are what you need to ask yourself in order to be successful, you must always have a backup plan that you can execute.
<br>
@ -297,7 +331,8 @@ You need to properly identify a _threat model_, an _adversary_ along with perfor
The most important part of your setup.
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity. You'll need to properly layout and identify what you are protecting yourself from.
Threat modeling can become an advanced topic, you will need to learn how to balance security, privacy and anonymity.
You'll need to properly layout and identify what you are protecting yourself from.
Everyone has something to protect, whether it is passwords, location, internet activity, confidential documents, etc.
The items you are trying to protect will be referred here as "assets".
@ -308,7 +343,7 @@ Ask yourself these basic questions:
- What happens if I fail to protect this?
These are some basic questions to ask yourself when creating your threat model.
Based upon your answers to these questions, will determine the route you must go.
Based upon your answers to these questions, will determine the route you must go.
Example - You don't want your neighbor Joe to see you sleeping, so you close your blinds.
Developing a threat model will require a lot of time and effort.
@ -434,6 +469,10 @@ Some aliasing services:
- [AnonAddy](https://anonaddy.com/)
- [Duckduckgo Mail](https://duckduckgo.com/email/)
- [Firefox Relay](https://relay.firefox.com/)
- [SimpleLogin](https://simplelogin.io/)
<br>
@ -450,7 +489,7 @@ _What is the point of using a secure messenger, if your desktop is compromised b
A massive amount of information is stored on our desktop, meaning that it contains a trove of our personal information.
From search results to private documents.
These items are **NOT** private on "traditional" operating systems.
The default desktop enviroment has a broken security model.
The default desktop environment has a broken security model.
This is due to the fact of lacking permissions and proper isolation as done on mobile operating systems such as Android with their per-app permission toggles.
Some services like Firejail, Bubblewrap, SELinux and Apparmor can fix a lot of these issues, but the fact is configuring these services for every application can be a daunting task and can lead to much user-error.
@ -622,10 +661,10 @@ qubes-usb-proxy
qubes-gpg-split
```
Fedora-36:
Fedora-37:
```
sudo qubes-dom0-update qubes-template-fedora-36
sudo qubes-dom0-update qubes-template-fedora-37
```
Debian-11:
@ -670,7 +709,7 @@ deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/de
Fedora Templates:
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncoment the onion `baseurl`
Edit `/etc/yum.repos.d/qubes-r[version].repo`, comment out the clearnet `baseurl` and uncomment the onion `baseurl`
<br>
@ -688,101 +727,10 @@ More thoughts:
<br>
#### U2F-Proxy
#### Additional Setup
Using [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) allows you to "compartmentalize the browser in one qube and the USB stack in another so that they are always kept separate from each other".
The Qubes documentation shows the following for installation:
dom0:
```
sudo qubes-dom0-update qubes-u2f-dom0
```
Now, execute this command for all the Qubes you will utilize u2f.
```
qvm-service --enable QUBE_NAME qubes-u2f-proxy
```
To install on our templates, use the following:
Fedora:
```
sudo dnf install qubes-u2f
```
Debian:
```
sudo apt install qubes-u2f
```
Finally, you must restart your Qubes.
It's suggested you read the [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) documentation.
<br>
#### YubiKey
Using a YubiKey can help mitigate certain attacks such as password "snooping", along with increasing security.
Read the [official documentation](https://qubes-os.org/doc/yubikey).
Installation for template qubes:
Fedora:
```
sudo dnf install ykpers yubikey-personalization-gui
```
Debian:
```
sudo apt-get install yubikey-personalization yubikey-personalization-gui
```
The GUI on for Debian can be run via the `yubikey-personalization-gui` command.
- Choose `configuration slot2`.
- Select `HMAC-SHA1 mode: fixed 64 bit input`.
- Ensure to backup the `Secret Key (20 bytes hex)`.
Now the following is required for dom0:
```
sudo qubes-dom0-update qubes-yubikey-dom0
```
If we had changed the name of `sys-usb` or are using something other than that, we would need to edit ``/etc/qubes/yk-keys/yk-vm'' in dom0.
- Paste the `Secret Key (20 bytes hex)` into `/etc/qubes/yk-keys/yk-secret-key.hex` in dom0.
- Paste your hashed password into `/etc/qubes/yk-keys/yk-login-pass-hashed.hex` in dom0.
