mirror of
https://github.com/c0mmando/Hack-Liberty-Resources.git
synced 2024-12-21 13:25:05 -05:00
add resources
This commit is contained in:
parent
43779c47da
commit
55d3cfa8e2
19
README.md
19
README.md
@ -194,7 +194,7 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
- [Vonu Podcast](https://vonupodcast.com) - the podcast making you invulnerable to the coercion of the State and the servile society
|
||||
|
||||
### **Projects & Organizations**
|
||||
- [Annas Archive](https://annas-archive.org/) - the world’s largest open-source open-data library. mirrors sci-hub, library genesis, z-library, Mirrors Sci-Hub, LibGen, Z-Lib, and more. 25,077,770 books, 99,425,873 papers — preserved forever.
|
||||
- [Annas Archive](https://annas-archive.org/) - the world’s largest open-source open-data library. mirrors sci-hub, library genesis, z-library. 25,077,770 books, 99,425,873 papers — preserved forever.
|
||||
- [AnarSec](https://www.anarsec.guide/) - tech guides for anarchists
|
||||
- [Anonymous Land](https://www.anonymousland.org) - a community dedicated to providing anonymity enhancing guides and services
|
||||
- [Anonymous Planet](https://anonymousplanet.org/) - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
|
||||
@ -288,25 +288,26 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
- [Privacy Guides](https://www.privacyguides.org/) - a non-profit, socially motivated website that provides information for protecting your data security and privacy
|
||||
- [Extreme Privacy 4th Edition](https://annas-archive.org/md5/3bca9891bf832a50e0f8d7aee7555eb3) - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view.
|
||||
- [Anonymous Land](https://www.anonymousland.org) - a community dedicated to providing anonymity enhancing guides and services
|
||||
- [Prism Break](https://prism-break.org) - opt out of global data surveillance programs like prism, xkeyscore and tempora.
|
||||
- [The New Oil](https://thenewoil.org/) [[Tor](http://vyrgfx4jz2lnejqduons56ph5xtsrtaoo7ovny53dd7okyzhfsgkzbad.onion/)] - the beginner’s guide to data privacy & cybersecurity
|
||||
- [Techlore](https://www.techlore.tech) - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
|
||||
- [No Trace Project](https://www.notrace.how/) - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
|
||||
- [Qubes OS for Anarchists](https://www.anarsec.guide/posts/qubes/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/qubes/index.html)] - Qubes OS is a security-oriented operating system (OS), which means it is an operating system designed from the ground up to be more difficult to hack. Given that anarchists are regularly targeted for hacking in repressive investigations, Qubes OS is an excellent choice
|
||||
- [GrapheneOS for Anarchists](https://www.anarsec.guide/posts/grapheneos/) - [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/grapheneos/index.html)] - anarchists should not have phones. if you must use a phone, make it as difficult as possible for an adversary to geotrack it, intercept its messages, or hack it. this means using grapheneos
|
||||
- [Tails for Anarchists](https://www.anarsec.guide/posts/tails/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tails/index.html)] - tails is an operating system that makes anonymous computer use accessible to everyone. tails is designed to leave no trace of your activity on your computer unless you explicitly configure it to save specific data
|
||||
- [Tails Opsec for Anarchists](https://www.anarsec.guide/posts/tails-best/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tails-best/index.html)] - additional precautions you can take that are relevant to an anarchist threat model - operational security for tails
|
||||
- [Make Your Electronics Tamper-Evident](https://www.anarsec.guide/posts/tamper/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tamper/index.html)] - if the police ever have physical access to an electronic device like a laptop, even for five minutes, they can install hardware keyloggers, create images of the storage media, or otherwise trivially compromise it at the hardware, firmware, or software level. one way to minimize this risk is to make it tamper-evident
|
||||
- [Encrypted Messaging for Anarchists](https://www.anarsec.guide/posts/e2ee/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/e2ee/index.html)] - This article provides an overview and installation instructions for Tails, Qubes OS, and GrapheneOS encrypted messengers
|
||||
- [Kill the Cop in Your Pocket](https://www.anarsec.guide/posts/nophones/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/nophones/index.html)] - your phone's location is tracked at all times, and this data is harvested by private companies, allowing police to bypass laws requiring them to obtain a warrant
|
||||
- [The Cop in Your Pocket: Your Phone's Location is tracked at ALL times](https://www.anarsec.guide/posts/nophones/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/nophones/index.html)] - your phone's location is tracked at all times, and this data is harvested by private companies, allowing police to bypass laws requiring them to obtain a warrant
|
||||
- [Remove Identifying Metadata From Files](https://www.anarsec.guide/posts/metadata/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/metadata/index.html)] - metadata is 'data about data' or 'information about information'. in the context of files, this can mean information that is automatically embedded in the file, and this information can be used to deanonymize you
|
||||
- [Defending against Stylometric attacks](https://seirdy.one/posts/2022/07/09/stylometric-fingerprinting-redux/) [[Tor](http://wgq3bd2kqoybhstp77i3wrzbfnsyd27wt34psaja4grqiezqircorkyd.onion/posts/2022/07/09/stylometric-fingerprinting-redux/)] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. it’s one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
|
||||
- [EFF Surveillance Self-Defense: The Basics](https://ssd.eff.org/module-categories/basics) - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
|
||||
- [EFF Surveillance Self-Defense: Tool Guides](https://ssd.eff.org/module-categories/basics) - step-by-step tutorials to help you install and use handy privacy and security tools
|
||||
- [Prism Break](https://prism-break.org) - opt out of global data surveillance programs like prism, xkeyscore and tempora.
|
||||
- [The New Oil](https://thenewoil.org/) [[Tor](http://vyrgfx4jz2lnejqduons56ph5xtsrtaoo7ovny53dd7okyzhfsgkzbad.onion/)] - the beginner’s guide to data privacy & cybersecurity
|
||||
- [Techlore](https://www.techlore.tech) - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
|
||||
- [Into the Crypt](https://0xacab.org/optout/into-the-crypt) - the art of anti-forensics
|
||||
- [Advanced Privacy and Anonymity Using VMs, VPN’s, Tor](https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-1/) - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
|
||||
- [How to create anonymous Telegram and Signal accounts without a phone](https://web.archive.org/web/20230603151721/https://agorism.blog/anarkio/anonymous-telegram-account) - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
|
||||
- [Security Tips & Devices for Digital Nomads](https://web.archive.org/web/20231010234237/https://officercia.mirror.xyz/GX0LvoKDcC12ACXzhT3F_3PVRSfEyhE8cJYMZnoia9U) - various tools and gadgets for OpSec, written with a preference for practical usability
|
||||
- [Telegram Security Best Practices](https://web.archive.org/web/20231011012559/https://officercia.mirror.xyz/i9-pRa_r9Of1RNf-tnkhJLO9ho3gwhBK-4ARHNFtmvM) - quick tips that will help you sleep better at night when using Telegram
|
||||
- [EFF Surveillance Self-Defense: The Basics](https://ssd.eff.org/module-categories/basics) - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
|
||||
- [EFF Surveillance Self-Defense: Tool Guides](https://ssd.eff.org/module-categories/basics) - step-by-step tutorials to help you install and use handy privacy and security tools
|
||||
|
||||
### **Android**
|
||||
- [A brief and informal analysis of F-Droid security](https://wonderfall.dev/fdroid-issues/) - a write-up emphasizing major security issues with F-Droid
|
||||
@ -314,6 +315,7 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
- [Android](https://madaidans-insecurities.github.io/android.html) - common ways in which people worsen the security model of android
|
||||
|
||||
### **Secure Messengers**
|
||||
- [The Guide to Peer-to-Peer, Encryption, and Tor: New Communication Infrastructure for Anarchists](https://itsgoingdown.org/the-guide-to-peer-to-peer-encryption-and-tor-new-communication-infrastructure-for-anarchists/) - an exhaustive anarchist overview and guide to various apps and tech that utilize peer-to-peer and encryption
|
||||
- [Secure Communications Comparison](https://wiki.wired.rehab/index.php?title=Secure_Communications#cite_ref-26) - communicating securely over the internet is a must. this article compares available and actively-developed projects that are used for secure communications
|
||||
- [Signal Privacy Concerns (2019)](https://web.archive.org/web/20230708054922/https://github.com/privacytools/privacytools.io/issues/779) - arguments against the popular secure messenger signal
|
||||
- [A security analysis comparison between Signal, WhatsApp and Telegram [PDF]](https://eprint.iacr.org/2023/071.pdf) - a security analysis comparison between the three popular instant messaging apps. The analysis will focus on the encryption protocols used by each app and the security features they offer
|
||||
@ -396,7 +398,8 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
|
||||
---
|
||||
## **Surveillance Technology**
|
||||
|
||||
- [Ears and Eyes](https://www.notrace.how/earsandeyes/) - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
|
||||
- [Bugged Planet](https://buggedplanet.info/index.php?title=Main_Page) - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
|
||||
- [Harris: Wide Area Airborne Motion Imagery](https://yewtu.be/watch?v=ptSeU-OnI8E) - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
|
||||
- [CRI LodeStar Wide Area Motion Imagery (WAMI)](https://yewtu.be/watch?v=gM8OlvF_g6s) - a demonstration of cri lodestar wide area motion imagery (wami) system
|
||||
- [Harris: Airborne Augmented Reality]() - video with augmented reality overlays enhances situation awareness for teams in the field, analysts and decision makers. overlays poi features, building names, and road names
|
||||
|
@ -288,25 +288,26 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
- [Privacy Guides](https://www.privacyguides.org/) - a non-profit, socially motivated website that provides information for protecting your data security and privacy
|
||||
- [Extreme Privacy 4th Edition](https://annas-archive.org/md5/3bca9891bf832a50e0f8d7aee7555eb3) - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view.
