Formatting tweaks

This commit is contained in:
arcanedev 2021-08-11 03:15:43 +00:00
parent cd9eb92516
commit afb6d1c181
No known key found for this signature in database
GPG Key ID: 13BA4BD4C14170C0

112
README.md
View File

@ -54,9 +54,9 @@
- [Market Vendor](#market-vendor)
- [Conclusion](#conclusion)
- [Appendix A](#appendix-a)
- [References](#references)
- [Contact Us](#contact-us)
- [Donations](#donations)
- [References](#references)
---- End TOC ----
@ -604,61 +604,6 @@ For the hollow men (federal agents or contractors) who stumbled upon my work by
done
```
## References
[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/
[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/
[^3]: https://github.com/corna/me_cleaner
[^4]: Coreboot - https://www.coreboot.org
[^5]: Artix Linux - https://artixlinux.org
[^6]: Void Linux - https://voidlinux.org
[^7]: Alpine Linux - https://alpinelinux.org/
[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/
[^9]: GrapheneOS - https://grapheneos.org
[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/
[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/
[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model
[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/
[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN
[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support
[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/
[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection
[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/
[^19]: Bromite Browser - https://www.bromite.org
[^20]: Brave Browser - https://brave.com
[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers
[^22]: DuckDuckGo - https://duckduckgo.com
[^23]: Searx instances - https://searx.space/
[^24]: TAILS - https://tails.boum.org
[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate.
[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html
[^27]: Minisign - https://github.com/jedisct1/minisign/
[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/
[^29]: KeepassXC - https://keepassxc.org
[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py
[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian
[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry
[^34]: USBCTL - https://github.com/anthraxx/usbctl
[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/
[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf
[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf
[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge.
[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
[^40]: ZkSnarks - https://z.cash/technology/zksnarks
[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf
[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf
[^43]: CIS - https://www.cisecurity.org
[^44]: DISA STIGs - https://public.cyber.mil/stigs
[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host
[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos
[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap
[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020
[^50]: HiddenVM - https://github.com/aforensics/HiddenVM
[^51]: KVM - https://www.linux-kvm.org/
[^52]: Oracle VirtualBox - https://virtualbox.org
## Contact Us
Email: x0ptoutx@protonmail.ch
Do note that there is end-to-end encryption (e2ee) implemented between protonmail users.
@ -723,3 +668,58 @@ IOxa+y6OYfAfltw=
Donations to support under https://git.envs.net/WhichDoc are welcome with Monero (XMR) and Pirate Chain (ARRR) in the spirit of anti-forensics.
- Pirate Chain (ARRR): `zs1wjw05nmfc0x8l0wd75ug0xj8q9fjta4ch0kak0ulnvnt2y8j3hevq0q8f62ma62kk5pd6z4h8zr`
- Monero (XMR): `47w2kanKMnzFkRGnSvbYjjPYac9TAsAm2GzmPBprdqM41zVXHSgkkSmVJMrY6o1qoYLdVJabcBupnJbABMxu4ejrMArAEue`
## References
[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/
[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/
[^3]: https://github.com/corna/me_cleaner
[^4]: Coreboot - https://www.coreboot.org
[^5]: Artix Linux - https://artixlinux.org
[^6]: Void Linux - https://voidlinux.org
[^7]: Alpine Linux - https://alpinelinux.org/
[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/
[^9]: GrapheneOS - https://grapheneos.org
[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/
[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/
[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model
[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/
[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN
[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support
[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/
[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection
[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/
[^19]: Bromite Browser - https://www.bromite.org
[^20]: Brave Browser - https://brave.com
[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers
[^22]: DuckDuckGo - https://duckduckgo.com
[^23]: Searx instances - https://searx.space/
[^24]: TAILS - https://tails.boum.org
[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate.
[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html
[^27]: Minisign - https://github.com/jedisct1/minisign/
[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/
[^29]: KeepassXC - https://keepassxc.org
[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py
[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian
[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry
[^34]: USBCTL - https://github.com/anthraxx/usbctl
[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/
[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf
[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf
[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge.
[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
[^40]: ZkSnarks - https://z.cash/technology/zksnarks
[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf
[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf
[^43]: CIS - https://www.cisecurity.org
[^44]: DISA STIGs - https://public.cyber.mil/stigs
[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host
[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos
[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap
[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020
[^50]: HiddenVM - https://github.com/aforensics/HiddenVM
[^51]: KVM - https://www.linux-kvm.org/
[^52]: Oracle VirtualBox - https://virtualbox.org