To get your hashed password:
```
read -r password
```
```
echo -n "$password" | openssl dgst -sha1
```
Edit `/etc/pam.d/login` in dom0 and add:
```
auth include yubikey
```
Now, edit `/etc/pam.d/xscreensaver` to include:
```
auth include yubikey
```
We are able to use [u2f-proxy](https://qubes-os.org/doc/u2f-proxy) along with [yubikey](https://qubes-os.org/doc/yubikey).
Review the official documentation.
<br>
@ -983,6 +931,7 @@ LibreWolf is a good alternative to utilizing Arkenfox on Qubes as we cannot reas
#### General Notes
- For using Tor, you should only use the *official* Tor Browser.
- For an ideal browser setup focused around privacy, you should **NOT** store any browser history, cookies or cache.
- HTTPS-Only should be activated on all browsers.
- Disable saving of passwords, logins, credit cards, etc. as this is a security concern saving all of this in a web browser.
@ -999,28 +948,25 @@ There are a variety of tools to test your different browser configurations in a
- [SSL Test](https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html)
[Mullvad](https://mullvad.net) has released the [Mullvad Browser](https://mullvad.net/en/browser), which focuses on minimizing the browser fingerprint and to minimize tracking.
It comes installed with UBlock Origin by-default.
With this browser being brand-new, it would be advisable to proceed with caution, but this browser does appear promising.
<br>
---
## **Mobile**
Default un-modified mobile devices are **NOT** private.
Your mobile device likely contains the most sensitive information. Pictures, texts, location, and more.
We'll need to work heavily on reducing this fingerprint.
Anything you do on your phone is likely not private.
Apps have unnecessary permissions to contacts, messages, files, location and more.
This is an extremely terrifying thing, as any app could have the potential to view sensitive information.
Most apps require very minimal permissions to function.
The idea is minimalism.
"Calculator" does not need access to text messages, nor does it need to ping servers.
Any device with a SIM card installed is not anonymous.
The location of the device is known by the cell provider.
To be truly "anonymous" with a mobile device, you must not have an installed SIM card.
It is not advisable to try to be "anonymous" on a mobile device.
Mobile devices are extremely important.
They contain a plethora of information such as contacts, files, texts and more.
Mobile devices by-default are not private or even anonymous.
While there are ways to harden IOS / stock Android, this is not the place for it.
It is best to focus on minimalism for our mobile devices, for instance, the calculator app does not need location permissions.
We can reduce the amount of data being collected by eliminating apps we do not need and by removing invasive permissions.
It is important to note that any device with a SIM card is likely not anonymous, as the cellular towers can triangulate the location of the device by measuring its signal strength.
It is possible to create an anonymous mobile device by having no SIM card on it at all, and routing everything over Tor.
Android allows us to have more access over our device such as installing applications from third-party repositories and having access over `ADB` and changing permissions.
<br>
@ -1087,12 +1033,12 @@ If your device has the ability to create multiple profiles, you can create a "To
---
## **Secure Communications**
## **Secure(ish) Communications**
Having a secure operating system is only 1 part that we need.
We need to ensure that all of our communications stay secure.
The most common method to this is using E2EE (End-to-end encryption).
anThis encrypts your messages locally on your device before sending them out.
This encrypts your messages locally on your device before sending them out.
Let's take a look at some of the basic types of messengers.
Centralized: Meaning there is a single server / point of failure.
@ -1112,6 +1058,7 @@ Here's a list of "great" messengers and services that you'll be able to use.
Session has built-in onion-routing.
- [Matrix](https://matrix.org) Matrix provides a federated platform, which allows for anyone to host their own server, meaning that it is resistent to censorship as the network does not rely on a single server.
*Note: Matrix has issues regarding metadata.*
- [Briar](https://briarproject.org) A P2P messenger app which is designed for extreme threat models.
Allows for Bluetooth communication along with routing communications over Tor network.
@ -1132,6 +1079,17 @@ For more information visit [JoinMatrix](https://joinmatrix.org).
## **Physical**
<div style="text-align:center">
<div class="alert alert-danger" role="alert">
<strong>
This page is a **<b>WORK IN PROGRESS</b>**
(more so than the others)
</strong>
</div>
</div>
<br>
Your physical state is just as important as your online state.
If you can be physically tracked and stalked, this could potentially lead to the compromise of your online being.
For instance, if someone stalks your behavior and notices you leave your device unattended, this can lead to malicious activity taking place such as compromising firmware, installing a small Bluetooth transmitter, accessing device information if the device is unencrypted, or even just outright taking the device.
@ -1164,12 +1122,72 @@ At first glance, many of this seems like defining qualities, but they can be alt
<br>
### Cars
Modern cars contain a lot of information about you.
