mirror of
https://0xacab.org/optout/into-the-crypt.git
synced 2024-12-12 09:24:33 -05:00
Formatting tweaks
This commit is contained in:
parent
cd9eb92516
commit
afb6d1c181
112
README.md
112
README.md
@ -54,9 +54,9 @@
|
||||
- [Market Vendor](#market-vendor)
|
||||
- [Conclusion](#conclusion)
|
||||
- [Appendix A](#appendix-a)
|
||||
- [References](#references)
|
||||
- [Contact Us](#contact-us)
|
||||
- [Donations](#donations)
|
||||
- [References](#references)
|
||||
|
||||
---- End TOC ----
|
||||
|
||||
@ -604,61 +604,6 @@ For the hollow men (federal agents or contractors) who stumbled upon my work by
|
||||
done
|
||||
```
|
||||
|
||||
## References
|
||||
[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/
|
||||
[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/
|
||||
[^3]: https://github.com/corna/me_cleaner
|
||||
[^4]: Coreboot - https://www.coreboot.org
|
||||
[^5]: Artix Linux - https://artixlinux.org
|
||||
[^6]: Void Linux - https://voidlinux.org
|
||||
[^7]: Alpine Linux - https://alpinelinux.org/
|
||||
[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/
|
||||
[^9]: GrapheneOS - https://grapheneos.org
|
||||
[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/
|
||||
[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/
|
||||
[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model
|
||||
[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/
|
||||
[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN
|
||||
[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support
|
||||
[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/
|
||||
[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection
|
||||
[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/
|
||||
[^19]: Bromite Browser - https://www.bromite.org
|
||||
[^20]: Brave Browser - https://brave.com
|
||||
[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers
|
||||
[^22]: DuckDuckGo - https://duckduckgo.com
|
||||
[^23]: Searx instances - https://searx.space/
|
||||
[^24]: TAILS - https://tails.boum.org
|
||||
[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate.
|
||||
[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html
|
||||
[^27]: Minisign - https://github.com/jedisct1/minisign/
|
||||
[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/
|
||||
[^29]: KeepassXC - https://keepassxc.org
|
||||
[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
|
||||
[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py
|
||||
[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian
|
||||
[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry
|
||||
[^34]: USBCTL - https://github.com/anthraxx/usbctl
|
||||
[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/
|
||||
[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf
|
||||
[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf
|
||||
[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge.
|
||||
[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
|
||||
[^40]: ZkSnarks - https://z.cash/technology/zksnarks
|
||||
[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf
|
||||
[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf
|
||||
[^43]: CIS - https://www.cisecurity.org
|
||||
[^44]: DISA STIGs - https://public.cyber.mil/stigs
|
||||
[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
|
||||
[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host
|
||||
[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos
|
||||
[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap
|
||||
[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020
|
||||
[^50]: HiddenVM - https://github.com/aforensics/HiddenVM
|
||||
[^51]: KVM - https://www.linux-kvm.org/
|
||||
[^52]: Oracle VirtualBox - https://virtualbox.org
|
||||
|
||||
|
||||
## Contact Us
|
||||
Email: x0ptoutx@protonmail.ch
|
||||
Do note that there is end-to-end encryption (e2ee) implemented between protonmail users.
|
||||
@ -723,3 +668,58 @@ IOxa+y6OYfAfltw=
|
||||
Donations to support under https://git.envs.net/WhichDoc are welcome with Monero (XMR) and Pirate Chain (ARRR) in the spirit of anti-forensics.
|
||||
- Pirate Chain (ARRR): `zs1wjw05nmfc0x8l0wd75ug0xj8q9fjta4ch0kak0ulnvnt2y8j3hevq0q8f62ma62kk5pd6z4h8zr`
|
||||
- Monero (XMR): `47w2kanKMnzFkRGnSvbYjjPYac9TAsAm2GzmPBprdqM41zVXHSgkkSmVJMrY6o1qoYLdVJabcBupnJbABMxu4ejrMArAEue`
|
||||
|
||||
|
||||
## References
|
||||
[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/
|
||||
[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/
|
||||
[^3]: https://github.com/corna/me_cleaner
|
||||
[^4]: Coreboot - https://www.coreboot.org
|
||||
[^5]: Artix Linux - https://artixlinux.org
|
||||
[^6]: Void Linux - https://voidlinux.org
|
||||
[^7]: Alpine Linux - https://alpinelinux.org/
|
||||
[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/
|
||||
[^9]: GrapheneOS - https://grapheneos.org
|
||||
[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/
|
||||
[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/
|
||||
[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model
|
||||
[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/
|
||||
[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN
|
||||
[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support
|
||||
[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/
|
||||
[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection
|
||||
[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/
|
||||
[^19]: Bromite Browser - https://www.bromite.org
|
||||
[^20]: Brave Browser - https://brave.com
|
||||
[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers
|
||||
[^22]: DuckDuckGo - https://duckduckgo.com
|
||||
[^23]: Searx instances - https://searx.space/
|
||||
[^24]: TAILS - https://tails.boum.org
|
||||
[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate.
|
||||
[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html
|
||||
[^27]: Minisign - https://github.com/jedisct1/minisign/
|
||||
[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/
|
||||
[^29]: KeepassXC - https://keepassxc.org
|
||||
[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
|
||||
[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py
|
||||
[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian
|
||||
[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry
|
||||
[^34]: USBCTL - https://github.com/anthraxx/usbctl
|
||||
[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/
|
||||
[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf
|
||||
[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf
|
||||
[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge.
|
||||
[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
|
||||
[^40]: ZkSnarks - https://z.cash/technology/zksnarks
|
||||
[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf
|
||||
[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf
|
||||
[^43]: CIS - https://www.cisecurity.org
|
||||
[^44]: DISA STIGs - https://public.cyber.mil/stigs
|
||||
[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
|
||||
[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host
|
||||
[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos
|
||||
[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap
|
||||
[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020
|
||||
[^50]: HiddenVM - https://github.com/aforensics/HiddenVM
|
||||
[^51]: KVM - https://www.linux-kvm.org/
|
||||
[^52]: Oracle VirtualBox - https://virtualbox.org
|
||||
|
Loading…
Reference in New Issue
Block a user