Merge branch 'master' into master

This commit is contained in:
Than Harrison 2023-03-01 08:25:35 +00:00 committed by GitHub
commit 49a59294ae
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
48 changed files with 265 additions and 204 deletions

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qogAKCRAoXmBIoSMh
srpJAQCg9TzE218u6W/xI0SthuEk0hljA4xGzFmEj6jY+H5m3QEAlSS5X+Qxy8VA
k5Pek03QA3Qi/S6Yfs2sx47sMWLV0gc=
=wah1
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuqwAKCRAoXmBIoSMh
sg/pAP41GXmVMmtTTzfWctCs+NCRELl0A2M+ZGzfBTmjtoEL3AD/QUvYw7BWLOgG
xlW7JXqZnxC0kqkGF1NSN1PBfCh0Fg4=
=k/RM
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/uYQLfVUTQJwY8AJnYU53jjfwMOYSWRRDYp20ztw9LMZgeEiV1E57YSdOSgJD4/MNQegzWy/M/NPsmOZq65c2wQ=
trusted comment: timestamp:1674488483 file:CHANGELOG.md hashed
cU75vksVmmTUfcyFVS3kLCHT6LkZgq7SL3ipvI+Ek+oH/ArXnd0SAvy0bo4sB50PoaZY+vJ9mi8zidXfpNvyAw==
trusted comment: timestamp:1674915500 file:CHANGELOG.md hashed
IvBZif4H4jdpQSYNaAViYPeQ1MdmcB2R9t5IJ2u8pJGFwfpr74sy4W2fX9OHnY4MdVwExOnX52j3T/moKeXeDQ==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qowAKCRAoXmBIoSMh
shynAP0b1F63EI0IaQtjr+uwNyhNE/xRsh1usuZPTEuwxV6vNgEAzo2RDEZNECGe
j3pfRTkkGkqBcJqoreGXP8HZripoiQg=
=pOpU
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UurAAKCRAoXmBIoSMh
srh0AQDPXn9Mhh1tl1dryy1SHruYQY6Q5VnrJbCRFOvnfRFfQAEAg2iqlnqT7Fi9
ZH0E7jWFR11zyh+7Shw4k2cuRjtpigE=
=F0EQ
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/gD5vCC8/YFdUVxQVvGfr4Far0rKgyq8NvpyWOyv7OniMR0H1cROxjbaNwDGKi40AIpnb4DxlLhGLB9vXxAk4Qo=
trusted comment: timestamp:1674488485 file:CODE_OF_CONDUCT.md hashed
ig24wAj29T0QE9bYY6Q189r7eXnDEY6znZnnS+8CSajDMqW7vpJughZ3jYypDHE5VHRjCh+20euIfBT+DrQkDA==
trusted comment: timestamp:1674915502 file:CODE_OF_CONDUCT.md hashed
0w2okHsqd4NAQGPjnx0v3abyluHHM5dzjg91Dtk+dVKn2PIwmUuiUs/opri7Hijyl1xOD1c8HXLP6P0y9suWDA==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qpQAKCRAoXmBIoSMh
sp8KAP0T/023vjncxEcIXdE27u9mPP34iOWBXgh0DfGIQiB32AD/SxOziO2EI0nR
v4FiEghZpDuo/zCtjTfDKg4NZ11tLAI=
=oRcd
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UurgAKCRAoXmBIoSMh
slbYAQCEBa6opa9rOG2FAy10ixSoiPq+EEK7u4Lli21g7BHylAD/evKvGJeJnUEy
CftZqjMMNjC4nevkvqfbGTub3Zt3Uwo=
=8kz2
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/tV9Fy2nTvAb4k8umjfk+y6Bpi6z4nOEGBCAm1VfwbmjJF5Kpe9aU0bZtncMMN7vZXi+kYrvUuVG18ZECx8pRg4=
trusted comment: timestamp:1674488486 file:CONTRIBUTING.md hashed
FteL9pZ8NAvvaoQDivO/hd33CvuGZHF5wKCUe1aGu+KS5HcalNN0Z/NZR2+f1w1BQjXz3Qe1RPuRefnOTe4WDg==
trusted comment: timestamp:1674915503 file:CONTRIBUTING.md hashed
334o5be7/MYvgDUZUdvnIvXlBp71jFx/nwcx0VIBJbVplkOZ4p4WC0CAq+b/2AH2N5ZEUKEN4EwVYXxl4cEBDw==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qpgAKCRAoXmBIoSMh
ssKxAP9BKPff8S7ipzAwssvPsY4IMTjGYoHBgOUBR1xkSXA2kQD/dj/BN/dnmT25
R0qTdR3WKsoiv2AUzYo85sJeLVYYRQg=
=V4X+
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UurwAKCRAoXmBIoSMh
svxAAP9HP5nD/TIeIFhXNNpX5/fZbx2JSGEGA1FzFnWZYDwN5AD5AVRsNOAx1vGQ
Nc9lUzF92+iB10g8ZunWVbnXHqEmMQ8=
=AuxW
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/gEdIFDRsGwF2xuLoX64+PcxRZHg0mT+M3d5ZBNe4iv6jUdYpoFpY6Ba2Ny2jTxhLq8lbu4IsvRsBxMSvCdipQE=
trusted comment: timestamp:1674488488 file:KEY_ROTATION.md hashed
wMIr9c2xkYZy0crct/ULChlvikqpKDtnE9KzmZn71U9ZxsSR8G82QWT3At48hbUz3SyR3WEsBpEhbGzi/vwDCg==
trusted comment: timestamp:1674915505 file:KEY_ROTATION.md hashed
NRx9jIPcZ7Rb3WIhhhoGhM6YJXum5cnfFElD+SKcUpVLavBCZ23uw++MkFpt+gtHigWDXMpSPUj+NXMezzSzDA==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qqAAKCRAoXmBIoSMh
skZdAQCbDwO/kZXqOVNqBtCTU8mHCdoa3ShbaGESyO2pfIsZxAEA+9GxWvmUqKi8
+mkFFFoCEVcz99KINrFRy/wJc8ZkFgE=
=qe4V
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UusQAKCRAoXmBIoSMh
ssd9AQCHkSSR5IfVDbYjVoq7ef1Ru8X6dWEDNG2LE3jvT+WkbwEA6FKdjqCsUNPe
n5ltacCnYPe0Cc82Jh7jQIOlYwpWaQE=
=b9Mn
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/gAzBQtyzCamju84eebs9pmkibZyZu3dRxd3LrTgZgknkRyjTMx8clMYRpHl1l7XCqCROtQU8r+zSXd79xFgFQc=
trusted comment: timestamp:1674488489 file:LICENSE.md hashed
yJr8HSH+l5Ogr/Fg8+OtkrN2Kti67zpWMwIpYtSrw2GMHguwJ2KaWdw50sGVQS4zU09dH3GvrJMIZuWDxx0sBA==
trusted comment: timestamp:1674915506 file:LICENSE.md hashed
mTvYSDa/IoabpOOqkbb27UTe9HDBdo9l8Mz+W2G1BcL6f2kviAZsi1yjErXOL91kwTJw+V4gFWK0+p6sfvdoCQ==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qqQAKCRAoXmBIoSMh
ssreAP0V5BtkIixfjUTZ7S4cvzoQb6t5OHCCYL6LeRCsHj1BhAD7BKr+1f97jFl6
U/5hKGMTKux0bWkzeZA1r+nSL26N5wQ=
=bm2v
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UusgAKCRAoXmBIoSMh
suVoAP9FMLpW9zkNPjggu/Dkg3Hf2jWhRfkEZUbPshLS/TKADwD/Twx/YSWg4H6F
hQuKR3vlVAcQlw7Gy+N9PWwfT/sJVw8=
=WGTE
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/uT7Mx6SWYXM7lEt4cBUizxeTsrgaWWQgWM4DBq3U8c8Olq3BaK6g+HQomBNcXYpBHllpi166rSByfSXkRF9uw8=
trusted comment: timestamp:1674488491 file:README.md hashed
slAKJYYIbwmG/I52MPN6Feg/VODQFi97Wpi7EZRVn4YaMb6ahzflRWfN5Fo1IdOxJjnvoQtkkSPf4jHmxArYCA==
trusted comment: timestamp:1674915508 file:README.md hashed
FkTKjM7Itr7dZ4o5cryXzu4AuE6u2ysmxHoVJRT41ELlV8QlJHpgyUfhVx3wuO0pKq1wVDlNQey75EyX4LlDAw==