|
||||
- [Anonymous Land](https://www.anonymousland.org) - a community dedicated to providing anonymity enhancing guides and services
|
||||
- [Prism Break](https://prism-break.org) - opt out of global data surveillance programs like prism, xkeyscore and tempora.
|
||||
- [The New Oil](https://thenewoil.org/) [[Tor](http://vyrgfx4jz2lnejqduons56ph5xtsrtaoo7ovny53dd7okyzhfsgkzbad.onion/)] - the beginner’s guide to data privacy & cybersecurity
|
||||
- [Techlore](https://www.techlore.tech) - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
|
||||
- [No Trace Project](https://www.notrace.how/) - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
|
||||
- [Qubes OS for Anarchists](https://www.anarsec.guide/posts/qubes/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/qubes/index.html)] - Qubes OS is a security-oriented operating system (OS), which means it is an operating system designed from the ground up to be more difficult to hack. Given that anarchists are regularly targeted for hacking in repressive investigations, Qubes OS is an excellent choice
|
||||
- [GrapheneOS for Anarchists](https://www.anarsec.guide/posts/grapheneos/) - [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/grapheneos/index.html)] - anarchists should not have phones. if you must use a phone, make it as difficult as possible for an adversary to geotrack it, intercept its messages, or hack it. this means using grapheneos
|
||||
- [Tails for Anarchists](https://www.anarsec.guide/posts/tails/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tails/index.html)] - tails is an operating system that makes anonymous computer use accessible to everyone. tails is designed to leave no trace of your activity on your computer unless you explicitly configure it to save specific data
|
||||
- [Tails Opsec for Anarchists](https://www.anarsec.guide/posts/tails-best/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tails-best/index.html)] - additional precautions you can take that are relevant to an anarchist threat model - operational security for tails
|
||||
- [Make Your Electronics Tamper-Evident](https://www.anarsec.guide/posts/tamper/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tamper/index.html)] - if the police ever have physical access to an electronic device like a laptop, even for five minutes, they can install hardware keyloggers, create images of the storage media, or otherwise trivially compromise it at the hardware, firmware, or software level. one way to minimize this risk is to make it tamper-evident
|
||||
- [Encrypted Messaging for Anarchists](https://www.anarsec.guide/posts/e2ee/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/e2ee/index.html)] - This article provides an overview and installation instructions for Tails, Qubes OS, and GrapheneOS encrypted messengers
|
||||
- [Kill the Cop in Your Pocket](https://www.anarsec.guide/posts/nophones/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/nophones/index.html)] - your phone's location is tracked at all times, and this data is harvested by private companies, allowing police to bypass laws requiring them to obtain a warrant
|
||||
- [The Cop in Your Pocket: Your Phone's Location is tracked at ALL times](https://www.anarsec.guide/posts/nophones/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/nophones/index.html)] - your phone's location is tracked at all times, and this data is harvested by private companies, allowing police to bypass laws requiring them to obtain a warrant
|
||||
- [Remove Identifying Metadata From Files](https://www.anarsec.guide/posts/metadata/) [[Tor](http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/metadata/index.html)] - metadata is 'data about data' or 'information about information'. in the context of files, this can mean information that is automatically embedded in the file, and this information can be used to deanonymize you
|
||||
- [Defending against Stylometric attacks](https://seirdy.one/posts/2022/07/09/stylometric-fingerprinting-redux/) [[Tor](http://wgq3bd2kqoybhstp77i3wrzbfnsyd27wt34psaja4grqiezqircorkyd.onion/posts/2022/07/09/stylometric-fingerprinting-redux/)] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. it’s one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
|
||||
- [EFF Surveillance Self-Defense: The Basics](https://ssd.eff.org/module-categories/basics) - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
|
||||
- [EFF Surveillance Self-Defense: Tool Guides](https://ssd.eff.org/module-categories/basics) - step-by-step tutorials to help you install and use handy privacy and security tools
|
||||
- [Prism Break](https://prism-break.org) - opt out of global data surveillance programs like prism, xkeyscore and tempora.
