diff --git a/CHANGELOG.md.asc b/CHANGELOG.md.asc index 5eee76b..8126343 100644 --- a/CHANGELOG.md.asc +++ b/CHANGELOG.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36rgAKCRAoXmBIoSMh -sqLqAQCWflaqeJx6sHa5F0GZNv+KdWQCpD7I2BleW0OxRzdLDgD/XEAMo/eZ3i4X -QZhLtKxW2VK9Or4O5pqL6ekcQD5FGwo= -=G5pT +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGUwAKCRAoXmBIoSMh +ssWmAP9q6uA/2F/Hr51K0qW26Ai0d7m+V1NzY1oQJbhB+DoAewD9GlR2QHFR3cFM +lGUC1SEQQVPuKeFulHX8YI1y+RwAWQo= +=7+em -----END PGP SIGNATURE----- diff --git a/CHANGELOG.md.minisig b/CHANGELOG.md.minisig index b6e1f19..7910753 100644 --- a/CHANGELOG.md.minisig +++ b/CHANGELOG.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/rUuTZ3zG4hwK9fl/+zi4zwaIbFvGaprJfucA/gJf0/b+XQfU4MywwTJUQsooVznDzbGAw2zKJbZlbmKTRfQ2w4= -trusted comment: timestamp:1687026351 file:CHANGELOG.md hashed -KiaLsJ0/RbAM41o09JcD5DM+DqlxTNrW5GERImdq0zxgMuppnZfREF5LXXDURe94CwKs0v3sJE5l/oE81WUNDg== +trusted comment: timestamp:1688782421 file:CHANGELOG.md hashed +JFRF9M0BYjKayl1pPGnnnSOjepVK/pGGUvhY36rPvNRmn3S730il5ChGHUXnNBk3V8UVK8LuLhNFQ+jXEFG2BQ== diff --git a/CODE_OF_CONDUCT.md.asc b/CODE_OF_CONDUCT.md.asc index ef6a6ab..8f70a4c 100644 --- a/CODE_OF_CONDUCT.md.asc +++ b/CODE_OF_CONDUCT.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36rwAKCRAoXmBIoSMh -sr49AQCdYY+HxxYUujJdsNjaRLbwLzWWUgxJEU65ndc3yRRdHAEAjriqxnd6FG4v -3GLrFBkSPfJXqwRTRpElLGbOs/gAigg= -=cpXn +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGVQAKCRAoXmBIoSMh +shkbAQChlGyEWWDWWos3lCjdqmnW6G9IlyQg/adYf+c2tSH+RwD/TLBv04gznOkI +St1Gv3yU2QF99eFOjinMuUJIDrPUGwQ= +=b+zm -----END PGP SIGNATURE----- diff --git a/CODE_OF_CONDUCT.md.minisig b/CODE_OF_CONDUCT.md.minisig index 2308ce9..f123a83 100644 --- a/CODE_OF_CONDUCT.md.minisig +++ b/CODE_OF_CONDUCT.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/gD5vCC8/YFdUVxQVvGfr4Far0rKgyq8NvpyWOyv7OniMR0H1cROxjbaNwDGKi40AIpnb4DxlLhGLB9vXxAk4Qo= -trusted comment: timestamp:1687026352 file:CODE_OF_CONDUCT.md hashed -EDlIFhZnf8GRz2xxjSuVZCEGe0OJ2kSKX1CAHNI6s8A4Nl95hQ+hfVHX0x4pNxS7yosB35GkqjSyUXCpsYhTCg== +trusted comment: timestamp:1688782422 file:CODE_OF_CONDUCT.md hashed +EmwkOZd16Y64XG3BiQilQ6CzX1vOdBry4K3pCawhL7FkVvEh+lLzDfbHXrHiEeK3Eod4HDg3Phe4HYdvNYV6Ag== diff --git a/CONTRIBUTING.md.asc b/CONTRIBUTING.md.asc index 334bc04..e82ce14 100644 --- a/CONTRIBUTING.md.asc +++ b/CONTRIBUTING.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36sAAKCRAoXmBIoSMh -soxYAQDM7wXpGcXxFS/54tIO1QC2/ToD8O1OCGbm7atERZj29gEAh82DgF4ry4ya -0H6fXI6JjOv2l8bP3NT5oTFrqegPPQM= -=Avcm +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGVgAKCRAoXmBIoSMh +sqzqAQD22MWryO5pEzAguPd/U+NHSCnnkdcPZPcCb96JUPEUGAD+Nu2jwB1stj9N +hH4xoe+7U+50Y/MgfYZJjE6aXdgJQQI= +=tGgE -----END PGP SIGNATURE----- diff --git a/CONTRIBUTING.md.minisig b/CONTRIBUTING.md.minisig index 987fda0..73458ad 100644 --- a/CONTRIBUTING.md.minisig +++ b/CONTRIBUTING.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/tWnF0Uppl4tQg0CfR1fSzNpvQpIunGQeT70ZiZbMV5l/1sb5rFmzjZOgOyJxslx/Da9yoSnzcDy+zKhHF99ng0= -trusted comment: timestamp:1687026354 file:CONTRIBUTING.md hashed -JENV43g8vY0ABfhK1/UqNTmYB5ZOz3EdCqaCa6C1Omz2U4u15VAaPJw5tGlnyFe7crQ6hwbDEu2Y8v9gmYCuAQ== +trusted comment: timestamp:1688782424 file:CONTRIBUTING.md hashed +vIXpcqpyYKid8xNi4stiaCRVWu8HUiplAGQznVCXDdDlmg8d+b0TZzS5oKHpaBtsF5lCaR0Z2iLNVmoOdZfQBg== diff --git a/KEY_ROTATION.md.asc b/KEY_ROTATION.md.asc index 95eb4b0..9ac8407 100644 --- a/KEY_ROTATION.md.asc +++ b/KEY_ROTATION.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36sgAKCRAoXmBIoSMh -su6aAQDHoThpapfnBpIp+OtcB2783kEgeqvYfBU2c7yIvD89fwD/TKlad9YhlBfs -ctMKI25UiNlKiMy5IvpQLAlCy5wIqAA= -=quL9 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGWAAKCRAoXmBIoSMh +spYQAP9VI49Ay2ZSnXpbc1lpQedJ8u3VnUznEUx2JIiiC5C0wgD/c+9wyMVyd8+b +0OBU+pDvUGunqSAQpchx22I2x5CxrQ0= +=qOAb -----END PGP SIGNATURE----- diff --git a/KEY_ROTATION.md.minisig b/KEY_ROTATION.md.minisig index 0a90789..922948a 100644 --- a/KEY_ROTATION.md.minisig +++ b/KEY_ROTATION.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/gEdIFDRsGwF2xuLoX64+PcxRZHg0mT+M3d5ZBNe4iv6jUdYpoFpY6Ba2Ny2jTxhLq8lbu4IsvRsBxMSvCdipQE= -trusted comment: timestamp:1687026355 file:KEY_ROTATION.md hashed -wUYE7GD///Ba659e6NbA1LR+nsW8rDyotxwET9D2OZoOt6xkmEdmER7epf+juRnDrL6AwL+GyIcKsrO6+pOwCw== +trusted comment: timestamp:1688782425 file:KEY_ROTATION.md hashed +qhkoUfyBfLsDSnX2qs0lyV2vaz5GgTcdrYBjzNiAwWxp/FRTu8wkrUBeG3U5dELtdNuXTYPSa3mC1z7khNQKBg== diff --git a/LICENSE.md.asc b/LICENSE.md.asc index 901f25f..3eb6313 100644 --- a/LICENSE.md.asc +++ b/LICENSE.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36swAKCRAoXmBIoSMh -sojQAQDd7eRo56RuZXhnAV45igMywL1/IAVMFjt1C8hKc6wszAEAvVTNERREpH+2 -INhHXbyR01L+d/ZsujiyOklobXw3pAc= -=pa4H +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGWQAKCRAoXmBIoSMh +sn+uAP9P2vRShLNB8v5EV9poAPdXRGD6K2HlDvYmUL7AgtX8xgEAsSGsW8WHOjjA +EJtkmi/rskCEhnsg9CxVAnIvPyJcVQg= +=DkvK -----END PGP SIGNATURE----- diff --git a/LICENSE.md.minisig b/LICENSE.md.minisig index bddd990..c40e1c2 100644 --- a/LICENSE.md.minisig +++ b/LICENSE.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/gAzBQtyzCamju84eebs9pmkibZyZu3dRxd3LrTgZgknkRyjTMx8clMYRpHl1l7XCqCROtQU8r+zSXd79xFgFQc= -trusted comment: timestamp:1687026357 file:LICENSE.md hashed -lXZGpTW6RdWQOQYC8A1xtolDGYsWcb8l8rcaBuH4OzX0Z0MwEisaPlSSw+UZCDRf/hqQMdaDXOZoAcdtwHQCBw== +trusted comment: timestamp:1688782427 file:LICENSE.md hashed +3X6tBYwaearqjAKgWck5ywvxtNa/LKr5BCWuolV0oRdgK63S/+wqaLFkuFRbbWJ9vwIsWdfEcJTbtI81h2yTBA== diff --git a/README.md.asc b/README.md.asc index e8d683c..8a2395e 100644 --- a/README.md.asc +++ b/README.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36tQAKCRAoXmBIoSMh -sk3VAQDd2BR8e2IziGr01HOoi0Rcg+z2FttVyIHJDiZAP2BolQEAnG4VMVXKGT4b -XYzZqAXyBB9Iqv6ZeK4zPXct6T1wpgk= -=XHcL +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGWwAKCRAoXmBIoSMh +svsEAQDGB8604rIkpEISFMkBrw6lNVyi29UkJCGXThGFN2sg4AD/SGM0UJqJFmJ3 +wur9Fk/H82tTflwoiC27NBsdrZJiiQc= +=AEy9 -----END PGP SIGNATURE----- diff --git a/README.md.minisig b/README.md.minisig index e2c4808..6c52377 100644 --- a/README.md.minisig +++ b/README.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/pgNN3JobRKk9yc7YsFmiU8HGK3ODVuzNh4pPtbNj+u0hu3lLC6FJJV1f8o2iiMrmBKnMmeQL/lpTIOHtwXTtwc= -trusted comment: timestamp:1687026358 file:README.md hashed -IiE6TJ8MzP3tdOYGIznjuXAjZHea+BbgFX4Z4g8cmlKw5UEkaZlvFMHkNQ5QuE/+Bm+oBpJsUHbl7dpnZ/7lDQ== +trusted comment: timestamp:1688782428 file:README.md hashed +Qu+OuumBXmCiq8tNAtNEN+haNH7Uy3eZ0RSZA/Uv/WSmvKd1dNmOp5wB6d+69JE7E1Ck2SiPEMjPuaj69642CQ== diff --git a/about.md.asc b/about.md.asc index 70deed8..8d9cda2 100644 --- a/about.md.asc +++ b/about.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36tgAKCRAoXmBIoSMh -skAVAQD9f2MNWVAiiLLFJRot+fWGdGlw16ZyP4PfxyvklTWv2gD/U4TOm7YhmpgS -XcV4smfirWXmnblDYMnIOt6vefgr2A8= -=FEYe +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGXAAKCRAoXmBIoSMh +smRyAQD7Z5P/skJM2g3TVFHxSgkdbVZ/3Ri0rtnhlZ0FhUH2YwEAnTsR2AE9ULBN +ybZDgIxATuNdVUIDxDLGnEk5RzFd4Aw= +=xcRi -----END PGP SIGNATURE----- diff --git a/about.md.minisig b/about.md.minisig index cafc7c6..a7240b4 100644 --- a/about.md.minisig +++ b/about.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/jMbV8YC4jebQgZWBwmP0XZ0QEfXmIO2c1YQ30zXoZm2QxZjfybCNrVIaPgL72LiqBBTtDQPNrN9JjTSZkuvVAw= -trusted comment: timestamp:1687026360 file:about.md hashed -fvbOHU4kQd39shqfKbc0ivy7juPTIXSW03x+zCnbESc3l77KAXsim8sWBwOMH8ZaCUWpYPO5LuafMM8TYri8DQ== +trusted comment: timestamp:1688782430 file:about.md hashed +ALYdTN2UywJwJBtt11di/jTCyvJ4FoVzPG+RoBuYmHfLAA6CHQudCzQls+7MXkv1ts/d3UpxXAovjyhsybXuCw== diff --git a/b2sum.txt b/b2sum.txt index b8955cf..385bdcb 100644 --- a/b2sum.txt +++ b/b2sum.txt @@ -9,7 +9,7 @@ ae55dafb58b68494ac627911e7ca19878c515bdd712e3328775065b2066e212ed4c62d24abe52674 81352084f4e0d2104f71be16779ca788a97da03df7b6307b14867ad097be329ff37f039a4aed1b0309391c4af10187ee32822736bc3c797b3af5b19f4da0cc73 chatrooms-rules.md 0f1ade686710eae78be9d2ac09f8249399994b4e73d37e8d0893cff9d58ba93dc38eb5ffb912744aa1318508449ed7a11661af99e778f0d800f5b11ced4fbd2c constitution.md 5a0a6f7e1df8e6965606d12e6763c86c96adb023df120c0a71e631f2ad44fcd9057c84f793411f71e6b5366a84fe583def86729f0863d0e3a0f083d228f37850 donations.md -3d7098c73a1b9f882807cd5812c03c7010ec8d08f0b36b22f7397d76231917e24cc65647f55dae7cc742e086dd36e03885c4dcec7109a508e31f76cef0277262 guide.md +619ff0d4d0b30cf390706cff86bb11ff514023bd692fe68b27cf409c3a54331fa4129a56f4bfef0229418c529e9e706abfe1a0b5803f611d36855fde04074ac1 guide.md 046a52e53005963dd38343505aa43e51b5d750f0891c0a20a675c80ef9a254077db98b15165641a5f7ea33cc19f035e2aa7dbec4504a95c32b63911e3c7a8046 legacy.md 354a7a6f910c5a6508cf13b406c542ae3f0ad739fa3732936ccaa282fd486a475c39ab0862525dd4555f06e0164b90a99dac400b729bc9feab91b637eb896589 links.md 32b57ea09d576ce73f74352e9fe1baef19ed6c3808a9e3fa4716ec881f57a579861fa22b95e56dc729048c27e242fbbc15866cb2c36411c9e49173c00c126647 moderncrypto-rules.md diff --git a/b2sum.txt.asc b/b2sum.txt.asc index 91da499..6e53204 100644 --- a/b2sum.txt.asc +++ b/b2sum.txt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36yQAKCRAoXmBIoSMh -suXeAPwPRgoxyv8PggSvl23yHcOoHudaLN5/rL/TINA+Fefh0gD+PK76ZjMsmEPS -REv6IfOuPK6ImQnaI+Q68JaR+Y2+2ws= -=+azL +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGbgAKCRAoXmBIoSMh +si/CAQCIXH7LtyfJP9RkebnYDTyBk35wTeoyYX8lSfQ9E98tbAEA7fl+zgrh1eTi +P4LyXISZ5wnvwrgB8xOLMIk48Tnjnw4= +=vAVM -----END PGP SIGNATURE----- diff --git a/b2sum.txt.minisig b/b2sum.txt.minisig index f7f0dd2..2329f38 100644 --- a/b2sum.txt.minisig +++ b/b2sum.txt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/olEqpUdlOQFLsYec0I2Dkx7WVpgBBT3t2b4l4nuNrK79yK9mnRVjkm8/hGKP4LXYQX9OYhKNDQ45KggZkUMaAo= -trusted comment: timestamp:1687026378 file:b2sum.txt hashed -jmkLEWh6dHoDAIRl2Fg9T/wIzu1atImDEXr1PyvZFNdhT9MsxHUw3F+QEFHMZ85r5ZyaROJSIrUGEga9/zuFDA== +RUSn9xivowlq/mo1bKOBMGJV9Kv3W4CO7VuOhZrG0PxlN1rCckeCD17cyFe5BP+mpuJsTv19YEp9cnFv7Kx1h00fZNH6i9tUmAM= +trusted comment: timestamp:1688782448 file:b2sum.txt hashed +rcxhad+eda//vCUYhLP/s4qd1u2bUlMpb3ZU91rQncgBlapvHrTXSOUE8P8KaTCje9N+NExXQqWw/XYj2XGjBg== diff --git a/briar.md.asc b/briar.md.asc index 61285c6..3688a65 100644 --- a/briar.md.asc +++ b/briar.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36uAAKCRAoXmBIoSMh -srs1AQCL1els5em5IsnzNGfQGEaJpXdwQcLONIMNUyspQbfVFQD+K3fQFS7bXrH7 -dn0BUesOqHAFZpoMy7EJcwnPQFYaHQg= -=2nii +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGXgAKCRAoXmBIoSMh +sq95AQCyQuVxgJ7cOoE/15K/kef1v3kZh/ViHLRotnv7xAqObgD+OWPFpXLGu8h1 +/qyz1hb4hMWO6qyslW7SPpB81EqZtwI= +=bHHm -----END PGP SIGNATURE----- diff --git a/briar.md.minisig b/briar.md.minisig index 96cae6e..74a18bd 100644 --- a/briar.md.minisig +++ b/briar.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/mjhwPVty4ZNYfjn4Gx8rNfbI0b+wd4o32ZIPOV/tWquVnu0QA3tLFvn+UODOdV+MYvFsknKZ37H9BAgqPt0CQc= -trusted comment: timestamp:1687026361 file:briar.md hashed -kxkEoL+fdoBjyXAdTmTs44umdcsEtoxKiAlXAfFuoAxV+B7n2rvb1+LLrXX92XFO88MExdrBxstUkIFinBlYAQ== +trusted comment: timestamp:1688782431 file:briar.md hashed +fAEjQwPCoLyhf9tGAlRRXCcJTj0In6UwSzzVGBHbobC2Cp07pk60MTEnk3bZrnXPRyDILnir2NEuQtpul3M4CA== diff --git a/chatrooms-rules.md.asc b/chatrooms-rules.md.asc index 7862dcf..38a9957 100644 --- a/chatrooms-rules.md.asc +++ b/chatrooms-rules.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36uQAKCRAoXmBIoSMh -sq4eAQDn7mdh2VvWOMJXZRvLC8rA/ZBizzNtXn9BQUle2j3CCQD/W+ecYhnw0zzA -1qhWoBXDsZFca7QeHYYV5vxO0PM4UwU= -=ZtW4 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGXwAKCRAoXmBIoSMh +soNAAP0S8ly6w6hOTe1BXxrzOm0FSenZvloyio969a5gePcnKgD9EmKiFbsaCVCk +qjQrD+mOwtvM1hmOVhIj0G7gUknk9wY= +=ExvY -----END PGP SIGNATURE----- diff --git a/chatrooms-rules.md.minisig b/chatrooms-rules.md.minisig index 16cd4c2..56f873b 100644 --- a/chatrooms-rules.md.minisig +++ b/chatrooms-rules.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/rLXR8idyufcZFnYdYipqM3lvINPxKGr6KNEZoNq0UHDG5PThx+JfeIT2RKQoU3Qd6McVV45YgF8FMdmbCXo/QA= -trusted comment: timestamp:1687026363 file:chatrooms-rules.md hashed -H9sN1I3mj4pex4XgUyAR+y9NsSs1y2wYVqVCArAoYtJ0DCfdIA3NLtGgIe6E1L1eJr8+Cdmqhz6wUptFWFNqCg== +trusted comment: timestamp:1688782433 file:chatrooms-rules.md hashed +m46dksuMFUR585DXT13UonzOqZc0CmDniRsarkqZ7qeXDY5wTjWWj4xnvEED0TOeUdW5ClJk44H4e5N/B0gcDg== diff --git a/constitution.md.asc b/constitution.md.asc index c420ca3..169a51d 100644 --- a/constitution.md.asc +++ b/constitution.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36uwAKCRAoXmBIoSMh -spc6AQD+bX1DzKz7C6Lxwov3giAEshv8YrGZzaqzZwVkMfI3rgD9FinPLlhNH0DW -m/hrONiN2tAnbEGu54/8IyqG90QxlQA= -=CGlu +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGYQAKCRAoXmBIoSMh +sscnAPsGXR6d2Bt2qFoNmH0sKAvzVgjX0zGZyd6NFgDWqmLy1QEA8ZuBQbSjcLQo +oSYWqsnLnUbnrCtNbFFjelxlhpwkeQI= +=nrRl -----END PGP SIGNATURE----- diff --git a/constitution.md.minisig b/constitution.md.minisig index f6a1cd6..7f91c22 100644 --- a/constitution.md.minisig +++ b/constitution.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/pTBVjkP4uv5unHZNWMoXS1e0g8frI16Z7Oo13E5kkaSDRQfNY5ljVzaYTS87i+qGp2f/rajz3CFZ+hZK4XmEAs= -trusted comment: timestamp:1687026364 file:constitution.md hashed -EX+QqNt+gotcYGtV3ssnJ1X3Y3cbxg6scmddm4LHqlROHA1zAUgtPfkbEooKVrm7X3inYM8HfouOw+NQLC3CDg== +trusted comment: timestamp:1688782434 file:constitution.md hashed +n9dVPajKNa9mS2Uwb7WF7jhda251iWavfA8oALiLkfCL+xk+Qz+yiM0GFgrlxamZpG2fc/5nMigElwbvak1DDg== diff --git a/donations.md.asc b/donations.md.asc index 0e42a65..3f56e79 100644 --- a/donations.md.asc +++ b/donations.md.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36vAAKCRAoXmBIoSMh -sm00AP4/O2Vq3GqoXn73kdevTyrHXwziLWvzTSsIprxkhgF3fQEApl9QmFZlCvy9 -ugCLQInAcHY7HsSMWcrvAeT6tikFGA8= -=YCdJ +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGYgAKCRAoXmBIoSMh +skXLAQCA0xadDIxOd2AjoVS6mf603s4Hso6+2WwcvvwsZvAtLgD9HkTWf0I7nD1I +xLJbZ0yIrUvEXoItyhLLA45CvnWf0wE= +=8tHB -----END PGP SIGNATURE----- diff --git a/donations.md.minisig b/donations.md.minisig index 0876709..5360455 100644 --- a/donations.md.minisig +++ b/donations.md.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/sQFyVW9JQLYtu+Uzm+8g8sA/n2nmKhCq1qD2dDWRBu2sgf52CUpImu5sAOsEITef7OL1YlZgM5i7/spdOrQvQE= -trusted comment: timestamp:1687026366 file:donations.md hashed -EYlRuLZxruqaZRV7XWxuq7wAXWxzuuPPL2tfsyaTGcp3Q6p+mVpmOOTkgw/mi5GeNBHBBTB0w+yCUSenkSDrCw== +trusted comment: timestamp:1688782436 file:donations.md hashed +jRqOx0CFKadH0Wx5Wx31qfIbt7iLFFFB0uAC/05c68g8C4aATppKBc8KhUPruwXLejJdmopbWY+aoOzj+tM1CA== diff --git a/export/CHANGELOG.html.asc b/export/CHANGELOG.html.asc index bcae6ea..ec9681e 100644 --- a/export/CHANGELOG.html.asc +++ b/export/CHANGELOG.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36XgAKCRAoXmBIoSMh -so0oAP42UTzX+cP6LWNnsYT01zAt+xXnGLHK0sspEYkCiHLMagEA+aEzXM9B+rRu -1840w+67noweWJv8DKCBjhf0vYm8fg4= -=Rude +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGBAAKCRAoXmBIoSMh +sr/cAP9GTaA8ASlQOWfUAc7/kNzc5vWU6DFRDom2F4Q5iQIt6QD/WkJZRuRCjz+f +oTIYGPa9Rbh61MZOEE/RGE8jCu11Tws= +=KT4x -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.html.minisig b/export/CHANGELOG.html.minisig index 8d098a4..53af292 100644 --- a/export/CHANGELOG.html.minisig +++ b/export/CHANGELOG.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/pfwmomB+Px1R+4/88sGAAOwCAnciWmFs47EcyyY8YOZU75tRy/v35qGh6Yg7ldXe64eVM/ggmM8+MGdlIOi9wY= -trusted comment: timestamp:1687026272 file:CHANGELOG.html hashed -Ppa2TWTtNAsm2WpuQw7lgd07yY1bW1Pe2qZy62BL0m3YtaPyB5VIA+myUJLqiZjwP280ARIRGb9zSQf28ZfGBA== +trusted comment: timestamp:1688782342 file:CHANGELOG.html hashed +iojcRqZRY2wvMS5KWNBJj8QqMSQ5iuyYO3QH0RPCqsZ28DiShrWxjHdThZ5fh7sAXxd/6oMNzELZnzi6AlDyCg== diff --git a/export/CHANGELOG.odt b/export/CHANGELOG.odt index d0c19da..e97817c 100644 Binary files a/export/CHANGELOG.odt and b/export/CHANGELOG.odt differ diff --git a/export/CHANGELOG.odt.asc b/export/CHANGELOG.odt.asc index 72e5333..0250198 100644 --- a/export/CHANGELOG.odt.asc +++ b/export/CHANGELOG.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36YAAKCRAoXmBIoSMh -sp/zAP9iVVDWORHKO6s9RiPARdgq5Cj7/ms1EoqZLusoI6XkhgEAu0G1ZPYi4YA8 -VD9aVIhQgtnuekFVo7CYVTGfk7+zYwQ= -=JGSH +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGBgAKCRAoXmBIoSMh +spPVAQCohYAMAFyn9tZ9UmUMbtTkY3S+oeTebn9fRZlo6tZFygD6AyVf7joh0tg+ +qAgrghnCPrmlwgFuVnzmzZxv8bL4Pg8= +=Ep+r -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.odt.minisig b/export/CHANGELOG.odt.minisig index 147c6d4..b79a734 100644 --- a/export/CHANGELOG.odt.minisig +++ b/export/CHANGELOG.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/q99HBuBnHda+THzKY62sb/LdspMSFtUgdNFB/c+RRDTbWNIgJLK4WyhylrmSlzOh5akE2jBuu/GcWfa7UDncAs= -trusted comment: timestamp:1687026274 file:CHANGELOG.odt hashed -q44qxu2YoU7Bi/tTfF+6P0kjKhvFKuz/fSCxE9fPMEdfA63jpsRRL0PsIIAF9sZqQ+/dbu+pHUCxzkR/UQXmAw== +RUSn9xivowlq/hRwrATzW0+i5kkfiwuwE/WOuBJlYaeYLwdc/fXuOwCRckcZ8hio/T1KJ1RdTPyrCb4SLr6ezYzJQWUSzpBn3ww= +trusted comment: timestamp:1688782343 file:CHANGELOG.odt hashed +W2xGlIZDwS3uEGO/YDOMHjQojSU5bTokYCwlex9ifgoPU8tkSXaqhjpCrKL1wMKLs3nQ8oUR3fSe6iRmBM9TDg== diff --git a/export/CHANGELOG.pdf b/export/CHANGELOG.pdf index 807ce89..0a08581 100644 Binary files a/export/CHANGELOG.pdf and b/export/CHANGELOG.pdf differ diff --git a/export/CHANGELOG.pdf.asc b/export/CHANGELOG.pdf.asc index 59ffc9e..f043426 100644 --- a/export/CHANGELOG.pdf.asc +++ b/export/CHANGELOG.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36YgAKCRAoXmBIoSMh -stbhAPwMcqkBK2xAuxCi+zh9ohS+u7ZNndrN2vJetYOPs9PZvQEA+2wLWs0WnH4V -PWAVFnzlUYjpyB9wG4CFa5Gv7kiiLQ8= -=FVw6 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGBwAKCRAoXmBIoSMh +sj3bAQCAbER1oFxAjdCu0aDZpN47nCkHiVo3ocr9/7uKEaLW3wD+NNSBXuPE+DTE +8P32fiWBnvurLfHXana/O2CU0VzJ+Ak= +=ngFY -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.pdf.minisig b/export/CHANGELOG.pdf.minisig index 3809311..0dcbc28 100644 --- a/export/CHANGELOG.pdf.minisig +++ b/export/CHANGELOG.