View File

@ -26,6 +26,7 @@ github:
links_url: links.html
twitter_url: https://anonymousplanet.org/twitter.html
mastodon_url: https://mastodon.social/@anonymousplanet
constitution_url: constitution.html
tor_mirror_url: http://thgtoa27ujspeqxasrfvcf5aozqdczvgmwgorrmblh6jn4nino3spcqd.onion
defaults:
-

View File

@ -167,6 +167,9 @@ input:checked + .slider::before {
<!-- <a href="{{ site.github.odt_url }}" class="btn_small">OpenDocument</a>-->
{% if page.url != "/donations.html" %}
<a href="{{ site.github.donations_url }}" class="btn_small">Donate</a>
{% endif %}
{% if page.url != "/constitution.html" %}
<a href="{{ site.github.constitution_url }}" class="btn_small">Constitution</a>
{% endif %}
<a href="{{ site.github.repository_url }}" target="_blank" class="btn_small">Repository</a>
<!--<a href="{{ site.github.keyoxide_url }}" target="_blank" class="btn_small">Keyoxide</a>-->

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qqwAKCRAoXmBIoSMh
svE5AP9FRmMUaWFWtpFcFA6Z9QTl5T54IeBPzMjZkt3db2rw1gEA0xUExGmmZGDR
PKqgCi8PIhxn2rIQ5m9EeClWrRbTmgs=
=thVR
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UutAAKCRAoXmBIoSMh
snExAQCeu68fM+uWRhbcSNSj7CMJG6GLrXE04CayYJtCkoOxjQD/VtkzQmjRr1rf
Lq4YpXkzcAIzdkcaFLSTa8KIpux5Qgk=
=Afox
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/jPGLG4VcZ5au6he/dAI4GTaWrTiWJEdqbaCxJHxOsczmmoIPZyrXjl8lSwWc+cQ4Lh5wh/OWuK79IY/6lGhVws=
trusted comment: timestamp:1674488492 file:about.md hashed
Kc1xVVmPFgkMIJ1kQVwQPoE+3eMh40e8pFQ/qk4XB3GGMaTlVe4frEExBtUDpGZn64BOCi+9G0/lk0VrRetRAg==
trusted comment: timestamp:1674915509 file:about.md hashed
jjkZ1ulacVVTvRmhpnCOdWnvRrhMjSvrh+tecYJMAaOKuVykVvwQCWYY1+juOWuUOC7+XueyY4V9446/YUyMCQ==

View File

@ -7,6 +7,7 @@ c880a19cd5e8659fe88f2dd3835c7a13ced1d894ff0a708b0d0e09b9956bcc2e8a080ff0dfcc4ae3
51f8fb376233f1c8930a0540bcd169c389e8ef35aff8bc1fee98ac41811dd27be9897e81887ded7fc83f139e78bb6842dc1acc8b3d1214a4a49ca88c1e48abac about.md
26196d7b81bb79c8dc290a98204e3d416e887552ec68b0de4bbe2f17bcc11fe8e3dfccc7f210a72ddecba2eecfa2e33ceaf57f4b0c3061230d62b805e8228f79 briar.md
891592dbb81e072fbce58e5772a3a2c9194f1eece192ac24c590c82d1446abfc6b35962ccf5b3e5b52c1a4ec685416f25737a9cca210b558a1bc43d3afa1384e chatrooms-rules.md
0f1ade686710eae78be9d2ac09f8249399994b4e73d37e8d0893cff9d58ba93dc38eb5ffb912744aa1318508449ed7a11661af99e778f0d800f5b11ced4fbd2c constitution.md
5a0a6f7e1df8e6965606d12e6763c86c96adb023df120c0a71e631f2ad44fcd9057c84f793411f71e6b5366a84fe583def86729f0863d0e3a0f083d228f37850 donations.md
07577f215d80fad83eed5657cc53e377944cfe58c38541138419142244e3c5fce736afa1a1950eaade93dbdd125f30397a86ff5e982c2b6e2ff838696ab8316d guide.md
046a52e53005963dd38343505aa43e51b5d750f0891c0a20a675c80ef9a254077db98b15165641a5f7ea33cc19f035e2aa7dbec4504a95c32b63911e3c7a8046 legacy.md

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qvAAKCRAoXmBIoSMh
su7fAQDQk3QG28hWYZsS/HKpeSOShNP9UIYIdaAaZ/89FWwxGAD/VB2AdDfA9fn7
JHw6F4kY3zCqWiaeKxHSGyPQqcgbCQE=
=Yl7f
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuxQAKCRAoXmBIoSMh
sixYAQCuagRRI081zfWpp78Jl1+HMaF5khOp4vKaBFSTj1WywgEA+Hr7Eul9nPQs
MT4ntnNOaZRY3X1AQed4vt+McFPy1Ao=
=Fa5x
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/m12sFpuRRuVjYwYfFuXCnoEyDbDVDAsXYWf/2fhrPdwmlITqlMq94crAze2uV7lIhM55CEuZYZ2qeRHNhbVIwI=
trusted comment: timestamp:1674488509 file:b2sum.txt hashed
2NU82Vo4poYOYncE7M8ZNdXKOJ+k2sKg0rKdZym2bs2cgpbHVFavs5/Eous6qG/8Mv6cME9i85WwDc79Ahy1AQ==
RUSn9xivowlq/kM4rv/0imc5rmVfBwSCnie17MpCPNN7s1qTjdjxJrgzmXtF9gUJHT7ZMvhIX8SWwCwJPUb0yLJgcSEVY9jEcgw=
trusted comment: timestamp:1674915526 file:b2sum.txt hashed
naf4ciO87ZK5h+DcHeu64xJt0KxFGUEoxjnL8/CC9RWQhjq/kGqCKawT0Rc5f9a0y7VO3OcYC2w4GRweMYrNDA==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qrAAKCRAoXmBIoSMh
sqjJAPwKy++dU759yPZ5o0vxx9tKIbbrFHtKcCLmi6zSXFW8BQEAxoU1mP/5UXBa
aCd6Uyo3otgVQ8b4YYN8LZKnzvRBVQY=
=uTDT
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UutQAKCRAoXmBIoSMh
sp8PAP9ODWohYdqF5N33KhigdSHpBEFgvJ6TX8d+QXV6y5WoQwD/YOLm6ooGlimJ
h5JAvbGVr+TFI5osvwBcDYssvPhy8wU=
=gDjk
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/mjhwPVty4ZNYfjn4Gx8rNfbI0b+wd4o32ZIPOV/tWquVnu0QA3tLFvn+UODOdV+MYvFsknKZ37H9BAgqPt0CQc=
trusted comment: timestamp:1674488494 file:briar.md hashed
yeY09caIIzqeLx+LE59EGwacRhpVL5f+uGd36+mGB+sHc+hYy4LeWhvGzQ/HXPXfbGqLMAaRVO/fzA9z+CAjBQ==
trusted comment: timestamp:1674915510 file:briar.md hashed
la58EqkTbHq+UlhM0N9hGEpfdaWv+cu9VYQnWBwcrDzFZLwM/xsUe4yRjo+ysIOVsesA8vHBVijaIp0ZxXoABQ==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qrgAKCRAoXmBIoSMh
sknXAQDd60JWV8ZUpAqEhhs9x6wAcxgX+bdb2gPrqCwOHzQmOQD/dEw3FiMzbTpT
B1yHfCoH438CgjyJ7giYrk6M+yqcFg0=
=gFun
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UutgAKCRAoXmBIoSMh
snT6AQDCYky2KVu4ex8QhlSht5xsKo+Sp+Rg3WG7splz0WH+nwD/aktXsfCE/OKH
d1DbU1bT6GOaSZzJ/vSuTsBfD/qMKwE=
=MYB2
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/rSnaMOsbp2MHC3YZeQh4vjs31ikY7gGEkSUNHfwrdw2qr/ebmHBXTVxAYkN22cocTayR08gYCJuGMQceINFUgc=
trusted comment: timestamp:1674488495 file:chatrooms-rules.md hashed
1st19l9eAFh/pMyBNNgNOzw1xrAI6tNEnftCBaJlK5ggCkQI5B9cz+Hb8km/ifI+kLSdJfCtDG3nkx2sGYKaCw==
trusted comment: timestamp:1674915512 file:chatrooms-rules.md hashed
/SKi4PUk5FyXH6HEbdwo6S58WyecgQAd9eairsFLFAHrYG2tb3wm6We64ec/X0MexQZeQpnLe3BN/3WGXwVaCw==