Location, speed, driving patterns, and more.
There are few actual resources on what these privacy invasions are, and what you can do about them.
The term "car" is used to describe automobiles such as sedans, SUV's, trucks, tudors, unless otherwise specified.
<br>
#### Introduction
Most modern cars contain an EDR, Electronic Data Recorder.
This device is also commonly known as a "black box".
This device contains detailed information such as vehicle speed, detailed engine information along with the vehicles occupancy status.
This device is able to be read via a simple USB dongle.
The EDR is able to use the on-board pressure sensors embedded in the driver and passenger seats to have information such as how many passengers were in the vehicle, along with the status of seat belts.
While this is used for safety purposes, it is an extreme privacy invasion.
This page is not to describe on why you might want to care about privacy, but rather an overview on the privacy concern of modern cars.
Most modern cars include "smart features", such as an embedded display usually running a version of Android.
These devices will be referred to as a "smart screen".
The smart screen has the ability to connect to the internet along with providing apps such as Spotify, and some sort of GPS / navigational system.
A concern of these devices is the lack of security consideration.
These devices have access to extremely sensitive information such as location and potentially account information granted that an account is signed in.
Often times, these devices to not receive proper security patches or even updates to the OS in general.
<br>
#### Privacy
With the rise in IOT devices, comes "smart" enabled technology.
This is often times being implemented into newer vehicles.
Unfortunately, with the rapid adoption of technology, cars are vulnerable to various types of attacks.
With more detailed information being logged by your vehicle, often times in the event of an accident of some sort, insurance companies will pull information from the vehicle such as speed and location.
<br>
#### Security
Unfortunately, with the rapid adoption of technology, cars are vulnerable to various types of attacks.
Certain types of attacks include spoofing the radio signal from a key Fob and utilizing vulnerabilities found in 3rd-party applications.
Here is a list of some educational resources:
- [Connecting to the car's network - David Bombal](https://invidious.namazso.eu/watch?v=ICOaAfLlb4o)
- [I Hacked Into My Own Car - Steve Mould](https://invidious.snopyta.org/watch?v=5CsD8I396wo)
<br>
### Walking Style
Your walking style is a unique identifier, and can be used to track you.
To change this, you are able to do a variety of things to change your normal behavior / pattern.
The easiest method would be to put a coin inside your shoe.
- [Generating digital signatures with the gait of people](https://towardsdatascience.com/generating-digital-signatures-with-the-gait-of-people-3a66f0c44b7b)
- [From Learning Gait Signatures of Many Individuals to Reconstructing Gait Dynamics of One Single Individual](https://www.frontiersin.org/articles/10.3389/fams.2020.564935/full)
<br>
### Heart Rate
@ -1182,6 +1200,8 @@ Doing such will raise / lower your heart rate based upon what you do.
To hide your heart rate from such technology, it is advisable to use tinfoil to block the signal.
This can be done via foil clothing or line a jacket with the proper tinfoil material.
- [Heart rate prediction from facial video with masks using eye location and corrected by convolutional neural networks](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8906658/)
<br>
### Fingerprints
@ -1272,6 +1292,7 @@ You can be tracked physically with a wide array of technologies including but no
- [Real Time Object Tracking System using Thermal Camera](https://medium.com/analytics-vidhya/real-time-object-tracking-system-using-thermal-camera-b4d077a20f16)
- Facial recognition
- [The T-Shirt Invisibility Cloak](https://yewtu.be/watch?v=NyofHyRm5CQ)
- [Wearable face projector](https://inv.bp.projectsegfau.lt/watch?v=_PoudPCevN0)
<br>
@ -1330,7 +1351,7 @@ Very useful if you're at an airport, hotel or other public area in which you nee
<br>
[PortaPow USB Data Blocker](https://www.amazon.com/PortaPow-3rd-Gen-Data-Blocker/dp/B00QRRZ2QM/) - The gold standard of USB data blocking.
This is a USB-A connector withqubesqubes a built-in "SmartChip" designed to increase charging speeds.
This is a USB-A connector with a built-in "SmartChip" designed to increase charging speeds.
<br>
@ -1435,13 +1456,14 @@ Security Keys:
- [NitroKey](https://www.nitrokey.com/)
- [Tkey](https://www.tillitis.se/)
- [YubiKey](https://www.yubico.com/)
Crypto Wallets:
- [Trezor](https://trezor.io/)
<br>
---
@ -1481,6 +1503,8 @@ These range from Amazon Azure, to Linode.