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/uqGoR81yxSTY2/IzcH4ImVC8Y6WWAeN+yR8jVseXurXlXl1nxBt76/+feV8iTMiXOxNnQ7qTcckHYKkMkNcSQA= -trusted comment: timestamp:1687026275 file:CHANGELOG.pdf hashed -cQKYWSZQf6Z4CSzY1VBoS+BGy+M3uRamPEGgMLDHWefhIl93foAk8qP8PlXiuAiJVXXCefRgDiKDc8HCytKjDA== +RUSn9xivowlq/n57S1F5wH7yyPDZuzBdzeiPYeSCr5QaGYwSBzDIpJgDbvovd6mEmECFIPYKCBjbaEysMfnp1oy++QFaLDmjWQE= +trusted comment: timestamp:1688782345 file:CHANGELOG.pdf hashed +VOEscUf+GJ+I1wStB/xPt+D9GxwgMA9kNDl3zMXSWjFEEXidq/zG8JsH2kz0bpX6FAD7KWsqafGfpBpxV3cUBQ== diff --git a/export/CODE_OF_CONDUCT.html.asc b/export/CODE_OF_CONDUCT.html.asc index e1b89f8..f3d2c83 100644 --- a/export/CODE_OF_CONDUCT.html.asc +++ b/export/CODE_OF_CONDUCT.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36YwAKCRAoXmBIoSMh -skLrAP4qRwDgFft1CgiAXP9HGzbLB0jKI/cHdp4yQF4y7yx4owEAxzkWtdz8AL50 -lK8wu0klkeijkf5zkz4iqci2h0UQ1QM= -=uagL +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGCQAKCRAoXmBIoSMh +spPyAP49KS6nPLBBD1kFLLzS7gtp9NxEmBxRG4ep7X4a4cj2KwEArjRL8fV8T7/Y +G64pgtRgjfQkKARd7G7aOkXDoAH2wQ0= +=AhUU -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.html.minisig b/export/CODE_OF_CONDUCT.html.minisig index 1d5b805..79f61ed 100644 --- a/export/CODE_OF_CONDUCT.html.minisig +++ b/export/CODE_OF_CONDUCT.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/ioo28EDlpt05lMj9jH/4zMxjvwURfcOSYkDnkbxyG/gvvEsNlxRBq1WcM9DAgyTZrIJT2PF84ZRnqZeS89g/Q0= -trusted comment: timestamp:1687026277 file:CODE_OF_CONDUCT.html hashed -vTyLCcopZfMyFrGfAczSKdunYDZBOjT9uHL7fsvayvebeMuymMgESngGKr7tNBNN7uaP8mXIhQQvVWtl5mdEBg== +trusted comment: timestamp:1688782346 file:CODE_OF_CONDUCT.html hashed +EnZY38g0JEbcaWR5nICOSCqfHtL8ODvXQJFYd5SraBGH1dyMrt7OR8dO8rGhRlwC9r7HdC+pB03douiXGlGtBw== diff --git a/export/CODE_OF_CONDUCT.odt b/export/CODE_OF_CONDUCT.odt index 47d4916..fadad98 100644 Binary files a/export/CODE_OF_CONDUCT.odt and b/export/CODE_OF_CONDUCT.odt differ diff --git a/export/CODE_OF_CONDUCT.odt.asc b/export/CODE_OF_CONDUCT.odt.asc index b5393eb..b905450 100644 --- a/export/CODE_OF_CONDUCT.odt.asc +++ b/export/CODE_OF_CONDUCT.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36ZQAKCRAoXmBIoSMh -sg/ZAPoDvQkgi4J3NE+QUsPw0+omccJqXYUDmjE0q43x8qQZUgEAzuUQXOiIgg6R -wjjCP4TwubE79x3JFFvy2GOTR1/cDgc= -=R/yZ +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGCgAKCRAoXmBIoSMh +siL0AP9P8d8AKwWHKWHw6MnF672HtVKl959Lbg12YqO6Q6v4ggEAtvHLEOnnqslC +enUPfXXw90KRv3EK5z7cahjQgWAdjAQ= +=Xcxg -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.odt.minisig b/export/CODE_OF_CONDUCT.odt.minisig index db387d0..fe33cdd 100644 --- a/export/CODE_OF_CONDUCT.odt.minisig +++ b/export/CODE_OF_CONDUCT.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/r0d9kNJRETpp9uFR1ceomnsjQJbwf6Hs12woXmPnvN/6Ce62kHl5+OYN4myFF6dOTD8NdezoqCKz8VA6nqd6AQ= -trusted comment: timestamp:1687026278 file:CODE_OF_CONDUCT.odt hashed -dSnB+KA+V2hjPClYEIITFIdvwNk1eCXy0zvXUGjBf8FayE4Lu9ZVDn7MCTvK+04V5FLiUpGcGBC5DKoVo8hQBw== +RUSn9xivowlq/pilYMZvFpiloBKDLYNRE4vDNrPzDXzsXXRkLLp0TAMr82nds4TDHY4F/OPHyC5LQKsE0O73Dan/ucrxewF+pg8= +trusted comment: timestamp:1688782348 file:CODE_OF_CONDUCT.odt hashed +ETs+rUvx7cQ8sna+5nQV0EU9nD/Vd4Wb6cfcwZmPSXumy6dsJpfSS8G543Ttonm0/7U9+v9cDHua5KMGKyYoAA== diff --git a/export/CODE_OF_CONDUCT.pdf b/export/CODE_OF_CONDUCT.pdf index 853351d..5f80285 100644 Binary files a/export/CODE_OF_CONDUCT.pdf and b/export/CODE_OF_CONDUCT.pdf differ diff --git a/export/CODE_OF_CONDUCT.pdf.asc b/export/CODE_OF_CONDUCT.pdf.asc index 3664052..08b9708 100644 --- a/export/CODE_OF_CONDUCT.pdf.asc +++ b/export/CODE_OF_CONDUCT.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36ZgAKCRAoXmBIoSMh -sgzQAP99fb2PyLQANFh9DDji2bb3z1m98muKqsatKLVOdN8JSwEApcW9Egkb372R -mbXMmF3s+Jxpo4IGZihk22c/PHsXfw0= -=G0Np +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGDAAKCRAoXmBIoSMh +sr22AQCMOQvcQgA38CQKEe5vUvWF00TkzZ32LCV4yOjq0TuZLAEAl7pReF3svBCO +r5LGZVw4PSRCriK/OfGd99STd34GjwI= +=WhLo -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.pdf.minisig b/export/CODE_OF_CONDUCT.pdf.minisig index 8db7052..713c124 100644 --- a/export/CODE_OF_CONDUCT.pdf.minisig +++ b/export/CODE_OF_CONDUCT.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/oJX13+Pg0/C1fDUrKnW5Nna7yx8rvpg+kCEk9u8qi4nmm18VVQsEjmNRfU7er3tUMSVLGWXZjBHMZLcawQQugA= -trusted comment: timestamp:1687026280 file:CODE_OF_CONDUCT.pdf hashed -+EUG3Vf6chJfZ3Ok55vpy6hIeDRPNy9YTXue/+pQp+JJkWzZNBXcirb3J3vAsvZsa9oOdgtU3/LjCeTHKByLCA== +RUSn9xivowlq/gT6MfUVJuDZxIBWgu3kOiGTNjSYy6Ju076Syup/5mWwvT6Gud5YoP+eDDy7/i7GVnyEEon+Rqe2gsdCzJxRAw4= +trusted comment: timestamp:1688782349 file:CODE_OF_CONDUCT.pdf hashed +/s3dOdJrPlED++fTzInvjn0fpTz0uzCbI8ywOCTYfGe6Qfdk2sOIojvRytAiVNasbfq8EaReaKArZVpSdYUxAQ== diff --git a/export/CONTRIBUTING.html.asc b/export/CONTRIBUTING.html.asc index d604222..e6612ca 100644 --- a/export/CONTRIBUTING.html.asc +++ b/export/CONTRIBUTING.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36aAAKCRAoXmBIoSMh -svjLAP4kA3Zz/3THTclA8oQLnMiJU5Mu5jtYjkc1JC+CljgGpgD/YpBAg/VTStFn -McWh0UFwGil//1VexyHfQHCat/IA3Qs= -=z78R +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGDQAKCRAoXmBIoSMh +sr/NAP9vNLkSNJwSs2P7BiR+UjbT32Z3Qacx5kY9swaGCXDfnQEA/z+1NHD2Y0i3 +BndyvflBRb6gHZwa9lWl+Ux7LinZrQo= +=fYcb -----END PGP SIGNATURE----- diff --git a/export/CONTRIBUTING.html.minisig b/export/CONTRIBUTING.html.minisig index 752757c..c42a1c6 100644 --- a/export/CONTRIBUTING.html.minisig +++ b/export/CONTRIBUTING.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/kJDSQcnHHBj/uCrIEl25acHORkEShj9weXJ8GOGrME6kYrRM2EmiI9eO/iK1DPR5qmPnWWsAZ27gpDybkb1lA8= -trusted comment: timestamp:1687026281 file:CONTRIBUTING.html hashed -DxWADoar+JjAl7oH6fpUJN4271Y5pHTB0wv3oJUZ25LuBcS3dhM7PWYdJ8ILRCKQhgpS4sU5pWkf3WfOD0lCAQ== +trusted comment: timestamp:1688782351 file:CONTRIBUTING.html hashed +12BDPl+JBxvtfMiarnDEJqZCjK92i56+pOMj3Vi7jmidSW58484u0minS/oukbU/F0qP3T1XaGMKe72XiavEBg== diff --git a/export/CONTRIBUTING.odt b/export/CONTRIBUTING.odt index 03aca76..1455fd9 100644 Binary files a/export/CONTRIBUTING.odt and b/export/CONTRIBUTING.odt differ diff --git a/export/CONTRIBUTING.odt.asc b/export/CONTRIBUTING.odt.asc index 5496b87..c87f8f2 100644 --- a/export/CONTRIBUTING.odt.asc +++ b/export/CONTRIBUTING.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36aQAKCRAoXmBIoSMh -soi4AQD+TNF4EEjCafSdsktef03GIgs4nGqV0S3SyEKKxpK4lgEAwXWCKHRoLEJI -KouXzWZsx8q/UFof3ldZN1wCw4ne7QY= -=BG6k +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGDwAKCRAoXmBIoSMh +sr5pAP0QJq6oEc2b/5BqXYnmcB0BJeMIxhElw28l93aZks7KFwEA4uHVU9thSDy/ +pMzfB+2JZ3GKgsL5oukRzdjVt4Np9Qc= +=42Q7 -----END PGP SIGNATURE----- diff --git a/export/CONTRIBUTING.odt.minisig b/export/CONTRIBUTING.odt.minisig index 83780f9..3ce895c 100644 --- a/export/CONTRIBUTING.odt.minisig +++ b/export/CONTRIBUTING.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/opG/E9TT+SEFIqtdh10I/zP+lprb7TsnVrxEVigKno5Qcih5IwV2nd6ycM0DzurgZpWuccQQvzNKrsr6uvc3Q8= -trusted comment: timestamp:1687026283 file:CONTRIBUTING.odt hashed -univx9Q09zc2Wl0nhm83gBrAMwKKVc3U+WWCSkrtYakhJNDgXv9mCD31bl97Si/oU5U5zrqiL0mHgVqyCXtpBw== +RUSn9xivowlq/nf5NMT/+I6SxOBKSJJQFiFBd3peGgA8TJf8zLjop3zQNNslM9wjc27PWjjw8lmQb4cPE3QtzBo5PfA7nUFwnQk= +trusted comment: timestamp:1688782352 file:CONTRIBUTING.odt hashed +O4gQ4m+WZ4UbdRtmcFNo4h6LT1j0kUfoVnQaJ3HGOzvFjM9dzluHql3PRKUA9mx6NlE4B4f6IiEpCQ/t+oGvAA== diff --git a/export/CONTRIBUTING.pdf b/export/CONTRIBUTING.pdf index 4a4e1b6..b2fd72b 100644 Binary files a/export/CONTRIBUTING.pdf and b/export/CONTRIBUTING.pdf differ diff --git a/export/CONTRIBUTING.pdf.asc b/export/CONTRIBUTING.pdf.asc index 89908ec..ae6175f 100644 --- a/export/CONTRIBUTING.pdf.asc +++ b/export/CONTRIBUTING.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36awAKCRAoXmBIoSMh -svg/AQDEKVCSszMxkA10VzC3c/cN/J0gfrMYsIqPlumyFHGiswD/f8WfMDlTxgOp -5I4e8pQOvg43zlueONm1BGmSRlO4kAk= -=j+H5 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGEAAKCRAoXmBIoSMh +sogWAQCVZFHkPMGiQVBAR781yOpouxHREl5Adv3daDWgEQ0L/QD/dFPlMqf0ASKq +dA6pbNy4DRWahSuuudmKcUPkg0xnVQU= +=MFEF -----END PGP SIGNATURE----- diff --git a/export/CONTRIBUTING.pdf.minisig b/export/CONTRIBUTING.pdf.minisig index 637b164..b2b44b5 100644 --- a/export/CONTRIBUTING.pdf.minisig +++ b/export/CONTRIBUTING.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/hDPWkDnHDxPLpQdch7UFL+mf3iK41XyD7ToTAp2RxGubbOIQFD3LYVDnr1laT0wZaEgYZMlGVmcVV1U0OmKEwg= -trusted comment: timestamp:1687026284 file:CONTRIBUTING.pdf hashed -2TDBN9/d1jcab75fZZaN6B39Shhh6zkqb4LvVxzIobHhMjE+uyCW4NU3yYkgy5XV0BesfSVN3PfK0A3W/nUFAA== +RUSn9xivowlq/gUHWu9/auX2zy7e4fXtyDzbGYl5LQj7a0uEpSH3bPgc3aTSRGLsphHFGqINsiSWtSDXW9GamTOdVn5St5lPQgQ= +trusted comment: timestamp:1688782354 file:CONTRIBUTING.pdf hashed +9nb2n/BffI5+oYas+b1grLueoRKAfC1mAKwUyyUn5jPSSh6PQjwFG/aKPnEdg+d29Da5txUDYZhnqcika3hnAA== diff --git a/export/KEY_ROTATION.html.asc b/export/KEY_ROTATION.html.asc index dfb8a0a..6160df8 100644 --- a/export/KEY_ROTATION.html.asc +++ b/export/KEY_ROTATION.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36bAAKCRAoXmBIoSMh -svTQAQCSSZg9D+AxfIACY5E3/2oQ7KlpPl/sguKflEuimUn+cAEA6C4uou7PrVPw -dSDL02rmCLuJDrK03YM+VhZuMFux4QI= -=j/N2 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGEgAKCRAoXmBIoSMh +srhBAP9xGge2Yba7BH2FRwOipCXuF+7TEPRyG/uQkgTCYH3koAEAutIurVxmjSJt +I1gWmOoehKsEkZXNRLZz8zFfz5vnSww= +=gnsg -----END PGP SIGNATURE----- diff --git a/export/KEY_ROTATION.html.minisig b/export/KEY_ROTATION.html.minisig index 8528dd5..1c28c0f 100644 --- a/export/KEY_ROTATION.html.minisig +++ b/export/KEY_ROTATION.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/pGhTRk114UcQT5Yy7ijHLok1bJDUjWEdoqO8kzv/pdxXZ0MLXP32LJcanmsuCkAlnzGe7Jr/duicpf2G6QitgM= -trusted comment: timestamp:1687026286 file:KEY_ROTATION.html hashed -EvJo7qpJAzw3IswMSWLmCQ5nOBK/zSS3Q1tOkecptod6P21u8aUGxUGlq1cFsflT3V9e1sPWz4cC7sDEgVk1Dw== +trusted comment: timestamp:1688782355 file:KEY_ROTATION.html hashed +Twh4zOgQfy+XPUrSDo+afbsvd9c/dgqKzqdnhcxoKo3rXXiRvUOuniPNuN5keUYdmGob6/JW/Vg3IBIfUEW3Bg== diff --git a/export/KEY_ROTATION.odt b/export/KEY_ROTATION.odt index 5517663..67cea9d 100644 Binary files a/export/KEY_ROTATION.odt and b/export/KEY_ROTATION.odt differ diff --git a/export/KEY_ROTATION.odt.asc b/export/KEY_ROTATION.odt.asc index 39a165f..f1ad25b 100644 --- a/export/KEY_ROTATION.odt.asc +++ b/export/KEY_ROTATION.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36bgAKCRAoXmBIoSMh -sgEwAQCg5oci7njLwQT/6pI8AnBck0z13/80T3VaqmO7Alyi1gD/UEHYmOjfr11B -dbx52nc6qBuAMs8dOGbpJPvBTitIVAs= -=t8mR +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGEwAKCRAoXmBIoSMh +sjoNAQDO0pwQ492qSkEB+/4jcGF8JyPFtNtHouBHvGCHiPJLKwEA4TtQctTinGTE +yjv4ZBzGPbcaUNIu16zbbt6m/bHoiAY= +=+cW+ -----END PGP SIGNATURE----- diff --git a/export/KEY_ROTATION.odt.minisig b/export/KEY_ROTATION.odt.minisig index f3e917e..495d7ff 100644 --- a/export/KEY_ROTATION.odt.minisig +++ b/export/KEY_ROTATION.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/ifSMNYFdkvBiqd42MBa7Q4RcPjzk540vcCckpr6ML/LEN1yF17fYdviYXVNljqw6FuIP6JkEwdRTmP1iiWONgo= -trusted comment: timestamp:1687026287 file:KEY_ROTATION.odt hashed -wdifkS+gMukwfTMgPzU3ioHTsW2yFBINQPJNx0ih/Bc3ynOvmfeYi7ak7XdUCrVKf5K3tx2XcNOc9vJpcWS0BA== +RUSn9xivowlq/jE62N7HSs06HeHlXz+lClrKTDR41TQZU2/U+aT9jQR6u6e/vvsGlTAdaITgtTUU09pf0mrZA5BRHzmHnlflBAM= +trusted comment: timestamp:1688782357 file:KEY_ROTATION.odt hashed +DsXe1v5xWQOxvKojCSAe1Bnw9rA1u+7wzreYbyRFW1hnf6dwWlBMDNM0aBk42lIAFbInu424lhK/6K/3uZh7Aw== diff --git a/export/KEY_ROTATION.pdf b/export/KEY_ROTATION.pdf index ed2315f..7036d5e 100644 Binary files a/export/KEY_ROTATION.pdf and b/export/KEY_ROTATION.pdf differ diff --git a/export/KEY_ROTATION.pdf.asc b/export/KEY_ROTATION.pdf.asc index de98788..a6cdc0d 100644 --- a/export/KEY_ROTATION.pdf.asc +++ b/export/KEY_ROTATION.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36bwAKCRAoXmBIoSMh -siDQAP9B7ORPHOcUIXsu/X3UHqmpbX6a5v5KK+I9pgDPo2f4VAD/RPihcCBs1uFg -klbbTkYVWmj8TsbuDkRGDXhpmsq+iQs= -=B2Fv +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGFQAKCRAoXmBIoSMh +slWpAP0aOEfjqdEyM5/Qb0iI3zMSNn/IrRoIw18HM6MutUAIngD/VoQwaYZqfmrh +cGfFmbO5lXFyn7XOaQDCIabAwQO/RwA= +=ZRSM -----END PGP SIGNATURE----- diff --git a/export/KEY_ROTATION.pdf.minisig b/export/KEY_ROTATION.pdf.minisig index f1aa1fe..d1c4364 100644 --- a/export/KEY_ROTATION.pdf.minisig +++ b/export/KEY_ROTATION.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/gsxkKpGOykKLXK+Veqv9o7yZWDyqv7h74zCel56cmujRWkNxiBZAWb2Nzwo6ktVXeFLfxNHPMnSduVadXy3gQs= -trusted comment: timestamp:1687026288 file:KEY_ROTATION.pdf hashed -MmS8K80g8IlMlfvm4WHqCIBZM2rCA+vKFz16wBd1Q/E2qMPHAhxT73Krj/v/ZL2Vpjn/cgv8g6LpAznZKhhGDA== +RUSn9xivowlq/gkgbZpgIFy/QjAMXabOMEFWhvzsbH657sUPmpMYhycWt6a6BkzqXEVqQEPQdro1OgaNmGfXyt7slhns7j0uXg0= +trusted comment: timestamp:1688782358 file:KEY_ROTATION.pdf hashed +/iD6IdroDucPYKHPj7t5P80MgB2MibOAB6YDNbNW29KiqVRJvZJ5884P05Zklp48UaofoO/xrFmnTcspl+2LAA== diff --git a/export/LICENSE.html.asc b/export/LICENSE.html.asc index 4ac517e..6bba632 100644 --- a/export/LICENSE.html.asc +++ b/export/LICENSE.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36cAAKCRAoXmBIoSMh -si/uAP4nBxfRtqhqXbiMKQYzc1WceXIlBwUS7y4DCt4GKqpV2gEAo64q366jFY5T -mRm3IKWJNluNvDCn9KqN9wQac75NbQo= -=cbSW +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGFgAKCRAoXmBIoSMh +slDPAQCXcIcubi/ZEO4PqN25vlb7j3UlyAEvx33x6QLsYkv5owD/bAiRIbwykmUo +k39bwDdHHRsk9yitnftFBL0qmK9xcwI= +=gzJL -----END PGP SIGNATURE----- diff --git a/export/LICENSE.html.minisig b/export/LICENSE.html.minisig index 2eabeb1..1796ecf 100644 --- a/export/LICENSE.html.minisig +++ b/export/LICENSE.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/nZg+a6N8nQ1jmeskt71VfNoZx0gsFa9WCQGxhRXxAoyqOfJdSoc4xLUpMv7NUwiT0+XeQgxUtHlmUvOdsSp/gI= -trusted comment: timestamp:1687026290 file:LICENSE.html hashed -eQUgFGqZOw5FqE3l1a7BT0A7drIVFJTp5RxDX7os1miGK+17XAm6L5F+4tlouOWWLCRCF3wWfJ6xs4bqFbBFCQ== +trusted comment: timestamp:1688782360 file:LICENSE.html hashed +2UqHYCJYX26+Cys0pnfemE3Jml3Fc2Vb5hnxQyYfPq9jV4etqGueuElDJnPkWOV+bylryDEkLeldrRjKLxsPAQ== diff --git a/export/LICENSE.odt b/export/LICENSE.odt index 10c4f89..7cb508d 100644 Binary files a/export/LICENSE.odt and b/export/LICENSE.odt differ diff --git a/export/LICENSE.odt.asc b/export/LICENSE.odt.asc index 2643155..62e7919 100644 --- a/export/LICENSE.odt.asc +++ b/export/LICENSE.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36cgAKCRAoXmBIoSMh -suk0AP0cPEpzoOtWi98c3Hwd8LQb1ZXwFYpRsSTTrKU+yKwecwEAj7rBCdYV7766 -akfmOQ9FoLCEtSJyPhEjDWLLvZP4DQw= -=vKNE +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGGAAKCRAoXmBIoSMh +sohyAQCfkq5qEA8IFmNbJc/NdJO8kndKDIWvsKwL5SXGmTskygD/cy5l9XUL2GrF +C1Qd/b/taKu64sWHLBD/lvLUb9kokgU= +=dyqS -----END PGP SIGNATURE----- diff --git a/export/LICENSE.odt.minisig b/export/LICENSE.odt.minisig index 7d4ca78..b886470 100644 --- a/export/LICENSE.odt.minisig +++ b/export/LICENSE.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/rrbc/lb0mZbHKUJYMCDvWhDMCeckEVPqZZGLZ51VBCib2Z6i74e5KcQX7s7UQGIAgmX+O7/vieW/Vn0kQhFsQA= -trusted comment: timestamp:1687026291 file:LICENSE.odt hashed -YcneWrwxkxYZ8JG1Fda5aLZfWzT0qdrLyCelkPU0iwwIt5e9KxDEJou2O7K4B9ZcZfMXwGZfHBCm/2xk1uFTBw== +RUSn9xivowlq/ttHZqkQ17Sn1kLw3HVWKPiaxBYgyZRddF7wjIL/9KwIXXIrUgaMpqFSoYQfCIkOmdOpiQzHLZU3hkkAQnOWnQo= +trusted comment: timestamp:1688782361 file:LICENSE.odt hashed +/ut49cJ6rUGz/RZi4EqsQQeww7Ze44d7E2BuTLOdYPas1vlPoom7UJG3Csl/AwwCn7nBu1w2Dp25zhpErl9UCw== diff --git a/export/LICENSE.pdf b/export/LICENSE.pdf index 0ce49bf..23fae42 100644 Binary files a/export/LICENSE.pdf and b/export/LICENSE.pdf differ diff --git a/export/LICENSE.pdf.asc b/export/LICENSE.pdf.asc index 0aa95ec..56cd82f 100644 --- a/export/LICENSE.pdf.asc +++ b/export/LICENSE.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36cwAKCRAoXmBIoSMh -sklQAQCas/tO8ROuf9mozmp7D5Ilzi9cILs/lZR0IS50onoPlQD/eb0Nb6+8UOkr -XjdstXl/K9LbE0qGwUZAgma8huzx1Qg= -=94nv +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGGQAKCRAoXmBIoSMh +spsaAQC0jxvsrnjXuReDrT7aB370mY3SkaZp761bWWuUZJ+FsgD/SMezTTU1Aiin +v4BMKrgLww0Y1jitMTCEyPVvkD053Qw= +=zJeH -----END PGP SIGNATURE----- diff --git a/export/LICENSE.pdf.minisig b/export/LICENSE.pdf.minisig index d1442b7..5aeca6b 100644 --- a/export/LICENSE.pdf.minisig +++ b/export/LICENSE.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/ra0PV27hmpGq5N6wdETKYDqaEji3KZtVVTeC5mjExpRsDNKE6m3OsU8RaEx+Jk9IkwzCpze2yg+xMBYU/8QYgw= -trusted comment: timestamp:1687026293 file:LICENSE.pdf hashed -29RmsVTVBCESlG90oGcXUyYyeSr0waGPpEM+fm8rX7SNorDN3N7ggf/a8gCSpksHZpEoRu4LGGXCHttHWP56Dg== +RUSn9xivowlq/joaJhZbYAuUhfnXFsQUA0bo26IesPUKOplLpyoHMfDl/ejpjg8GkzcqB3pyQULApkQUhOozHRCmcQ/LyKuIQwc= +trusted comment: timestamp:1688782363 file:LICENSE.pdf hashed +X+M7GdYCp4n7wkhY3MX/m1I1jmahHuIcpbPqHbJjlDCjBtPdF7RbayUDzSVCQA6N7sD7qotGQXc1wI3t70CdCQ== diff --git a/export/README.html.asc b/export/README.html.asc index e218161..0d6e311 100644 --- a/export/README.html.asc +++ b/export/README.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36dQAKCRAoXmBIoSMh -sjTXAQDB0xNxOWcBZ/ml9BwY2o7qohfZrJUE8Sj4QKNcvP5BqwEA5PbnMoUUnOxn -WAxvhnmSLqVUBsxk6oAUNYKYfxoBPQU= -=k2s3 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGGwAKCRAoXmBIoSMh +sn2/AP9wxVgWq9/rvG6c8pRvXvu7OKoa55vfwoUfa9lGw1Id+AEA3pf1VONzUMn4 +J+dr1vzAkRb/8saHafmSLrd0VP69nwE= +=eo/w -----END PGP SIGNATURE----- diff --git a/export/README.html.minisig b/export/README.html.minisig index fcb1845..dc9ee02 100644 --- a/export/README.html.minisig +++ b/export/README.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/uazoBrgOu9DY51wrWSuARJ5rHx16brjignX10LRCY1nj3/20fhspE4wDKufmtKExL+0g+nxz3z6FtD95oYX2AM= -trusted comment: timestamp:1687026294 file:README.html hashed -EvfZSQdFMozAqCJi5VdjSEg73UyQmQ2iQbx4al7X4qGGNT9zK9NXuIkBHZEL2YDz4xLZRumwOwof7BWVj/xKAQ== +trusted comment: timestamp:1688782364 file:README.html hashed +yUits34X6AU5tUjMtbyzngQyFcNFoELphWTddoYf3l3ETGkL1fi4xAPK1wSKJW0mr+Q+JqHz7mogAYLJKyzrAQ== diff --git a/export/README.odt b/export/README.odt index 8b11fec..8c0d6c2 100644 Binary files a/export/README.odt and b/export/README.odt differ diff --git a/export/README.odt.asc b/export/README.odt.asc index 6f77ed5..f19c54a 100644 --- a/export/README.odt.asc +++ b/export/README.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36dgAKCRAoXmBIoSMh -sv6JAQDlH5ZT5N/oxtoZBkRrk27u+FxQmVoI+gu1CMOWp2Rx6gEA644E1FrBWAJX -ryZScxtRdXFA3KkuXZ+lTaaBHzbmmw8= -=7lJU +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGHAAKCRAoXmBIoSMh +suPVAPwMTIFe10oDWpbobCJsd7XekhYL3jT22lkFkOAk3vCEwwEA6E8bYtQz9Qta +58q40F8/u5VWZuue7t0/ZpK1JGDaWgA= +=Jnhx -----END PGP SIGNATURE----- diff --git a/export/README.odt.minisig b/export/README.odt.minisig index 82cd7d2..789f6aa 100644 --- a/export/README.odt.minisig +++ b/export/README.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/mohnzLQPVCsTByFj1gU9sx0YU2qhAtgPUnZEJF+ugkq1uexDT8lfQZsJV9FKinKNwPB0e2BVhC7aDiQDX8+9Qg= -trusted comment: timestamp:1687026296 file:README.odt hashed -75PGwK57pjVafH5QrR/6xuRq1RWMklFw3l8aFdrG9vM+DbMLDsI49jXNUKWRrvHdaGvMPx83R5MZDvdRZUVOAQ== +RUSn9xivowlq/jmE2jI3yXkNddV7ag0qDHZtJC6xbm6o4drdhigvTRR0m346tvCvvlr7SSJlV44jzpdSVZ3UzupLV16L1psSdAw= +trusted comment: timestamp:1688782366 file:README.odt hashed +kVZvOrPCYqQ6pAAY3qPUZmaArxFH0fGHvaVYwx7Svl0Db2TcUJfKgFPf+Qm3xexxHElfjZJsG6D9Ylo6nEOzAA== diff --git a/export/README.pdf b/export/README.pdf index 7ccee9b..69df31f 100644 Binary files a/export/README.pdf and b/export/README.pdf differ diff --git a/export/README.pdf.asc b/export/README.pdf.asc index 938fc94..e5cec1a 100644 --- a/export/README.pdf.asc +++ b/export/README.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36eAAKCRAoXmBIoSMh -ssV5AP9rZ1QyXJ5ASUrHTx42u93KmnwkyZQyVl7JvnECXfN61QEA2mZPdGsy5GSU -t0g2M3ZaP8wZwJKHtx8S9fl82atOzwY= -=TFaT +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGHgAKCRAoXmBIoSMh +suQlAQC3YpNYiBq01p+3CvutU7OwOw9QLKlPW9m1VGEUNvtxbwD/TeYrrB3zUCaS +dHKhwDizTlOxtaPugz7dYmZ0T7NHOQE= +=Yr/Q -----END PGP SIGNATURE----- diff --git a/export/README.pdf.minisig b/export/README.pdf.minisig index 9e93e5d..7bf45a6 100644 --- a/export/README.pdf.minisig +++ b/export/README.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/v29EknUwnEcWCbecY1vbm3b3xSqtOevkC5s4JmRMHn23yN4omi/zRdPASie27n9NWrt6zN5VK9HaYyO/mMsuAU= -trusted comment: timestamp:1687026297 file:README.pdf hashed -PIDWVZOH1tKWYlQnsB9P7Q5H/BBMkUPQYpPZiiqyQmeoUg0pT+RbokKvfD7CddJtzjHEruu8dV7DvPbTcofjCg== +RUSn9xivowlq/rkZiQ2oud9NiTG0oqPsN+7Y0PxuhJ3BgIDy0bZVIxMuOd8NhPT/iikcthwROruz4U0yZ39+48FPNfchyT2gdwc= +trusted comment: timestamp:1688782367 file:README.pdf hashed +tth9Nx3O5AydxBMIID2+NIbv3m0mDhOlUm/QmKg/WTLwni1VVM6PZPLbdsx4qTFGBVPOKBqy8+7eiVFKq8EBCg== diff --git a/export/about.html.asc b/export/about.html.asc index ec9867a..352b4fa 100644 --- a/export/about.html.asc +++ b/export/about.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36eQAKCRAoXmBIoSMh -so5pAP0fw4aj4oF5zYIBzPg1jpynzWg5LxegaVJRqE7S09owZQD+LxnB2yRjQqKJ -MdFzElZzwzbybw7wkP3HRNgJVdD57gY= -=o3M5 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGHwAKCRAoXmBIoSMh +smi7AQCL/aMrrA3qXowpSTLMDpp246uo2UJx7GWzBl+oHuqaHAEA1uf/pbkzApKw +8TrcOtbHwpdaepcPqqipHnPWqiKrrAA= +=v/Gb -----END PGP SIGNATURE----- diff --git a/export/about.html.minisig b/export/about.html.minisig index 581b58c..49b1351 100644 --- a/export/about.html.minisig +++ b/export/about.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/mVWZOWSTc14fteyudF8SVL/g/fj+YBEtT1XKl3IspD1DdXz2QRIrir0yXCqQgVaFnQxqHJGx1hwhpVwVhHQlQY= -trusted comment: timestamp:1687026299 file:about.html hashed -9qLihhXaQ1waoKdgrXMe68BQV3fA8xCP4tULHq9yxpv8lb07tLWFet4VGRN61IoU7me5Xdta7nkasJzUgeP/Cg== +trusted comment: timestamp:1688782369 file:about.html hashed +5ioyUT1nWxiisPXiozlx99cth2sL+XpljogTkG8WMG6/OoYR7/0S3JaXQbc66wmLAdp7DAnlJ8xVUjBsI6l6AQ== diff --git a/export/about.odt b/export/about.odt index ad76bfa..c1925ab 100644 Binary files a/export/about.odt and b/export/about.odt differ diff --git a/export/about.odt.asc b/export/about.odt.asc index 4e91c09..b7ec3a2 100644 --- a/export/about.odt.asc +++ b/export/about.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36ewAKCRAoXmBIoSMh -smk6AQDka6XMu0N0pViW8ttWX/waLie7rp25uU6qzbQXe9J4LwEAgBBlNeBj83nY -GU/vnN6HMj76FZudBTxVFs6T6rJEBgk= -=wVXx +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGIQAKCRAoXmBIoSMh +soXeAQC9wR2vKh36p91krWNAcgxZ2I3FOLlPOZeiKiaOn8IeegEAjfCQMLcQ9Les +V/J3zX1Zg6pF59wbYHTivWbfS4k0Sg4= +=T1bx -----END PGP SIGNATURE----- diff --git a/export/about.odt.minisig b/export/about.odt.minisig index fce79e5..05eec7e 100644 --- a/export/about.odt.minisig +++ b/export/about.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/mH8EQqqSeI5fab0Xt2wjLq+WEDfqHnkqCHxL+97JG6hr/44sXDh6TgZ9EVneOsPMqKCMSRPU7IdCQRx334Y6Ag= -trusted comment: timestamp:1687026300 file:about.odt hashed -lnyhbpQA4/FHLLkAHxFAB4xJ9u72hunSnopKL6npiTq4TrtmWNWoaEfad9SocuIS4uiPzSDqiH20l4ajMKeQBQ== +RUSn9xivowlq/h9BN9nyp9PBjZnby7A4k/OCUtxqT4HtnUVi6rhkXF4NLXZP0Y+crbTQKXskICG8zCnOhFr5CnN8Fn+BpO9/Ug0= +trusted comment: timestamp:1688782370 file:about.odt hashed +i81XHVLnAJk+ER7HuMVkNk3EohuoPR1cWYD07SeebWgT3uuAuTkoT6lPVvm87aQt8vwlvQ7eF17bE/7LAfVpBQ== diff --git a/export/about.pdf b/export/about.pdf index cca6258..a17451f 100644 Binary files a/export/about.pdf and b/export/about.pdf differ diff --git a/export/about.pdf.asc b/export/about.pdf.asc index 88443ba..112ed76 100644 --- a/export/about.pdf.asc +++ b/export/about.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36fAAKCRAoXmBIoSMh -slJyAQCCjlJsVToEi6bcA/oPSUG0SfH1IRLuVP3plpSxryVXigEAnDC3sFVQ/OOB -hzRv42E+5m9Ikx+f6nOV01NRKbcQwAk= -=VVQG +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGIgAKCRAoXmBIoSMh +sli8AQCB4jt1yN8gQKy19eflo9o9AbHdb80ituVL/QP057JLBQD+NXwxC34INeTI +lI+Od6L6uUYeAuIm2qfaH/urcjmDUQU= +=a3JO -----END PGP SIGNATURE----- diff --git a/export/about.pdf.minisig b/export/about.pdf.minisig index ce0fb13..ab7c1e0 100644 --- a/export/about.pdf.minisig +++ b/export/about.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/s/RACTMY25hD4FQksBAiMhZI5fYMPGhf8PqQWh+1K2wjiLsZtg953SH9s5bgeejXnJuQsvgPlgi4hrVUJiY1Ak= -trusted comment: timestamp:1687026302 file:about.pdf hashed -nP9tL9vuwOBCxPoQZgYrBE389R+jXNZkMVcRpFYb0wctiG40oKHs+6Scp/pNFRUYkOw5kvrDFxzkjqRZwGt9BA== +RUSn9xivowlq/ol6OYilq3aS21ghWVnXmKXKCdudqpZ1r/KgJa+zaNRSeMi5ss8NGVN37I6LcSRa+P0T/dw40wbM8NU8ab9lTQo= +trusted comment: timestamp:1688782372 file:about.pdf hashed +UQn4JPI562Ze5Oan8rTe2o976rZ1VSft+nxxZQK3f1D73Dx8T5xrtekxB1cM5XJJY5pK2Hqz/fY//5CEGYUUBA== diff --git a/export/b2sum.txt b/export/b2sum.txt index 3541771..073fc60 100644 --- a/export/b2sum.txt +++ b/export/b2sum.txt @@ -1,51 +1,51 @@ 4ef56c6bfafe949361d4d3f3817572f4db54bdebfc61293596b7cf1151fdc938abd6856c795c95b4c81d4080f5c39bde34b334c1ee1a8e47f7a15b5f4b67b3a7 ./CHANGELOG.html -a3a955e6efa6425f1b7c3f43859699f7583c9da29ba75ec491b9da6b92781246a2a8a9c34a24eca67b246473daba942f7e5a379066ce30be229b51529f132928 ./CHANGELOG.odt -b211e821855bd5a44ac0f61f02f5b84086d8627900d54475877660daffe498b8d744259917ed310351aa46cd107dcbc00cd317536e2ebecb2cfb3f44a763e236 ./CHANGELOG.pdf +6f94254be23c6bd257e70af13883c3a6a247d0fb6b6b79707613ac8d34470034363bc17463f81813a9fd186d06c42327f10777368c3e4f4f93a6b033df9e3ec7 ./CHANGELOG.odt +80c58aa9e716bb2570ca67d44ddf8c32753738f66267030622394a87de16c82eb0cf31e85623126c48c91758256b9c748eb616c49a4fcb4b0a38e8ef557983f6 ./CHANGELOG.pdf edc68f24affae9b45de3e98fbfae86350df5baae00f747fe06ac58bb8dbece7aff5acda3464ecf43b35acea036bef334b8475f438c035f5c9cc9ee2fb6920517 ./CODE_OF_CONDUCT.html -4a10aecb45ef7e459828379c26d3b351e811e8b70492bedf9c712b790e24a28d7e4eed0a8e64499bbc46f0050af65db00a64beb6c3e3066dc7259b15713dff59 ./CODE_OF_CONDUCT.odt -70264ff52532af2ee38b12450b2c28ef3c74d814ab5dde1931709db22f84649a79b49585737faa32a04b505a4adcd111fea1d5aad43945bb82a2d743c6a4534f ./CODE_OF_CONDUCT.pdf +0111598c807a4add2050bbe4a66bd4de46fedf6c9a09dd389918ee452d5a85f921d9af23440ed89b310fda89fcbbbcdacfa254dda651fe30ac03928198b7f190 ./CODE_OF_CONDUCT.odt +61f86cf50e9fc65dec180ee8c4f0887f401ea48cb9d6a629174b663a802dac8e83ac4e7c8c83da6fabc7220512e5cf3af26f6e0e94cc1b91747459adc196f5b0 ./CODE_OF_CONDUCT.pdf e1a0325b5d2b03f3e0d0ab1eb74cc61fa4fb714bec024f5e549bcd19031e0e52bdf4eaf7954698f532ddd9c5889acd51f2fec61bbcd3077f82d581bd0e9f8a93 ./CONTRIBUTING.html -1605d21c9ef05d1e1f2222712e88601bbd2ba475edbbc662df498d796b2a84e92572625a4f9fffe38b1d2f9cb0b0a9bb965e61a14081f99d3b363338dcb25f56 ./CONTRIBUTING.odt -202a66c0e0e0eeba71d6a240e5d1d8c35c85e15da5db4ad0057aacacbb065b85080f93d0d55b421feb7981b43e06234c1203a009de0718e962a4e34c143d140a ./CONTRIBUTING.pdf +c3474575cd3ccdc09ba4976db74572803ce24a2b6102d390ee690f3202f0cacc55628d3381be0aef38b00113f24d27a8022ebc5dfc31d12ce2006c027ca0c0d7 ./CONTRIBUTING.odt +bbba16a5b5f4159ddafd151c0a20c763aac6c51f620231b298b093da8e53b16a5e76f662809271dfd0ce76017dbe65dc80bbc1ffcf0c1878c8a87741e59f5909 ./CONTRIBUTING.pdf e5608ee5d273ca761f7d8a1a6dbf5ce26d9bdb5cb2bb17a8b115ab0d970c04183f55c541e457a6bdbaaf89fe0233861021b9c7a4af6f08219359c158483ed10b ./KEY_ROTATION.html -390a07ef408c8a9a615cf4a1bafbbc082baec741c57f5d8ba95631dba3693a5e774c6af82fa365f82db45d84ef9cb7d649368a9f01934a42cff1706ce8768a64 ./KEY_ROTATION.odt -5a7b09a3f1ab894767524f240fa9f3558757069e3b08272baa164ed2899c735dec8b5435e56644906066b141d2a99b1f407169bcddcfc32e9f09b377d57a10c3 ./KEY_ROTATION.pdf +ce638c8d7a062928255449490f4602d7a9c18e05f4209af3957205aa1d17bce70bd6a33432540df6f42b6cc7b6d63a98395dc9a78cd82f82a19a813997d3a250 ./KEY_ROTATION.odt +2de1bc9e554b5bf555d90e45dfb7570c31538b0c81f3da966e105d9c609143691895e1585175e09c21c6fd530d9ee4d14fe2af8078027e6e80168ec91b45890e ./KEY_ROTATION.pdf 61b55b1507341fc1355c6f9d757350f4774007ff949cfaa90d353e608a2aaff82019139d54bca91d474890f53163c5e795686175449c6c7f7327294ab523a066 ./LICENSE.html -1574043a1a23d1c2729896558c496f92b5a68f44ec1f4772a16719bafaba2b1924e82e13f6f89a044e3dd14c043f6fddc7dce2c4e13339700fb8d2cb1064282a ./LICENSE.odt -9c9257e2044d782b6183ad1ed4917f7a8dabb565b697ca3731e7fb6e7209d61d094bf47fba66438d4a110568adb6b2e0a6da449606ad8b25c2e9f5ea600c7103 ./LICENSE.pdf +ccb81f30e62e5051494fcdd56f049677dfa72fdd78296b8a3ef42a0da143154ba1d13d27297a45e4b2180e3c6d83dd9675a64c2f585b3af260481a5988a09469 ./LICENSE.odt +8f5fcd4fa28851df9b1a5995f5477f8ec429dbbfd777191f839da33b2ede12168793bfb15df053486329a0430e2286e40410907a2c66a40e247e0153eb1b3c03 ./LICENSE.pdf 70fcd83ac062429f3c9c46cf3d6c19e37e2e125b4695d16207df155120d1c800fab87cd943e3c5e8d9e0a053539f1a99a7a292891ea8f50abd8ad8fc93cff12f ./README.html -3488605c11fc9bc058e3e5879e9d48189ec5c750203b3064bd939220c37f18d4a945465049c3f339826022ba164851e03ee5056ffae44ca69d6d28036858f94e ./README.odt -a6e017adeb25ed1b8072523506a80e9be931dbbfa3fdaa4db77f55a54e4e3adaa6f551bd175d1b519e1a64633ae9ba1ee4b6f4aa177f705633be21a69f44e5cc ./README.pdf +33af542cdb1d429fdea369c847ce1185570dd5ddf7882a5bed16dfdbf81a0ddd265410e5ab9fe7f126b65ef0ac643af888c438beb4b8bb82a082841eabfc92d9 ./README.odt +7a9dbb4768c8f61bb8257e71409bfa4fcba57512bac9b26bc1321c3975910bab830c9665ed26c41ad7b17b5bfc489833ba9b3c76f3383f5d5965560ce57c5da4 ./README.pdf 1406eccdba99b061667d0469049a5e19d16f9bfa03447c84d2b6829e3cf4f193dd10baf8696fefce507faceb124921ff6a39bdf774e4094a70902eaaa7864271 ./about.html -466bd168549d5ef715fb8a55675eaf2fe37c6bd409a3a754c789ea04132a82a9f29dfb6223b9e4c16794124a346f416c8a81d19b42eab4388c78375828b47952 ./about.odt -97a8afc1ebb1c539e70c71945d53e349bc72d1b693ed45e76c98dbfde6eae95a2576a38494c462d1238d6569962ffcd3e626f2552191734a378bcb48d3c883d3 ./about.pdf +d3e9aafa583af3d9edbb8bb4c8139e966616ee51a73050d392f53db26f9c36fbba7c6755858dfb87af8d7d1518126a91f02ecabea5545d4e5aa9b4383816268b ./about.odt +8d4f3383ecd709ecdddbf53759a0622098554cc8c076ef917430f0751315ac1344bc99dc68eec5d970dc420d196f30e4e9c644333153d62aac0779b21bb6eb4f ./about.pdf 41a70d04322d7c2a115609587ff171026055511d521a5ae73d3fb19aed9ab1bcac9708b038780b9ebadcdeb919496e69c4424377e5d6b6d6447f032cfc0d4ab4 ./briar.html -b4f353dab5451449c626231aad5922761633afb795c293cc167b14bb1e2d10dea55a125fe008bae9be90ba7e9a4bf9b8de7686852f12c672289a04435c42126c ./briar.odt -d97516051dffd1080b0c74a5bed39345bc4a02a899af8700d76c57788c99373ec69eda77175bd02a0cc26e9fc8afd9dc54856ab620eb7807c2db623c12c0d00c ./briar.pdf +41afbf72a569242a5e09f71b1435004103ebffada07526f9c4fe3c5b91e697bb990abf3d856bc6610aa8616a0f50d0b62cac9186861e7e6349984d64b09a8f61 ./briar.odt +909aed70bf97bda5f48da72bc45291236f8140ba31ba301c1fedae3231f6fea553c22e167a6fb41e7997d4897c01346d0bfba76e37dbb3cce2413a37f7af6d32 ./briar.pdf c84a99f05fd0837a12561cef0bfae22b348dca7daaf3499d10324f40382e88b9e89dcd7fc04ca565e83438094987ddd144bc9707eea97918ef54178c3fef808a ./chatrooms-rules.html -904d311af298dcf2f35ec8cc39db8d77f1c42ce7163b47e76d5fc2f0dfd5d6c302180a0bc2e38124209c78d7554aaf7efb66fe3a8707d98233485319a2ee83e2 ./chatrooms-rules.odt +a5afb4328e8e1b70693be7af1a93b7a9a4e6b5516d048456a19fb17b580ec21ff4a7c61e6ef23bf848ece19b163ad2a9f1f693bc80a0888ae75d80de3a741264 ./chatrooms-rules.odt dc30249ac1e551d6d011cd0ee6fed1f69c5a35601d77217480ced3957acb4a9e6d377b3f8f4887c4a05906f8bbad1f8bd4430eed48c3727ccd0cf8305b262c34 ./constitution.html -5bba5fb8c91d401e3694d8d21907fe0cd3c27d73649bc94d6653adea248a6eb48062c135495ab98f648c79468abb08916bb37197e70a09d6358b7affd6eb15c7 ./constitution.odt -441853deddb7cbfd7eba633de65c3fb1dea612c2cee0b45fd0ffd1161928d257dc87cff77668a84ab4c66640711241ce84a015945e8f5e9e576bafb3a1f9ee90 ./constitution.pdf +e4df42dc62f0bc88f9119f938e103fb867bc5a63c8a8fc20e1748a4b312c5de2ad7634c7f258e2b89bc1f680f19cfea56b24152313e3dd26459e79869794363a ./constitution.odt +09dfa92aea2e7248c0e9444338c084a247c2a1066c33d85b5fe4f168663c3fff8864face591a7afeaac708ec23af16521eb42d489a463427093d505158edbaf3 ./constitution.pdf d2162a0c52e03b4bdf00533ff1c1388b42ac81dae74c376221e2c08e6bd7a6c2935c987b43869d378beeabe20cc6f23672c66d012d1db9d79ae9d82ca2c0b7be ./donations.html -2a3147639f3693f821bbf371c0ede7c4768fe464d2df33cf272a06d3265b3a8def9ec078f3f4fb6bf18c6cb206bceb091e39cf92861850e8c24df5fed0b8e1e9 ./donations.odt -f37154223b5625d1d265d4485087566b820584f253293ba8543c41ef759fb0a92df3623d2102e97ecbbd7e7d23665ce7b82ff38bded03c27b7cb27f5de526270 ./donations.pdf -e89fe304127456d576368e1b624aadcab3901babcb08d17e84e037ab98cf0c684c47e924d7760a0d2591247e0ca95f043e6079b29507c310d66b43029b72fdf7 ./guide.html -f7630f51b714074a3c964c875493ec153dabe71ffc00176a002248ecd464d070a88d6245d955ffc9a89012f765fc2ae914c50e63f1265bea9051b6ad46acf60e ./guide.odt -d9a6204a67f78374095ab06d4e8a7cd5240ce2d06bf70fa9f38d51bb986b4bedeb27d9c960d7f28d81e451fad8e73fdba7dc5e9765350fb847f6ad5fd427177f ./guide.pdf +645abaa6b04a88fedbd645640e2e85ce6d231b89a8997c6aa742145aa07501a9cc1c86d52e6273b7b60e96676798b4629c1de2165e72a81fea24766811bf3eaa ./donations.odt +62405cb4c1b178798c64a6241e0b7b7ee6f8a9c46de99d21812196d78eee55051abe3c8d8a9fc7a1afdc0e967ac0568bb7e8f1e56ddde00bb4bd982a2b0ac94a ./donations.pdf +c4c98f19e69944334fdb530e433ea0e417e5e4f3d09accca1d19bf51d2bb3d34e47cea7658dc65a3b2a22c87b640715068dd09f273d69211f318c6da7a953307 ./guide.html +49e85747b57501dc427e6830c9b14ca4ef435c11521750a6249f9c05074aaf2e57e4c77fe0f0c4c2964142142738784bb22298aeadc7f2083533eb83c4e493d3 ./guide.odt +82610fb9d979fe858a8337cb92f2e9084d86b3559b80d25a5d47bd9c0c11b329b9cfd177f8ee07eb9fa2b10567f7544c226890eedb53ac80cb5d952490b18a5b ./guide.pdf 011d1c7a16e42d0ff9c9ca3bb9583e968b9f89c5ff975d1d33255a4b547a475f6f9c858138990283acf52b4ad7da0ec6a0245e6f580a739f24aa9b958c6b3127 ./legacy.html -45a6cafab9db1c2f51d1dbf34c725f30effafd0e1d5a3df8daf3319a162ee2ccf65f26d9449a1258b73dd999355fbddc986e2aebaa8eb17e8d616ce6ccbef69b ./legacy.odt -e9071e5713d00ea6d2ac0d05f75211d45a93073f15381afe94c2ed8c81133663f28f12347c7a9b5a930b579042c7f1af102476e344bba470c2ec0df8afbf54fc ./legacy.pdf +be85a0189bb8bee016394510ac2d3798535e4f90b79240af1fdf3c8130445b6de3cf1ecc99c83e0e88f22ed5270fbefe64d8fe735a29c4471a820829912f5fd0 ./legacy.odt +c7719aa6c20713efabfc200c9d3adbf3f93ef9a450478f2e5cda42ea85e155417fa9e57aae95df0fa31e90d125e50b5a2e681a7c3d95a07d3e6369c22fa5cb0f ./legacy.pdf 76958f3298f9ac581e778a41a765090206da3140c465d20db120f6ed4760ebc21670fa58403b8f839b2b38f36f9ff17c7b9dd1c18ca22060e1426a82f3ad3ded ./links.html -89e2a095994d54476219784a893502877c0898823f1752ad769bbbf15b3f897a34874d09b24b45f70e32b0fdce44300253d1dcc2d1031f5cd3c60bb2c643f40c ./links.odt -1cee6373467e2456ed038907c5e1813844aa75394ac7fa6fcf4829313e28baf0c96a337d339216b5c83e6d963665a183a7bc6719b89d121b3d7d1e0246ca19d2 ./links.pdf +22f73738b5d595b5c8018d8f17b3a9b62c5f0e2cf08ca5534bffd660bfde511bc4eee2200a25b4dec851b816d57f6dad3a72e1d801d76104a8eefa49f09cee6b ./links.odt +57ab441a1a9b7e831efd26cc758a772b2e6ade496b3aafeb495fbb6d41895e5384573b5b93b50f2483ee39cb641592c70b22a0b6e1469fcc27d6132072d4bf17 ./links.pdf 59909d35b1186f6a84f43a338d6a00a2707133b564fc55d12b5202506ed66583cddbd41f86df84085a1ab688cece919337a3f1a21c4c3f882b60e3fdb8e309d7 ./moderncrypto-rules.html -ff116fa300016fd608e407378322a15a31e8cf51f4d11750544e4d279af128dfc37b702a07a3e1780b6889ac86572d7a73ba52609cde708107d62f565bc296d0 ./moderncrypto-rules.odt -627b959f7e73a38d5f3a4f8f6a38079a429813aa01908da1e15887709e3ea0d2bd39e33364cc0e9036cebab57c6e264d1cf9ef771f0f5e0e071b5abc98c91fc6 ./moderncrypto-rules.pdf -f7df21ff09420f59aa8fcf9be473ad8d3a722a6ae90e9247bf42fbbbae8c0790d75563c64c59fb8ff04eab6b07b43421b8d2ea54a492ecce170f3dd08bdceded ./sha256sum.txt +38944861b07fc1288448aacb70e0ea00dcca18a7215f8c8b83186ec07f0abbf31ed588bfcbdf0aef64584b69fdf12a5fcc53757c15c06cfc2ff611159fa06832 ./moderncrypto-rules.odt +3ddd0873cd2828b2a76897f16dd2cd399ef6ceb5e484d882874e6cfac70cb1633a657c57a1d8594ebb0004ee1638d06ed640fcdf680d7ab8001e24855d97ccf3 ./moderncrypto-rules.pdf +048df39e9f85b9f0c5b7d54ee77c3bcf010ce4a6aacffd3126fb771ab552c15b96d23259909401270d1b7389963e8c9780d6434ddee389071fcec5cd4cf52359 ./sha256sum.txt 49a740a680ae43d50f350a81cab6a7f16e143c425ea637ea6b04741aaf0f32f3cda40b47fc968df63fc593f4fc68b20b323a79c5d3fb3456fdc559e492fa91d1 ./twitter.html -9cc603dd98fd29c42e4be63f558193ebafdb99e2c65ad61a3dcbd5bf21c23eb2cf842bff8b4cc2d0821a18f09fce98b8f0159871e30c516ca51ee8291950f087 ./twitter.odt -a888200c339afe97d11efdeda3a9f1385da1de954ae9c0068423dfed178270db195039887abc86115c3f7106c8ff98c635499e0e78c9b5817f11ab1022fa1ea9 ./twitter.pdf +8a9f08f7055562268ecf4ab99c6f65e3b35f4950bb17ae5f9434937ececd2c2d7d5cc277f3c525532cd47f2667a2548dd6f3db8f10e35e691e50db1b29c6ade5 ./twitter.odt +3569528c6854fe51e5c6bb1f1c6dcce28b7a23fa52fd73554395cafae5019a2f77331c3b07283f3f555b283dc03996e64125e559988fda5e5841c1bd9687119a ./twitter.pdf a45e486db2d922ca486f3deb973b28b40fc37e167e1f73ed1d239cccd4f25c8a9c5aed7a6184dfb044972f5fa0516f92097b246df5047e681c9d93e5e8cf541a ./verify.html -30c8e6813713b7561ad28842456197626150bc5d5b2f4a76381321ae3675950936aa7f96388a7fa094ff867fde2e2dfda1712aa2e75ed1caa0920ec79472255d ./verify.odt -6568c9569956e14531c2336f584de499fddef7331cb386e2f8dc73366cc42226a8ff8879e9f7fdcf2904444058ecdfd7b33418fa521b5252c3720390ad11a7fb ./verify.pdf +d23198ce9fa1d9b75aed57b3a3049ded5920c0c82bdc8535b8734e61d519f6d8b146b15fc25881772e0078e18bdb3654849fe47fdc832dfe6827bc1d355f4518 ./verify.odt +c4dda7a75c066d906087b8c8e90a8ca35feb4b92b3a3cbb5fcaf6dfc358397bd31745ecdc651b86fe6f5327e35a54e665651895f831cfb0747dd31a228cb6cd9 ./verify.pdf diff --git a/export/b2sum.txt.asc b/export/b2sum.txt.asc index 2d386d8..1bce06c 100644 --- a/export/b2sum.txt.asc +++ b/export/b2sum.txt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36fgAKCRAoXmBIoSMh -srdSAQCVhbo8ZxegbADhIIhEcMwl5kouSSOHTYLs1smdxFBLCAEA3kbynE+Dh/Hq -O8kbuTgwgG9uktDCJqf7aTvu2QZiaAs= -=iYh8 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGJAAKCRAoXmBIoSMh +sm8+AQDag1tMox2qVKrVqtMsrwbcJwraB+Yra0FoK4Wb5V4RJwEA592OodR4Yz4S +w/xGBJ0DDc2GVxx1AKB/ERgh1Ki1DwU= +=tk4f -----END PGP SIGNATURE----- diff --git a/export/b2sum.txt.minisig b/export/b2sum.txt.minisig index 9f8541d..1f7fb43 100644 --- a/export/b2sum.txt.minisig +++ b/export/b2sum.txt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/t7LJnfmuXmyx/pow50EWBzrIzl6yE4HkmsfPMXNxpgTaJRLdmO7Si7mqtV9bhntwjYNBdFE64CE2K42QHICdQg= -trusted comment: timestamp:1687026303 file:b2sum.txt hashed -3zvJWPx3tJf+LwvghI5QI5jqVJSQ40SeB4VLA495hGwWvOHJL7FCN7mwajt1JuX/SKEbFZowo9tHcszFirfyBw== +RUSn9xivowlq/sPpbVombG5RYiR8Uv8ir0ohTddvopG7IACzLknzHC51GS/cSVf321PMYGwiThBuYHiqBiN8bbuB5IDksUI9Wg4= +trusted comment: timestamp:1688782373 file:b2sum.txt hashed +xIA0ZlZfAUm3NnecrVkT6YGYNa/Fm9o5t55gx+dUZCtvdsc3+jtRAfVkfKPlUEgerBzwXx1Vv1onTqsQJfHtBQ== diff --git a/export/briar.html.asc b/export/briar.html.asc index e18506e..8bac4e3 100644 --- a/export/briar.html.asc +++ b/export/briar.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36fwAKCRAoXmBIoSMh -suLiAPwLrjLvvNIiPrb+F6NWj13x1br/ElcdIwTCE4P1F3RSggEA8350vpQvAs8p -vNMy98qrrMfZvTQj7p08jjSI1EhxoA0= -=FLJ+ +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGJQAKCRAoXmBIoSMh +svNQAQCyR4+QzU6lSz2HDn1Eg1w4c/2qhcW7FC2guWftzmqC6wEAvMWyun7jFuC1 +1uzJndh3+0FRKYxn5A3xeMe2VasoTAU= +=pBPw -----END PGP SIGNATURE----- diff --git a/export/briar.html.minisig b/export/briar.html.minisig index 8e7f362..d8558d3 100644 --- a/export/briar.html.minisig +++ b/export/briar.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/qgUw1Ej+2oO4PZtZD55Od30GW8555X5KXNESxKPmVmZraKN6Pxvx1LiE+fX5fTpAaXSYCtT7e2fVNYKx5Zvcgk= -trusted comment: timestamp:1687026304 file:briar.html hashed -aIp2WZA/YVsYP3N+XU5OE8pEY0ujmwS77NcaqxE3kPv2+naUc4lyHjlw/4Q3EFPyfzV8u37+F9hwjmLEha0HDA== +trusted comment: timestamp:1688782375 file:briar.html hashed +oVvmftGx8o2lvCOEMRaQ5P9whagH8XbM1k+K4YAVenV1sgGgz5ozZS3CeFpDGox9Ps64YVTFybJTgnLP6XiuCQ== diff --git a/export/briar.odt b/export/briar.odt index 5daaa14..f00d24d 100644 Binary files a/export/briar.odt and b/export/briar.odt differ diff --git a/export/briar.odt.asc b/export/briar.odt.asc index 2caed24..b4ac072 100644 --- a/export/briar.odt.asc +++ b/export/briar.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36gAAKCRAoXmBIoSMh -sgZCAP9T0/6/3jbitSCZ+IpXitnT+ss1tbkxoOi5mE1ApYQKjwEAmp8E9GXO+a18 -9v9birwDVmdixqGDP0WtOW7sAB/99wk= -=bsjd +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGJwAKCRAoXmBIoSMh +sphXAPoDbGuA6UsSqotNaV/5+8az1YneEuYSWbeMiRn8ll49yQD+JuLRaWD1P4oq +5X0C5KV0o4WqlWMh72syX5fAm+D0YAo= +=sQV3 -----END PGP SIGNATURE----- diff --git a/export/briar.odt.minisig b/export/briar.odt.minisig index 3db59d3..991aff0 100644 --- a/export/briar.odt.minisig +++ b/export/briar.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/v29MZhpop2LXByVs3SC5dIsvh49wfj7PfGwlM76u+g2Tw9Wmq9fzgVfT425XDEzi6y/y/I7vGEE83eq2gMh+Ac= -trusted comment: timestamp:1687026306 file:briar.odt hashed -p9PiDgxHxOokWctQ5HkrS5yvsmn0iI01HgQmgpoGOTvEV7RmnU5f9N2/WR6bKarg0HgBHySsEZ2vqxOypvTRBQ== +RUSn9xivowlq/oWGIJUa6CvTjDw07reJAFUj6CEQamkfECQ8USmYtqg/+Aq6X844xx0umZqNp4xGKwK1rA0Mkc3mKnBmNVtVhwM= +trusted comment: timestamp:1688782376 file:briar.odt hashed +bQWQVqQvGyu4cP8FbUGN9738RNvk6a2Xd8NMDyeftNehMtvRjNFinLnU6qgBWdnM4F9o8RRXRCMR3PLCWwZ3Cw== diff --git a/export/briar.pdf b/export/briar.pdf index a2555ef..6682086 100644 Binary files a/export/briar.pdf and b/export/briar.pdf differ diff --git a/export/briar.pdf.asc b/export/briar.pdf.asc index f2232e1..25f7abc 100644 --- a/export/briar.pdf.asc +++ b/export/briar.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36ggAKCRAoXmBIoSMh -sh/6AP4u8qGMcrPz9Gspro1pgZyq3LjJb5D0MpWxyQ9ZCVTh+gEAnHfcUY+e/nfb -Jiag7o/Q1CjlkyiHsbwFxAFhYiHmMQo= -=3XO6 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGKAAKCRAoXmBIoSMh +spjVAP4/xePmXp06izJZFArw3n0X4rM3Iscz9umVavO9WdgUsQD+LXUoub+aP5cj +mxHefwKUAKbcTUlFg1vhWNDUgeL5wQ0= +=GVif -----END PGP SIGNATURE----- diff --git a/export/briar.pdf.minisig b/export/briar.pdf.minisig index 9f7a32f..228f55a 100644 --- a/export/briar.pdf.minisig +++ b/export/briar.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/gpEU5JmxUgcY7I/B5phgO8VRsb/wSNMkoOVfrm/Qifzmu3lBkRd+CEokhs/RaygicNH1+6/k7wjX/AvfE66KAU= -trusted comment: timestamp:1687026307 file:briar.pdf hashed -yQRTLxhbT+oErWYnzGqZ1wS82AFO876zNI8SQgCdf91ISg9zOcMMjwBWClhlpQ0f9SfB7rzROJVsXJIjUi55BQ== +RUSn9xivowlq/jF0va27zbs9sxAklmOufWNs4pW6TbE4bYnlHlO6t0Bolw3r6LRsgpsdYjMLLEhbWWm2LrzN0QpfkttANDue/wM= +trusted comment: timestamp:1688782378 file:briar.pdf hashed +c9KdHmY5vf5T9U0qIvPrxlqC1zckLeOkVF1eJ4qocg+QaL5J9x7INNu4GpFS2enUOIRXQKoU6xzZwzgIiQpvAA== diff --git a/export/chatrooms-rules.html.asc b/export/chatrooms-rules.html.asc index 12f65d7..43ec49b 100644 --- a/export/chatrooms-rules.html.asc +++ b/export/chatrooms-rules.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36gwAKCRAoXmBIoSMh -su5MAP4tQfofSL9nIzskkHI2baeyFtUf+RYPF6O/SJgRG+2sugD+Kaf7sCm4amj2 -ButTbFFqP6goxaIBPY0hdPsJ+/aYWwQ= -=rKHT +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGKgAKCRAoXmBIoSMh +su/qAP4qk32ZQyAmdgeEEafcsLNEg1IxQO4vdhg5SPed7udxMwD+KFuHKPpnhisd +E8w1BD+Xk9Tx4I6VJN2RtGi+4gQqHgo= +=CImV -----END PGP SIGNATURE----- diff --git a/export/chatrooms-rules.html.minisig b/export/chatrooms-rules.html.minisig index ef09cb2..2da6738 100644 --- a/export/chatrooms-rules.html.minisig +++ b/export/chatrooms-rules.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/ppOl3ovJYEIlXzLeFeAo9Km4Pt579EoM9nHrnshNmufzumdhh8gG+fqZ60MxJwb0B/vxOF1+E902TDiDX9f4Q0= -trusted comment: timestamp:1687026309 file:chatrooms-rules.html hashed -t3p9f30hgQIq3uKfhsrnamTRrnag0HMrmqdiJEQ2s6TGw3xOR7jDBswdz4MYpWUxQCZMdl+TgsdsjDyt0FHqCQ== +trusted comment: timestamp:1688782379 file:chatrooms-rules.html hashed +ZH6nCD1kWqIAs1V77eSjANghoIaQq88gGQQ0xFsSwK6R2QWNIOaTIlF+f8N9ebV8n0VGVufI/PW6HYNtQT/yAw== diff --git a/export/chatrooms-rules.odt b/export/chatrooms-rules.odt index 74d2699..65521c8 100644 Binary files a/export/chatrooms-rules.odt and b/export/chatrooms-rules.odt differ diff --git a/export/chatrooms-rules.odt.asc b/export/chatrooms-rules.odt.asc index 08c8513..58ab695 100644 --- a/export/chatrooms-rules.odt.asc +++ b/export/chatrooms-rules.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36hQAKCRAoXmBIoSMh -sl+vAP9sx1dS3Fu1vOOGPD/QUAnnHYFiM3M2Oimh6N35BPj5JgD+MtdZ9csn1n/T -DVbifRc+eGYw/hzLFGpW23BU4N7zDwE= -=xWzj +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGKwAKCRAoXmBIoSMh +suT5AQCphVs2CDm8bRUrZlLLAHo1tSvaxFkvn2lQ2uxJQvmSYQEAldnimx7Va+iG +O5tbcL+WAHP90mS+FqQCIKUUf4PnsgU= +=CqMk -----END PGP SIGNATURE----- diff --git a/export/chatrooms-rules.odt.minisig b/export/chatrooms-rules.odt.minisig index 3d28f07..71a79ab 100644 --- a/export/chatrooms-rules.odt.minisig +++ b/export/chatrooms-rules.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/rf82fYzF9wuQW2Q6Jad+N7uwv+pO03XBdR4gOogqkU9JRSIrCwrkAXPeMtwHlkqLPK7YQepbqFke8QPEsaULwE= -trusted comment: timestamp:1687026310 file:chatrooms-rules.odt hashed -u7aKKuxqvoxC8OaRB6Nfmdk8DudChvgpLgs3v369/TVUtb/OTmWvK4hc35mgWKoYfDR4kPgDwWbqBFN8vLclDw== +RUSn9xivowlq/hErkiZcsT0CeSDD/Zqeiik+tZF2FLXFnaqLnSJ4np8k0AjA8KAimi5r6GEYmtGCfB8L7iBvLLmmJBs0JR4EIg0= +trusted comment: timestamp:1688782381 file:chatrooms-rules.odt hashed +LO11z0WQId9vh00sOjLMfr+aKZfoEMtVjQRt5l9P7jWfRX7HJArt2AHgXJPx0Sjf+k0HZo5piSUJtXPAY7nZBg== diff --git a/export/constitution.html.asc b/export/constitution.html.asc index a788155..493625f 100644 --- a/export/constitution.html.asc +++ b/export/constitution.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36hgAKCRAoXmBIoSMh -stMTAQCAUAgM/xSY6sWVIU/zAUmviv7VFL3I1pJ38TUSR5SUZQD/Zyi3R+nfLuhX -W476tn2CedLHu8e2yF/9UUbQmk1zBQk= -=HWv0 +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGLQAKCRAoXmBIoSMh +snNpAP448rU3iyEKw8rzkzu/IkyMxgGx0U6LxF50gvLncLS7LQD9FUUrFCShYp3D +f4/JMUhO0jfr55k5M9cYBlvLn6sb2w0= +=jXFI -----END PGP SIGNATURE----- diff --git a/export/constitution.html.minisig b/export/constitution.html.minisig index 27874f9..0f1b5dd 100644 --- a/export/constitution.html.minisig +++ b/export/constitution.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/jsRa4aFcLWumN4MSTkkE0YG+nDmaSe4Jg4yuakTMw3uJcMMY/5GpQgO85q/cvCKMWYSKtPE38gA7hpLERy/6ws= -trusted comment: timestamp:1687026312 file:constitution.html hashed -mMezksTPG2899Xb0LZERLuMhwL6lm5CLc6n6ciFXEgs4stgW/D9oa8K/PqNgI8ZB1ZpE6jamWV0aeB6yV35OAw== +trusted comment: timestamp:1688782382 file:constitution.html hashed +gbqH04TEruR27VQteHTre8NcapHHpK2H2Sb8wX5i7li6u+VSRaGnYV6KIHptcSRdh+cjp02HrZKx5KZAoh/pCA== diff --git a/export/constitution.odt b/export/constitution.odt index 90c0445..be23a31 100644 Binary files a/export/constitution.odt and b/export/constitution.odt differ diff --git a/export/constitution.odt.asc b/export/constitution.odt.asc index 83ab66d..b766cc6 100644 --- a/export/constitution.odt.asc +++ b/export/constitution.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36iAAKCRAoXmBIoSMh -sucrAP9PiQ/43CDRdw7G6DBRyrl+31BwYJdTMbHyPZK4l2osmQD/fHWm2JMD6xNT -CGosP/4oQ0rDCynuw+ten6TcsBVOFQ4= -=TGpd +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGLgAKCRAoXmBIoSMh +su9xAP9ZXMB2LvULaPUTI1oh7p/99rX/aHkTacJCsRa5QBYkKwEAz91GosxEvNHf +fu1p88xvU2mTnPQIoVF8lNVstbBNkwg= +=DN1x -----END PGP SIGNATURE----- diff --git a/export/constitution.odt.minisig b/export/constitution.odt.minisig index ac15ddb..ddef6eb 100644 --- a/export/constitution.odt.minisig +++ b/export/constitution.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/vI7CbR6fSVZ+sRFAMTXnznRc5PRfmjUE/QNIpq2pLyRUvkzmtCDNeivnPMi1G3GyTJB1+GhhfFLKBM8kRaXZgE= -trusted comment: timestamp:1687026313 file:constitution.odt hashed -v5T5euk57j3coys+oZWIUeVu0NcYNjiI2iuWPyJIgV+DaHiiRuF/2nk6Jb+5EnWasttXdcHA9paRHlMIFXpNAQ== +RUSn9xivowlq/jNFbzinhSkLrWk+Azt04ErSM2MEV03xHJUhEIcv0aVQcBDEEEghqxxxC9YKaVePgJHHfWRYiavpRVvA72MMfQY= +trusted comment: timestamp:1688782384 file:constitution.odt hashed +KDepJhxLLHjHbLKIWlS/VdrPLRrrkwYbe71Ckau4taauKQus10zPkvE4Ajvb406h5U28sNkqIDsgD+6JrZ5fBQ== diff --git a/export/constitution.pdf b/export/constitution.pdf index 7142227..6a17ef7 100644 Binary files a/export/constitution.pdf and b/export/constitution.pdf differ diff --git a/export/constitution.pdf.asc b/export/constitution.pdf.asc index 5482aae..6f70582 100644 --- a/export/constitution.pdf.asc +++ b/export/constitution.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36iQAKCRAoXmBIoSMh -stJKAP9+i74fGmPs7doDYng+2Z3gD0h/yYZ28hNgQLdoSD2WQQEAgpTkD31hEX7c -fygOEIJLuDLpltLlFwClhyewe+Jf4Q0= -=Np3A +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGMAAKCRAoXmBIoSMh +slisAQCqVUVNBc6uNmZ/8DjBEfdwU958rIv6hK3XhvdyXyif8AD/f4tJbIHjPuwU +U6/6IXDAGB9zU68FDzTnNP+1K6qwoAE= +=pi1+ -----END PGP SIGNATURE----- diff --git a/export/constitution.pdf.minisig b/export/constitution.pdf.minisig index 0601604..220afc2 100644 --- a/export/constitution.pdf.minisig +++ b/export/constitution.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/hFwBfYS9S7d9mh3rPvWwt4TGEaZ0WMKQaB5cyy13cJRhixL/fMrBUVuzPY1RUU6w9FN2D9AzBZ1PIJGAfHeTgY= -trusted comment: timestamp:1687026315 file:constitution.pdf hashed -qXr5emd+t2IN2POcx4PP1RErlTC5Qvg6a6wUZD2rG6wtdsbmJ2NU/U7aML6+XQsdRXjpiknlM9dOrR37dDicCQ== +RUSn9xivowlq/vxCwGHgdwqmZioEW50NbLnyT1+TCso+gQZlqTUaj78hHscVYoXWt/k2AehjnqhK5gwxtLBL9hOu6WpeWB6n0AY= +trusted comment: timestamp:1688782385 file:constitution.pdf hashed +3E4NGDObjuXgnFSLzkFSgr6wCN78DIc0WzGrD09Wd7faEFWi2tf3FwoSOu37lzHaD69RhrsaYFo7+j3Jpb8bAA== diff --git a/export/donations.html.asc b/export/donations.html.asc index fdfa750..a3f3dd2 100644 --- a/export/donations.html.asc +++ b/export/donations.html.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36iwAKCRAoXmBIoSMh -sudkAQC6OpTLEJzQBDRG+5DfchYGiERYq1Ta3Wv/w1HkB/v/EQEAq6TGKhF8zMar -vmq+dtyCadtNcwCz+GuRXFAK69hwkAw= -=80dk +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGMQAKCRAoXmBIoSMh +sgcBAPsFhJqxpEDH7GHEcM8dNy9uyoV9axIV9HgDkoSh2TvP5AEA/CF5xXYobA96 +ks7VSYp1uFm3iNXPFHp3Y3g/ub/h3A8= +=f/CD -----END PGP SIGNATURE----- diff --git a/export/donations.html.minisig b/export/donations.html.minisig index 04e75a9..a23fd22 100644 --- a/export/donations.html.minisig +++ b/export/donations.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/hXCnNCs3OyIT1gf6SVkt/3IjH91rQWxKF2QaGFgNPeGOal72djj164fa7gzoVmpYMNa1as4VgPxAZ1BbsugEgI= -trusted comment: timestamp:1687026316 file:donations.html hashed -lKOqyh+ad4+IwAOgZQ5AkIwX7US74JyDzfjLKc2rLMyPwYSYNgFHPGHTr4UZysAasmTkMYTMKBtTC0E5YlYFBA== +trusted comment: timestamp:1688782386 file:donations.html hashed +AsLvAj1npP5x+o+BuM/kJNFXf65AAb44t8/I3wrQsNtcto5SEU8TWl/WtjIJP+rMZMuZiOUtP8mp1tcSb8LOAg== diff --git a/export/donations.odt b/export/donations.odt index b77a4a0..c269bf9 100644 Binary files a/export/donations.odt and b/export/donations.odt differ diff --git a/export/donations.odt.asc b/export/donations.odt.asc index 8071f06..1d3b593 100644 --- a/export/donations.odt.asc +++ b/export/donations.odt.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36jAAKCRAoXmBIoSMh -sqceAQCuap6ubW6MybsZjYH6kPQKeGVhgvmv4QxtXnMHMzcb3gD/Ye2niLgbsyKY -6NEOMhWYFH5VZoSH6Zv98BBwU9TWSgE= -=EojB +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGMgAKCRAoXmBIoSMh +su8eAQDRbL3mxk15Z7BjlhzekzOAuTAmNEHS82ijP+RkT5Zc5AEA/2+CVNTttm/l +O0c6dCxmOwXWU8jzjS1RhW3TTuNzawc= +=UBOj -----END PGP SIGNATURE----- diff --git a/export/donations.odt.minisig b/export/donations.odt.minisig index e8354a8..8686a41 100644 --- a/export/donations.odt.minisig +++ b/export/donations.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/moC0NdjgSrZ/fjK/UMkKuOUJX/cJIdNLpJLjkDwHuuKVOft6i/LD//QWW7Y5/JBkgOdTjnxWzA4A9XYShzBVg8= -trusted comment: timestamp:1687026318 file:donations.odt hashed -wvyYl0j/7L6C3AiUG04zs2mJDgQikXuHq7u8pluui8+9x9uQwODN4jdWXxYQs7ABFoq86GgxTcpfoj2ZnoM5Cw== +RUSn9xivowlq/qpDRxu9pSoYLpXUSNGtxOiOlLRFRj+TILPLmGqkpJQD9EABt8SAbv/psP2jLN6Z/QxcfMbaNhy9jSCpj1b7JgY= +trusted comment: timestamp:1688782388 file:donations.odt hashed +PD8jBTI1SncLmuzFd9OPAT9No0B/dvxdhSbLKyHNLixBaCXDU9clSkxvz4rc96MuLKLbopB1Myx2F6WMo89cBg== diff --git a/export/donations.pdf b/export/donations.pdf index d4f2439..50a342b 100644 Binary files a/export/donations.pdf and b/export/donations.pdf differ diff --git a/export/donations.pdf.asc b/export/donations.pdf.asc index b2ee0e9..d75138c 100644 --- a/export/donations.pdf.asc +++ b/export/donations.pdf.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNATURE----- -iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZI36jgAKCRAoXmBIoSMh -slfOAP9lwmzRdYPF/UFyoLynpMgV9YNWWQ8xQMDOd0AMVERoHwEAkPw+lk3E7uVe -YSHWXcjypoQ0cgv2sfONVRO7WzaApQ4= -=rpI+ +iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCZKjGNAAKCRAoXmBIoSMh +spMwAPkBNKBpbCxPAGfMgnIF+o3P/wVOtpXlNrDl7qPmKkWAMAEA+8Le6wJNwDZl +5F6atiC4wbgEKuKe+JXRoofozecAUQQ= +=UoNJ -----END PGP SIGNATURE----- diff --git a/export/donations.pdf.minisig b/export/donations.pdf.minisig index 9cbfe26..3a70d60 100644 --- a/export/donations.pdf.minisig +++ b/export/donations.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/v581r32o3SzFyNKRLpCm+p0nCYV8ZxURj4D22TUavOtbTibVLam4/ZCzGy53/u1e2sk17BckMMN5iOj886zZQ8= -trusted comment: timestamp:1687026320 file:donations.pdf hashed -u8vfiJ3KzKsVjT13dxEAens9JgRLo2JR6Z3y6WDpgX2HiIadf8H3eEP4F2FSl9JKJ7ERKE/GSdmzGj5eWNsZDg== +RUSn9xivowlq/nkotwkA2VRv96edlkcbb63SMUqT43kgJteiX3/GUdLMAqviKrrfnCu44+k5Qm4InGa8YLYEblHbdtLsAS5CnAo= +trusted comment: timestamp:1688782389 file:donations.pdf hashed +CeoHjbT8fkXY37rIuUC3hDDwDfHsM2Ve3AfgPEqIUklRhZS3X5pmNShfs7KHf9v4Z9PtV0pJIrd+KglWOQW5BA== diff --git a/export/guide.html b/export/guide.html index 55b955d..d41c771 100644 --- a/export/guide.html +++ b/export/guide.html @@ -122,10 +122,7 @@
You should not trust cloud providers with your (not previously and locally encrypted) sensitive data and you should be wary of their privacy claims. In most cases, they can access your data and provide it to a third party if they want to256.
The only way to mitigate this is to encrypt your data on your side and then only upload it to such services or just not use them at all.
-Your Browser and Device Fingerprints257 are a set of properties/capabilities of your System/Browser. These are used on most websites for invisible user tracking but also to adapt the website user experience depending on their browser. For instance, websites will be able to provide a “mobile experience” if you are using a mobile browser or propose a specific language/geographic version depending on your fingerprint. Most of those techniques work with recent Browsers like Chromium-based258 browsers (such as Chrome/Edge) or Firefox259 unless taking specific measures. Browser and Device260 Fingerprinting are usually integrated into the Captcha services but also in other various services.
-We will address Browser and Device Fingerprinting further down but this is a basic introduction to the methodology behind it and why it is used in practice.
-It should also be noted that while some browsers and extensions will offer some fingerprint resistance, this resistance in itself can also be used to fingerprint you as explained here https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/ [Archive.org]
-This guide will mitigate these issues by randomizing or hiding many of those fingerprinting identifiers by:
-Using Virtualization (See Appendix W: Virtualization);
Using specific recommendations (See Appendix A5: Additional browser precautions with JavaScript enabled;
Using hardening Appendix V1: Hardening your Browsers);
and by using fingerprint-resistant browsers (like Brave or Tor Browser).
There was an attack published that can deanonymize users if they have a known alias. For example, an attacker trying to track the activities of a journalist can use that journalist’s public Twitter handle to link their anonymous identities with their public one. This breaks compartmentalization of identities and can lead to complete deanonymization, even of users who practice proper OPSEC.
The attack, published at https://leakuidatorplusteam.github.io/ [Archive.org], can be mitigated using the well-known NoScript extension and will be our preferred recommendation.
@@ -1130,7 +1116,7 @@Most of you have probably seen enough Crime dramas on Netflix or TV to know what forensics are. These are technicians (usually working for law enforcement) that will perform various analysis of evidence. This of course could include your smartphone or laptop.
While these might be done by an adversary when you already got “burned”, these might also be done randomly during a routine control or a border check. These unrelated checks might reveal secret information to adversaries that had no prior knowledge of such activities.
-Forensics techniques are now very advanced and can reveal a staggering amount of information from your devices even if they are encrypted261. These techniques are widely used by law enforcement all over the world and should be considered.
+Forensics techniques are now very advanced and can reveal a staggering amount of information from your devices even if they are encrypted257. These techniques are widely used by law enforcement all over the world and should be considered.
Here are some recent resources you should read about your smartphone:
UpTurn, The Widespread Power of U.S. Law Enforcement to Search Mobile Phones https://www.upturn.org/reports/2020/mass-extraction/ [Archive.org]
FTK Forensic Toolkit, https://accessdata.com/products-services/forensic-toolkit-ftk [Archive.org]
SANS Digital Forensics and Incident Response Videos, https://www.youtube.com/c/SANSDigitalForensics/videos
And finally, here is this very instructive detailed paper on the current state of IOS/Android security from the John Hopkins University: https://securephones.io/main.html262.
+And finally, here is this very instructive detailed paper on the current state of IOS/Android security from the John Hopkins University: https://securephones.io/main.html258.
When it comes to your laptop, the forensics techniques are many and widespread. Many of those issues can be mitigated by using full disk encryption, virtualization (See Appendix W: Virtualization), and compartmentalization. This guide will later detail such threats and techniques to mitigate them.
There is a frequent adage among the infosec community: “Don’t roll your own crypto!”.
-And there are reasons263‘264’265’266 for that:
+And there are reasons259‘260’261’262 for that:
We would not want people discouraged from studying and innovating in the crypto field because of that adage. So instead, we would recommend people to be cautious with “Roll your own crypto” because it is not necessarily good crypto:
Good cryptography is not easy and usually takes years of research to develop and fine-tune.
Yet, this is not stopping some from doing it anyway and publishing various production Apps/Services using their self-made cryptography or proprietary closed-source methods:
You should apply caution when using Apps/Services using closed-source or proprietary encryption methods. All the good crypto standards are public and peer-reviewed and there should be no issue disclosing the one you use.
You should be wary of Apps/Services using a “modified” or proprietary cryptographic method267.
By default, you should not trust any “Roll your own crypto” until it was audited, peer-reviewed, vetted, and accepted by the cryptography community268’269.
There is no such thing as “military-grade crypto”270‘271’272.
You should be wary of Apps/Services using a “modified” or proprietary cryptographic method263.
By default, you should not trust any “Roll your own crypto” until it was audited, peer-reviewed, vetted, and accepted by the cryptography community264’265.
There is no such thing as “military-grade crypto”266‘267’268.
Cryptography is a complex topic and bad cryptography could easily lead to your de-anonymization.
In the context of this guide,we recommend sticking to Apps/Services using well-established, published, and peer-reviewed methods.
@@ -1171,58 +1157,50 @@Hashes:
Prefer: SHA3-224, SHA-384 or BLAKE2273 (these are considered very Quantum Resistant based on an instance of the KECCAK algorithm), SHAKE128 and SHAKE256 (referred to as extendable-output functions (XOFs) via FIPS 202);
-Most digital signature algorithms are quantum-broken;
Highly suspicious RBGs such as MS_DRBG still exist in standards such as ISO 18031;
The AES and SHA2 based DRBGs in current NIST standards are fine
Still relatively safe to use: SHA-2 (e.g., SHA-256 or SHA-512, which are still considered mostly quantum-safe)
Avoid: SHA-0, SHA-1, MD5 (unfortunately still widely used), CRC, MD6 (rarely used); i.e., anything with known collisions, and/or a history of extensive, not one-off, cryptographic failures
Prefer: SHA-3 or BLAKE2269
Still relatively ok to use: SHA-2 (such as the widely used SHA-256 or SHA-512)
Avoid: SHA-1, MD5 (unfortunately still widely used), CRC, MD6 (rarely used)
File/Disk Encryption:
Prefer:
Hardware Accelerated274: AES (Rijndael) 256 Bits with HMAC-SHA-2 or HMAC-SHA-3 (This is what Veracrypt, Bitlocker, Filevault 2, KeepassXC, and LUKS use by default). Prefer SHA-3.
Hardware Accelerated270: AES (Rijndael) 256 Bits with HMAC-SHA-2 or HMAC-SHA-3 (This is what Veracrypt, Bitlocker, Filevault 2, KeepassXC, and LUKS use by default). Prefer SHA-3.
Non-Hardware Accelerated: Same as accelerated above or if available consider:
ChaCha20275 or XChaCha20 (You can use ChaCha20 with Kryptor https://www.kryptor.co.uk, unfortunately, it is not available with Veracrypt).
Serpent276
TwoFish277
ChaCha20271 or XChaCha20 (You can use ChaCha20 with Kryptor https://www.kryptor.co.uk, unfortunately, it is not available with Veracrypt).
Serpent272
TwoFish273
Avoid: Pretty much anything else
Password Storage:
Be skeptical of Argon2d, as it’s vulnerable to some forms of side-channels. Prefer Argon2i or Argon2id.
Avoid: SHA-3, SHA-2, SHA-1, MD5; PBKDF2 due to concerns regarding brute-force [Archive.org]
Be skeptical of Argon2d, as it’s vulnerable to some forms of side-channels. Prefer Argon2i or Argon2id
Avoid: SHA-3, SHA-2, SHA-1, MD5
Browser Security (HTTPS):
Prefer: TLS 1.3 (ideally TLS 1.3 with ECH/eSNI support) or at least TLS 1.2 (widely used)
Avoid: Anything Else (TLS <=1.1, SSL <=3)
Avoid: Anything Else (TLS =<1.1, SSL =<3)
Signing messages/files with PGP/GPG:
Prefer ECDSA (ed25519)+ECDH (ec25519) or RSA 4096 Bits*
Avoid: RSA 2048 bits
SSH keys:
ED25519 (preferred) or RSA 4096 Bits*
-ED25519 (preferred) or RSA 4096 Bits*
Avoid: RSA 2048 bits
Warning: RSA and ED25519 are unfortunately not seen as “Quantum Resistant”279 and while they have not been broken yet, they probably will be broken someday into the future. It is just a matter of when rather than if RSA will ever be broken. So, these are preferred in those contexts due to the lack of a better possibility.
Warning: RSA and ED25519 are unfortunately not seen as “Quantum Resistant”275 and while they have not been broken yet, they probably will be broken someday into the future. It is just a matter of when rather than if RSA will ever be broken. So, these are preferred in those contexts due to the lack of a better possibility.
Here are some real cases of issues bad cryptography:
Later this guide will not recommend “bad cryptography” and that should hopefully be enough to protect you?
Many people have the idea that privacy-oriented services such as VPN or E-Mail providers are safe due to their no-logging policies or their encryption schemes. Unfortunately, many of those same people forget that all those providers are legal commercial entities subject to the laws of the countries in which they operate.
-Any of those providers can be forced to silently (without your knowing (using for example a court order with a gag order280 or a national security letter281) log your activity to de-anonymize you. There have been several recent examples of those:
+Any of those providers can be forced to silently (without your knowing (using for example a court order with a gag order276 or a national security letter277) log your activity to de-anonymize you. There have been several recent examples of those:
2021, Proton, Proton logged IP address of French activist after an order by Swiss authorities (source link unavailable).
2021, WindScribe, Servers were not encrypted as they should have been allowing MITM attacks by authorities282.
2021, DoubleVPN servers, logs, and account info seized by law enforcement283.
2021, The Germany-based mail provider Tutanota was forced to monitor specific accounts for 3 months284.
2020, The Germany-based mail provider Tutanota was forced to implement a backdoor to intercept and save copies of the unencrypted e-mails of one user285 (they did not decrypt the stored e-mail).
2017, PureVPN was forced to disclose information of one user to the FBI286.
2014, an EarthVPN user was arrested based on logs provider to the Dutch Police287.
2013, Secure E-Mail provider Lavabit shuts down after fighting a secret gag order288.
2011, HideMyAss user was de-anonymized, and logs were provided to the FBI289.
2021, WindScribe, Servers were not encrypted as they should have been allowing MITM attacks by authorities278.
2021, DoubleVPN servers, logs, and account info seized by law enforcement279.
2021, The Germany-based mail provider Tutanota was forced to monitor specific accounts for 3 months280.
2020, The Germany-based mail provider Tutanota was forced to implement a backdoor to intercept and save copies of the unencrypted e-mails of one user281 (they did not decrypt the stored e-mail).
2017, PureVPN was forced to disclose information of one user to the FBI282.
2014, an EarthVPN user was arrested based on logs provider to the Dutch Police283.
2013, Secure E-Mail provider Lavabit shuts down after fighting a secret gag order284.
2011, HideMyAss user was de-anonymized, and logs were provided to the FBI285.
Some providers have implemented the use of a Warrant Canary290 that would allow their users to find out if they have been compromised by such orders, but this has not been tested yet as far as we know.
-Finally, it is now well known that some companies might be sponsored front ends for some state adversaries (see the Crypto AG story291 and Omnisec story292).
+Some providers have implemented the use of a Warrant Canary286 that would allow their users to find out if they have been compromised by such orders, but this has not been tested yet as far as we know.
+Finally, it is now well known that some companies might be sponsored front ends for some state adversaries (see the Crypto AG story287 and Omnisec story288).
For these reasons, you mustn’t trust such providers for your privacy despite all their claims. In most cases, you will be the last person to know if any of your accounts were targeted by such orders and you might never know at all.
To mitigate this, in cases where you want to use a VPN, we will recommend the use of a cash/Monero-paid VPN provider over Tor to prevent the VPN service from knowing any identifiable information about you.
If the VPN provider knows nothing about you, it should mitigate any issue due to them not logging but logging anyway.
@@ -1255,8 +1233,8 @@ -(Illustration: an excellent movie we highly recommend: Das Leben der Anderen293)
-Many advanced techniques can be used by skilled adversaries294 to bypass your security measures provided they already know where your devices are. Many of those techniques are detailed here https://cyber.bgu.ac.il/advanced-cyber/airgap [Archive.org] (Air-Gap Research Page, Cyber-Security Research Center, Ben-Gurion University of the Negev, Israel) but also in this report https://www.welivesecurity.com/wp-content/uploads/2021/12/eset_jumping_the_air_gap_wp.pdf [Archive.org] (ESET, JUMPING THE AIR GAP: 15 years of nation-state effort) and include:
+(Illustration: an excellent movie we highly recommend: Das Leben der Anderen289)
+Many advanced techniques can be used by skilled adversaries290 to bypass your security measures provided they already know where your devices are. Many of those techniques are detailed here https://cyber.bgu.ac.il/advanced-cyber/airgap [Archive.org] (Air-Gap Research Page, Cyber-Security Research Center, Ben-Gurion University of the Negev, Israel) but also in this report https://www.welivesecurity.com/wp-content/uploads/2021/12/eset_jumping_the_air_gap_wp.pdf [Archive.org] (ESET, JUMPING THE AIR GAP: 15 years of nation-state effort) and include:
Attacks requiring malware implants:
Attacks not requiring malware:
Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing295. Publication with demonstration: http://wallcamera.csail.mit.edu/ [Archive.org]
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room296. Publication with photographic examples: https://arxiv.org/pdf/2001.04642.pdf [Archive.org]
Measuring floor vibrations to identify individuals and determine their health condition and mood297. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html [Archive.org]
Observing a light bulb from a distance to listen to the sound in the room298 without any malware: Demonstration: https://www.youtube.com/watch?v=t32QvpfOHqw [Invidious]. It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013299 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html [Archive.org]
Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing291. Publication with demonstration: http://wallcamera.csail.mit.edu/ [Archive.org]
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room292. Publication with photographic examples: https://arxiv.org/pdf/2001.04642.pdf [Archive.org]
Measuring floor vibrations to identify individuals and determine their health condition and mood293. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html [Archive.org]
Observing a light bulb from a distance to listen to the sound in the room294 without any malware: Demonstration: https://www.youtube.com/watch?v=t32QvpfOHqw [Invidious]. It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013295 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html [Archive.org]
Here is also a good video from the same authors to explain those topics: Black Hat, The Air-Gap Jumpers https://www.youtube.com/watch?v=YKRtFgunyj4 [Invidious]
-Realistically, this guide will be of little help against such adversaries as such malware could be implanted on the devices by a manufacturer, anyone in the middle300, or by anyone with physical access to the air-gapped computer but there are still some ways to mitigate such techniques:
+Realistically, this guide will be of little help against such adversaries as such malware could be implanted on the devices by a manufacturer, anyone in the middle296, or by anyone with physical access to the air-gapped computer but there are still some ways to mitigate such techniques:
Do not conduct sensitive activity while connected to an untrusted/unsecured power line to prevent power line leaks.