80
constitution.md Normal file
View File

@ -0,0 +1,80 @@
# A Constitution for an Anonymous Planet.
To amend the rules and regulations of the network and of the PSA community, this constitution is hereby set forth. It is applicable to all the projects of the initiative, especially the Hitchhiker's Guide to Online Anonymity. All members/collaborators must abide by these lines when contributing within the context of the initiative.
## Requirements
> Our content is licensed under **[Creative Commons Attribution NonCommercial](https://creativecommons.org/licenses/by-nc/3.0/)** to prevent commercial usage.
### 1. Anonymity above everything
Anonymity is necessary to maintain the balance of power, specifically to help journalists, whistleblowers, lawyers, scientists, and victims of oppression. Anonymity first, even if that means using non-free and/or proprietary means. Security and privacy are second, again, even if using non-free or non-open-source and/or proprietary means. In this sense, the ends may at times justify proprietary means.
### 2. Independence
The Anonymous Planet initiative has no affiliation with the "Anonymous" collective and does not endorse their activities.
Any overlap of their activities and our guide are purely coincidental.
### 3. Accessibility
We will strive to always keep available the following methods of reading the Hitchhiker's Guide:
* online;
* offline (e.g., PDF, ODT, EPUB (in the future));
* via the Tor network
### 4. Freedom
Maintain free, open-source, and non-commercial nature of all our projects. This does not mean proprietary and/or closed-source tools won't be recommendeded. All scientific knowledge should be free for anyone and we support and encourage Sci-Hub and LibGen. Any attempt to erode the freedom of information and flow of knowledge of our projects, in any manner, is hostile.
### 5. Verifiability, falsifiability and reproducibility
We will make every effort to be transparent about any and all bias we have.
Anyone claiming to be unbiased is lying, therefore we will not falsely claim to be.
All our content shall be verifiable, reproducible and fact-checked:
- academic references (e.g., studies, papers, and peer reviewed publications);
- reputable media references (e.g., articles, videos, and documentaries);
- official documentation (e.g., manuals, field guides, and technical documents);
- renowned and reputable expert review;
- direct testing by our own collaborators for falsifiablity
### 6. Innocence
Suspected offenders are innocent until proven guilty, with zero tolerance for abuse of power or position.
Any accusing/moderating member is:
- Subject to the burden of proving the wrong-doing of the offender.
- Required to motivate any sanction.
Any offender has the right to:
- Face their accuser (know who is accusing them).
- Appeal sanctions to an uninvolved third party.
- Participate in their own incrimination (the burden of proof lies with the accuser).
- Due process of the above.
### 7. Freedom of thought
Open-minded and pragmatic - with no tolerance for gatekeeping.
Critical thinking and fact-checking are strongly encouraged; we welcome criticism including of a harsh nature (excluding ad-hominem and slurs).
### 8. We do not tolerate intolerance
See the [Paradox of Tolerance](https://en.wikipedia.org/wiki/Paradox_of_tolerance), which includes hate speech.
### 9. No analytics
Note that, while we will never use analytics, the (now free) platforms hosting our content might be gathering such analytics outside of our control, such as Github pages. As the initiative progresses, we will strive to avoid these as soon as possible.
### 10. No profit
Any excess donations will only be used to support our main projects first and possibly support other intitiatives (like hosting Tor exit nodes). In all cases, we abide by the following principles:
- Funding transparency (i.e., all donations, spendings, source code, and future goals will be public).
- Acceptance of donations from any entity anonymously or acknowledged (opt-in) will not have any influence on our content.
- No sponsored content.
- No affiliate links.
- No product placements.
- No advertising.
**Disclaimer: it is possible that, coincidentally, a donation could correlate with a recommendation. It will then be clearly stated that while the donation was welcome, the donating entity will not be gaining visibility/coverage/endorsement/recommendations due to such a donation.**
## Core Goals.
0. Help people in need of anonymity to maintain both their physical and digital safety.
## Non-Goals:
0. Help any people who are using this knowledge for bad purposes. Helping people takes precedence and we know our content can be used nefariously. Our initiative believes in having one good person given an anonymous voice, safely, is worth the risk of having several using our content for evil. As we do adhere to a fair "rule of law" system which, having 9 criminals and 1 innocent person free, is much better than having one innocent person in prison among 9 criminals.
**Yours faithfully, Anonymous Planet**

7
constitution.md.asc Normal file
View File

@ -0,0 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuuAAKCRAoXmBIoSMh
sg/UAQDVy+4bPPKhl9H9AfJIXPCq+t3p2TaGFdpDrkt8pBM7CwD/SR8skzVYlfkU
4yjr31RJgVwuURuYi5sr3JHarQVdWAg=
=NyiH
-----END PGP SIGNATURE-----