For a server, it's advisable to pay with crypto-currency, such as Monero, Zcash or some other type of "privacy"-respecting currency.
If you need a domain, it's advisable to use [Njalla](https://njal.la) <button type="button" class="btn btn-default btn-xs"><a href="http://njallalafimoej5i4eg7vlnqjvmb6zhdh27qxcatdn647jtwwwui3nad.onion/">Tor</a></button> as they do not collect any personal information, and they are well-known for their strong privacy.
While Njalla is a fantastic privacy-respecting service, their VPS plans are lacking.
For hosting a simple web server or private service, this should be sufficient, but the idea here is that we have separate providers for our VPS and our domain.
For the actual server, you can use [1984](https://1984.is/) or the listed options below:
@ -1492,6 +1516,23 @@ For the actual server, you can use [1984](https://1984.is/) or the listed option
---
### **Power Analysis**
*"Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated."*
<br>
This is an advanced attack which requires equipment and the technical skill to sucessfully operate such an attack.
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
To take certain precautions, it's advisable to unplug and power off all devices not currently in-use.
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
<br>
---
## TLDR
Don't use the internet.

View File

@ -44,6 +44,7 @@ Multi-factor authentication is extremely important as it provides multiple layer
- [Aegis](https://github.com/beemdevelopment/Aegis) (Mobile)
- [NitroKey](https://www.nitrokey.com/) (Hardware)
- [Tkey](https://www.tillitis.se/) (Hardware)
- [YubiKey](https://www.yubico.com/) (Hardware) <button type="button" class="btn btn-xs btn-warning"> <a href="https://www.yubico.com/blog/secure-hardware-vs-open-source/"> Proprietary </a> </button>
<br>
@ -61,6 +62,7 @@ Your browser contains everything you do.
It is the main entry point onto your system, along with the main privacy & security risk.
- [Tor Browser](https://torproject.org) <button type="button" class="btn btn-default btn-xs"><a href="http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/">Tor</a></button>
- [Mullvad Browser](https://mullvad.net/en/browser)
- [Librewolf](https://librewolf.net/)
- [Vanadium](https://vanadium.app) (Mobile)
- [Bromite](https://bromite.org) (Mobile)

View File

@ -1,72 +0,0 @@
---
layout: default1
title: Transparency
permalink: /transparency
---
<div style="text-align:center;">
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
</div>
## Servers
### 1984
6 Cores
16GB RAM
360 GB SSD
<br>
### Njalla
6 Cores
9GB RAM
90 GB SSD
<br>
---
Total Cost: €139/month
Public Services:
- Matrix Clearnet
- Matrix Onion
- Element Clearnet
- Element Onion
- Element Onion
- Cinny Clearnet
- Cinny Onion
- Schild Clearnet
- Dimension Clearnet
- Gitea Clearnet
- Mastodon Clearnet
- Status Clearnet
- OTS Clearnet
- Paste Clearnet
<br>
#### Matrix Clearnet
`media_store` : 31.6 GiB
`DB` : 61GB
**1984**
Total Price: €49/month
<br>
#### Other Services
**Njalla**
Total Price: €90/month

View File

@ -11,9 +11,14 @@ permalink: /propagate
<br>
<br>
## Hosting Ideas
## Orbot
<br>
## Hosting Ideas
- [Awesome Self Hosted](https://github.com/awesome-selfhosted/awesome-selfhosted)
- [Mailcow](https://github.com/mailcow/mailcow-dockerized)

View File

@ -9,8 +9,29 @@ permalink: /services
<i>“There are too many of us, he thought. There are billions of us and that's too many. Nobody knows anyone. Strangers come and violate you. Strangers come and cut your heart out. Strangers come and take your blood. Good God, who were those men? I never saw them before in my life!” </i>
</div>
<br>
<br>
<div style="text-align:center">
<div class="alert alert-warning" role="alert">
<strong>
Notice
<br>
<br>
This page is outdated, and the information should be considered such.
<br>
<br>
</strong>
</div>
</div>
<br>
<br>
## __Services__
**Due to recent incidents with our Njalla VPS, some of our services will be offline.**
These services are publicly available and free to use.
Services are hosted in __Sweden__ and / or __Iceland__.
@ -83,6 +104,12 @@ Additional services are hosted with [Njalla](https://njal.la/about/).
<br>
### __Tor__
We host a Tor [exit node](https://metrics.torproject.org/rs.html#details/800F6AB9506498F7FE80BFF204B9F33571297636)
<br>
### __Matrix__
The Matrix homeserver is located at
@ -143,8 +170,21 @@ and requires an email address for sign-up.