Do not use your devices in front of a camera that could be compromised.
Personally, in the context of this guide, it is also interesting to have a look at your security model. And in this context,we only have one to recommend:
-Zero-Trust Security301 (“Never trust, always verify”).
+Zero-Trust Security297 (“Never trust, always verify”).
Here are some various resources about what Zero-Trust Security is:
DEFCON, Zero Trust a Vision for Securing Cloud, https://www.youtube.com/watch?v=euSsqXO53GY [Invidious]
It is new and it has great specs (more than 16GB or ideally 32GB of RAM, >250GB of disk space, recent fast CPU):
If it is an ARM-based M1/M2 Mac:
If your main concern is a forensic examination of your devices, you should consider the Tor Browser route or the Tails route.
If your main concerns are remote adversaries that might uncover your online identity on various platforms, you should consider the Tails, Whonix, or Qubes OS routes (listed in order of difficulty).
If you want system-wide plausible deniability303‘304 despite the risks305’306, consider the Tails route, including the persistent plausible deniability section (see Persistent Plausible Deniability using Whonix within Tails).**
If you want system-wide plausible deniability299‘300 despite the risks301’302, consider the Tails route, including the persistent plausible deniability section (see Persistent Plausible Deniability using Whonix within Tails).**
If you are in a hostile environment where Tor/VPN usage alone is impossible/dangerous/suspicious, consider the Tails route (without actually using Tor), or more advanced routes like Whonix or Qubes OS.
You might be asking yourself: “How do I know if I’m in a hostile online environment where activities are actively monitored and blocked?”
First read more about it at the EFF here: https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship [Archive.org]
Check some data yourself here on the Tor Project OONI307 (Open Observatory of Network Interference) website: https://explorer.ooni.org/
Check some data yourself here on the Tor Project OONI303 (Open Observatory of Network Interference) website: https://explorer.ooni.org/
Have a look at https://censoredplanet.org/ and see if they have data about your country.
Specific to China, look at https://gfwatch.org/ and https://www.usenix.org/system/files/sec21-hoang.pdf [Archive.org]
Test for yourself using OONI (this can be risky in a hostile environment).
You should test that the phone is in working order before going to the next step. But we will repeat ourselves and state that it is important to leave your smartphone at home when going (or turn it off before leaving if you must keep it) and that you test the phone at a random location that cannot be tracked back to you (and again, do not do that in front of a CCTV, avoid cameras, be aware of your surroundings). No need for Wi-Fi at this place either.
When you are certain the phone is in working order, disable Bluetooth then power it off (remove the battery if you can) and go back home and resume your normal activities. Go to the next step.
This is the hardest part of the whole guide. It is a SPOF (Single Point of Failure). The places where you can still buy prepaid SIM cards without ID registration are getting increasingly limited due to various KYC type regulations308.
+This is the hardest part of the whole guide. It is a SPOF (Single Point of Failure). The places where you can still buy prepaid SIM cards without ID registration are getting increasingly limited due to various KYC type regulations304.
So here is a list of places where you can still get them now: https://prepaid-data-sim-card.fandom.com/wiki/Registration_Policies_Per_Country [Archive.org]
You should be able to find a place that is “not too far” and just go there physically to buy some pre-paid cards and top-up vouchers with cash. Do verify that no law was passed before going that would make registration mandatory (in case the above wiki was not updated). Try to avoid CCTV and cameras and do not forget to buy a Top-Up voucher with the SIM card (if it is not a package) as most pre-paid cards will require a top-up before use.
See Appendix N: Warning about smartphones and smart devices
@@ -1545,7 +1523,7 @@Skip this step if you have no intention of creating anonymous accounts on most mainstream platforms, but you will want anonymous browsing; or if the platforms which you will use allow registration without a phone number.
Get at least one or two decent size generic USB keys (at least 16GB but we would recommend 32GB).
Please do not buy or use gimmicky self-encrypting devices such as these: https://syscall.eu/blog/2018/03/12/aigo_part1/ [Archive.org]
-Some might be very efficient309 but many are gimmicky gadgets that offer no real protection310.
+Some might be very efficient305 but many are gimmicky gadgets that offer no real protection306.
You need to find safe places where you will be able to do your sensitive activities using some publicly accessible Wi-Fi (without any account/ID registration, avoid CCTVs).
This can be anywhere that will not be tied to you directly (your home/work) and where you can use the Wi-Fi for a while without being bothered. But also, a place where you can do this without being “noticed” by anyone.
@@ -1632,7 +1610,7 @@Please see Warning for using Orbot on Android.
Disclaimer: Onion Browser, following a 2018 release on iOS, has had IP leaks via WebRTC. It is still the only officially endorsed browser for the Tor network for iOS. Users should exercise caution when using the browser and check for any DNS leaks.
-While the official Tor Browser is not yet available for iOS, there is an alternative called Onion Browser endorsed by the Tor Project311.
+While the official Tor Browser is not yet available for iOS, there is an alternative called Onion Browser endorsed by the Tor Project307.
Head over to https://apps.apple.com/us/app/onion-browser/id519296448
Install
You have very low IT skills
You decide to go with Tails anyway
Tails312 stands for The Amnesic Incognito Live System. It is a bootable Live Operating System running from a USB key that is designed for leaving no traces and forcing all connections through the Tor network.
+Tails308 stands for The Amnesic Incognito Live System. It is a bootable Live Operating System running from a USB key that is designed for leaving no traces and forcing all connections through the Tor network.
You insert the Tails USB key into your laptop, boot from it and you have a full operating system running with privacy and anonymity in mind. As soon as you shut down the computer, everything will be gone unless you saved it somewhere.
Tails is an amazingly straightforward way to get going in no time with what you have and without much learning. It has extensive documentation and tutorials.
-WARNING: Tails is not always up to date with their bundled software. And not always up to date with the Tor Browser updates either. You should always make sure you are using the latest version of Tails and you should use extreme caution when using bundled apps within Tails that might be vulnerable to exploits and reveal your location313.
+WARNING: Tails is not always up to date with their bundled software. And not always up to date with the Tor Browser updates either. You should always make sure you are using the latest version of Tails and you should use extreme caution when using bundled apps within Tails that might be vulnerable to exploits and reveal your location309.
It does however have some drawbacks:
Tails uses Tor and therefore you will be using Tor to access any resource on the internet. This alone will make you suspicious to most platforms where you want to create anonymous accounts (this will be explained in more detail later).
Your ISP (whether it is yours or some public Wi-Fi) will also see that you are using Tor, and this could make you suspicious in itself.
Tails does not include (natively) some of the software you might want to use later which will complicate things quite a bit if you want to run some specific things (Android Emulators for instance).
Tails uses Tor Browser which while it is very secure will be detected as well by most platforms and will hinder you in creating anonymous identities on many platforms.
Tails will not protect you more from the 5$ wrench314.
Tails will not protect you more from the 5$ wrench310.
Tor in itself might not be enough to protect you from an adversary with enough resources as explained earlier.
Important Note: If your laptop is monitored/supervised and some local restrictions are in place, please read Appendix U: How to bypass (some) local restrictions on supervised computers.
@@ -1758,7 +1736,7 @@When you are done and have a working Tails on your laptop, go to the Creating your anonymous online identities step much further in this guide or if you want persistence and plausible deniability, continue with the next section.
Consider checking the https://github.com/aforensics/HiddenVM [Archive.org] project for Tails.
-This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability315 (see The Whonix route: first chapters and also for some explanations about Plausible deniability, as well as the How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives: section at the end of this guide for more understanding).
+This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability311 (see The Whonix route: first chapters and also for some explanations about Plausible deniability, as well as the How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives: section at the end of this guide for more understanding).
This would allow the creation of a hybrid system mixing Tails with the Virtualization options of the Whonix route in this guide.
Encryption should now be started in the background (you can check by clicking the Bitlocker icon on the lower right side of the taskbar).
Unfortunately, this is not enough. With this setup, your Bitlocker key can just be stored as-is in the TPM chip of your computer. This is rather problematic as the key can be extracted in some cases with ease348‘349’350’351.
-To mitigate this, you will have to enable a few more options as per the recommendations of Microsoft352:
+Unfortunately, this is not enough. With this setup, your Bitlocker key can just be stored as-is in the TPM chip of your computer. This is rather problematic as the key can be extracted in some cases with ease344‘345’346’347.
+To mitigate this, you will have to enable a few more options as per the recommendations of Microsoft348:
Click the Windows icon
Type Run
Requires Windows (this feature is not “easily” supported on Linux).
The danger of online Data leaks
Requires full wipe of your laptop
No use with an SSD drive due to the requirement of disabling Trim353 Operations354. This will severely degrade the performance/health of your SSD drive over time.
No use with an SSD drive due to the requirement of disabling Trim349 Operations350. This will severely degrade the performance/health of your SSD drive over time.
Enter a strong passphrase (longer the better, remember Appendix A2: Guidelines for passwords and passphrases)
Collect some entropy by randomly moving your cursor around until the bar is full
Click Next as the Generated Keys screen
To rescue disk355 or not rescue disk, well that is up to you. We recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.
To rescue disk351 or not rescue disk, well that is up to you. We recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.
Wipe mode:
If you have no sensitive data yet on this laptop, select None
If you have sensitive data on an SSD, Trim alone should take care of it356 but we would recommend one pass (random data) just to be sure.
If you have sensitive data on an SSD, Trim alone should take care of it352 but we would recommend one pass (random data) just to be sure.
If you have sensitive data on an HDD, there is no Trim, and we Swould recommend at least 1-pass.
Test your setup. Veracrypt will now reboot your system to test the bootloader before encryption. This test must pass for encryption to go forward.
Wipe your currently running Windows 10/11.
This means that your current Windows 10/11 will become the hidden Windows 10/11 and that you will need to reinstall a fresh decoy Windows 10/11 OS.
Mandatory if you have an SSD drive and you still want to do this against the recommendation: Disable SSD Trim in Windows357 (again this is NOT recommended at all as disabling Trim in itself is highly suspicious). Also as mentioned earlier, disabling Trim will reduce the lifetime of your SSD drive and will significantly impact its performance over time (your laptop will become slower and slower over several months of use until it becomes almost unusable, you will then have to clean the drive and re-install everything). But you must do it to prevent data leaks358 that could allow forensics to defeat your plausible deniability359360. The only way around this at the moment is to have a laptop with a classic HDD drive instead.
+Mandatory if you have an SSD drive and you still want to do this against the recommendation: Disable SSD Trim in Windows353 (again this is NOT recommended at all as disabling Trim in itself is highly suspicious). Also as mentioned earlier, disabling Trim will reduce the lifetime of your SSD drive and will significantly impact its performance over time (your laptop will become slower and slower over several months of use until it becomes almost unusable, you will then have to clean the drive and re-install everything). But you must do it to prevent data leaks354 that could allow forensics to defeat your plausible deniability355356. The only way around this at the moment is to have a laptop with a classic HDD drive instead.
See [Appendix C: Windows Installation Media Creation][306] and go with the USB key route.
Enter a short weak password (yes this is serious, do it, it will be explained later).
Collect some entropy by randomly moving your cursor around until the bar is full
Click Next as the Generated Keys screen
To rescue disk361 or not rescue disk, well that is up to you. We recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.
To rescue disk357 or not rescue disk, well that is up to you. We recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.
Wipe mode: Select 1-Pass just to be safe
Pre-Test your setup. Veracrypt will now reboot your system to test the bootloader before encryption. This test must pass for encryption to go forward.
After your computer rebooted and the test is passed. You will be prompted by Veracrypt to start the encryption process.
Remember Appendix W: Virtualization.
This step and the following steps should be done from within the Host OS. This can either be your Host OS with simple encryption (Windows/Linux/macOS) or your Hidden OS with plausible deniability (Windows only).
-In this route, you will make extensive use of the free Oracle Virtualbox362 software. This is a virtualization software in which you can create Virtual Machines that emulate a computer running a specific OS (if you want to use something else like Xen, Qemu, KVM, or VMWARE, feel free to do so but this part of the guide covers Virtualbox only for convenience).
-So, you should be aware that Virtualbox is not the virtualization software with the best track record in terms of security. Some of the reported issues363 have not been completely fixed to date364. If you are using Linux, and you possess a bit more technical skill, you should consider using KVM instead by following the guide available at Whonix here https://www.whonix.org/wiki/KVM [Archive.org] and here https://www.whonix.org/wiki/KVM#Why_Use_KVM_Over_VirtualBox.3F [Archive.org]
+In this route, you will make extensive use of the free Oracle Virtualbox358 software. This is a virtualization software in which you can create Virtual Machines that emulate a computer running a specific OS (if you want to use something else like Xen, Qemu, KVM, or VMWARE, feel free to do so but this part of the guide covers Virtualbox only for convenience).
+So, you should be aware that Virtualbox is not the virtualization software with the best track record in terms of security. Some of the reported issues359 have not been completely fixed to date360. If you are using Linux, and you possess a bit more technical skill, you should consider using KVM instead by following the guide available at Whonix here https://www.whonix.org/wiki/KVM [Archive.org] and here https://www.whonix.org/wiki/KVM#Why_Use_KVM_Over_VirtualBox.3F [Archive.org]
Some steps should be taken in all cases:
All your sensitive activities will be done from within a guest Virtual Machine running Windows 10/11 Pro (not Home this time), Linux, or macOS.
This has a few advantages that will help you remain anonymous:
@@ -2588,13 +2566,13 @@If an adversary somehow manages to compromise the Tor network too, they will only reveal the IP of a random public Wi-Fi that is not tied to your identity.
If an adversary somehow compromises your VM OS (with malware or an exploit for instance), they will be trapped within the internal Network of Whonix and should be unable to reveal the IP of the public Wi-Fi.
-This solution however has one main drawback to consider: Interference with Tor Stream Isolation365.
+This solution however has one main drawback to consider: Interference with Tor Stream Isolation361.
Stream isolation is a mitigation technique used to prevent some correlation attacks by having different Tor Circuits for each application. Here is an illustration to show what stream isolation is:
(Illustration from Marcelo Martins, https://stakey.club/en/decred-via-tor-network/ [Archive.org])
-VPN/Proxy over Tor falls on the right-side366 meaning using a VPN/Proxy over Tor forces Tor to use one circuit for all activities instead of multiple circuits for each. This means that using a VPN/Proxy over Tor can reduce the effectiveness of Tor in some cases and should therefore be used only for some specific cases:
+VPN/Proxy over Tor falls on the right-side362 meaning using a VPN/Proxy over Tor forces Tor to use one circuit for all activities instead of multiple circuits for each. This means that using a VPN/Proxy over Tor can reduce the effectiveness of Tor in some cases and should therefore be used only for some specific cases:
When your destination service does not allow Tor Exit nodes.
When you do not mind using a shared Tor circuit for various services. For instance, when using various authenticated services.
See Appendix O: Getting an anonymous VPN/Proxy
Skip this step if you cannot use Tor.
-This route will use Virtualization and Whonix367 as part of the anonymization process. Whonix is a Linux distribution composed of two Virtual Machines:
+This route will use Virtualization and Whonix363 as part of the anonymization process. Whonix is a Linux distribution composed of two Virtual Machines:
The Whonix Workstation (this is a VM where you can conduct sensitive activities)
The Whonix Gateway (this VM will establish a connection to the Tor network and route all the network traffic from the Workstation through the Tor network).
You will be able to decide which flavor to use based on my recommendations. We recommend the second one as explained before.
Whonix is well maintained and has extensive and incredibly detailed documentation.
Later, you will create and run several Virtual Machines within Virtualbox for your sensitive activities. Virtualbox provides a feature called “Snapshots”368 that allow for saving the state of a VM at any point in time. If for any reason later you want to go back to that state, you can restore that snapshot at any moment.
+Later, you will create and run several Virtual Machines within Virtualbox for your sensitive activities. Virtualbox provides a feature called “Snapshots”364 that allow for saving the state of a VM at any point in time. If for any reason later you want to go back to that state, you can restore that snapshot at any moment.
I strongly recommend that you do make use of this feature by creating a snapshot after the initial installation/update of each VM. This snapshot should be done before its use for any sensitive/anonymous activity.
-This will allow you to turn your VMs into a kind of disposable “Live Operating Systems” (like Tails discussed earlier). Meaning that you will be able to erase all the traces of your activities within a VM by restoring a Snapshot to an earlier state. Of course, this will not be “as good” as Tails (where everything is stored in memory) as there might be traces of this activity left on your hard disk. Forensics studies have shown the ability to recover data from a reverted VM369. Fortunately, there will be ways to remove those traces after the deletion or reverting to an earlier snapshot. Such techniques will be discussed in the Some additional measures against forensics section of this guide.
+This will allow you to turn your VMs into a kind of disposable “Live Operating Systems” (like Tails discussed earlier). Meaning that you will be able to erase all the traces of your activities within a VM by restoring a Snapshot to an earlier state. Of course, this will not be “as good” as Tails (where everything is stored in memory) as there might be traces of this activity left on your hard disk. Forensics studies have shown the ability to recover data from a reverted VM365. Fortunately, there will be ways to remove those traces after the deletion or reverting to an earlier snapshot. Such techniques will be discussed in the Some additional measures against forensics section of this guide.
You should download a few things within the host OS:
VBoxManage modifyvm "Whonix-Workstation-XFCE" --biossystemtimeoffset -35017
VBoxManage modifyvm "Whonix-Workstation-XFCE" --biossystemtimeoffset +27931
Also, consider applying these mitigations from VirtualBox to mitigate Spectre370/Meltdown371 vulnerabilities by running this command from the VirtualBox Program Directory. All of these are described here: https://www.whonix.org/wiki/Spectre_Meltdown [Archive.org] (be aware these can impact severely the performance of your VMs but should be done for best security).
+Also, consider applying these mitigations from VirtualBox to mitigate Spectre366/Meltdown367 vulnerabilities by running this command from the VirtualBox Program Directory. All of these are described here: https://www.whonix.org/wiki/Spectre_Meltdown [Archive.org] (be aware these can impact severely the performance of your VMs but should be done for best security).
Finally, consider the security advice from Virtualbox themselves here https://www.virtualbox.org/manual/ch13.html [Archive.org]
Skip this step if you do not intend to use Tor over VPN and only intend to use Tor or cannot.
@@ -2875,7 +2853,7 @@Skip this step if you cannot use Tor.
Just use the provided Whonix Workstation VM. It is the safest and most secure way to go on this route.
-It is also the only VM that will provide Stream Isolation pre-configured for most apps by default372.
+It is also the only VM that will provide Stream Isolation pre-configured for most apps by default368.
If you want additional software on the Workstation (such as another Browser), follow their guide here https://www.whonix.org/wiki/Install_Software [Archive.org]
Consider running Whonix in Live Mode if for extra malware protection, See https://www.whonix.org/wiki/Anti-Forensics_Precautions [Archive.org]
Do not forget to apply the VM hardening recommendations here: Virtualbox Hardening recommendations.
@@ -3063,8 +3041,8 @@See why here: Appendix V: What browser to use in your Guest VM/Disposable VM
See Appendix V1: Hardening your Browsers as well.
You will need something to store your data (logins/passwords, identities, and TOTP373 information).
-For this purpose, we strongly recommend KeePassXC because of its integrated TOTP feature. This is the ability to create entries for 2FA374 authentication with the authenticator feature.
+You will need something to store your data (logins/passwords, identities, and TOTP369 information).
+For this purpose, we strongly recommend KeePassXC because of its integrated TOTP feature. This is the ability to create entries for 2FA370 authentication with the authenticator feature.
Remember this should ideally be installed on your Guest VM and not on your Host OS. You should never do any sensitive activities from your Host OS.
Here are the tutorials:
The Best Way: Using an external USB Wi-Fi dongle and just disabling Wi-Fi on the Host OS/Computer.
This way is not supported by the Whonix project375 but I will go ahead and give this option anyway. This is helpful to prevent your Host OS from leaking any information while you are using the Whonix VMs.
+This way is not supported by the Whonix project371 but I will go ahead and give this option anyway. This is helpful to prevent your Host OS from leaking any information while you are using the Whonix VMs.
Note that this option as-is will only work on Wi-Fis without a captive portal (where you must enter some information to unlock access).
The illustration below shows the result of this step:
Note that the guide has been updated to Qubes OS 4.1
As they say on their website, Qubes OS is a reasonably secure, free, open-source, and security-oriented operating system for single-user desktop computing. Qubes OS leverages and extensively uses Xen-based virtualization to allow for the creation and management of isolated compartments called Qubes.
-Qubes OS is not a Linux distribution376 but a Xen distribution. It is different from Linux distributions because it will make extensive use of Virtualization and Compartmentalization so that any app will run in a different VM (Qube). As a bonus, Qubes OS integrates Whonix by default and allows for increased privacy and anonymity. It is highly recommended that you document yourself over Qubes OS principles before going this route. Here are some recommended resources:
+Qubes OS is not a Linux distribution372 but a Xen distribution. It is different from Linux distributions because it will make extensive use of Virtualization and Compartmentalization so that any app will run in a different VM (Qube). As a bonus, Qubes OS integrates Whonix by default and allows for increased privacy and anonymity. It is highly recommended that you document yourself over Qubes OS principles before going this route. Here are some recommended resources:
Qubes OS Introduction, https://www.qubes-os.org/intro/ [Archive.org]
Qubes OS Video Tours, https://www.qubes-os.org/video-tours/ [Archive.org]
If an adversary somehow manages to compromise the Tor network too, they will only reveal the IP of a random public Wi-Fi that is not tied to your identity.
If an adversary somehow compromises your VM OS (with malware or an exploit for instance), they will be trapped within the internal Network of Whonix and should be unable to reveal the IP of the public Wi-Fi.
-This solution however has one main drawback to consider: Interference with Tor Stream Isolation377.
+This solution however has one main drawback to consider: Interference with Tor Stream Isolation373.
Stream isolation is a mitigation technique used to prevent some correlation attacks by having different Tor Circuits for each application. Here is an illustration to show what stream isolation is:
(Illustration from Marcelo Martins, https://stakey.club/en/decred-via-tor-network/ [Archive.org])
-VPN/Proxy over Tor falls on the right-side378 meaning using a VPN/Proxy over Tor forces Tor to use one circuit for all activities instead of multiple circuits for each. This means that using a VPN/Proxy over Tor can reduce the effectiveness of Tor in some cases and should therefore be used only for some specific cases:
+VPN/Proxy over Tor falls on the right-side374 meaning using a VPN/Proxy over Tor forces Tor to use one circuit for all activities instead of multiple circuits for each. This means that using a VPN/Proxy over Tor can reduce the effectiveness of Tor in some cases and should therefore be used only for some specific cases:
When your destination service does not allow Tor Exit nodes.
When you do not mind using a shared Tor circuit for various services. For instance for using various authenticated services.
The Qubes master signing key fingerprint should match 427F 11FD 0FAA 4B08 0123 F01C DDFA 1A3E 3687 9494
.
Remember to read the guide to verifying signatures on the Qubes website: https://www.qubes-os.org/security/verifying-signatures/ [Archive.org].
Unfortunately, Qubes OS does not support hibernation379 which is an issue regarding cold-boot attacks. To mitigate those, I highly recommend that you configure Qubes OS to shut down on any power action (power button, lid closure). You can do set this from the XFCE Power Manager. Do not use the sleep features.
+Unfortunately, Qubes OS does not support hibernation375 which is an issue regarding cold-boot attacks. To mitigate those, I highly recommend that you configure Qubes OS to shut down on any power action (power button, lid closure). You can do set this from the XFCE Power Manager. Do not use the sleep features.
Warning, this step only works with Intel CPUs, a legacy BIOS, TPM 1.2. If you do not meet those requirements, skip this step.
Anti Evil Maid is an implementation of a TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. Installing and using AEM requires attaching a USB drive directly to dom0. So the user must make a choice between protecting dom0 from a potentially malicious USB drive, and protecting the system from Evil Maid attacks. Note that AEM is only compatible with Intel CPUs and Legacy boot options.
@@ -3756,7 +3734,7 @@While Qubes OS is already sandboxing everything by design, it is also useful to consider sandboxing apps themselves using AppArmor or SELinux.
“AppArmor is a Mandatory Access Control framework. When enabled, AppArmor confines programs according to a set of rules that specify what files a given program can access. This initiative-taking approach helps protect the system against both known and unknown vulnerabilities” (Debian.org).
-Basically, AppArmor380 is an application sandboxing system. By default, it is not enabled but supported by Qubes OS.
+Basically, AppArmor376 is an application sandboxing system. By default, it is not enabled but supported by Qubes OS.
