hack-liberty-resources.md | ||
README.md |
Hack Liberty Resources
VERITAS - LIBERTAS - SCIENTIA
About Hack Liberty
We are a group of cypherpunks, privacy advocates, engineers, and philosophers dedicated to the pursuit of truth, liberty, and knowledge for all. We believe technology is a tool for liberation, not enslavement. We fight tyranny with encryption, decentralization, and anonymity. Join us in this fight for liberty.
Hack Liberty Services
All our services use open source software and are open to the public. We anonymize logs and use full disk encryption to preserve user privacy. Our hosting provider 1984 is located in Iceland and supports human rights and free speech. Our Matrix Server uses a hardened memory allocator and we use Alpine Linux whenever possible.
- Matrix - an open protocol for real-time, distributed communications with strong end-to-end encryption, user verification, and other cryptographic protection mechanisms
- Element - a glossy Matrix client for the web built on top of matrix-react-sdk with an emphasis on performance and usability
- SchildiChat - a Matrix client for the web based on Element with a more traditional instant messaging experience
- Lemmy - A link aggregator and forum for the fediverse
- Gitea - A painless self-hosted Git service
- Bookstack - an opinionated wiki system that provides a pleasant and simple out-of-the-box experience
- PrivateBin- a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode
- OTS - One-Time-Secret sharing platform with symmetric 256bit AES encryption in the browser
- Blog - A blog for long form content and guides
Hack Liberty Matrix Community
Anyone that agrees to our [Terms of Service + Code of Conduct + Privacy Policy] is welcome to create a Matrix account on our server and join the conversation!
- Hack Liberty Space -
#hackliberty.org:hackliberty.org
- Hack Liberty Community -
#community:hackliberty.org
- Artifical Intelligence (AI) -
#ai:hackliberty.org
- Crypto Circular Economies -
#circular-economy:hackliberty.org
- Cypherpunk Cryptopia -
#cypherpunks:hackliberty.org
- Forbidden Knowledge -
#forbidden-knowledge:hackliberty.org
- Anonymity Privacy and Security -
#anon:hackliberty.org
- Wireless and RF Hacking -
wireless-hacking:hackliberty.org
- RSS - Cypherpunk News -
#cypherpunk-news:hackliberty.org
- RSS - Dark Web News -
#darkweb-news:hackliberty.org
- RSS - Hack Liberty Git -
#hackliberty-git:hackliberty.org
- RSS - Hack Liberty News -
#hackliberty-news:hackliberty.org
- RSS - Libertarian News -
#libertarian-news:hackliberty.org
- RSS - Matrix News -
#matrix-news:hackliberty.org
- RSS - Monero News -
#monero-news:hackliberty.org
- RSS - Security News -
#security-news:hackliberty.org
- Hack Liberty Community -
Recommended Matrix Rooms
- Anonymity -
#anonymity:matrix.anonymousplanet.org
- Citadel Chat -
#citadeldispatch:bitcoin.kyoto
- GrapheneOS -
#grapheneos:grapheneos.org
- GrapheneOS Off Topic -
#offtopic:grapheneos.org
- Monero -
#monero:monero.social
- Monero Community -
#monero-community:monero.social
- Privacy Discussion -
#privacy-discussion:matrix.org
- Privacy Guides Main -
#main:privacyguides.org
- Qubes OS -
#cybersec-qubes_os:matrix.org
- Opt Out Podcast -
#optout-general:matrix.optoutpod.com
Philosophy Resources
Agorism
- An Agorist Primer
- An Argument Against KYC Bitcoin
- KYC-Free Bitcoin Circular Economies: Free The Markets, Free The World
- It’s Time To Join The Bitcoin Circular Economy
- How Monero Uniquely Enables Circular Economies
- KYC-free Bitcoin Circular Economies
- Building a circular economy with Monero
- Agorist Journal
Crypto Anarchy
- Second Realm: Book on Strategy
- Fifty things to do NOW
- Second Realm Ideas
- 50+ libertarian, agorist and anarchist ebooks (SEK3, Mises, Rothbard & more)
- Roadblocks to obtaining government-issued ID
- True Names Not Required: On Identity and Pseudonymity in Cyberspace
- How to survive outside of the state with Crypto Agorism
- Why the state’s monopoly on identity is more dangerous than Google, Facebook and Microsoft
- How to buy, earn and spend KYC-free Bitcoin and Monero (without ID or a bank account)
- KYC Will Not Protect Us, Bitcoin And Encryption Will
- The rarely discussed dangers of KYC and what you can do about it
- Why Twitter’s KYC’ed Bitcoin tips are dangerous and what KYC-free alternatives you can use
- The dangers of “decentralized” ID systems
Manifestos
- The GNU Manifesto (1985)
- The Hacker's Manifesto (1986)
- The Crypto Anarchist Manifesto (1988)
- A Cypherpunks Manifesto (1993)
- Crypto Anarchy and Virtual Communities (1994)
- The Cyphernomicon (1994)
- A Declaration of the Independence of Cyberspace (1996)
- A Cyberpunk Manifesto (1997)
- b-money (1998)
- Bit-gold (2005)