4
constitution.md.minisig Normal file
View File

@ -0,0 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/pTBVjkP4uv5unHZNWMoXS1e0g8frI16Z7Oo13E5kkaSDRQfNY5ljVzaYTS87i+qGp2f/rajz3CFZ+hZK4XmEAs=
trusted comment: timestamp:1674915513 file:constitution.md hashed
hpxcxVN4HQ5s+IBAt5v6Bx7zDtiqJzwOJlJztwmIcGP8pKJXyTlr/39pEDnQS4f6VwbzlOuS9awYu9GOdyaPBw==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qrwAKCRAoXmBIoSMh
spNOAP9dAiZvPe/WHl20ydHCWqsvX5Y3mbTaD8Xon4xT1LSewQD7BGwxFRJpiq35
iJUhg0aYMZtYjfz3YGnuXaZvM1QVAw8=
=sM8/
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuuQAKCRAoXmBIoSMh
sjfIAP4pFcexMgZr+V6pzeaToiNDs+NWIcEV5FjvMZpVbfOlnAEAmtvgpfaD2krq
n1Hgx8dE8WmGDb5iY51OY6Z18pRcdQE=
=wHSJ
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/sQFyVW9JQLYtu+Uzm+8g8sA/n2nmKhCq1qD2dDWRBu2sgf52CUpImu5sAOsEITef7OL1YlZgM5i7/spdOrQvQE=
trusted comment: timestamp:1674488497 file:donations.md hashed
OIV2jWgI1m8qltRdKa+SHr0cKPVXRU1I80FgZtx/OlWP2j/WN3tQA/NhpxE/jZP2hHnONkr9L7KnhpwQ/KFxDQ==
trusted comment: timestamp:1674915515 file:donations.md hashed
CNFP5kYcD8kkQsomDLawhfAQMTJ1b44kmQEXa7SGH5VQaAMqsBNzpmD1sB+2Bir/WD+4arrJChXIKDGbDkmOCQ==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qngAKCRAoXmBIoSMh
spqgAQCLx5IH05b1eAyK/CGTSSmS83zoGK4GOHMfCdrv1623sAD6A7DqN1sMswwf
e1DW5LC+89FLIU66MSq6P/mIV+0XmgI=
=YIwt
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuqAAKCRAoXmBIoSMh
svYxAP9ZS8ziTK/FJ6EQc9PxoNN07TFFD3HpXltaw6DXLG3vtAD/S7QeOFFqqXMl
Y+2zRqwd0wSyPMWCnBSuyct29QKTEQw=
=aLSc
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/m9u4GCYbaa9GhEomTQimt7c7HvuJZJlN3em2Ydy2DeCKpvpENQ4T5DfNtSe3j5pjnNQda4QNXW/mp4d8Q0eeAM=
trusted comment: timestamp:1674488480 file:b2sum.txt hashed
gbBLBKFuYSBnwUtwR/vuUi3ZGp1fNR1+6W4RoBKE8HvQUsH4wpXSZk/zadDDvnNc18ZsyOXEy4Hqw6BLI4Z8Cg==
trusted comment: timestamp:1674915497 file:b2sum.txt hashed
NvRc1JFKeQq/pV7ySdc7Z/4n1d5xmc/P8giot/4FGyevq+b9zw5uCQQgz5tHnB2brHRr4V3fEf7EzJ8jbDwLDw==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qoAAKCRAoXmBIoSMh
slDcAQCTmeywBZE/QiwbNpNGiiCgcUf27eMMALFHyQdOf2XLoAD/dJXsbEUNcv3q
UV8QDcZ0A/sYXUpIyAAeYhEgq9Wkigg=
=TFQr
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuqgAKCRAoXmBIoSMh
sok/AP4hOWw2bpfKP3zCb6Hb7bfqqVQO7Ghw+4KRQ+xJr8fiiwEAgM63u5riSIVk
h0mvMRMyAjvlXZkuKj2e4ljhoNR33Qw=
=Qm7s
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/kJ6thrlMUlYMQS85xqWIMR7agiJynTCepUp5sRhyMVdmwl4SBXuQ1EczsCaq6kM7fEy4+ls9+Rux9PvVw8Jogo=
trusted comment: timestamp:1674488482 file:sha256sum.txt hashed
nEg9vtnnts2iMIMeUX/+hJBhneaAoZnK1czzat/+WUfnqstxwW34M0GtI4C4amdnEw07sRpt/1zLUXh/CAl1AA==
trusted comment: timestamp:1674915499 file:sha256sum.txt hashed
s+2T3Lp5GAm7HlSfSmjuUgtAySiJAlsx1ha0VzSWMqxQ5y4UmOEueZunYSjxTH4gieVoFWjq3uJMVOgLNeeOCg==

128
guide.md
View File

@ -347,8 +347,8 @@ Finally note that this guide does mention and even recommends various commercial
- [Installation:][25]
- [Usage and Precautions:]
- [Appendix Z: Online anonymous payments using cryptocurrencies]
- [Reasonably anonymous option:]
- [Extra-Paranoid anonymous option:]
- [Using Bitcoin anonymously option:]
- [Using Monero anonymously option:]
- [Warning about special tumbling, mixing, coinjoining privacy wallets and services]
- [When converting from BTC to Monero:]
- [Appendix A1: Recommended VPS hosting providers]
@ -867,7 +867,7 @@ There are some not so straightforward ways[^107] to disable the Intel IME on som
Note that, to AMD's defense, there were no security vulnerabilities found for ASP and no backdoors either. See <https://www.youtube.com/watch?v=bKH5nGLgi08&t=2834s> <sup>[[Invidious]](https://yewtu.be/watch?v=bKH5nGLgi08&t=2834s)</sup>. In addition, AMD PSP does not provide any remote management capabilities contrary to Intel IME.
If you are feeling a bit more adventurous, you could install your own BIOS using Libreboot or Coreboot [^108] if your laptop supports it (be aware that Coreboot does contain some propriety code unlike its fork Libreboot).
If you are feeling a bit more adventurous, you could install your own BIOS using Coreboot [^108] or Libreboot (a distribution of Coreboot) if your laptop supports it. Coreboot allows users to add their own microcode or other firmware blobs in order for the machine to function, but this is based upon user choice, and as of Dec 2022, Libreboot has adopted a similar pragmatic approach in order to support newer devices in the Coreboot tree. (Thanks, kind Anon who corrected previous information in this paragraph.)
Check yourself:
@ -1365,9 +1365,10 @@ The main issue is not setting up a random Crypto wallet to receive some currency
There are some cryptocurrencies with privacy/anonymity in mind like Monero but even those have some and warnings to consider[^242]'[^243].
Even if you use Mixers or Tumblers[^244] (services that specialize in "anonymizing" cryptocurrencies by "mixing them"), keep in mind this is only obfuscation[^245] and not actual anonymity[^246]. Not only are they only obfuscation but they could also put you in trouble as you might end up exchanging your crypto against "dirty" crypto that was used in various questionable contexts[^247].
Use of "private" mixers, tumblers[^244] (centralized services that specialize in "anonymizing" cryptocurrencies by "mixing them") and coinjoiners are risky as you don't know what's happening on them[^245] and can be trivially de-mixed[^246]. Their centrally-controlled nature could also put you in trouble as they are more susceptible to money-laundering laws[^247].
This does not mean you cannot use Bitcoin anonymously at all. You can actually use Bitcoin anonymously as long as you do not convert it to actual currency and use a Bitcoin wallet from a safe anonymous network. Meaning you should avoid KYC/AML regulations by various exchanges and avoid using the Bitcoin network from any known IP address. See [Appendix Z: Paying anonymously online with BTC (or any other cryptocurrency)][Appendix Z: Online anonymous payments using cryptocurrencies].
This does not mean you cannot use Bitcoin anonymously at all. You can actually use Bitcoin anonymously as long as you do not convert it to actual currency, use a Bitcoin wallet from a safe anonymous network, and do not reuse addresses or consolidate outputs that were used when spending at different merchants. Meaning you should avoid KYC/AML regulations by various exchanges, avoid using the Bitcoin network from any known IP address, and use a wallet that provides privacy-preserving tools. See [Appendix Z: Online anonymous payments using cryptocurrencies][Appendix Z: Online anonymous payments using cryptocurrencies].
**Overall, the best option for using Crypto with reasonable anonymity and privacy is still Monero and you should ideally not use any other for sensitive transactions unless you are aware of the limitations and risks involved. Please do read** [Appendix B2: Monero Disclaimer]**.**
@ -1797,21 +1798,21 @@ First, here is a small basic UML diagram showing your available options accordin
- **You could go for any route, but we would recommend Qubes OS if your threat model allows it.**
- If it is an ARM-based M1 Mac:
- If it is an ARM-based M1/M2 Mac:
- **Not possible currently for these reasons:**
- **Virtualization of x86 images on ARM M1 Macs is still limited to commercial software (Parallels) which is not supported by Whonix yet.**
- **Virtualization of Intel x86 images on ARM (M1/M2) hosts is still limited to commercial software (e.g., Parallels, Fusion) which are mostly not supported by Whonix, yet. They are very buggy and for advanced people only. Please seek this information yourself.**
- **Virtualbox is not available for ARM architecture yet.**
- **[Virtualbox is now available natively for ARM64 architecture](https://osxdaily.com/2022/10/22/you-can-now-run-virtualbox-on-apple-silicon-m1-m2/) in a package as of October 2022. Download the ["Developer preview for macOS/Arm64 (M1/M2) hosts"](https://www.virtualbox.org/wiki/Downloads).**
- **Whonix is not supported on ARM architecture yet.**
- **Whonix does not support macOS easily. "You need to build Whonix using the build script to get it running on Apple Silicon." [See the forum thread](https://www.whonix.org/wiki/MacOS#M1).**
- **Tails is not supported on ARM architecture yet.**
- **Tails is not supported on ARM64 architecture yet. [See this thread](https://gitlab.tails.boum.org/tails/blueprints/-/wikis/ARM_platforms/) for more information (keep in mind this page hasn't been updated recently).**
- **Qubes OS is not supported on ARM architecture yet.**
- **Qubes OS is not supported on ARM64 architecture yet, but there is work being done to make it available on aarch64, which may be delayed for the unforseeable future..**
**Your only option on M1 Macs is probably to stick with Tor Browses for now. But we would guess that if you can afford an M1 Mac you should probably get a dedicated x86 laptop for more sensitive activities.**
**The general advice in this guide regarding virtualization software is that it's costly. That said, you should probably get a dedicated laptop, capable of running virtualization software, preferably a 64-bit architecture, to be used for more sensitive activities and testing.**
### Skills:
@ -2421,15 +2422,15 @@ Note, if during the import you are having issues such as "NS_ERROR_INVALID_ARG (
### Get a dedicated laptop for your sensitive activities:
Ideally, you should get a dedicated laptop that will not be tied to you in any effortless way (ideally paid with cash anonymously and using the same precautions as previously mentioned for the phone and the SIM card). It is recommended but not mandatory because this guide will help you harden your laptop as much as possible to prevent data leaks through various means. There will be several lines of defense standing between your online identities and yourself that should prevent most adversaries from de-anonymizing you besides state/global actors with considerable resources.
Ideally, you should get a dedicated laptop that will not be tied to you in any effortless way (ideally paid with cash anonymously and using the same precautions as previously mentioned for the phone and the SIM card). It is recommended but not mandatory. This guide will help you harden your laptop as much as possible to prevent data leaks through various means. There will be several lines of defense standing between your online identities and yourself which should prevent most adversaries from de-anonymizing you - besides state/global actors. It will take considerable resources.
This laptop should ideally be a clean freshly installed Laptop (Running Windows, Linux, or macOS), clean of your normal day-to-day activities, and offline (never connected to the network yet). In the case of a Windows laptop, and if you used it before such a clean install, it should also not be activated (re-installed without a product key). Specifically, in the case of MacBooks, it should never have been tied to your identity before in any means. So, buy second-hand with cash from an unknown stranger who does not know your identity
This laptop should ideally be a clean, freshly installed laptop (running Windows, Linux, or macOS); which is clean of your normal day-to-day activities; and which is offline (never connected to your home network). In the case of a Windows laptop, and if you used it before such a clean install, it should also not be activated. Simply reinstall without a product key in the case that it came pre-activated. Specifically, in the case of MacBooks, it should never have been tied to your identity before in any means. So, buy secondhand with cash from an unknown stranger who does not know your identity.
This is to mitigate some future issues in case of online leaks (including telemetry from your OS or Apps) that could compromise any unique identifiers of the laptop while using it (MAC Address, Bluetooth Address, and Product key ...). But also, to avoid being tracked back if you need to dispose of the laptop.
If you used this laptop before for different purposes (like your day-to-day activities), all its hardware identifiers are probably known and registered by Microsoft or Apple. If later any of those identifiers is compromised (by malware, telemetry, exploits, human errors ...) they could lead back to you.
The laptop should have at least 250GB of Disk Space **at least 6GB (ideally 8GB or 16GB)** of RAM and should be able to run a couple of Virtual Machines at the same time. It should have a working battery that lasts a few hours.
The laptop should have at least 250GB of Disk Space **at least 6GB (ideally 8GB or 16GB)** of RAM and should be able to run a couple of Virtual Machines at the same time. It should have a working battery that lasts a few hours. You should aim for something with large storage (1TB+) if possible because we will need as much as possible.
This laptop could have an HDD (7200rpm) or an SSD/NVMe drive. Both possibilities have their benefits and issues that will be detailed later.
@ -2851,11 +2852,11 @@ See [Appendix G: Safe Browser on the Host OS]
### macOS Host OS:
**Note: At this time, this guide will not support ARM M1 MacBooks (yet). Due to Virtualbox not supporting this architecture yet. It could however be possible if you use commercial tools like VMWare or Parallels but those are not covered in this guide.**
**Note: Mac M1/M2 chips are now supported natively, or, if you wish to use commercial tools like VMWare Fusion or Parallels Desktop, but those are not covered in this guide. Seek this information yourself.**
As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at leastWedo not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk.
As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at least we do not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk.
I also recommend that you do the initial installation completely offline to avoid any data leak.
We also recommend that you do the initial installation completely offline to avoid any data leak.
**Do not ever sign in with your Apple account using that Mac.**
@ -5678,7 +5679,7 @@ Many platforms' operators and administrators do not want traffic from these IPs
- "Russian troll propaganda!";
- "Well, it's noise in the data we sell to advertisers!" (e.g., AdSense or Facebook Ads).
"Yet we still pay traffic for them so let us just deny them all instead.""
"Yet we still pay traffic for them so let us just deny them all instead."
Fortunately, those systems are not perfect, and you will (still) be able to get around those restrictions by switching identities (in the case of Tor) and trying to access the website each time until you find an Exit Node that is not yet blacklisted.
@ -11872,29 +11873,38 @@ There are many services that you might want to use (VPS hosting, mail hosting, d
As mentioned before in this guide multiple times, we strongly recommend the use of services accepting cash (that you could send anonymously through the postal services) or Monero which you can buy and use directly and safely.
But what if the service you want does not accept Monero but does accept a more mainstream cryptocurrency such as Bitcoin (BTC) or Ethereum (ETH).