About the Fedora VMs:
SELinux381 is similar to AppArmor. The differences between SELinux and AppArmor are technical details into which we will not get.
+SELinux377 is similar to AppArmor. The differences between SELinux and AppArmor are technical details into which we will not get.
Here is a good explanation of what it is: https://www.youtube.com/watch?v=_WOKRaM-HI4 [Invidious]
In this guide and the context of Qubes OS, it is important to mention it as it is the recommended method by Fedora which is one of the default systems on Qubes OS.
So, head out and read https://docs.fedoraproject.org/en-US/quick-docs/getting-started-with-selinux/ [Archive.org]
@@ -4055,8 +4033,8 @@That’s it, you should now have an Android Qube over Tor (or anything else) capable of running pretty much any App you can sideload with ADB. This is, for now, the easiest way to get Android emulation on Qubes OS.
You will need somewhere to store your data (logins/passwords, identities, and TOTP382 information).
-For this purpose, KeePassXC is recommended because of its integrated TOTP feature. This is the ability to create entries for 2FA383 authentication with the authenticator feature.
+You will need somewhere to store your data (logins/passwords, identities, and TOTP378 information).
+For this purpose, KeePassXC is recommended because of its integrated TOTP feature. This is the ability to create entries for 2FA379 authentication with the authenticator feature.
In the context of Qubes OS you should store your sensitive information within the vault Qube:
First, click the Applications icon (upper left) and select the vault Qube.
See their tutorial here: https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-tools41.md [Archive.org]
Correlation is a relationship between two or more variables or attributes. How are attributions determined? During digital forensic and incident response (DFIR), analysts typically look for indicators of compromise (IoCs) following events that call them to act. These indicators usually consist of IP addresses, names, databases; all of which can prescribe a certain behavioral “tag” to an individual or group. This is called attribution. A principal in statistics is that “correlation does not infer causality”. What this means is that, while you may leave certain traces on certain areas of a device or network, that only shows presence of action, i.e., not explicitly your presence. It doesn’t show who you are, it only resolves that something occurred and someone has done something.
-Attribution is required to prove fault or guilt, and is the prime reason why people using the Tor network to access the dark web have been compromised: they left traces that were shown to be connected to their real identities. Your IP can be — but is usually not — a large enough indicator to attribute guilt. This is shown in the infamous NotPetya cyber attacks against the U.S., which were later also released upon Ukraine. Though the White House never said it was Russia’s doing, they attributed the attack to Russia’s (GRU) which is a direct office housing the Russian deniable warfare384 cyber divisions, uncommonly referred to as “spy makers” in the intelligence community (IC).
+Attribution is required to prove fault or guilt, and is the prime reason why people using the Tor network to access the dark web have been compromised: they left traces that were shown to be connected to their real identities. Your IP can be — but is usually not — a large enough indicator to attribute guilt. This is shown in the infamous NotPetya cyber attacks against the U.S., which were later also released upon Ukraine. Though the White House never said it was Russia’s doing, they attributed the attack to Russia’s (GRU) which is a direct office housing the Russian deniable warfare380 cyber divisions, uncommonly referred to as “spy makers” in the intelligence community (IC).
What is the point, you may ask? Well, bluntly speaking, this a perfect example because NotPetya, which is now undoubtedly the work of Russian cyber operations against foreign countries and governments, has still never been formally attributed to Russia, only to a known group within Russia (colloquially dubbed Cozy Bear) which can not be confirmed nor denied given that it is highly compartmentalized within the structure of Russia’s military. And it’s also in part because of the efforts used to disguise itself as a common Ransomware, and because it routinely used the servers of hacked foreign assets not linked to Russia or to its internal networks.
It’s all to show you the lengths that state actors will go to. You may not be aware of it, but foreign governments use concealment techniques such as the ones discussed in the sections of this guide. They routinely use Tor, VPNs to conceal traffic; they use hacked devices and access to stolen equipment to perform cyber espionage every day and it makes attribution incredibly difficult, if not improbable, from a forensic examiner’s point of view. The problem of correlation is trivial, and you can solve it by simply using IP hiding tools such as a VPN and the Tor network, but still be connected to your IRL name and IP through data leaks or other factors. You can not easily be attributed to your activities if you carefully follow and adopt the given techniques and skills discussed below.
(Illustrations by Randall Munroe, xkcd.com, licensed under CC BY-NC 2.5)
-Captcha385 stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” are Turing tests386 puzzles you need to complete before accessing a form/website. You will mostly encounter those provided by Google (reCAPTCHA service387) and Cloudflare (hCaptcha388). hCaptcha is used on 15% of the internet by their own metrics389.
+Captcha381 stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” are Turing tests382 puzzles you need to complete before accessing a form/website. You will mostly encounter those provided by Google (reCAPTCHA service383) and Cloudflare (hCaptcha384). hCaptcha is used on 15% of the internet by their own metrics385.
They are designed to separate bots from humans but are also clearly used to deter anonymous and private users from accessing services.
-If you often use VPNs or Tor, you will quickly encounter many captchas everywhere390. Quite often when using Tor, even if you succeed in solving all the puzzles (sometimes dozens in a row), you will still be denied after solving the puzzles.
+If you often use VPNs or Tor, you will quickly encounter many captchas everywhere386. Quite often when using Tor, even if you succeed in solving all the puzzles (sometimes dozens in a row), you will still be denied after solving the puzzles.
See https://gitlab.torproject.org/legacy/trac/-/wikis/org/doc/ListOfServicesBlockingTor [Archive.org]
-While most people think those puzzles are only about solving a little puzzle, it is important to understand that it is much more complex, and that modern Captchas uses advanced machine learning and risk analysis algorithms to check if you are human391:
+While most people think those puzzles are only about solving a little puzzle, it is important to understand that it is much more complex, and that modern Captchas uses advanced machine learning and risk analysis algorithms to check if you are human387:
They check your browser, cookies, and browsing history using Browser fingerprinting392.
They check your browser, cookies, and browsing history using Browser fingerprinting388.
They track your cursor movements (speed, accuracy) and use algorithms to decide if it is “human/organic”.
They track your behavior before/during/after the tests to ensure you are “human”393.
They track your behavior before/during/after the tests to ensure you are “human”389.
It is also highly likely that those platforms could already reliably identify you based on the unique way you interact with those puzzles. This could work despite obfuscation of your IP address / Browser and clearing all cookies.
Watch for example this DEF CON 25 presentation: DEF CON 25 - Svea Eckert, Andreas Dewes - Dark Data [Invidious]
You will often experience several in a row (sometimes endlessly) and sometimes exceedingly difficult ones involving reading undecipherable characters or identifying various objects on endless pictures sets. You will also have more captchas if you use an ad-blocking system (uBlock for example) or if your account was flagged for any reason for using VPNs or Tor previously.
You will also have (in my experience) more Captchas (Google’s reCAPTCHA) if you do not use a Chromium-based browser. But this can be mitigated by using a Chromium-based browsers such as Brave. There is also a Browser extension called Buster that could help you those https://github.com/dessant/buster [Archive.org].
-As for Cloudflare (hCaptcha), you could also use their Accessibility solution here (https://www.hcaptcha.com/accessibility [Archive.org]) which would allow you to sign-up (with your anonymous identity created later) and set a cookie within your Browser that would allow you to bypass their captchas. Another solution to mitigate hCaptcha would be to use their own solution called “Privacy Pass”394 https://privacypass.github.io/ [Archive.org] in the form of a Browser extension you could install in your VM Browser.
+As for Cloudflare (hCaptcha), you could also use their Accessibility solution here (https://www.hcaptcha.com/accessibility [Archive.org]) which would allow you to sign-up (with your anonymous identity created later) and set a cookie within your Browser that would allow you to bypass their captchas. Another solution to mitigate hCaptcha would be to use their own solution called “Privacy Pass”390 https://privacypass.github.io/ [Archive.org] in the form of a Browser extension you could install in your VM Browser.
You should therefore deal with those carefully and force yourself to alter the way you are solving them (speed/movement/accuracy/…) to prevent “Captcha Fingerprinting”.
Fortunately, as far as we are aware, these are not yet officially/publicly used to de-anonymize users for third parties.
To not have those issues, you should consider using a VPN over Tor. And the best option to avoid those is likely to use a self-hosted VPN/Proxy over Tor on a cash/Monero paid VPS server.
Phone verification is advertised by most platforms to verify you are human. But do not be fooled, the main reason for phone verification is not only to check if you are human but also to be able to de-anonymize you if needed.
-Most platforms (including the privacy-oriented ones such as Signal/Telegram/Proton will require a phone number to register, and most countries now make it mandatory to submit a proof of ID to register395.
+Most platforms (including the privacy-oriented ones such as Signal/Telegram/Proton will require a phone number to register, and most countries now make it mandatory to submit a proof of ID to register391.
Fortunately, this guide explained earlier how to get a number for these cases: Getting an anonymous Phone number.
E-Mail verification is what used to be enough but is not anymore in most cases. What is important to know is that open e-mail providers (disposable e-mail providers for instance) are flagged as much as open proxies (like Tor).
@@ -4154,7 +4132,16 @@The tolerance is much higher with VPNs as they are not considered “open proxies”, but that will not stop many platforms from making them hard to use by forcing increasingly difficult CAPTCHAs on most VPN users.
For this reason, this guide does recommend the use of VPN over Tor (and not Tor over VPN) in certain use cases. Remember that the best option to avoid those is to use a self-hosted VPN/Proxy over Tor on a cash/Monero paid VPS.
Your Browser and Device Fingerprints392 are a set of properties/capabilities of your System/Browser. These are used on most websites for invisible user tracking but also to adapt the website user experience depending on their browser. For instance, websites will be able to provide a “mobile experience” if you are using a mobile browser or propose a specific language/geographic version depending on your fingerprint. Most of those techniques work with recent Browsers like Chromium-based393 browsers (such as Chrome/Edge) or Firefox394 unless taking specific measures. Browser and Device395 Fingerprinting are usually integrated into the Captcha services but also in other various services.
Many platforms (like Google396) will check your browser for various capabilities and settings and block browsers they do not like. This is one of the reasons we recommend using Chromium-based browsers such as Brave Browser over Tor Browser within this VM.
+It should also be noted that while some browsers and extensions will offer some fingerprint resistance, this resistance in itself can also be used to fingerprint you as explained here https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/ [Archive.org]
+This guide will mitigate these issues by randomizing or hiding many of those fingerprinting identifiers by:
+Using Virtualization (See Appendix W: Virtualization);
Using specific recommendations (See Appendix A5: Additional browser precautions with JavaScript enabled;
Using hardening Appendix V1: Hardening your Browsers);
and by using fingerprint-resistant browsers (like Brave or Tor Browser).
Here are some of the things they check within recent browsers:
User-Agent: This is your Browser name and Version.
Find it online at:
Original: https://anonymousplanet.org
Tor Onion Mirror: http://thgtoallkcxrdv37u6knsc3pumk6cq6lqmcqlw3j5vkmyahkxive4jyd.onion
Tor Onion Mirror: http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion
Archive.org: https://web.archive.org/web/https://anonymousplanet.org
Archive.today: https://archive.fo/anonymousplanet.org
Archive.today over Tor: http://archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion/anonymousplanet.org
PDF: https://anonymousplanet.org/export/guide.pdf [Archive.org] [Tor Mirror]
OpenDocument Text (ODT) version at: https://anonymousplanet.org/export/guide.odt [Archive.org] [Tor Mirror]
PDF: https://anonymousplanet.org/export/guide.pdf [Archive.org] [Tor Mirror]
OpenDocument Text (ODT) version at: https://anonymousplanet.org/export/guide.odt [Archive.org] [Tor Mirror]
If you want to compare an older version of the PDF with a newer version, consider these online tools (note that we do not endorse those tools in relation to their privacy policies, but it should not matter since these PDFs are public):
@@ -11272,145 +11259,145 @@ PDF-Redact Tools (L)Magnet Forensics, Magnet AXIOM https://www.magnetforensics.com/products/magnet-axiom/cloud/ [Archive.org]↩
Cellebrite, Unlock cloud-based evidence to solve the case sooner https://www.cellebrite.com/en/ufed-cloud/ [Archive.org]↩
Property of the People, Lawful Access to Secure Messaging Apps Data, https://propertyofthepeople.org/document-detail/?doc-id=21114562 [Archive.org]↩
Wikipedia, Device Fingerprinting https://en.wikipedia.org/wiki/Device_fingerprint [Wikiless] [Archive.org]↩
Chromium Documentation, Technical analysis of client identification mechanisms https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms#TOC-Machine-specific-characteristics [Archive.org]↩
Mozilla Wiki, Fingerprinting https://wiki.mozilla.org/Fingerprinting [Archive.org]↩
Wikipedia, Device Fingerprinting https://en.wikipedia.org/wiki/Device_fingerprint [Wikiless] [Archive.org]↩
Grayshift, https://www.grayshift.com/ [Archive.org]↩
Securephones.io, Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions https://securephones.io/main.pdf [Archive.org]↩
Loup-Vaillant.fr, Rolling Your Own Crypto https://loup-vaillant.fr/articles/rolling-your-own-crypto [Archive.org]↩
Dhole Moments, Crackpot Cryptography and Security Theater https://soatok.blog/2021/02/09/crackpot-cryptography-and-security-theater/ [Archive.org]↩
Vice.com, Why You Don’t Roll Your Own Crypto https://www.vice.com/en/article/wnx8nq/why-you-dont-roll-your-own-crypto [Archive.org]↩
arXiv, MIT, You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries https://arxiv.org/pdf/2107.04940.pdf [Archive.org]↩
YouTube, Great Crypto Failures https://www.youtube.com/watch?v=loy84K3AJ5Q [Invidious]↩
Cryptography Dispatches, The Most Backdoor-Looking Bug I’ve Ever Seen https://buttondown.email/cryptography-dispatches/archive/cryptography-dispatches-the-most-backdoor-looking/ [Archive.org]↩
Citizenlab.ca, Move Fast and Roll Your Own Crypto https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/ [Archive.org]↩
Jack Poon, The myth of military grade encryption https://medium.com/@atcipher/the-myth-of-military-grade-encryption-292313ae6369 [Scribe.rip] [Archive.org]↩
Congruent Labs, Stop calling it “Military-Grade Encryption” https://blog.congruentlabs.co/military-grade-encryption/ [Archive.org]↩
IronCoreLabs Blog, “Military Grade Encryption” https://blog.ironcorelabs.com/military-grade-encryption-69aae0145588 [Archive.org]↩
Wikipedia, BLAKE2, https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE2 [Wikiless] [Archive.org]↩
Wikipedia, AES Instruction Set, https://en.wikipedia.org/wiki/AES_instruction_set [Wikiless] [Archive.org]↩
Wikipedia, ChaCha Variants, https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant [Wikiless] [Archive.org]↩
Wikipedia, Serpent, https://en.wikipedia.org/wiki/Serpent_(cipher) [Wikiless] [Archive.org]↩
Wikipedia, TwoFish, https://en.wikipedia.org/wiki/Twofish [Wikiless] [Archive.org]↩
Lacatora, The PGP Problem https://latacora.singles/2019/07/16/the-pgp-problem.html [Archive.org]↩
Wikipedia, Shor’s Algorithm, https://en.wikipedia.org/wiki/Shor%27s_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Gag Order, https://en.wikipedia.org/wiki/Gag_order [Wikiless] [Archive.org]↩
Wikipedia, National Security Letter https://en.wikipedia.org/wiki/National_security_letter [Wikiless] [Archive.org]↩
ArsTechnica, VPN servers seized by Ukrainian authorities weren’t encrypted https://arstechnica.com/gadgets/2021/07/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted/ [Archive.org]↩
BleepingComputer, DoubleVPN servers, logs, and account info seized by law enforcement https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/ [Archive.org]↩
CyberScoop, Court rules encrypted email provider Tutanota must monitor messages in blackmail case https://www.cyberscoop.com/court-rules-encrypted-email-tutanota-monitor-messages/ [Archive.org]↩
Heise Online (German), https://www.heise.de/news/Gericht-zwingt-Mailprovider-Tutanota-zu-Ueberwachungsfunktion-4972460.html [Archive.org]↩
PCMag, Did PureVPN Cross a Line When It Disclosed User Information? https://www.pcmag.com/opinions/did-purevpn-cross-a-line-when-it-disclosed-user-information [Archive.org]↩
Internet Archive, Wipeyourdata, “No logs” EarthVPN user arrested after police finds logs https://archive.is/XNuVw#selection-230.0-230.1 [Archive.org]↩
Wikipedia, Lavabit Suspension and Gag order, https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order [Wikiless] [Archive.org]↩
Internet Archive, Invisibler, What Everybody Ought to Know About HideMyAss https://archive.is/ag9w4#selection-136.0-136.1↩
Wikipedia, Warrant Canary https://en.wikipedia.org/wiki/Warrant_canary [Wikiless] [Archive.org]↩
Washington Post, The intelligence coup of the century https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/ [Archive.org]↩
Swissinfo.ch, Second Swiss firm allegedly sold encrypted spying devices https://www.swissinfo.ch/eng/second-swiss-firm-allegedly-sold-encrypted-spying-devices/46186432 [Archive.org]↩
Wikipedia, Das Leben der Anderen https://en.wikipedia.org/wiki/The_Lives_of_Others [Wikiless] [Archive.org]↩
Wired, Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets https://www.wired.com/story/air-gap-researcher-mordechai-guri/ [Archive.org]↩
Scientific American, A Blank Wall Can Show How Many People Are in a Room and What They’re Doing https://www.scientificamerican.com/article/a-blank-wall-can-show-how-many-people-are-in-a-room-and-what-theyre-doing/ [Archive.org]↩
Scientific American, A Shiny Snack Bag’s Reflections Can Reconstruct the Room around It https://www.scientificamerican.com/article/a-shiny-snack-bags-reflections-can-reconstruct-the-room-around-it/ [Archive.org]↩
Scientific American, Footstep Sensors Identify People by Gait https://www.scientificamerican.com/article/footstep-sensors-identify-people-by-gait/ [Archive.org]↩
Ben Nassi, Lamphone https://www.nassiben.com/lamphone [Archive.org]↩
The Guardian, Laser spying: is it really practical? https://www.theguardian.com/world/2013/aug/22/gchq-warned-laser-spying-guardian-offices [Archive.org]↩
ArsTechnica, Photos of an NSA “upgrade” factory show Cisco router getting implant https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ [Archive.org]↩
Wikipedia, Zero-trust Security Model https://en.wikipedia.org/wiki/Zero_trust_security_model [Wikiless] [Archive.org]↩
Qubes OS, System Requirements https://www.qubes-os.org/doc/system-requirements/ [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Rubber-hose Cryptanalysis https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis [Archive.org]↩
Defuse.ca, TrueCrypt’s Plausible Deniability is Theoretically Useless https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
Wikipedia, OONI, https://en.wikipedia.org/wiki/OONI [Wikiless] [Archive.org]↩
Privacy International, Timeline of SIM Card Registration Laws https://privacyinternational.org/long-read/3018/timeline-sim-card-registration-laws [Archive.org]↩
NYTimes, Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes https://www.nytimes.com/2021/01/12/technology/bitcoin-passwords-wallets-fortunes.html [Archive.org]↩
Usenix.org, Shedding too much Light on a Microcontroller’s Firmware Protection https://www.usenix.org/system/files/conference/woot17/woot17-paper-obermaier.pdf [Archive.org]↩
TorProject.org, Can I run Tor Browser on an iOS device? https://support.torproject.org/tormobile/tormobile-3/ [Archive.org]↩
Wikipedia, Tails https://en.wikipedia.org/wiki/Tails_(operating_system) [Wikiless] [Archive.org]↩
Vice.com, Facebook Helped the FBI Hack a Child Predator https://www.vice.com/en/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez [Archive.org]↩
XKCD, Security https://xkcd.com/538/ [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Veracrypt Documentation, Trim Operations https://www.veracrypt.fr/en/Trim%20Operation.html [Archive.org]↩
YouTube, 36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPU https://www.youtube.com/watch?v=bKH5nGLgi08&t=2834s [Invidious]↩
Qubes OS, Anti-Evil Maid, https://github.com/QubesOS/qubes-antievilmaid [Archive.org]↩
QubesOS FAQ, https://www.qubes-os.org/faq/#is-secure-boot-supported [Archive.org]↩
Wikipedia, Secure Boot https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#Secure_boot [Wikiless] [Archive.org]↩
Wikipedia, Booting https://en.wikipedia.org/wiki/Booting [Wikiless] [Archive.org]↩
XKCD, Security https://xkcd.com/538/ [Archive.org]↩
Wired, Don’t Want Your Laptop Tampered With? Just Add Glitter Nail Polish https://www.wired.com/2013/12/better-data-security-nail-polish/ [Archive.org]↩
Wikipedia, Virtual Machine https://en.wikipedia.org/wiki/Virtual_machine [Wikiless] [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
PrivacyGuides.org, Don’t use Windows 10 - It’s a privacy nightmare https://web.archive.org/web/20220313023015/https://www.privacyguides.org/tools/#operating-systems#win10 [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
Wikipedia, Key Disclosure Laws https://en.wikipedia.org/wiki/Key_disclosure_law [Wikiless] [Archive.org]↩
GP Digital, World map of encryption laws and policies https://www.gp-digital.org/world-map-of-encryption/ [Archive.org]↩
Wikipedia, Bitlocker https://en.wikipedia.org/wiki/BitLocker [Wikiless] [Archive.org]↩
Wikipedia, Evil Maid Attack https://en.wikipedia.org/wiki/Evil_maid_attack [Wikiless] [Archive.org]↩
Wikipedia, Cold Boot Attack https://en.wikipedia.org/wiki/Cold_boot_attack [Wikiless] [Archive.org]↩
CITP 2008 (https://www.youtube.com/watch?v=JDaicPIgn9U) [Invidious]↩
ResearchGate, Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems https://www.researchgate.net/publication/318155607_Defeating_Plausible_Deniability_of_VeraCrypt_Hidden_Operating_Systems [Archive.org]↩
SANS.org, Mission Implausible: Defeating Plausible Deniability with Digital Forensics https://www.sans.org/reading-room/whitepapers/forensics/mission-implausible-defeating-plausible-deniability-digital-forensics-39500 [Archive.org]↩
SourceForge, Veracrypt Forum https://sourceforge.net/p/veracrypt/discussion/technical/thread/53f33faf/ [Archive.org]↩