- State and Terrorist Conspiracies and Conspiracy as Governance (2006)
- Guerilla Open Access Manifesto (2008)
- The libbitcoin Manifesto (2013)
Cryptocurrency Resources
NoKYC Guides
- How to buy non KYC Bitcoin - how to buy non-KYC bitcoin from a Bitcoin ATM
- How to buy non KYC Monero - how to buy non-KYC bitcoin at a Bitcoin ATM and convert to Monero using Bisq
- How to buy your first non KYC bitcoin and monero - a presentation by Heady Wook
- How to buy non KYC bitcoin with a US Postal Money Order on Bisq - how to buy non-KYC bitcoin using a US Postal Money Order on Bisq
- How to use a certified mail receipt to buy non KYC Bitcoin - using a Certified Mailing Receipt when sending a money order for buying non-KYC Bitcoin on Bisq
- How to accept non-KYC bitcoin with BTCPay Jungle and Electrum - how to start receiving non-KYC bitcoin payments in exchange for online goods and services
Crypto Services Directories
- KYCNOT.ME- directory for No-KYC exchanges and services
- AcceptedHere- directory for online and offline businesses accepting cryptocurrency
- CryptWerk - directory with companies, websites, shops, services that accept crypto
- Bitcoin Bookmarks-directory for premium crypto websites sorted by quality
- Monerica- directory for the Monero circular economy
- Lightning Network Stores - directory for stores that accept bitcoin through the lightning network
Automated Exchanges
- Trocador.app [Tor] - a privacy-focused exchange aggregator
Peer to Peer Exchanges
- Bisq - buy and sell bitcoin or monero for fiat using the Bisq peer-to-peer network
- LocalMonero [Tor] - a marketplace where users can buy and sell Monero to and from each other
- AgoraDesk [Tor]- P2P site for buying and selling cryptocurrencies
- Robosats [Tor]- a peer to peer exchange for converting bitcoin to national currencies via lightning hold invoices
- HodlHodl - global peer to peer bitcoin trading platform
Peer to Peer Crypto Marketplaces and Freelancing
- Bitejo - a marketplace for advertising goods and services for Bitcoin and Monero
- TukanMarket - a bitcoin marketplace for advertising goods and services
- Bitcoin P2P Marketplace - a bitcoin P2P marketplace telegram channel
- Monero Market - a reddit marketplace for buying and selling items with Monero
- Microlancer - a freelancing platform designed for quick milestones and secure escrowed payments using the lightning network
Crypto VPS & Domain Services
- 1984 - high quality web hosting and VPS service provider that respects and protects the civil and political rights of customers
- Incognet - privacy respecting web host and VPS provider
- Njalla - anonymous domain name registrar and VPS provider
Crypto VPN Services
- Mullvad VPN - a Sweden-based VPN provider with a long-standing reputation for privacy and efficiency
- IVPN - a Gibraltar-registered service that has been preserving customers privacy since 2009
Crypto Credit Cards
- Pay with Moon - bitcoin/lighting backed virtual credit cards
- Ezzocard - purchase virutal prepaid cards that work anywhere in the world
- The Bitcoin Company - buy Visa cards, gift cards, phone top-ups, and more
Crypto Gift Cards
- CardCoins - convert prepaid gift cards into digital currency at over 80,000 locations nationwide
- Cake Pay - buy gift cards and related products with virtual assets for use at millions of merchants worldwide
Crypto eSim Providers
- SilentLink - a global mobile and phone number provider for eSIM-compatible smartphones
- AnonCards - buy SIM, ESIM and gift cards with Monero
Crypto SMS Providers
- JMP - allows you to send and receive text messages, pictures, phone calls, and voicemails using a Jabber (XMPP) client
- TextVerified- SMS verficiation service that accepts Crypto
- SMSPVA - offers a large list of SMS verification numbers you can rent with BTC
- JuicySMS - verify online accounts with temporary real phone numbers
- Virtualsim - cheap SMS service for hundreds of services and many countries
- SMS4Sats - offers SMS verification numbers online
Privacy and Security Resources
Guides
- AnonymousPlanet.org - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
- PrivacyGuides.org - a non-profit, socially motivated website that provides information for protecting your data security and privacy
- AnonymousLand.org - a community dedicated to providing anonymity enhancing guides and services
- Advanced Privacy and Anonymity Using VMs, VPN’s, Tor - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
- How to create anonymous Telegram and Signal accounts without a phone - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
Android
- A brief and informal analysis of F-Droid security - a write-up emphasizing major security issues with F-Droid
- Android Tips - list of tips for buying and using Android phones
- Android - common ways in which people worsen the security model of android
Desktop
- Desktop Linux Hardening - a guide that intermediate to advanced Linux users can reasonably follow to set up and maintain hardened security configurations
- Linux - an article debunking common misunderstandings on desktop Linux's security model.
- Linux Hardening Guide - how to harden Linux as much as possible for security and privacy
- Choosing Your Desktop Linux Distribution - privacy and security considerations when choosing a Linux distribution
- security-misc - configurations to enhance Linux security
- The Linux Security Circus: On GUI isolation - article detailing the lack of GUI-level isolation in Linux, and how it nullifies all Linux desktop security
- Re: X11 -> Root? (Qubes square rooted) - criticisms of the Qubes security model
Tor and VPNs
- VPN - a Very Precarious Narrative - criticisms for VPN use
- Commercial VPN Use Cases - realistics use cases for VPNs
- Don’t use VPN services - a case for ditching VPN use
- You want Tor Browser … not a VPN - use case comparisons betwen Tor and VPN use
- IPVanish “No-Logging” VPN Led Homeland Security to Comcast User - an article detailing the time IPVanish doxed a customer to Homeland Security
- Is Tor Trustworthy and Safe? - an article detailing considerations and cons when using Tor
General
- Security and Privacy Advice - security and privacy advice for desktop, mobile, browser, messengers, email, passwords, 2FA, and social media.
- Despite DoH and ESNI, with OCSP, web activity is insecure and not private - how OCSP responses are a privacy nightmare
- Badness Enumeration - why badness enumeration as a concept is flawed and some examples of its failings in practice
- The Six Dumbest Ideas in Computer Security - default permit, badness enumeration, penetrate and patch, hacking is cool, educating users, action is better than inaction
- Threat Modeling - the first task a person should do when taking steps to protect their privacy and security
- The right thing for the wrong reasons: FLOSS doesn’t imply security - source unavailability doesn’t imply insecurity, and source availability doesn’t imply security
- FLOSS Security - while source code is critical for user autonomy, it isn’t required to evaluate software security or understand run-time behavior
- Two types of privacy - two main approaches to privacy: “tracking reduction” and “tracking evasion”
- Recovering redacted information from pixelated videos - image/video blurring methods and their weaknesses
- Let’s Enhance! How we found @rogerkver’s $1,000 wallet obfuscated private key - by overcoming blurring techniques
- Email (In)security - email is an inherently insecure protocol, conceived at a time when security was an afterthought
Fingerprinting Articles
- NetworkManager Minor Hardening - MAC address randomization, removing static hostname to prevent hostname broadcast, and disabling sending hostname to DHCP server
- How CSS Alone Can Help Track You - how CSS can fingerprint with javascript disabled
- Browser Tracking - misguided ways in which people attempt to improve their privacy when browsing the web
- Don’t update NTP – stop using it - arguements for why NTP has to die
Fingerprinting Tests
- TorZillaPrint - comprehensive, all-in-one, fingerprinting test suite
- No-JS fingerprinting - demonstration of how fingerprinting can occur even in the absence of JavaScript
- CSS Fingerprint - exploiting CSS to collect various characteristics about the visitor
- CreepJS - creepy device and browser fingerprinting
- Kloak - Kloak is a Keystroke Anonymization Tool
- AudioContext Fingerprint - tests browser-fingerprinting using the AudioContext and Canvas API
- Available Fonts - gets available fonts on browser without flash
- Browser Fingerprinting - analysis of Bot Protection systems with available countermeasures
- BrowserLeaks - a gallery of web technologies security testing tools
- Canvas Test - checks if the addon CanvasBlocker can be detected by websites
- CSS Exfil Vulnerability Tester - test to see if your browser is vulnerable to Cascading Style Sheets (CSS) data leakage
- Device Info - a web browser security testing, privacy testing, and troubleshooting tool
- DNS Cookie Demonstration - uses DNS caches as a side-channel to identify related network flows
- EFF: Cover Your Tracks - understand how easy it is to identify and track your browser based on how it appears to websites
- Epic Tracker - fingerprinting demo with some automated lookups using modern Javascript APIs
- Extension Fingerprints - detecting Chrome extensions by fetching web accessible resources
- Firefox Addon Detector - tracking 400+ firefox addons through chrome:// URI trickery!
- Iphey - Browser Fingerprinter
- Mouse Wheel Tracking Test - fingerprint based on tracking your mouse's wheel
- Nothing Private - proof of concept to show any website can identify and track you
- PicassAuth - canvas fingerprinting
- Pixelscan - basically a bot check
- Privacy Check - this website aims to focus on each fingerprinting technique in detail
- scheme flooding - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
- SuperCookie - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
- Webgl Fingerprinting - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
- Zardaxt.py - TCP/IP fingerprinting for VPN and Proxy Detection
Awesome Git Resource Mirrors
Artifical Intelligence
- ai-collection - a collection of awesome generative AI applications
- awesome-bots - the most awesome list about bots
- awesome-chatgpt - a curated list of ChatGPT related resource, tools, prompts, apps
- awesome-deep-text-detection-recognition - a curated list of resources for optical character recognition with deep learning methods
- awesome-sentiment-analysis - a curated list of Sentiment Analysis methods, implementations and misc.
- awesome-stable-diffusion - curated list of awesome resources for the Stable Diffusion AI Model
Computer Science
- awesome-cli-apps - a curated list of command line apps
- awesome-courses - list of awesome university courses for learning Computer Science
- awesome-linux-software - a list of awesome Linux softwares
- awesome-math - a curated list of awesome mathematics resources
- awesome-podcasts - awesome list of Important Podcasts for software engineers
- awesome-quantum-computing - a curated list of awesome quantum computing learning and developing resources
- awesome-youtubers - an awesome list of YouTubers that teach about technology
- OSSU-computer-science - path to a free self-taught education in Computer Science
Crypto
- awesome-blockchain - curated list of resources for the development and applications of blockchain
- awesome-cryptography - a curated list of cryptography resources and links
- awesome-crypto-papers - a curated list of cryptography papers, articles, tutorials and how-tos
- awesome-decentralized-finance - a curated list of awesome decentralized finance projects
- Crypto-OpSec-SelfGuard-RoadMap - defi, blockchain and crypto-related opsec research
Data Hoarding
- awesome-data-labeling - a curated list of awesome data labeling tools
- awesome-ipfs - useful resources for using IPFS and building things on top of it
- awesome-piracy - a curated list of awesome warez and piracy links
- awesome-web-archiving - an awesome list for getting started with web archiving
Privacy
- alternative-front-ends - alternative open source front-ends for popular internet platforms
- awesome-decentralized - awesome list of distributed, decentralized, p2p apps and tools
- awesome-decentralized-web - an awesome list of decentralized services and technologies
- awesome-privacy - a curated list of services and alternatives that respect your privacy because PRIVACY MATTERS
- awesome-qubes-os - a curated list of awesome qubes os links
- decentralized-id - self sovereign identity
Misc
- awesome-lockpicking - a curated list of resources related to the compromise of locks, safes, and keys
- awesome-readme - a curated list of awesome READMEs
- search-engine-optimization - a helpful checklist/collection of Search Engine Optimization (SEO) tips and techniques
Open Source Intelligence
- awesome-geospatial - long list of geospatial tools and resources
- awesome-hacker-search-engines - a curated list of awesome hacker search engines
- awesome-osint - a curated list of amazingly awesome open source intelligence tools and resources
- awesome-shodan-queries - a collection of interesting, funny, and depressing search queries to plug into shodan
- awesome-telegram-osint - a curated list of awesome telegram OSINT tools, sites & resources
Security
- awesome-api-security - a collection of awesome API Security tools and resources
- awesome-aws-security - a curated list of links, references, books, videos, tutorials, exploits, and CTF related to AWS security
- awesome-bugbounty-tools - a curated list of various bug bounty tools
- awesome-captcha - curated list of awesome captcha libraries and crack tools
- awesome-cybersecurity-blueteam - a curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams
- awesome-cyber-skills - a curated list of hacking environments where you can train your cyber skills legally and safely
- awesome-embedded-and-iot-security - a curated list of awesome embedded and IoT security resources
- awesome-flipperzero - a collection of awesome resources for the Flipper Zero device
- awesome-fuzzing - a curated list of fuzzing resources
- awesome-honeypots - an awesome list of honeypot resources
- awesome-incident-response - a curated list of tools for incident response
- awesome-kubernetes-security - a curated list of awesome Kubernetes security resources
- awesome-linux-rootkits - a curated list of awesome linux rootkits
- awesome-malware-analysis - a curated list of awesome malware analysis tools and resources
- awesome-mobile-security - an effort to build a single place for all useful android and iOS security related stuff
- awesome-network-analysis - a curated list of awesome network analysis resources
- awesome-nginx-security - a curated list of awesome links related to NGINX appsec
- awesome-oscp - a curated list of awesome OSCP resources
- awesome-pentest - a collection of awesome penetration testing resources, tools and other shiny things
- awesome-privilege-escalation - A curated list of awesome privilege escalation
- awesome-security - a collection of awesome software, libraries, documents, books, resources and cool stuff about security
- awesome-security-hardening - a collection of awesome security hardening guides, tools and other resources
- awesome-social-engineering - a curated list of awesome social engineering resources
- awesome-threat-detection - a curated list of awesome threat detection and hunting resources
- awesome-threat-modelling - a curated list of threat modeling resources
- awesome-vulnerable - a curated list of vulnerable apps and systems
- awesome-WAF - everything about web application firewalls (WAFs)
- awesome-web-security - a curated list of web security materials and resources
- cyber-security-resources - thousands of cyber security resources
- ForensicsTools - a list of free and open forensics analysis tools and other resources
- my-infosec-awesome - curated list of awesome links, resources and tools on infosec related topics
- personal-security-checklist - a compiled checklist of 300+ tips for protecting digital security and privacy
- security-apis - a collective list of public APIs for use in security
- WebHackersWeapons - a collection of cool tools used by web hackers
System Administration
- awesome-ansible - collaborative curated list of awesome Ansible resources, tools, roles, tutorials and other related stuff
- awesome-bash - a curated list of delightful Bash scripts and resources
- awesome-devops - a curated list of awesome DevOps platforms, tools, practices and resources
- awesome-docker - a curated list of Docker resources and projects
- awesome-git - a curated list of amazingly awesome Git tools, resources and shiny things
- awesome-gitea - a curated list of awesome projects related to Gitea
- awesome-hugo - a curated list of awesome things related to Hugo, the world's fastest framework for building websites
- awesome-k8s-resources - a curated list of awesome Kubernetes tools and resources
- awesome-linux-containers - a curated list of awesome Linux Containers frameworks, libraries and software
- awesome-network-automation - a curated list about Network Automation
- awesome-powershell - a curated list of delightful PowerShell modules and resources
- awesome-scalability - the patterns of scalable, reliable, and performant large-scale systems
- awesome-selfhosted - a list of Free Software network services and web applications which can be hosted on your own servers
- awesome-shell - a curated list of awesome command-line frameworks, toolkits, guides and gizmos
- awesome-sysadmin - a curated list of amazingly awesome open source sysadmin resources
- awesome-tmux - a list of awesome resources for tmux
- awesome-vscode - a curated list of delightful VS Code packages and resources
- Linux-Bash-Commands - ultimate list of Linux bash commands, cheatsheet and resources
- the-book-of-secret-knowledge - a collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more