- But what if the service you want does not accept Monero but does accept a more mainstream cryptocurrency such as Bitcoin (BTC) or Ethereum (ETH)?
**Bitcoin and other "mainstream cryptocurrencies" are not anonymous at all (Remember [Your Cryptocurrencies transactions][Your Cryptocurrencies transactions:]) and you should never ever purchase, for example, Bitcoin from an exchange and then use these directly for purchasing services anonymously. This will not work, and the transaction can be traced easily.**
- **Stay away from Crypto Mixer, Tumblers and Coinjoiners.** You might think this is a good idea but not only are they useless with cryptocurrencies such as BTC/ETH/LTC, but they are also dangerous as you might end up trading your currency for dirty currency from illicit activities. Use Monero to anonymize your crypto. Use a normal KYC-enabled Exchange to buy/sell your Monero (such as Kraken) or (at your own risk), use a service like LocalMonero.
- **Stay away from so-called "private" mixers, tumblers and coinjoiners.** You might think this is a good idea, but not only are they useless with cryptocurrencies such as BTC/ETH/LTC, they are also dangerous. They take custody of your coins. Use Monero to anonymize your crypto. Do not use a normal KYC-enabled exchange to buy/sell your Monero (such as Kraken), since this information on your purchases and withdrawals (for intended use) are retained in the exchange. Instead, use a P2P exchange that doesn't require KYC such as what can be found on <https://kycnot.me/>.
- **See [Warning about special tumbling, mixing, coinjoining privacy wallets and services].**
## Reasonably anonymous option:
## Using Bitcoin anonymously option:
Despite this, it is possible to safely anonymize Bitcoin through the use of cryptocurrencies with a focus on untraceability such as Monero (XMR) with a few more steps and at a relatively small cost. So, you might be wondering how? Well, it is actually pretty simple:
Despite this, it is possible to safely anonymize Bitcoin through the use of non-custodial collaborative transactions and privacy-preserving spending tools. This is possible with a protocol called [ZeroLink](https://code.samourai.io/whirlpool/Whirlpool/-/blob/whirlpool/THEORY.md) and an implementation called Whirlpool which as two clients that utilize it and provide the necessary spending tools, detailed below. So, you might be wondering how? Well, it is actually pretty simple:
1. Purchase Monero at:
1. Purchase Bitcoin at a non-KYC exchange (such as one found on <https://kycnot.me/>)
- a KYC exchange (such as Kraken)
2. Create a wallet with [Samourai Wallet](https://www.samouraiwallet.com/) (Android) or [Sparrow Wallet](https://www.sparrowwallet.com/) (Desktop). Both of these use the Whirlpool protocol to gain the user forward-facing on-chain privacy on Bitcoin.
- a non-KYC exchange (such as <https://bisq.network/>)
3. Deposit coins into the wallet and follow the relevant instructions ([Samourai](https://docs.samourai.io/wallet/usage), [Sparrow](https://www.sparrowwallet.com/docs/mixing-whirlpool.html)) to remove their historic links.
- from someone on LocalMonero using cash (at your own risk)
4. Funds should only be spent from the Postmix account, as that is the account with the coins that have gained anonymity through Whirlpool.
- **You should run your own node when using Bitcoin and always use that for connecting from your wallet. You do not need to purchase separate hardware to do so, and it's simple to [do so by using the Tor Network](https://bitcoincoredocs.com/tor.html) as well.**
## Using Monero anonymously option:
1. Purchase Monero at a non-KYC exchange (such as one found on <https://kycnot.me/>)
2. Create a Monero wallet on one of your anonymized VMs (for example, on the Whonix Workstation which includes a Monero GUI wallet natively or using the Monero GUI wallet from <https://www.getmonero.org/downloads/> on other OSes)
3. Transfer your Monero from the Exchange you bought it from to the wallet on your VM.
3. Transfer your Monero from the wallet from which you bought it to the wallet on your VM. We cannot stress enough how import it is to have two separate wallets for this process, even for handling Monero.
4. On the same VM (for instance again the Whonix Workstation), create a Bitcoin Wallet (again this is provided natively within the Whonix Workstation)
@ -11904,65 +11914,21 @@ Despite this, it is possible to safely anonymize Bitcoin through the use of cryp
**You should never access this wallet from a non-anonymized environment. Always use well-thought OPSEC with your BTC transactions. Remember those can be traced back to you.**
The origin of those BTC cannot be traced back to your real identity due to the use of Monero **unless Monero is broken**. Please do read [Appendix B2: Monero Disclaimer].
The origin of those BTC cannot be traced back to your real identity due to the use of Monero **unless Monero is broken** or if you consolidate outputs from spending at separate merchants. It is recommended to use privacy preserving wallets in the [Bitcoin section](Using Bitcoin anonymously option:). Please do read [Appendix B2: Monero Disclaimer].
## Extra-Paranoid anonymous option:
**As explained in the disclaimer, If you feel extra paranoid,** you could consider using an additional conversion step using a different privacy/anonymity-focused cryptocurrency such as Zcash (<https://z.cash/> <sup>[[Archive.org]](https://web.archive.org/web/https://z.cash/)</sup>).
For example, here are two possibilities:
**Buying Monero first option:**
1. Buy Monero (XMR) at:
- a KYC exchange (such as Kraken)
- a non-KYC exchange (such as <https://bisq.network/>)
- LocalMonero using cash (at your own risk)
2. Transfer your Monero to your Monero wallet in a secure environment (such as the Monero GUI wallet pre-installed on the Whonix workstation OR using the Monero GUI wallet from <https://www.getmonero.org/downloads/> on other OSes).
3. Use a swapping service (see [Appendix A8: Crypto Swapping Services without Registration and KYC]) to exchange your Monero to a Zcash wallet you control in your secure environment (see [Appendix A9: Installing a Zcash wallet][Appendix A9: Installing a Zcash wallet:]).
4. Transfer your Zcash from one VM Zcash wallet to another VM Zcash wallet you control while making sure you are using shielded addresses (some exchanges allow this directly).
**Make sure the wallets are different and change your Tor identity before opening the recipient wallet.**
5. Use a swapping service again to exchange your Zcash to Monero/BTC/other (for BTC, use for example the Electrum Wallet on the Whonix Workstation).
6. Use your Monero/BTC/other anonymously.
**Buying Zcash first option:**
1. Buy Zcash (see <https://z.cash/exchanges/> <sup>[[Archive.org]](https://web.archive.org/web/https://z.cash/exchanges/)</sup>)
2. Transfer your Zcash from the to a VM Zcash Wallet (see [Appendix A9: Installing a Zcash wallet][Appendix A9: Installing a Zcash wallet:]).
3. Transfer your Zcash from your VM Zcash Wallet to another VM Zcash Wallet using shielded addresses.
**Make sure the wallets are different and change your Tor identity before opening the recipient wallet.**
4. Use a swapping service (see [Appendix A8: Crypto Swapping Services without Registration and KYC]) to exchange your Zcash to Monero at your VM Monero Wallet (such as the Monero GUI wallet pre-installed on the Whonix workstation or using the Monero GUI wallet from <https://www.getmonero.org/downloads/> on other OSes).
5. Now either use your Monero directly to buy from merchants OR use a swapping service to swap your Monero to another cryptocurrency such as BTC/ETH/Other (for BTC, use for example the Electrum Wallet on the Whonix Workstation).
6. Use your cryptocurrency anonymously.
These steps should upgrade from "reasonably anonymous" to "extra-paranoid anonymous". Even if Monero is broken in the future. Zcash will have to be broken as well. Quite unlikely.
**Regarding Zcash: this section previously included use of Zcash but it has been removed in light of newer, more accurate information.**
## Warning about special tumbling, mixing, coinjoining privacy wallets and services: <sup>[Wikiless](https://wikiless.org/wiki/Cryptocurrency_tumbler) [Archive.org](https://web.archive.org/web/https://wikiless.org/wiki/Cryptocurrency_tumbler)</sup>
We are not recommending any as none of those are truly providing anonymity but obfuscation. As of this writing, and as we are aware of, anonymity can be only achieved with Zcash "Shielded Addresses" and Monero. BTC, ETH and many others do not provide anonymity and those wallets and mixing services can be traced. Here are some references about this issue:
Centralized "private" tumblers, mixers and coinjoiners are not recommended since they do not provide anonymity in a way that truly unlinks an output from its history. Here are some references about this issue:
Mixing BTC in this way should prevent any chain analysis on future transactions. This will not hide any past transactions or the fact you purchased BTC from a KYC exchange. Both wallets support Tor and running your own Bitcoin full node.
- [Mixing detection on Bitcoin transactions using statistical patterns.](https://arxiv.org/pdf/2204.02019.pdf) <sup>[Archive.org](https://web.archive.org/web/https://arxiv.org/pdf/2204.02019.pdf)</sup>
- [An Analysis Of Bitcoin Laundry Services](https://www.researchgate.net/profile/Julio-Hernandez-Castro/publication/319944399_An_Analysis_of_Bitcoin_Laundry_Services/links/5a045d410f7e9beb177883af/An-Analysis-of-Bitcoin-Laundry-Services.pdf?origin=publication_detail) <sup>[Archive.org](https://web.archive.org/web/https://www.researchgate.net/profile/Julio-Hernandez-Castro/publication/319944399_An_Analysis_of_Bitcoin_Laundry_Services/links/5a045d410f7e9beb177883af/An-Analysis-of-Bitcoin-Laundry-Services.pdf?origin=publication_detail)</sup>
- [Mixing Strategies in Cryptocurrencies and An Alternative Implementation](https://www.researchgate.net/publication/344485520_Mixing_Strategies_in_Cryptocurrencies_and_An_Alternative_Implementation) <sup>[Archive.org](https://web.archive.org/web/https://www.researchgate.net/publication/344485520_Mixing_Strategies_in_Cryptocurrencies_and_An_Alternative_Implementation)</sup>
Instead we recommend to use Monero (preferred) and additionaly Zcash to achieve anonymity.
Mixing BTC in this way should prevent any chain analysis on future transactions. This will *not* however hide any past transactions or the fact you purchased BTC from a KYC exchange. Instead we recommend to use Bitcoin wallets that utilize Whirlpool or Monero (preferred).
## When converting from BTC to Monero:
@ -12399,8 +12365,6 @@ You may want to watch this insightful video for more details: <https://www.youtu
Also please consider reading: [Privacy Limitations in Anonymity Networks with Monero](https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations) <sup>[[Archive.org]](https://web.archive.org/web/https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations)</sup>
**If you feel extra paranoid and want the highest safety level possible,** see the [Extra-Paranoid anonymous option][Extra-Paranoid anonymous option:].
**Use these at your own risk, sending cash payments to providers accepting cash (through the postal service) is always a better solution if/when possible.**
# Appendix B3: Threat modeling resources
@ -13832,8 +13796,8 @@ In short, our opinion is that you may use Session Messenger on iOS due to the ab
[25]: #installation-6
[Usage and Precautions:]: #usage-and-precautions
[Appendix Z: Online anonymous payments using cryptocurrencies]: #appendix-z-online-anonymous-payments-using-cryptocurrencies
[Reasonably anonymous option:]: #reasonably-anonymous-option
[Extra-Paranoid anonymous option:]: #extra-paranoid-anonymous-option
[Using Bitcoin anonymously option:]: #using-bitcoin-anonymously-option
[Using Monero anonymously option:]: #using-monero-anonymously-option
[Warning about special tumbling, mixing, coinjoining privacy wallets and services]: #warning-about-special-tumbling-mixing-coinjoining-privacy-wallets-and-services-wikiless-archiveorg
[When converting from BTC to Monero:]: #when-converting-from-btc-to-monero
[Appendix A1: Recommended VPS hosting providers]: #appendix-a1-recommended-vps-hosting-providers