|
||||
- [The New Oil](https://thenewoil.org/) [[Tor](http://vyrgfx4jz2lnejqduons56ph5xtsrtaoo7ovny53dd7okyzhfsgkzbad.onion/)] - the beginner’s guide to data privacy & cybersecurity
|
||||
- [Techlore](https://www.techlore.tech) - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
|
||||
- [Into the Crypt](https://0xacab.org/optout/into-the-crypt) - the art of anti-forensics
|
||||
- [Advanced Privacy and Anonymity Using VMs, VPN’s, Tor](https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-1/) - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
|
||||
- [How to create anonymous Telegram and Signal accounts without a phone](https://web.archive.org/web/20230603151721/https://agorism.blog/anarkio/anonymous-telegram-account) - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
|
||||
- [Security Tips & Devices for Digital Nomads](https://web.archive.org/web/20231010234237/https://officercia.mirror.xyz/GX0LvoKDcC12ACXzhT3F_3PVRSfEyhE8cJYMZnoia9U) - various tools and gadgets for OpSec, written with a preference for practical usability
|
||||
- [Telegram Security Best Practices](https://web.archive.org/web/20231011012559/https://officercia.mirror.xyz/i9-pRa_r9Of1RNf-tnkhJLO9ho3gwhBK-4ARHNFtmvM) - quick tips that will help you sleep better at night when using Telegram
|
||||
- [EFF Surveillance Self-Defense: The Basics](https://ssd.eff.org/module-categories/basics) - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
|
||||
- [EFF Surveillance Self-Defense: Tool Guides](https://ssd.eff.org/module-categories/basics) - step-by-step tutorials to help you install and use handy privacy and security tools
|
||||
|
||||
### **Android**
|
||||
- [A brief and informal analysis of F-Droid security](https://wonderfall.dev/fdroid-issues/) - a write-up emphasizing major security issues with F-Droid
|
||||
@ -314,6 +315,7 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
- [Android](https://madaidans-insecurities.github.io/android.html) - common ways in which people worsen the security model of android
|
||||
|
||||
### **Secure Messengers**
|
||||
- [The Guide to Peer-to-Peer, Encryption, and Tor: New Communication Infrastructure for Anarchists](https://itsgoingdown.org/the-guide-to-peer-to-peer-encryption-and-tor-new-communication-infrastructure-for-anarchists/) - an exhaustive anarchist overview and guide to various apps and tech that utilize peer-to-peer and encryption
|
||||
- [Secure Communications Comparison](https://wiki.wired.rehab/index.php?title=Secure_Communications#cite_ref-26) - communicating securely over the internet is a must. this article compares available and actively-developed projects that are used for secure communications
|
||||
- [Signal Privacy Concerns (2019)](https://web.archive.org/web/20230708054922/https://github.com/privacytools/privacytools.io/issues/779) - arguments against the popular secure messenger signal
|
||||
- [A security analysis comparison between Signal, WhatsApp and Telegram [PDF]](https://eprint.iacr.org/2023/071.pdf) - a security analysis comparison between the three popular instant messaging apps. The analysis will focus on the encryption protocols used by each app and the security features they offer
|
||||
@ -396,7 +398,8 @@ Anyone that agrees to our [[Terms of Service](https://git.hackliberty.org/hackli
|
||||
|
||||
---
|
||||
## **Surveillance Technology**
|
||||
|
||||
- [Ears and Eyes](https://www.notrace.how/earsandeyes/) - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
|
||||
- [Bugged Planet](https://buggedplanet.info/index.php?title=Main_Page) - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
|
||||
- [Harris: Wide Area Airborne Motion Imagery](https://yewtu.be/watch?v=ptSeU-OnI8E) - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
|
||||
- [CRI LodeStar Wide Area Motion Imagery (WAMI)](https://yewtu.be/watch?v=gM8OlvF_g6s) - a demonstration of cri lodestar wide area motion imagery (wami) system
|
||||
- [Harris: Airborne Augmented Reality]() - video with augmented reality overlays enhances situation awareness for teams in the field, analysts and decision makers. overlays poi features, building names, and road names
|
||||
|
Loading…
Reference in New Issue
Block a user