Microsoft, BitLocker Countermeasures https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-countermeasures [Archive.org]↩
SANS, Windows ShellBag Forensics in-depth https://www.sans.org/reading-room/whitepapers/forensics/windows-shellbag-forensics-in-depth-34545 [Archive.org]↩
University of York, Forensic data recovery from the Windows Search Database https://eprints.whiterose.ac.uk/75046/1/Forensic_Data_Recovery_From_The_Windows_Search_Database_preprint_DIIN328.pdf [Archive.org]↩
A forensic insight into Windows 10 Jump Lists https://web.archive.org/web/https://cyberforensicator.com/wp-content/uploads/2017/01/1-s2.0-S1742287616300202-main.2-14.pdf [Archive.org]↩
Wikipedia, Gatekeeper https://en.wikipedia.org/wiki/Gatekeeper_(macOS) [Wikiless] [Archive.org]↩
Alpine Linux Wiki, Setting up a laptop https://wiki.alpinelinux.org/wiki/Setting_up_a_laptop [Archive.org]↩
Wikipedia Veracrypt https://en.wikipedia.org/wiki/VeraCrypt [Wikiless] [Archive.org]↩
OSTIF Veracrypt Audit, 2016 https://web.archive.org/web/https://ostif.org/the-veracrypt-audit-results/↩
Veracrypt Documentation, Unencrypted Data in RAM https://www.veracrypt.fr/en/Unencrypted%20Data%20in%20RAM.html [Archive.org]↩
Veracrypt Documentation, Data Leaks https://www.veracrypt.fr/code/VeraCrypt/plain/doc/html/Data%20Leaks.html [Archive.org]↩
Dolos Group, From Stolen Laptop to Inside the Company Network https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network [Archive.org]↩
Trammell Hudson’s Projects, Understanding TPM Sniffing Attacks https://trmm.net/tpm-sniffing/ [Archive.org]↩
Jon Aubrey, attacking laptops that are protected by Microsoft Bitlocker drive encryption https://twitter.com/SecurityJon/status/1445020885472235524 [Nitter]↩
F-Secure Labs, Sniff, there leaks my BitLocker key https://labs.f-secure.com/blog/sniff-there-leaks-my-bitlocker-key/ [Archive.org]↩
Microsoft, BitLocker Countermeasures, Attacker countermeasures https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-countermeasures [Archive.org]↩
Wikipedia, Trim https://en.wikipedia.org/wiki/Trim_(computing) [Wikiless] [Archive.org]↩
Veracrypt Documentation, Trim Operations https://www.veracrypt.fr/en/Trim%20Operation.html [Archive.org]↩
Veracrypt Documentation, Rescue Disk https://www.veracrypt.fr/en/VeraCrypt%20Rescue%20Disk.html [Archive.org]↩
St Cloud State University, Forensic Research on Solid State Drives using Trim Analysis https://web.archive.org//web/20220612095503/https://repository.stcloudstate.edu/cgi/viewcontent.cgi?article=1141&context=msia_etds [Archive.org]↩
WindowsCentral, Trim Tutorial https://www.windowscentral.com/how-ensure-trim-enabled-windows-10-speed-ssd-performance [Archive.org]↩
Veracrypt Documentation, Trim Operation https://veracrypt.eu/en/docs/trim-operation/ [Archive.org]↩
Black Hat 2018, Perfectly Deniable Steganographic Disk Encryption https://i.blackhat.com/eu-18/Thu-Dec-6/eu-18-Schaub-Perfectly-Deniable-Steganographic-Disk-Encryption.pdf [Archive.org]↩
Milan Broz’s Blog, TRIM & dm-crypt … problems? http://asalor.blogspot.com/2011/08/trim-dm-crypt-problems.html [Archive.org]↩
Veracrypt Documentation, Rescue Disk https://www.veracrypt.fr/en/VeraCrypt%20Rescue%20Disk.html [Archive.org]↩
Wikipedia, Virtualbox https://en.wikipedia.org/wiki/VirtualBox [Wikiless] [Archive.org]↩
VirtualBox Ticket 17987 https://www.virtualbox.org/ticket/17987 [Archive.org]↩
Whonix Documentation, Spectre Meltdown https://www.whonix.org/wiki/Spectre_Meltdown#VirtualBox [Archive.org]↩
Whonix Documentation, Stream Isolation https://www.whonix.org/wiki/Stream_Isolation [Archive.org]↩
Whonix Documentation, Tunnels Comparison Table https://www.whonix.org/wiki/Tunnels/Introduction#Comparison_Table [Archive.org]↩
Wikipedia, Whonix https://en.wikipedia.org/wiki/Whonix [Wikiless] [Archive.org]↩
Oracle Virtualbox Manual, Snapshots https://docs.oracle.com/en/virtualization/virtualbox/6.0/user/snapshots.html [Archive.org]↩
Utica College, Forensic Recovery Of Evidence From Deleted Oracle Virtualbox Virtual Machines https://web.archive.org/web/https://programs.online.utica.edu/sites/default/files/Neal_6_Gonnella_Forensic_Recovery_of_Evidence_from_Deleted_Oracle_VirtualBox_Virtual_Machine.pdf↩
Wikipedia, Spectre https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) [Wikiless] [Archive.org]↩
Wikipedia, Meltdown https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) [Wikiless] [Archive.org]↩
Whonix Documentation, Stream Isolation, By Settings https://www.whonix.org/wiki/Stream_Isolation#By_Settings [Archive.org]↩
Wikipedia, TOTP https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Multi-Factor Authentication https://en.wikipedia.org/wiki/Multi-factor_authentication [Wikiless] [Archive.org]↩
Whonix Documentation, Bridged Adapters Warning https://www.whonix.org/wiki/Whonix-Gateway_Security#Warning:_Bridged_Networking [Archive.org]↩
Qubes OS, FAQ, https://www.qubes-os.org/faq/#is-qubes-just-another-linux-distribution [Archive.org]↩
Whonix Documentation, Stream Isolation https://www.whonix.org/wiki/Stream_Isolation [Archive.org]↩
Whonix Documentation, Tunnels Comparison Table https://www.whonix.org/wiki/Tunnels/Introduction#Comparison_Table [Archive.org]↩
Qubes OS Issues, Simulate Hibernation / Suspend-To-Disk (Issue #2414) https://github.com/QubesOS/qubes-issues/issues/2414 [Archive.org]↩
Wikipedia, AppArmor https://en.wikipedia.org/wiki/AppArmor [Wikiless] [Archive.org]↩
Wikipedia, SELinux https://en.wikipedia.org/wiki/Security-Enhanced_Linux [Wikiless] [Archive.org]↩
Wikipedia, TOTP https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Multi-Factor Authentication https://en.wikipedia.org/wiki/Multi-factor_authentication [Wikiless] [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Captcha https://en.wikipedia.org/wiki/CAPTCHA [Wikiless] [Archive.org]↩
Wikipedia, Turing Test https://en.wikipedia.org/wiki/Turing_test [Wikiless] [Archive.org]↩
Google reCAPTCHA https://www.google.com/recaptcha/about/ [Archive.org]↩
hCaptcha https://www.hcaptcha.com/ [Archive.org]↩
hCaptcha, hCaptcha Is Now the Largest Independent CAPTCHA Service, Runs on 15% Of The Internet https://www.hcaptcha.com/post/hcaptcha-now-the-largest-independent-captcha-service [Archive.org]↩
Nearcyan.com, You (probably) don’t need ReCAPTCHA https://nearcyan.com/you-probably-dont-need-recaptcha/ [Archive.org]↩
ArsTechnica, “Google’s reCAPTCHA turns”invisible," will separate bots from people without challenges" https://arstechnica.com/gadgets/2017/03/googles-recaptcha-announces-invisible-background-captchas/ [Archive.org]↩
BlackHat Asia 2016, “I’m not a human: Breaking the Google reCAPTCHA” https://www.blackhat.com/docs/asia-16/materials/asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA-wp.pdf [Archive.org]↩
Google Blog https://security.googleblog.com/2014/12/are-you-robot-introducing-no-captcha.html [Archive.org]↩
Cloudflare Blog, Cloudflare supports Privacy Pass https://blog.cloudflare.com/cloudflare-supports-privacy-pass/ [Archive.org]↩
Privacy International, Timeline of SIM Card Registration Laws https://privacyinternational.org/long-read/3018/timeline-sim-card-registration-laws [Archive.org]↩
Grayshift, https://www.grayshift.com/ [Archive.org]↩
Securephones.io, Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions https://securephones.io/main.pdf [Archive.org]↩
Loup-Vaillant.fr, Rolling Your Own Crypto https://loup-vaillant.fr/articles/rolling-your-own-crypto [Archive.org]↩
Dhole Moments, Crackpot Cryptography and Security Theater https://soatok.blog/2021/02/09/crackpot-cryptography-and-security-theater/ [Archive.org]↩
Vice.com, Why You Don’t Roll Your Own Crypto https://www.vice.com/en/article/wnx8nq/why-you-dont-roll-your-own-crypto [Archive.org]↩
arXiv, MIT, You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries https://arxiv.org/pdf/2107.04940.pdf [Archive.org]↩
YouTube, Great Crypto Failures https://www.youtube.com/watch?v=loy84K3AJ5Q [Invidious]↩
Cryptography Dispatches, The Most Backdoor-Looking Bug I’ve Ever Seen https://buttondown.email/cryptography-dispatches/archive/cryptography-dispatches-the-most-backdoor-looking/ [Archive.org]↩
Citizenlab.ca, Move Fast and Roll Your Own Crypto https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/ [Archive.org]↩
Jack Poon, The myth of military grade encryption https://medium.com/@atcipher/the-myth-of-military-grade-encryption-292313ae6369 [Scribe.rip] [Archive.org]↩
Congruent Labs, Stop calling it “Military-Grade Encryption” https://blog.congruentlabs.co/military-grade-encryption/ [Archive.org]↩
IronCoreLabs Blog, “Military Grade Encryption” https://blog.ironcorelabs.com/military-grade-encryption-69aae0145588 [Archive.org]↩
Wikipedia, BLAKE2, https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE2 [Wikiless] [Archive.org]↩
Wikipedia, AES Instruction Set, https://en.wikipedia.org/wiki/AES_instruction_set [Wikiless] [Archive.org]↩
Wikipedia, ChaCha Variants, https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant [Wikiless] [Archive.org]↩
Wikipedia, Serpent, https://en.wikipedia.org/wiki/Serpent_(cipher) [Wikiless] [Archive.org]↩
Wikipedia, TwoFish, https://en.wikipedia.org/wiki/Twofish [Wikiless] [Archive.org]↩
Lacatora, The PGP Problem https://latacora.singles/2019/07/16/the-pgp-problem.html [Archive.org]↩
Wikipedia, Shor’s Algorithm, https://en.wikipedia.org/wiki/Shor%27s_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Gag Order, https://en.wikipedia.org/wiki/Gag_order [Wikiless] [Archive.org]↩
Wikipedia, National Security Letter https://en.wikipedia.org/wiki/National_security_letter [Wikiless] [Archive.org]↩
ArsTechnica, VPN servers seized by Ukrainian authorities weren’t encrypted https://arstechnica.com/gadgets/2021/07/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted/ [Archive.org]↩
BleepingComputer, DoubleVPN servers, logs, and account info seized by law enforcement https://www.bleepingcomputer.com/news/security/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement/ [Archive.org]↩
CyberScoop, Court rules encrypted email provider Tutanota must monitor messages in blackmail case https://www.cyberscoop.com/court-rules-encrypted-email-tutanota-monitor-messages/ [Archive.org]↩
Heise Online (German), https://www.heise.de/news/Gericht-zwingt-Mailprovider-Tutanota-zu-Ueberwachungsfunktion-4972460.html [Archive.org]↩
PCMag, Did PureVPN Cross a Line When It Disclosed User Information? https://www.pcmag.com/opinions/did-purevpn-cross-a-line-when-it-disclosed-user-information [Archive.org]↩
Internet Archive, Wipeyourdata, “No logs” EarthVPN user arrested after police finds logs https://archive.is/XNuVw#selection-230.0-230.1 [Archive.org]↩
Wikipedia, Lavabit Suspension and Gag order, https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order [Wikiless] [Archive.org]↩
Internet Archive, Invisibler, What Everybody Ought to Know About HideMyAss https://archive.is/ag9w4#selection-136.0-136.1↩
Wikipedia, Warrant Canary https://en.wikipedia.org/wiki/Warrant_canary [Wikiless] [Archive.org]↩
Washington Post, The intelligence coup of the century https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/ [Archive.org]↩
Swissinfo.ch, Second Swiss firm allegedly sold encrypted spying devices https://www.swissinfo.ch/eng/second-swiss-firm-allegedly-sold-encrypted-spying-devices/46186432 [Archive.org]↩
Wikipedia, Das Leben der Anderen https://en.wikipedia.org/wiki/The_Lives_of_Others [Wikiless] [Archive.org]↩
Wired, Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets https://www.wired.com/story/air-gap-researcher-mordechai-guri/ [Archive.org]↩
Scientific American, A Blank Wall Can Show How Many People Are in a Room and What They’re Doing https://www.scientificamerican.com/article/a-blank-wall-can-show-how-many-people-are-in-a-room-and-what-theyre-doing/ [Archive.org]↩
Scientific American, A Shiny Snack Bag’s Reflections Can Reconstruct the Room around It https://www.scientificamerican.com/article/a-shiny-snack-bags-reflections-can-reconstruct-the-room-around-it/ [Archive.org]↩
Scientific American, Footstep Sensors Identify People by Gait https://www.scientificamerican.com/article/footstep-sensors-identify-people-by-gait/ [Archive.org]↩
Ben Nassi, Lamphone https://www.nassiben.com/lamphone [Archive.org]↩
The Guardian, Laser spying: is it really practical? https://www.theguardian.com/world/2013/aug/22/gchq-warned-laser-spying-guardian-offices [Archive.org]↩
ArsTechnica, Photos of an NSA “upgrade” factory show Cisco router getting implant https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ [Archive.org]↩
Wikipedia, Zero-trust Security Model https://en.wikipedia.org/wiki/Zero_trust_security_model [Wikiless] [Archive.org]↩
Qubes OS, System Requirements https://www.qubes-os.org/doc/system-requirements/ [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Rubber-hose Cryptanalysis https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis [Archive.org]↩
Defuse.ca, TrueCrypt’s Plausible Deniability is Theoretically Useless https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
Wikipedia, OONI, https://en.wikipedia.org/wiki/OONI [Wikiless] [Archive.org]↩
Privacy International, Timeline of SIM Card Registration Laws https://privacyinternational.org/long-read/3018/timeline-sim-card-registration-laws [Archive.org]↩
NYTimes, Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes https://www.nytimes.com/2021/01/12/technology/bitcoin-passwords-wallets-fortunes.html [Archive.org]↩
Usenix.org, Shedding too much Light on a Microcontroller’s Firmware Protection https://www.usenix.org/system/files/conference/woot17/woot17-paper-obermaier.pdf [Archive.org]↩
TorProject.org, Can I run Tor Browser on an iOS device? https://support.torproject.org/tormobile/tormobile-3/ [Archive.org]↩
Wikipedia, Tails https://en.wikipedia.org/wiki/Tails_(operating_system) [Wikiless] [Archive.org]↩
Vice.com, Facebook Helped the FBI Hack a Child Predator https://www.vice.com/en/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez [Archive.org]↩
XKCD, Security https://xkcd.com/538/ [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Veracrypt Documentation, Trim Operations https://www.veracrypt.fr/en/Trim%20Operation.html [Archive.org]↩
YouTube, 36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPU https://www.youtube.com/watch?v=bKH5nGLgi08&t=2834s [Invidious]↩
Qubes OS, Anti-Evil Maid, https://github.com/QubesOS/qubes-antievilmaid [Archive.org]↩
QubesOS FAQ, https://www.qubes-os.org/faq/#is-secure-boot-supported [Archive.org]↩
Wikipedia, Secure Boot https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#Secure_boot [Wikiless] [Archive.org]↩
Wikipedia, Booting https://en.wikipedia.org/wiki/Booting [Wikiless] [Archive.org]↩
XKCD, Security https://xkcd.com/538/ [Archive.org]↩
Wired, Don’t Want Your Laptop Tampered With? Just Add Glitter Nail Polish https://www.wired.com/2013/12/better-data-security-nail-polish/ [Archive.org]↩
Wikipedia, Virtual Machine https://en.wikipedia.org/wiki/Virtual_machine [Wikiless] [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
PrivacyGuides.org, Don’t use Windows 10 - It’s a privacy nightmare https://web.archive.org/web/20220313023015/https://www.privacyguides.org/tools/#operating-systems#win10 [Archive.org]↩
Wikipedia, Deniable Encryption https://en.wikipedia.org/wiki/Deniable_encryption [Wikiless] [Archive.org]↩
Wikipedia, Key Disclosure Laws https://en.wikipedia.org/wiki/Key_disclosure_law [Wikiless] [Archive.org]↩
GP Digital, World map of encryption laws and policies https://www.gp-digital.org/world-map-of-encryption/ [Archive.org]↩
Wikipedia, Bitlocker https://en.wikipedia.org/wiki/BitLocker [Wikiless] [Archive.org]↩
Wikipedia, Evil Maid Attack https://en.wikipedia.org/wiki/Evil_maid_attack [Wikiless] [Archive.org]↩
Wikipedia, Cold Boot Attack https://en.wikipedia.org/wiki/Cold_boot_attack [Wikiless] [Archive.org]↩
CITP 2008 (https://www.youtube.com/watch?v=JDaicPIgn9U) [Invidious]↩
ResearchGate, Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems https://www.researchgate.net/publication/318155607_Defeating_Plausible_Deniability_of_VeraCrypt_Hidden_Operating_Systems [Archive.org]↩
SANS.org, Mission Implausible: Defeating Plausible Deniability with Digital Forensics https://www.sans.org/reading-room/whitepapers/forensics/mission-implausible-defeating-plausible-deniability-digital-forensics-39500 [Archive.org]↩
SourceForge, Veracrypt Forum https://sourceforge.net/p/veracrypt/discussion/technical/thread/53f33faf/ [Archive.org]↩
Microsoft, BitLocker Countermeasures https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-countermeasures [Archive.org]↩
SANS, Windows ShellBag Forensics in-depth https://www.sans.org/reading-room/whitepapers/forensics/windows-shellbag-forensics-in-depth-34545 [Archive.org]↩
University of York, Forensic data recovery from the Windows Search Database https://eprints.whiterose.ac.uk/75046/1/Forensic_Data_Recovery_From_The_Windows_Search_Database_preprint_DIIN328.pdf [Archive.org]↩
A forensic insight into Windows 10 Jump Lists https://web.archive.org/web/https://cyberforensicator.com/wp-content/uploads/2017/01/1-s2.0-S1742287616300202-main.2-14.pdf [Archive.org]↩
Wikipedia, Gatekeeper https://en.wikipedia.org/wiki/Gatekeeper_(macOS) [Wikiless] [Archive.org]↩
Alpine Linux Wiki, Setting up a laptop https://wiki.alpinelinux.org/wiki/Setting_up_a_laptop [Archive.org]↩
Wikipedia Veracrypt https://en.wikipedia.org/wiki/VeraCrypt [Wikiless] [Archive.org]↩
OSTIF Veracrypt Audit, 2016 https://web.archive.org/web/https://ostif.org/the-veracrypt-audit-results/↩
Veracrypt Documentation, Unencrypted Data in RAM https://www.veracrypt.fr/en/Unencrypted%20Data%20in%20RAM.html [Archive.org]↩
Veracrypt Documentation, Data Leaks https://www.veracrypt.fr/code/VeraCrypt/plain/doc/html/Data%20Leaks.html [Archive.org]↩
Dolos Group, From Stolen Laptop to Inside the Company Network https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network [Archive.org]↩
Trammell Hudson’s Projects, Understanding TPM Sniffing Attacks https://trmm.net/tpm-sniffing/ [Archive.org]↩
Jon Aubrey, attacking laptops that are protected by Microsoft Bitlocker drive encryption https://twitter.com/SecurityJon/status/1445020885472235524 [Nitter]↩
F-Secure Labs, Sniff, there leaks my BitLocker key https://labs.f-secure.com/blog/sniff-there-leaks-my-bitlocker-key/ [Archive.org]↩
Microsoft, BitLocker Countermeasures, Attacker countermeasures https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-countermeasures [Archive.org]↩
Wikipedia, Trim https://en.wikipedia.org/wiki/Trim_(computing) [Wikiless] [Archive.org]↩
Veracrypt Documentation, Trim Operations https://www.veracrypt.fr/en/Trim%20Operation.html [Archive.org]↩
Veracrypt Documentation, Rescue Disk https://www.veracrypt.fr/en/VeraCrypt%20Rescue%20Disk.html [Archive.org]↩
St Cloud State University, Forensic Research on Solid State Drives using Trim Analysis https://web.archive.org//web/20220612095503/https://repository.stcloudstate.edu/cgi/viewcontent.cgi?article=1141&context=msia_etds [Archive.org]↩
WindowsCentral, Trim Tutorial https://www.windowscentral.com/how-ensure-trim-enabled-windows-10-speed-ssd-performance [Archive.org]↩
Veracrypt Documentation, Trim Operation https://veracrypt.eu/en/docs/trim-operation/ [Archive.org]↩
Black Hat 2018, Perfectly Deniable Steganographic Disk Encryption https://i.blackhat.com/eu-18/Thu-Dec-6/eu-18-Schaub-Perfectly-Deniable-Steganographic-Disk-Encryption.pdf [Archive.org]↩
Milan Broz’s Blog, TRIM & dm-crypt … problems? http://asalor.blogspot.com/2011/08/trim-dm-crypt-problems.html [Archive.org]↩
Veracrypt Documentation, Rescue Disk https://www.veracrypt.fr/en/VeraCrypt%20Rescue%20Disk.html [Archive.org]↩
Wikipedia, Virtualbox https://en.wikipedia.org/wiki/VirtualBox [Wikiless] [Archive.org]↩
VirtualBox Ticket 17987 https://www.virtualbox.org/ticket/17987 [Archive.org]↩
Whonix Documentation, Spectre Meltdown https://www.whonix.org/wiki/Spectre_Meltdown#VirtualBox [Archive.org]↩
Whonix Documentation, Stream Isolation https://www.whonix.org/wiki/Stream_Isolation [Archive.org]↩
Whonix Documentation, Tunnels Comparison Table https://www.whonix.org/wiki/Tunnels/Introduction#Comparison_Table [Archive.org]↩
Wikipedia, Whonix https://en.wikipedia.org/wiki/Whonix [Wikiless] [Archive.org]↩
Oracle Virtualbox Manual, Snapshots https://docs.oracle.com/en/virtualization/virtualbox/6.0/user/snapshots.html [Archive.org]↩
Utica College, Forensic Recovery Of Evidence From Deleted Oracle Virtualbox Virtual Machines https://web.archive.org/web/https://programs.online.utica.edu/sites/default/files/Neal_6_Gonnella_Forensic_Recovery_of_Evidence_from_Deleted_Oracle_VirtualBox_Virtual_Machine.pdf↩
Wikipedia, Spectre https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) [Wikiless] [Archive.org]↩
Wikipedia, Meltdown https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) [Wikiless] [Archive.org]↩
Whonix Documentation, Stream Isolation, By Settings https://www.whonix.org/wiki/Stream_Isolation#By_Settings [Archive.org]↩
Wikipedia, TOTP https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Multi-Factor Authentication https://en.wikipedia.org/wiki/Multi-factor_authentication [Wikiless] [Archive.org]↩
Whonix Documentation, Bridged Adapters Warning https://www.whonix.org/wiki/Whonix-Gateway_Security#Warning:_Bridged_Networking [Archive.org]↩
Qubes OS, FAQ, https://www.qubes-os.org/faq/#is-qubes-just-another-linux-distribution [Archive.org]↩
Whonix Documentation, Stream Isolation https://www.whonix.org/wiki/Stream_Isolation [Archive.org]↩
Whonix Documentation, Tunnels Comparison Table https://www.whonix.org/wiki/Tunnels/Introduction#Comparison_Table [Archive.org]↩
Qubes OS Issues, Simulate Hibernation / Suspend-To-Disk (Issue #2414) https://github.com/QubesOS/qubes-issues/issues/2414 [Archive.org]↩
Wikipedia, AppArmor https://en.wikipedia.org/wiki/AppArmor [Wikiless] [Archive.org]↩
Wikipedia, SELinux https://en.wikipedia.org/wiki/Security-Enhanced_Linux [Wikiless] [Archive.org]↩
Wikipedia, TOTP https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm [Wikiless] [Archive.org]↩
Wikipedia, Multi-Factor Authentication https://en.wikipedia.org/wiki/Multi-factor_authentication [Wikiless] [Archive.org]↩
Wikipedia, Plausible Deniability https://en.wikipedia.org/wiki/Plausible_deniability [Wikiless] [Archive.org]↩
Wikipedia, Captcha https://en.wikipedia.org/wiki/CAPTCHA [Wikiless] [Archive.org]↩
Wikipedia, Turing Test https://en.wikipedia.org/wiki/Turing_test [Wikiless] [Archive.org]↩
Google reCAPTCHA https://www.google.com/recaptcha/about/ [Archive.org]↩
hCaptcha https://www.hcaptcha.com/ [Archive.org]↩
hCaptcha, hCaptcha Is Now the Largest Independent CAPTCHA Service, Runs on 15% Of The Internet https://www.hcaptcha.com/post/hcaptcha-now-the-largest-independent-captcha-service [Archive.org]↩
Nearcyan.com, You (probably) don’t need ReCAPTCHA https://nearcyan.com/you-probably-dont-need-recaptcha/ [Archive.org]↩
ArsTechnica, “Google’s reCAPTCHA turns”invisible," will separate bots from people without challenges" https://arstechnica.com/gadgets/2017/03/googles-recaptcha-announces-invisible-background-captchas/ [Archive.org]↩
BlackHat Asia 2016, “I’m not a human: Breaking the Google reCAPTCHA” https://www.blackhat.com/docs/asia-16/materials/asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA-wp.pdf [Archive.org]↩
Google Blog https://security.googleblog.com/2014/12/are-you-robot-introducing-no-captcha.html [Archive.org]↩
Cloudflare Blog, Cloudflare supports Privacy Pass https://blog.cloudflare.com/cloudflare-supports-privacy-pass/ [Archive.org]↩
Privacy International, Timeline of SIM Card Registration Laws https://privacyinternational.org/long-read/3018/timeline-sim-card-registration-laws [Archive.org]↩
Wikipedia, Device Fingerprinting https://en.wikipedia.org/wiki/Device_fingerprint [Wikiless] [Archive.org]↩
Chromium Documentation, Technical analysis of client identification mechanisms https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms#TOC-Machine-specific-characteristics [Archive.org]↩
Mozilla Wiki, Fingerprinting https://wiki.mozilla.org/Fingerprinting [Archive.org]↩
Wikipedia, Device Fingerprinting https://en.wikipedia.org/wiki/Device_fingerprint [Wikiless] [Archive.org]↩
Developers Google Blog, Guidance to developers affected by our effort to block less secure browsers and applications https://developers.googleblog.com/2020/08/guidance-for-our-effort-to-block-less-secure-browser-and-apps.html [Archive.org]↩
Wikipedia, KYC https://en.wikipedia.org/wiki/Know_your_customer [Wikiless] [Archive.org]↩
Google Help, Access age-restricted content & features https://support.google.com/accounts/answer/10071085 [Archive.org]↩