diff --git a/README.md b/README.md index c43bb75..d36eda2 100644 --- a/README.md +++ b/README.md @@ -54,9 +54,9 @@ - [Market Vendor](#market-vendor) - [Conclusion](#conclusion) - [Appendix A](#appendix-a) -- [References](#references) - [Contact Us](#contact-us) - [Donations](#donations) +- [References](#references) ---- End TOC ---- @@ -604,61 +604,6 @@ For the hollow men (federal agents or contractors) who stumbled upon my work by done ``` -## References -[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/ -[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/ -[^3]: https://github.com/corna/me_cleaner -[^4]: Coreboot - https://www.coreboot.org -[^5]: Artix Linux - https://artixlinux.org -[^6]: Void Linux - https://voidlinux.org -[^7]: Alpine Linux - https://alpinelinux.org/ -[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/ -[^9]: GrapheneOS - https://grapheneos.org -[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/ -[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/ -[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model -[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/ -[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN -[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support -[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/ -[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection -[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/ -[^19]: Bromite Browser - https://www.bromite.org -[^20]: Brave Browser - https://brave.com -[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers -[^22]: DuckDuckGo - https://duckduckgo.com -[^23]: Searx instances - https://searx.space/ -[^24]: TAILS - https://tails.boum.org -[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate. -[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html -[^27]: Minisign - https://github.com/jedisct1/minisign/ -[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/ -[^29]: KeepassXC - https://keepassxc.org -[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/ -[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py -[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian -[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry -[^34]: USBCTL - https://github.com/anthraxx/usbctl -[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/ -[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf -[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf -[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge. -[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/ -[^40]: ZkSnarks - https://z.cash/technology/zksnarks -[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf -[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf -[^43]: CIS - https://www.cisecurity.org -[^44]: DISA STIGs - https://public.cyber.mil/stigs -[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings -[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host -[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos -[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap -[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020 -[^50]: HiddenVM - https://github.com/aforensics/HiddenVM -[^51]: KVM - https://www.linux-kvm.org/ -[^52]: Oracle VirtualBox - https://virtualbox.org - - ## Contact Us Email: x0ptoutx@protonmail.ch Do note that there is end-to-end encryption (e2ee) implemented between protonmail users. @@ -723,3 +668,58 @@ IOxa+y6OYfAfltw= Donations to support under https://git.envs.net/WhichDoc are welcome with Monero (XMR) and Pirate Chain (ARRR) in the spirit of anti-forensics. - Pirate Chain (ARRR): `zs1wjw05nmfc0x8l0wd75ug0xj8q9fjta4ch0kak0ulnvnt2y8j3hevq0q8f62ma62kk5pd6z4h8zr` - Monero (XMR): `47w2kanKMnzFkRGnSvbYjjPYac9TAsAm2GzmPBprdqM41zVXHSgkkSmVJMrY6o1qoYLdVJabcBupnJbABMxu4ejrMArAEue` + + +## References +[^1]: https://www.forbes.com/sites/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/ +[^2]: Purism technical writeup for IME - https://puri.sm/posts/deep-dive-into-intel-me-disablement/ +[^3]: https://github.com/corna/me_cleaner +[^4]: Coreboot - https://www.coreboot.org +[^5]: Artix Linux - https://artixlinux.org +[^6]: Void Linux - https://voidlinux.org +[^7]: Alpine Linux - https://alpinelinux.org/ +[^8]: https://www.statista.com/chart/15207/smartphone-data-collection-by-google-and-apple/ +[^9]: GrapheneOS - https://grapheneos.org +[^10]: Pine64 Pinephone - https://www.pine64.org/pinephone/ +[^11]: Purism Librem 5 - https://puri.sm/products/librem-5/ +[^12]: OSI Model - https://en.wikipedia.org/wiki/OSI_model +[^13]: ProtonVPN threat model - https://protonvpn.com/blog/threat-model/ +[^14]: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN +[^15]: https://gitlab.tails.boum.org/tails/blueprints/-/wikis/vpn_support +[^16]: Orbot - https://guardianproject.info/apps/org.torproject.android/ +[^17]: Whonix leak protection - https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection +[^18]: Ungoogled Chromium binaries - https://ungoogled-software.github.io/ungoogled-chromium-binaries/ +[^19]: Bromite Browser - https://www.bromite.org +[^20]: Brave Browser - https://brave.com +[^21]: The Hitchhikers Guide to Anonymity (Browser Hardening) - https://anonymousplanet.org/guide.html#appendix-v1-hardening-your-browsers +[^22]: DuckDuckGo - https://duckduckgo.com +[^23]: Searx instances - https://searx.space/ +[^24]: TAILS - https://tails.boum.org +[^25]: Singh, S. (1999). The code book: the secret history of codes and codebreaking (Vol. 366). London: Fourth Estate. +[^26]: GNU Privacy Assistant - gnupg.org/related_software/gpa/index.html +[^27]: Minisign - https://github.com/jedisct1/minisign/ +[^28]: Veracrypt - https://www.veracrypt.fr/code/VeraCrypt/ +[^29]: KeepassXC - https://keepassxc.org +[^30]: USB dead man's switch - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/ +[^31]: USBKill - https://github.com/hephaest0s/usbkill/blob/master/usbkill/usbkill.py +[^32]: Silk Guardian - https://github.com/NateBrune/silk-guardian +[^33]: Centry Panic Button - https://github.com/AnonymousPlanet/Centry +[^34]: USBCTL - https://github.com/anthraxx/usbctl +[^35]: Elcomsoft Forensics - https://blog.elcomsoft.com/2020/03/breaking-veracrypt-containers/ +[^36]: Jumping Airgaps - https://arxiv.org/pdf/2012.06884.pdf +[^37]: https://assets.documentcloud.org/documents/6747427/2.pdf +[^38]: Jung, C. G. (2014). Modern man in search of a soul. Routledge. +[^39]: CipherTrace - https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/ +[^40]: ZkSnarks - https://z.cash/technology/zksnarks +[^41]: Monero Whitepaper - https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf +[^42]: Pirate Chain Whitepaper - https://pirate.black/files/whitepaper/The_Pirate_Code_V2.0.pdf +[^43]: CIS - https://www.cisecurity.org +[^44]: DISA STIGs - https://public.cyber.mil/stigs +[^45]: KSPP - https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings +[^46]: Whonix Host - https://www.whonix.org/wiki/Whonix-Host +[^47]: PlagueOS- https://git.envs.net/whichdoc/plagueos +[^48]: BubbleWrap Sandbox - https://github.com/containers/bubblewrap +[^49]: FOIA request for Palantir operations -https://www.documentcloud.org/search/projectid:51061-Palantir-September-2020 +[^50]: HiddenVM - https://github.com/aforensics/HiddenVM +[^51]: KVM - https://www.linux-kvm.org/ +[^52]: Oracle VirtualBox - https://virtualbox.org