initial commit

This commit is contained in:
c0mmando 2023-03-04 19:01:47 +00:00
parent 5666991aaf
commit e26c3518c2

356 Normal file
View File

@ -0,0 +1,356 @@
# **Hack Liberty Resources**
## **About [Hack Liberty](**
We are a group of cypherpunks, privacy advocates, engineers, and philosophers dedicated to the pursuit of truth, liberty, and knowledge for all. We believe technology is a tool for liberation, not enslavement. We fight tyranny with encryption, decentralization, and anonymity. **[Join us](** in this fight for liberty.
## **Hack Liberty Services**
All our services use open source software and are open to the public. We **[anonymize logs](** and use **[full disk encryption](** to preserve user privacy. Our hosting provider **[1984](** is located in **[Iceland](** and supports human rights and free speech. Our **[Matrix Server](** uses a **[hardened memory allocator](** and we use **[Alpine Linux](** whenever possible.
- [Matrix]( - an open protocol for real-time, distributed communications with strong end-to-end encryption, user verification, and other cryptographic protection mechanisms
- [Element]( - a glossy Matrix client for the web built on top of matrix-react-sdk with an emphasis on performance and usability
- [SchildiChat]( - a Matrix client for the web based on Element with a more traditional instant messaging experience
- [Lemmy]( - A link aggregator and forum for the fediverse
- [Gitea]( - A painless self-hosted Git service
- [Bookstack]( - an opinionated wiki system that provides a pleasant and simple out-of-the-box experience
- [PrivateBin]( a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode
- [OTS]( - One-Time-Secret sharing platform with symmetric 256bit AES encryption in the browser
- [Blog]( - A blog for long form content and guides
## **Hack Liberty Matrix Community**
Anyone that agrees to our [[Terms of Service]( + [Code of Conduct]( + [Privacy Policy](] is welcome to [create]( a Matrix account on our server and join the conversation!
- [Hack Liberty Space]( - ``
- [Hack Liberty Community]( - ``
- [Artifical Intelligence (AI)]( - ``
- [Crypto Circular Economies]( - ``
- [Cypherpunk Cryptopia]( - ``
- [Forbidden Knowledge]( - ``
- [Anonymity Privacy and Security]( - ``
- [Wireless and RF Hacking]( - ``
- [RSS - Cypherpunk News]( - ``
- [RSS - Dark Web News]( - ``
- [RSS - Hack Liberty Git]( - ``
- [RSS - Hack Liberty News]( - ``
- [RSS - Libertarian News]( - ``
- [RSS - Matrix News]( - ``
- [RSS - Monero News]( - ``
- [RSS - Security News]( - ``
## **Recommended Matrix Rooms**
- [Anonymity]( - ``
- [Citadel Chat]( - ``
- [GrapheneOS]( - ``
- [GrapheneOS Off Topic]( - ``
- [Monero]( - ``
- [Monero Community]( - ``
- [Privacy Discussion]( - ``
- [Privacy Guides Main]( - ``
- [Qubes OS]( - ``
- [Opt Out Podcast]( - ``
## **Philosophy Resources**
### **Agorism**
- [An Agorist Primer](
- [An Argument Against KYC Bitcoin](
- [KYC-Free Bitcoin Circular Economies: Free The Markets, Free The World](
- [Its Time To Join The Bitcoin Circular Economy](
- [How Monero Uniquely Enables Circular Economies](
- [KYC-free Bitcoin Circular Economies](
- [Building a circular economy with Monero](
- [Agorist Journal](
### **Crypto Anarchy**
- [Second Realm: Book on Strategy](
- [Fifty things to do NOW](
- [Second Realm Ideas](
- [50+ libertarian, agorist and anarchist ebooks (SEK3, Mises, Rothbard & more)](
- [Roadblocks to obtaining government-issued ID](
- [True Names Not Required: On Identity and Pseudonymity in Cyberspace](
- [How to survive outside of the state with Crypto Agorism](
- [Why the states monopoly on identity is more dangerous than Google, Facebook and Microsoft](
- [How to buy, earn and spend KYC-free Bitcoin and Monero (without ID or a bank account)](
- [KYC Will Not Protect Us, Bitcoin And Encryption Will](
- [The rarely discussed dangers of KYC and what you can do about it](
- [Why Twitters KYCed Bitcoin tips are dangerous and what KYC-free alternatives you can use](
- [The dangers of “decentralized” ID systems](
### **Manifestos**
- [The GNU Manifesto (1985)](
- [The Hacker's Manifesto (1986)](
- [The Crypto Anarchist Manifesto (1988)](
- [A Cypherpunks Manifesto (1993)](
- [Crypto Anarchy and Virtual Communities (1994)](
- [The Cyphernomicon (1994)](
- [A Declaration of the Independence of Cyberspace (1996)](
- [A Cyberpunk Manifesto (1997)](
- [b-money (1998)](
- [Bit-gold (2005)](
- [State and Terrorist Conspiracies and Conspiracy as Governance (2006)](
- [Guerilla Open Access Manifesto (2008)](
- [The libbitcoin Manifesto (2013)](
## **Cryptocurrency Resources**
### **NoKYC Guides**
- [How to buy non KYC Bitcoin]( - how to buy non-KYC bitcoin from a Bitcoin ATM
- [How to buy non KYC Monero]( - how to buy non-KYC bitcoin at a Bitcoin ATM and convert to Monero using Bisq
- [How to buy your first non KYC bitcoin and monero]( - a presentation by Heady Wook
- [How to buy non KYC bitcoin with a US Postal Money Order on Bisq]( - how to buy non-KYC bitcoin using a US Postal Money Order on Bisq
- [How to use a certified mail receipt to buy non KYC Bitcoin]( - using a Certified Mailing Receipt when sending a money order for buying non-KYC Bitcoin on Bisq
- [How to accept non-KYC bitcoin with BTCPay Jungle and Electrum]( - how to start receiving non-KYC bitcoin payments in exchange for online goods and services
### **Crypto Services Directories**
- [KYCNOT.ME]( directory for No-KYC exchanges and services
- [AcceptedHere]( directory for online and offline businesses accepting cryptocurrency
- [CryptWerk]( - directory with companies, websites, shops, services that accept crypto
- [Bitcoin Bookmarks]( for premium crypto websites sorted by quality
- [Monerica]( directory for the Monero circular economy
- [Lightning Network Stores]( - directory for stores that accept bitcoin through the lightning network
### **Automated Exchanges**
- []( [[Tor](http://trocadorfyhlu27aefre5u7zri66gudtzdyelymftvr4yjwcxhfaqsid.onion)] - a privacy-focused exchange aggregator
### **Peer to Peer Exchanges**
- [Bisq]( - buy and sell bitcoin or monero for fiat using the Bisq peer-to-peer network
- [LocalMonero]( [[Tor](http://nehdddktmhvqklsnkjqcbpmb63htee2iznpcbs5tgzctipxykpj6yrid.onion/)] - a marketplace where users can buy and sell Monero to and from each other
- [AgoraDesk]( [[Tor](http://2jopbxfi2mrw6pfpmufm7smacrgniglr7a4raaila3kwlhlumflxfxad.onion/)]- P2P site for buying and selling cryptocurrencies
- [Robosats]( [[Tor](http://robosats6tkf3eva7x2voqso3a5wcorsnw34jveyxfqi2fu7oyheasid.onion/)]- a peer to peer exchange for converting bitcoin to national currencies via lightning hold invoices
- [HodlHodl]( - global peer to peer bitcoin trading platform
### **Peer to Peer Crypto Marketplaces and Freelancing**
- [Bitejo]( - a marketplace for advertising goods and services for Bitcoin and Monero
- [TukanMarket]( - a bitcoin marketplace for advertising goods and services
- [Bitcoin P2P Marketplace]( - a bitcoin P2P marketplace telegram channel
- [Monero Market]( - a reddit marketplace for buying and selling items with Monero
- [Microlancer]( - a freelancing platform designed for quick milestones and secure escrowed payments using the lightning network
### **Crypto VPS & Domain Services**
- [1984]( - high quality web hosting and VPS service provider that respects and protects the civil and political rights of customers
- [Incognet]( - privacy respecting web host and VPS provider
- [Njalla]( - anonymous domain name registrar and VPS provider