<br>
### __OTS__
*ots is a one-time-secret sharing platform. The secret is encrypted with a symmetric 256bit AES encryption in the browser before being sent to the server. Afterwards an URL containing the ID of the secret and the password is generated. The password is never sent to the server so the server will never be able to decrypt the secrets it delivers with a reasonable effort. Also the secret is immediately deleted on the first read.*
OneTimeSecret instance located at:
[OTS](https://ots.anonymousland.org) <button type="button" class="btn btn-default btn-xs"><a href="http://up6cmathcvv3gkscop56lau3rbv4ksrafukyeibiaz2oxxlll2ftofad.onion/">Tor</a></button>
<br>
## __Additional Services__
- [Dimension](https://dimension.anonymousland.org)
- [OTS](https://ots.anonymousland.org)
- [Paste](https://paste.anonymousland.org)
- [Paste](https://paste.anonymousland.org)<button type="button" class="btn btn-default btn-xs"><a href="http://h7kw36ijgdnp75kb7ofo2z4swxhkhcqfrghjkvo5q5quz3bca4lqazad.onion
">Tor</a></button>

15
_pages/Transparency.md Normal file
View File

@ -0,0 +1,15 @@
---
layout: default1
title: Transparency
permalink: /transparency
---
<div style="text-align:center;">
<p><i>“We do not merely destroy our enemies; we change them"</i></p>
</div>
<br>
## Servers
As of now, we are currently only running a web server.

7
docker-build.sh Normal file
View File

@ -0,0 +1,7 @@
#!/bin/bash
docker run --rm \
--volume="$PWD:/srv/jekyll:Z" \
--volume="$PWD/vendor/bundle:/usr/local/bundle:Z" \
-it jekyll/jekyll \
jekyll build

View File

@ -14,14 +14,13 @@ description: A fun happy place.
<br>
</div>
<div style="text-align:center">
<div class="alert alert-info" role="alert">
<strong>Sign up for our <a href="https://element.anonymousland.org"> Matrix Server</a>, or check out our <a href="http://ps3364wgpvq46iumfm7wcewr3qxymtnd2fo753gvngzbumir7wyrlvad.onion/"> Onion Matrix Server</a></strong>
</div>
</div>
<br>
<br>
---
<br>
<div style="text-align:center">
<button type="button" class="btn btn-lg btn-default"><a href="./donate"> Donate</a></button>
@ -33,7 +32,7 @@ description: A fun happy place.
<br>
<br>
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://codeberg.org/anonymousland/anonymousland"> <i class="fa fa-github" aria-hidden="true"></i> Source Code</a></button>
<button type="button" class="btn btn-md btn-default"><a href="./guide"><i class="fa fa-suitcase" aria-hidden="true"></i> Guide</a></button>
@ -43,35 +42,13 @@ description: A fun happy place.
<button type="button" class="btn btn-md btn-default"><a href="./collections"><i class="fa fa-list" aria-hidden="true"></i> Collections</a></button>
<br>
<br>
<button type="button" class="btn btn-lg btn-default"><a href="https://status.anonymousland.org"> Status Page</a></button>
<button type="button" class="btn btn-lg btn-default"><a href="./services"> Services Page</a></button>
<br>
<br>
<button type="button" class="btn btn-md btn-default"><a href="https://element.anonymousland.org"> Matrix</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://mastodon.anonymousland.org"> Mastodon</a></button>
<button type="button" class="btn btn-md btn-default"><a href="https://git.anonymousland.org"> Git</a></button>
<br>
<br>
<button type="button" class="btn btn-large btn-default"><a href="http://vqajogx2cyooddrtai62pzj4v346kwnfiru2fa2fftemae47rgpeglqd.onion">Onion Site</a></button>
<br>
<br>
</div>
<br>
<br>
---
---
<br>
@ -97,16 +74,20 @@ Recent blog posts from our [blog](./blog) page
Information from [collections](./collections)
[Information](./information) - A collection of links, articles and more.
- [Information](./information) - A collection of links, articles and more.
[GrapheneOS](./graphene)
- [GrapheneOS](./graphene)
[F-Droid](./f-droid)
- [F-Droid](./f-droid)
[Matrix](./matrix)
- [Matrix](./matrix)
[Qubes OS](./qubes)
- [Qubes OS](./qubes)
- [dvm-zulucrypt](./qubes/dvm-zulucrypt)
- [kicksecure-sys-dns](./qubes/kicksecure-sys-dns)
<br>
<br>