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qsQAKCRAoXmBIoSMh
sshsAP9xNbv7ojgz04gZ5F4z4eTgVm1UyT/gJuKSk2tLCO+lhQEAo1dV7fEd3ZRv
EScXAtO/uqU/GdYTyHPqRfT7WV0nOgU=
=RBfa
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuuwAKCRAoXmBIoSMh
ss2pAQD+hdR7EsLB3JLgW4k1k8lYDSYIxFTtXF0wCnDbYWwl5AD/btc1VrClHlls
v1Pt7YI+agHr0ghyaVPmPv4uIhHyBQw=
=zMDf
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/hy8GAn9B22OhtgumxLj3SahS1ibNHJlnZePs4HavZegXfh7hNmuztMLLuX7+zw/gMotDHYj4A/CHaz9sHBtMAs=
trusted comment: timestamp:1674488499 file:guide.md hashed
znq2u+JV59+5UMigVR7U9vYUkxD4KEHkGJ0DWugMso1yXJItNgGoKtG0znPkwRel4K6Pw/cU70jbH9ff4jpVBQ==
trusted comment: timestamp:1674915516 file:guide.md hashed
ec2P1epXcoqYq0/gDyI1cLRrMPzWUfKH6kc9872AHu8uPMgzisZWHccCh0WI4LOn3MHqMimhgJxEc8G8OosrAg==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qswAKCRAoXmBIoSMh
sj/bAQCbA/oxrG5Nq/JOS1DIJbSHqxAMPtIxpXoG5P5/wJbwAgEAqPQwVcDswzw9
6xLZf6lyilSKXefopVi4axUItkf27g8=
=mbuk
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuvAAKCRAoXmBIoSMh
sgvJAQDY1GUpt9m6vcR4Y++LYH5iBS0B9Py9l3KHhjWFcf+E8wEA/K4kUqCMyrjH
jxfDCz8uz+KtTiF/AYpSF2iXtOTt0Qg=
=rKAH
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/vAqSGLl3ShK3I0FWnH2G/nSm3okr+6qDd9cUSO5tBGSW0zioY4VOyr8YLGrmATU/SqID4hZSgDMqaOdIefHIAs=
trusted comment: timestamp:1674488500 file:legacy.md hashed
sRZZUMuuL4e4DHe7pemRHCT27fbpbyx6OujGYSofKx6PRNutq/GieI3J76tVv35KdtDYQIfIbX79xwow+OISBQ==
trusted comment: timestamp:1674915518 file:legacy.md hashed
F1uxD4JhCSPsSU010opf/CBr/NOZyEHOmJqPS2WYVaDVf25n5zrCqfNgfb7g6LH5WNCvzOF7+IEjAs6pJbzmAw==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qtAAKCRAoXmBIoSMh
ssgYAP9d+FQaBZgRxVREcR96mdLv811Gs2mu0NmxN1YHyUJqYQD+OxWahMwZHtdJ
Q1U2+S73jBzj0F67ITjPMVl1ZiI2mwY=
=5Pxe
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuvgAKCRAoXmBIoSMh
sqTdAP9Odmh5sh6k4G+CIqF3RuiRaGSvutlVIEoSvwoPYfOikAEAyqkh4YQA7YMN
tTWAUDLmFxijl/vZqpARGUqMpo/XPgw=
=3sGQ
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/i1yTrpkZCQHUBO2skbgOOGbrLwHF/ZLQPSXcL3QNY19aAt8KlXjPnoO5aurDjPlE5afJp0hpuJZ0ND3ISj9Jg8=
trusted comment: timestamp:1674488502 file:links.md hashed
uGNr2NiGQnK1BSJGv54fa6v/CPkNtyfMTAP8vb/l6USQFMV67aM7uc46shxGAlced+lqxxXokRld+Hy2ylQUBw==
trusted comment: timestamp:1674915519 file:links.md hashed
PZ+WV/XG0T7bTIOX1pU6LD+5xq+AqQx0AY/ANEdMu2oVehzVFidxT4cJtQesSgQiRry1/rJ1FsFJ0NuMtANKDA==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qtgAKCRAoXmBIoSMh
shHHAQC/wVWVr14pGwFnFd5VXy6JhoRNxGCH1nseWYChPMjC5gEA7WN1OW6vQ2qh
HuQZWVimKHBGBfvCfILyqZwesgP/HQo=
=WRzQ
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuvwAKCRAoXmBIoSMh
suDXAPwI1Kf1kQ2QQrBEUrL4NiGaOJOuGzVqxQxlh8h57+bGcQEA7mA+4HF8bOxV
tpY4lNTRA9HvqHMIpJApOCPHg2xFGQ8=
=I2ZH
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/pNx6BCj6u0LY2YRUkVLOPqkc+MKWrBr0MkOHSHYhIXPbk+r/MAnbPmxpAGP20XFAAARa97VpcRkDsDgNf6+Uw0=
trusted comment: timestamp:1674488503 file:moderncrypto-rules.md hashed
fQdhHpCGpLQ+Oit0mxy2HykNJMYLtGekujtX3fxO5eXeA0/Hz2/bpS8SJ4txtf9EcAgJhBZtPnTH+4qvdFxzCA==
trusted comment: timestamp:1674915520 file:moderncrypto-rules.md hashed
tvGEj0ed9/78t+JXwavQnWjTGFc8mjCKB988Mb/eAjNh2+Wk11wBLET39aqkmjgrT0HjqPnTt+H1XPLVXyFIDQ==

View File

@ -7,6 +7,7 @@ bba42faffa2aad96ae527518b813b0b7122dc9bf19d75171cab646dc98dcb05f CODE_OF_CONDUC
049f22151988e3cc964e8df02b8ae06193fdce4b0ae30588234d5d8a000c9006 about.md
6c65d21a15bcd581f33b5f7f2b02eb65d73b6990778c9df687c2aea47eee6907 briar.md
79643060bd41d061ce55b57bd7a4d82f1e8e9044e67c2d56a17f91cec96f9b91 chatrooms-rules.md
b953000e50f0607c6cd9d0650d37bba13678c6a92e66ab7ab4585c284ba2e950 constitution.md
a48018aa4eb8c2fb346cd7abec5de4d4ef2b4c47d8896a7d5dd295e4719dc160 donations.md
5b75f4d7074175f893f97b864a260a998d3a671a4b6caf5ce72483f0eab153a4 guide.md
ca7931e201056dd44bc77959dc3e4298a1b5c712b6c249f19746d949d2079f49 legacy.md

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qugAKCRAoXmBIoSMh
srIOAQD2eJGL6GJZRn/3kOJHHRfZFX6QfSbpE7fB53OZmL+UPwD/VIR7PHUGPyjl
FSM5NVoh6Jh7k08M14kbN9sdEAqkHQI=
=jGJg
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuwwAKCRAoXmBIoSMh
slNaAP4t5l8moXZqYxebhI5IFyr0WBD4iza1SX/VzjRQhCdLMgD/ZLKAz6FaFVk4
ObGRHiEV9dgiIda6l6BI3KwL9cJ2iQI=
=1+Kv
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/iM34AQkrkc7vOCsan8mtkh4lQpnYRE23ilTindH3rJ2nU599RxUOpH/eINTvE5THoOaUajEoNhhPFBHCoLkvgo=
trusted comment: timestamp:1674488508 file:sha256sum.txt hashed
e/hNTaEEoZD5REcNqcieedXo0p0aifoDWEHMGK/dn4YftvTP4Fuhee/2lnr/bjEi6w/gwdNnCBoAqqEKMw3rAQ==
RUSn9xivowlq/igNPnyVyk0AXKUuM/Xw0hYOvwj4ZMVSBGx1arhQQltAKn4WoJFCvHXsUnWbdbSVu8KBxSL35jmbthOSrtROFgg=
trusted comment: timestamp:1674915525 file:sha256sum.txt hashed
6yqzfO+PlZVNPIsMhYPy08KcbNji3rEqkWK1CCxQuo7zloITz6n9Sdd2NH/Hk1MlacsY1x9+BRQUjIRZN59YDg==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86qtwAKCRAoXmBIoSMh
sqrHAQCFaXhtx9QaUgC4FyFl5BBQJSGZ62ShGMbcsrTCBKGliwD/bhG9hjj9++MF
qZlzl/lp1chgyJ04xsS6moZ6wuzXBQY=
=hhiw
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuwAAKCRAoXmBIoSMh
sva9AP0fuNM9ZrLXLoLaadNBwOG9QZPC32Re7J5dVwcrXpZxMgD+OTELsAMCTY/n
t6VL4RXp1Y6giI/c++VsJlIu3UJ0RA4=
=haaE
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/kjN63PlxnjtdMJPd0FowcHL/5v8iiRnbyZXjznc1ABgRmw9HdVjH6Gye/LG7A53ZgFt3EbXDB8MtxaM0IGilQE=
trusted comment: timestamp:1674488505 file:twitter.md hashed
+64OPpocb6Aco5re9VW6CWTd6ITx9Vwber9eWcXIduqjD3JUXGkQiCYFDcM1Ib4sWVkvmgw2Q9E2IF9RgZBLCg==
trusted comment: timestamp:1674915522 file:twitter.md hashed
Lpib5kfpewKFEKflnUYl/R7i6lca5Ws9gMPTgdy8EKmWnr9mJY3Eaj99Yfdbpshk9+Kkom1rKjBZ3hIfXN3KBA==

View File

@ -1,7 +1,7 @@
-----BEGIN PGP SIGNATURE-----
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY86quQAKCRAoXmBIoSMh
skLyAQDBznKz+Jo3zbp8Wvm8/8fNiVI+28unKMHvhN3xQrG5GwEA0s1/ZeF+t9C9
/F9a8wt81OvOySuy86AQLjTguC2kHAM=
=nWG/
iHUEABYKAB0WIQSDps+e9XrCW1x/XSkoXmBIoSMhsgUCY9UuwgAKCRAoXmBIoSMh
sjJ6AP9Rv5uXh0TgYjY1T8vII/whBBEHgDd+F0r24ukSWlNEWQD/X5EqgjFkwweI
EBeGVv7gaQiWy5WKc9H/KUDH/+S0RwE=
=SLo7
-----END PGP SIGNATURE-----

View File

@ -1,4 +1,4 @@
untrusted comment: signature from minisign secret key
RUSn9xivowlq/rX4tI7VFfWMA00SsI8n/mBqgCRzaATlx1N71U26lhTY7Hygqyggpqa4pk1Uud567b8Pgq0kafihu3B2JMWs8Ao=
trusted comment: timestamp:1674488506 file:verify.md hashed
Ltr/woEKiTSlxEoAdmSaYtcQecBd+pyJ0/YZPjbOIKf1NvP4pQFZrRqWQWCBKtYuxbyFl70olGFoow/cCIfFCg==
trusted comment: timestamp:1674915523 file:verify.md hashed
N1axtW7AQkXXTFdPKehIGsqkO2bFZjd242283EMQ6mrVV4WkwRQCiJ4dIypFGm73fFC+Am7BZA/YQO7YzNydDA==