### **Crypto VPN Services**
- [Mullvad VPN]( - a Sweden-based VPN provider with a long-standing reputation for privacy and efficiency
- [IVPN]( - a Gibraltar-registered service that has been preserving customers privacy since 2009
### **Crypto Credit Cards**
- [Pay with Moon]( - bitcoin/lighting backed virtual credit cards
- [Ezzocard]( - purchase virutal prepaid cards that work anywhere in the world
- [The Bitcoin Company]( - buy Visa cards, gift cards, phone top-ups, and more
### **Crypto Gift Cards**
- [CardCoins]( - convert prepaid gift cards into digital currency at over 80,000 locations nationwide
- [Cake Pay]( - buy gift cards and related products with virtual assets for use at millions of merchants worldwide
### **Crypto eSim Providers**
- [SilentLink]( - a global mobile and phone number provider for eSIM-compatible smartphones
- [AnonCards]( - buy SIM, ESIM and gift cards with Monero
### **Crypto SMS Providers**
- [JMP]( - allows you to send and receive text messages, pictures, phone calls, and voicemails using a Jabber (XMPP) client
- [TextVerified]( SMS verficiation service that accepts Crypto
- [SMSPVA]( - offers a large list of SMS verification numbers you can rent with BTC
- [JuicySMS]( - verify online accounts with temporary real phone numbers
- [Virtualsim]( - cheap SMS service for hundreds of services and many countries
- [SMS4Sats]( - offers SMS verification numbers online
## **Privacy and Security Resources**
### **Guides**
- []( - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
- []( - a non-profit, socially motivated website that provides information for protecting your data security and privacy
- []( - a community dedicated to providing anonymity enhancing guides and services
- [Advanced Privacy and Anonymity Using VMs, VPNs, Tor]( - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
- [How to create anonymous Telegram and Signal accounts without a phone]( - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
### **Android**
- [A brief and informal analysis of F-Droid security]( - a write-up emphasizing major security issues with F-Droid
- [Android Tips]( - list of tips for buying and using Android phones
- [Android]( - common ways in which people worsen the security model of android
### **Desktop**
- [Desktop Linux Hardening]( - a guide that intermediate to advanced Linux users can reasonably follow to set up and maintain hardened security configurations
- [Linux]( - an article debunking common misunderstandings on desktop Linux's security model.
- [Linux Hardening Guide]( - how to harden Linux as much as possible for security and privacy
- [Choosing Your Desktop Linux Distribution]( - privacy and security considerations when choosing a Linux distribution
- [security-misc]( - configurations to enhance Linux security
- [The Linux Security Circus: On GUI isolation]( - article detailing the lack of GUI-level isolation in Linux, and how it nullifies all Linux desktop security
- [Re: X11 -> Root? (Qubes square rooted)]( - criticisms of the Qubes security model
### **Tor and VPNs**
- [VPN - a Very Precarious Narrative]( - criticisms for VPN use
- [Commercial VPN Use Cases]( - realistics use cases for VPNs
- [Dont use VPN services]( - a case for ditching VPN use
- [You want Tor Browser … not a VPN]( - use case comparisons betwen Tor and VPN use
- [IPVanish “No-Logging” VPN Led Homeland Security to Comcast User]( - an article detailing the time IPVanish doxed a customer to Homeland Security
- [Is Tor Trustworthy and Safe?]( - an article detailing considerations and cons when using Tor
### **General**
- [Security and Privacy Advice]( - security and privacy advice for desktop, mobile, browser, messengers, email, passwords, 2FA, and social media.
- [Despite DoH and ESNI, with OCSP, web activity is insecure and not private]( - how OCSP responses are a privacy nightmare
- [Badness Enumeration]( - why badness enumeration as a concept is flawed and some examples of its failings in practice
- [The Six Dumbest Ideas in Computer Security]( - default permit, badness enumeration, penetrate and patch, hacking is cool, educating users, action is better than inaction
- [Threat Modeling]( - the first task a person should do when taking steps to protect their privacy and security
- [The right thing for the wrong reasons: FLOSS doesnt imply security]( - source unavailability doesnt imply insecurity, and source availability doesnt imply security
- [FLOSS Security]( - while source code is critical for user autonomy, it isnt required to evaluate software security or understand run-time behavior
- [Two types of privacy]( - two main approaches to privacy: “tracking reduction” and “tracking evasion”
- [Recovering redacted information from pixelated videos]( - image/video blurring methods and their weaknesses
- [Lets Enhance! How we found @rogerkvers $1,000 wallet obfuscated private key]( - by overcoming blurring techniques
- [Email (In)security]( - email is an inherently insecure protocol, conceived at a time when security was an afterthought
### **Fingerprinting Articles**
- [NetworkManager Minor Hardening]( - MAC address randomization, removing static hostname to prevent hostname broadcast, and disabling sending hostname to DHCP server
- [How CSS Alone Can Help Track You]( - how CSS can fingerprint with javascript disabled
- [Browser Tracking]( - misguided ways in which people attempt to improve their privacy when browsing the web
- [Dont update NTP stop using it]( - arguements for why NTP has to die
### **Fingerprinting Tests**
- [TorZillaPrint]( - comprehensive, all-in-one, fingerprinting test suite
- [No-JS fingerprinting]( - demonstration of how fingerprinting can occur even in the absence of JavaScript
- [CSS Fingerprint]( - exploiting CSS to collect various characteristics about the visitor
- [CreepJS]( - creepy device and browser fingerprinting
- [Kloak]( - Kloak is a Keystroke Anonymization Tool
- [AudioContext Fingerprint]( - tests browser-fingerprinting using the AudioContext and Canvas API
- [Available Fonts]( - gets available fonts on browser without flash
- [Browser Fingerprinting]( - analysis of Bot Protection systems with available countermeasures
- [BrowserLeaks]( - a gallery of web technologies security testing tools
- [Canvas Test]( - checks if the addon CanvasBlocker can be detected by websites
- [CSS Exfil Vulnerability Tester]( - test to see if your browser is vulnerable to Cascading Style Sheets (CSS) data leakage
- [Device Info]( - a web browser security testing, privacy testing, and troubleshooting tool
- [DNS Cookie Demonstration]( - uses DNS caches as a side-channel to identify related network flows
- [EFF: Cover Your Tracks]( - understand how easy it is to identify and track your browser based on how it appears to websites
- [Epic Tracker]( - fingerprinting demo with some automated lookups using modern Javascript APIs
- [Extension Fingerprints]( - detecting Chrome extensions by fetching web accessible resources
- [Firefox Addon Detector]( - tracking 400+ firefox addons through chrome:// URI trickery!
- [Iphey]( - Browser Fingerprinter
- [Mouse Wheel Tracking Test]( - fingerprint based on tracking your mouse's wheel
- [Nothing Private]( - proof of concept to show any website can identify and track you
- [PicassAuth]( - canvas fingerprinting
- [Pixelscan]( - basically a bot check
- [Privacy Check]( - this website aims to focus on each fingerprinting technique in detail
- [scheme flooding]( - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
- [SuperCookie]( - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
- [Webgl Fingerprinting]( - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
- []( - TCP/IP fingerprinting for VPN and Proxy Detection
## **Awesome Git Resource Mirrors**
### **Artifical Intelligence**
- [ai-collection]( - a collection of awesome generative AI applications
- [awesome-bots]( - the most awesome list about bots
- [awesome-chatgpt]( - a curated list of ChatGPT related resource, tools, prompts, apps
- [awesome-deep-text-detection-recognition]( - a curated list of resources for optical character recognition with deep learning methods
- [awesome-sentiment-analysis]( - a curated list of Sentiment Analysis methods, implementations and misc.
- [awesome-stable-diffusion]( - curated list of awesome resources for the Stable Diffusion AI Model
### **Computer Science**
- [awesome-cli-apps]( - a curated list of command line apps
- [awesome-courses]( - list of awesome university courses for learning Computer Science
- [awesome-linux-software]( - a list of awesome Linux softwares
- [awesome-math]( - a curated list of awesome mathematics resources
- [awesome-podcasts]( - awesome list of Important Podcasts for software engineers
- [awesome-quantum-computing]( - a curated list of awesome quantum computing learning and developing resources
- [awesome-youtubers]( - an awesome list of YouTubers that teach about technology
- [OSSU-computer-science]( - path to a free self-taught education in Computer Science
### **Crypto**
- [awesome-blockchain]( - curated list of resources for the development and applications of blockchain
- [awesome-cryptography]( - a curated list of cryptography resources and links
- [awesome-crypto-papers]( - a curated list of cryptography papers, articles, tutorials and how-tos
- [awesome-decentralized-finance]( - a curated list of awesome decentralized finance projects
- [Crypto-OpSec-SelfGuard-RoadMap]( - defi, blockchain and crypto-related opsec research
### **Data Hoarding**
- [awesome-data-labeling]( - a curated list of awesome data labeling tools
- [awesome-ipfs]( - useful resources for using IPFS and building things on top of it
- [awesome-piracy]( - a curated list of awesome warez and piracy links
- [awesome-web-archiving]( - an awesome list for getting started with web archiving
### **Privacy**
- [alternative-front-ends]( - alternative open source front-ends for popular internet platforms
- [awesome-decentralized]( - awesome list of distributed, decentralized, p2p apps and tools
- [awesome-decentralized-web]( - an awesome list of decentralized services and technologies
- [awesome-privacy]( - a curated list of services and alternatives that respect your privacy because PRIVACY MATTERS
- [awesome-qubes-os]( - a curated list of awesome qubes os links
- [decentralized-id]( - self sovereign identity
### **Misc**
- [awesome-lockpicking]( - a curated list of resources related to the compromise of locks, safes, and keys
- [awesome-readme]( - a curated list of awesome READMEs
- [search-engine-optimization]( - a helpful checklist/collection of Search Engine Optimization (SEO) tips and techniques
### **Open Source Intelligence**
- [awesome-geospatial]( - long list of geospatial tools and resources
- [awesome-hacker-search-engines]( - a curated list of awesome hacker search engines
- [awesome-osint]( - a curated list of amazingly awesome open source intelligence tools and resources
- [awesome-shodan-queries]( - a collection of interesting, funny, and depressing search queries to plug into shodan
- [awesome-telegram-osint]( - a curated list of awesome telegram OSINT tools, sites & resources
### **Security**
- [awesome-api-security]( - a collection of awesome API Security tools and resources
- [awesome-aws-security]( - a curated list of links, references, books, videos, tutorials, exploits, and CTF related to AWS security
- [awesome-bugbounty-tools]( - a curated list of various bug bounty tools
- [awesome-captcha]( - curated list of awesome captcha libraries and crack tools
- [awesome-cybersecurity-blueteam]( - a curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams
- [awesome-cyber-skills]( - a curated list of hacking environments where you can train your cyber skills legally and safely
- [awesome-embedded-and-iot-security]( - a curated list of awesome embedded and IoT security resources
- [awesome-flipperzero]( - a collection of awesome resources for the Flipper Zero device
- [awesome-fuzzing]( - a curated list of fuzzing resources
- [awesome-honeypots]( - an awesome list of honeypot resources
- [awesome-incident-response]( - a curated list of tools for incident response
- [awesome-kubernetes-security]( - a curated list of awesome Kubernetes security resources
- [awesome-linux-rootkits]( - a curated list of awesome linux rootkits
- [awesome-malware-analysis]( - a curated list of awesome malware analysis tools and resources
- [awesome-mobile-security]( - an effort to build a single place for all useful android and iOS security related stuff
- [awesome-network-analysis]( - a curated list of awesome network analysis resources
- [awesome-nginx-security]( - a curated list of awesome links related to NGINX appsec
- [awesome-oscp]( - a curated list of awesome OSCP resources
- [awesome-pentest]( - a collection of awesome penetration testing resources, tools and other shiny things
- [awesome-privilege-escalation]( - A curated list of awesome privilege escalation
- [awesome-security]( - a collection of awesome software, libraries, documents, books, resources and cool stuff about security
- [awesome-security-hardening]( - a collection of awesome security hardening guides, tools and other resources
- [awesome-social-engineering]( - a curated list of awesome social engineering resources
- [awesome-threat-detection]( - a curated list of awesome threat detection and hunting resources
- [awesome-threat-modelling]( - a curated list of threat modeling resources
- [awesome-vulnerable]( - a curated list of vulnerable apps and systems
- [awesome-WAF]( - everything about web application firewalls (WAFs)
- [awesome-web-security]( - a curated list of web security materials and resources
- [cyber-security-resources]( - thousands of cyber security resources
- [ForensicsTools]( - a list of free and open forensics analysis tools and other resources
- [my-infosec-awesome]( - curated list of awesome links, resources and tools on infosec related topics
- [personal-security-checklist]( - a compiled checklist of 300+ tips for protecting digital security and privacy
- [security-apis]( - a collective list of public APIs for use in security
- [WebHackersWeapons]( - a collection of cool tools used by web hackers
### **System Administration**
- [awesome-ansible]( - collaborative curated list of awesome Ansible resources, tools, roles, tutorials and other related stuff
- [awesome-bash]( - a curated list of delightful Bash scripts and resources
- [awesome-devops]( - a curated list of awesome DevOps platforms, tools, practices and resources
- [awesome-docker]( - a curated list of Docker resources and projects
- [awesome-git]( - a curated list of amazingly awesome Git tools, resources and shiny things
- [awesome-gitea]( - a curated list of awesome projects related to Gitea
- [awesome-hugo]( - a curated list of awesome things related to Hugo, the world's fastest framework for building websites
- [awesome-k8s-resources]( - a curated list of awesome Kubernetes tools and resources
- [awesome-linux-containers]( - a curated list of awesome Linux Containers frameworks, libraries and software
- [awesome-network-automation]( - a curated list about Network Automation
- [awesome-powershell]( - a curated list of delightful PowerShell modules and resources
- [awesome-scalability]( - the patterns of scalable, reliable, and performant large-scale systems
- [awesome-selfhosted]( - a list of Free Software network services and web applications which can be hosted on your own servers
- [awesome-shell]( - a curated list of awesome command-line frameworks, toolkits, guides and gizmos
- [awesome-sysadmin]( - a curated list of amazingly awesome open source sysadmin resources
- [awesome-tmux]( - a list of awesome resources for tmux
- [awesome-vscode]( - a curated list of delightful VS Code packages and resources
- [Linux-Bash-Commands]( - ultimate list of Linux bash commands, cheatsheet and resources
- [the-book-of-secret-knowledge]( - a collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more