various updates

This commit is contained in:
optout 2023-11-30 17:31:18 +00:00
parent 6d40a564c6
commit 34f1626574
No known key found for this signature in database
GPG Key ID: 13BA4BD4C14170C0

View File

@ -1,5 +1,6 @@
# *Into the Crypt: The Art of Anti-Forensics*
- [Preface](#preface)
- [Introduction](#introduction)
- [General Premise](#general-premise)
- [Philosophy](#philosophy)
@ -65,11 +66,11 @@
- [Donations](#donations)
- [References](#references)
## Prelude
> These writings spawned as a collaborative effort between a variety of technologists weighing their concerns during the years of the global lockdown & censorship policies (2020-2022). This was published as a form of dissent and non-compliance against private-public collaboration, which had the aims of increased surveillance and censorship. As the proverb goes, "The road to hell is paved with good intentions." While many of those collaborative efforts from CISA and private partners sought to do good, suppression of public discourse only caused blowback in the face of institutions, and their fear narratives, gaslighting, and the more simple forms of propaganda (repetition), have lost their hypnotic effects.
## Preface
> These writings spawned as a collaborative effort between a variety of technologists weighing their concerns during the years of the global lockdown & censorship policies (2020-2022). This was published as a form of dissent and non-compliance against private-public collaboration, which had the aims of increased surveillance and censorship. As the proverb goes, "The road to hell is paved with good intentions." While many of those collaborative efforts included some who sought to do good, suppression of public discourse only caused blowback in the face of institutions, and their fear narratives, gaslighting, and the more simple forms of propaganda (repetition), have lost their hypnotic effects.
## Introduction
The digital age has ushered in a dystopia, at least for those unwilling to circumvent or stretch the bounds of the law. There is a significant gap in literature in regards to circumvention of surveillance, largely due to this being an underground activity. It is pseudo-illegal; authors would be afraid that creations today will come back to haunt them. Exposing anti-forensic procedures will erode some of their operational security (OPSEC) in the process, coupled with time withering away at its relevance. This being said, not all of the defensive techniques throughout this writing will be as granular as we would have preferred. Though it could have went without saying, technological advancement moves fast, and quantum computing could theoretically weaken or render useless today's cryptographic implementations.
The digital age has ushered in a dystopia, at least for those unwilling to circumvent or stretch the bounds of the law. There is a significant gap in literature in regards to circumvention of surveillanceP, largely due to this being an underground activity. It is pseudo-illegal; authors would be afraid that creations today will come back to haunt them. Exposing anti-forensic procedures will erode some of their operational security (OPSEC) in the process, coupled with time withering away at its relevance. This being said, not all of the defensive techniques throughout this writing will be as granular as we would have preferred. Though it could have went without saying, technological advancement moves fast, and quantum computing could theoretically weaken or render useless today's cryptographic implementations.
### General Premise
Several concepts will be reiterated throughout this work as security is a process that acts in layers (think about the layers of an onion that is commonly alluded to). Here is a layout of the general concepts that will be explained in further detail throughout this work: