A list of privacy, security, and cryptocurrency resources curated by the hackliberty.org community.
Go to file
2024-06-19 02:58:50 +00:00
assets/img update format, add assets, add donations 2023-03-04 22:10:29 +00:00
hack-liberty-resources.md switch invidious links to datura.network 2024-06-19 02:58:50 +00:00
README.md switch invidious links to datura.network 2024-06-19 02:58:50 +00:00

Hack Liberty Resources

VERITAS - LIBERTAS - SCIENTIA


About Hack Liberty

We are a group of cypherpunks, privacy advocates, engineers, and philosophers dedicated to the pursuit of truth, liberty, and knowledge for all. We believe technology is a tool for liberation, not enslavement. We fight tyranny with encryption, decentralization, and anonymity. Join us in the fight for liberty.


Hack Liberty Services

[Terms of ServiceCode of ConductPrivacy Policy]

All our services use open source software and are open to the public. We anonymize logs and use full disk encryption to preserve user privacy. Our hosting provider 1984 is located in Iceland and supports human rights and free speech. Our Matrix Server uses a hardened memory allocator and we use Alpine Linux whenever possible.

  • Matrix [Tor] - an open protocol for real-time, distributed communications with strong end-to-end encryption, user verification, and other cryptographic protection mechanisms. Register Here
  • Simplex [Tor] - the first messaging network operating without user identifiers of any kind - 100% private by design!
  • Forum [Tor] - discuss and advocate for the use of encryption, privacy technologies, and decentralized systems to promote freedom and protect digital rights
  • Element - a glossy Matrix client for the web built on top of matrix-react-sdk with an emphasis on performance and usability
  • SchildiChat - a Matrix client for the web based on Element with a more traditional instant messaging experience
  • Lemmy [Tor] - a link aggregator and forum for the fediverse
  • Gitea [Tor]- a painless self-hosted Git service
  • Bookstack - an opinionated wiki system that provides a pleasant and simple out-of-the-box experience
  • PrivateBin [Tor]- a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode
  • OTS [Tor]- One-Time-Secret sharing platform with symmetric 256bit AES encryption in the browser
  • Blog - a blog for long form content and guides

Donations and Transparency

Please consider donating to help us pay for servers and infrastructure. We operate 100% out of our own pocket and any donations will help pay for server costs!

Monero (XMR)
881ayjjExYVhyqQBQFxdY6aQC5J5Ys3JNfvxC1r5WNwSVK3ysD4Sn6GfUbNf1JkhMEJWj11mNvzCW9XZLpyWkjHx6EftAXU
Tor - click here to donate with cryptocurrencies other than Monero over Tor
Clearnet - click here to donate with cryptocurrencies other than Monero over Clearnet

Current number of donations received: 3


Operating Costs: $250 a month / $3000 a year


Hack Liberty Simplex Community

Anyone that agrees to our Code of Conduct is welcome to join our Simplex Hack Liberty Community Room and our Simplex server, a decentralized, metadata resistant alternative to Matrix! Incognito profiles welcome!


Hack Liberty Matrix Community

Anyone that agrees to our [Terms of Service + Code of Conduct + Privacy Policy] is welcome to create a Matrix account on our server and join the conversation!


Hack Liberty Lemmy Community

Anyone that agrees to our [Terms of Service + Code of Conduct + Privacy Policy] is welcome to create [Tor] a Lemmy account on our server to start sharing links!

  • 9/11 Truth - https://links.hackliberty.org/c/911_truth
  • Agorism - https://links.hackliberty.org/c/agorism
  • Artifical Intelligence - https://links.hackliberty.org/c/generative_ai
  • Bitcoin - https://links.hackliberty.org/c/bitcoin
  • Conspiracy - https://links.hackliberty.org/c/conspiracy
  • Encryption - https://links.hackliberty.org/c/encryption
  • Flipper Zero - https://links.hackliberty.org/c/flipper_zero
  • Fringe - https://links.hackliberty.org/c/fringe
  • Guns - https://links.hackliberty.org/c/guns
  • Monero - https://links.hackliberty.org/c/monero
  • Netsec - https://links.hackliberty.org/c/netsec
  • Philosophy - https://links.hackliberty.org/c/philosophy
  • Privacy - https://links.hackliberty.org/c/privacy
  • Secret History - https://links.hackliberty.org/c/secret_history
  • Tyranny - https://links.hackliberty.org/c/tyranny
  • Warriorship - https://links.hackliberty.org/c/warriorship

Cypherpunk Resources

Start Here

Agorism

  • Agorist Class Theory - a left libertarian approach to class conflict analysis
  • Agorist Journal - axxi amplifies dissonance and brings voices together from across the political spectrum. it is also a call for unity. axxi resurrects the unifying vision of an agorist alliance beyond the surveillance state
  • An Agorist Primer - a comprehensive guidebook that explores the principles and practical aspects of agorism, a strategy for achieving a stateless society through peaceful market activities
  • An Argument Against KYC Bitcoin - presents a compelling case against the use of Know Your Customer (KYC) requirements in the Bitcoin ecosystem, discussing how it creates honeypots of user information and gives rise to a permissioned social system
  • Building a circular economy with Monero - the future belongs to digital marketplaces that run on private digital cash. Anarkio explains why he built Bitejo and why he is into Monero
  • How Monero Uniquely Enables Circular Economies - explores how Monero, a privacy-focused cryptocurrency, has distinct characteristics that make it particularly well-suited for enabling circular economies
  • Its Time To Join The Bitcoin Circular Economy - free men dont ask permission to transact with each other and dont rely on the legacy third-party financial institutions that operate in tandem with State authorities
  • KYC-free Bitcoin Circular Economies - KYC-free bitcoin circular economies are perhaps the most pure free markets in the world, enabled by the first truly free sound money
  • New Libertarian Manifesto - a concise and influential guide outlining the principles of agorism, a libertarian philosophy advocating for the practice of counter-economics
  • The Last, Whole Introduction to Agorism - Agorism, unfortunately, needs an introduction...

Crypto Anarchy

  • Fifty things to do NOW - the following is a highly valuable list of 50 things to do NOW, taken from the terrific crypto-agorist website, Anarplex. Find out what YOU can do RIGHT NOW to help build the Second Realm/counter-economy/vonu minicultures
  • How to buy, earn and spend KYC-free Bitcoin and Monero (without ID or a bank account) - discover methods for purchasing, acquiring, and using Bitcoin and Monero without the need for KYC (Know Your Customer) verification
  • How to survive outside of the state with Crypto Agorism - fair and free markets for food, jobs, housing, healthcare, mail, sim cards & more no government ID or state permit required
  • KYC Will Not Protect Us, Bitcoin And Encryption Will - as regulators attempt to institute KYC and AML rules at the peril of our personal data, Bitcoin and encryption offer salvation.
  • Roadblocks to obtaining government-issued ID - state's ID monopoly and KYC regulations stop millions from accessing necessities like finances, jobs, healthcare, and more. No alternative methods or appeal processes exist if the state refuses to issue an ID. This exclusionary system prevents individuals, regardless of skills or efforts, from entering and regularizing their situation as adults
  • Second Realm Ideas - a collection of Second Realm ideas (KYC-free agorist services)
  • The Aristocracy of Action - what it will take to build a cypherpunk breakaway society
  • The dangers of “decentralized” ID systems - many of these protocols rely on government ID as a base layer (as proof of name, age or address, referred to as “Verifiable credentials”). In this system, users are required to upload a video with their passport or national ID card. After this, their name, age or address is marked as verified. This reliance on government IDs means that DIDs cannot protect users against state surveillance
  • The rarely discussed dangers of KYC and what you can do about it - many people don't talk about it but unfortunately it's everywhere. Without KYC documents, opportunities to freely participate in the economy and even survive are limited. KYC is required for jobs, housing, healthcare and more. In addition, many people can't complete KYC, as they don't have any government-issued IDs and therefore must rely on the gray market to have access to necessities such as finding work, apartments and medicine. This text clarifies the rarely discussed reasons why KYC is harmful and what can be done about it.
  • The Vision of Cryptoanarchy - talk given at "the web of phronesis" in 2020, a conference by the institute of network society, china academy of art.
  • True Names Not Required: On Identity and Pseudonymity in Cyberspace - the cypherpunks recognized that a free society can not function if identity is rigid and known to all. A free society requires the option to selectively reveal yourself to the world, or not reveal yourself at all
  • Why cryptoanarchy is not a revolutionary movement - an interview describing how cryptoanarchy is about building parallel systems on top of existing power structures
  • Why the states monopoly on identity is more dangerous than Google, Facebook and Microsoft - while the tracking by Google, Facebook and Microsoft is definitely disturbing and can even put people in danger, the states data economy is even worse. Many people dont talk about this, even though it affects millions of peoples daily lives

Manifestos

  • The GNU Manifesto (1985) - document written by Richard Stallman, outlining the goals and principles of the GNU Project, which aimed to develop a free and open-source operating system
  • The Hacker's Manifesto (1986) - a declaration expressing the hacker culture's belief in the freedom of information and opposition to restrictions on computer use
  • The Crypto Anarchist Manifesto (1988) - advocates for the widespread use of cryptography and anonymous digital currency to uphold privacy and undermine government control
  • A Cypherpunks Manifesto (1993) - emphasizes the importance of cryptography as a tool for political and social change, promoting privacy, anonymity, and individual freedom
  • Crypto Anarchy and Virtual Communities (1994) - explores the concept of crypto anarchy where technology facilitates individuals to operate beyond traditional societal boundaries using encryption and virtual communities
  • The Cyphernomicon (1994) - a guidebook outlining the principles of cypherpunks, focusing on the role of cryptography in protecting privacy and empowering individuals against surveillance
  • A Declaration of the Independence of Cyberspace (1996) - asserts the autonomy of the online world from governments and urges policymakers to stay out of cyberspace regulation
  • A Cyberpunk Manifesto (1997) - articulates the ethos of the cyberpunk subculture, highlighting dystopian themes, the merging of humans with technology, and resistance against authority
  • b-money (1998) - proposed a digital currency system that utilized cryptographic proofs instead of centralized authorities to achieve secure and decentralized transactions
  • Bit-gold (2005) - describes a decentralized digital currency system, based on proof of work and cryptography, that influenced the development of Bitcoin
  • State and Terrorist Conspiracies and Conspiracy as Governance (2006) - sheds light on the power dynamics between conspiratorial governance and the whistleblowers
  • Guerilla Open Access Manifesto (2008) - advocates for open access to academic knowledge and criticizes the current publishing system, calling for civil disobedience to achieve a free and open flow of information
  • The libbitcoin Manifesto (2013) - outlines the principles and goals behind the libbitcoin project, emphasizing a focus on privacy, security, decentralization, and empowering individuals in their control over digital assets

Podcasts

  • Agora Podcast - your home for agorism, localism, radical decentralization, and anti-authoritarian concepts
  • Bit Buy Bit - a podcast for ungovernable misfits who choose Bitcoin, opensource software, privacy and freedom
  • Citadel Dispatch - an interactive live show about bitcoin and freedom tech. Dispatch is audience funded without ads or paywalls. Live unedited shows with direct audience participation via youtube, twitch, and our matrix chats.
  • Cypherpunk Bitstream - A cypherpunk and cryptoanarchy focused podcast
  • Monero Talk - weekly conversations with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become
  • Opt Out - a podcast that interviews individuals who are passionate about privacy, explores their reasons for valuing privacy, discusses the tools and techniques they use, and aims to inspire others to prioritize personal privacy and data control
  • Truth for the Commoner - your gateway to a world of truth, knowledge, and empowerment in the digital age. We are dedicated to bringing you content that spans the realms of bitcoin, economics, privacy, freedom technology, and culture
  • Vonu Podcast - the podcast making you invulnerable to the coercion of the State and the servile society

Projects & Organizations

  • Annas Archive - the worlds largest open-source open-data library. mirrors sci-hub, library genesis, z-library. 25,077,770 books, 99,425,873 papers — preserved forever.
  • AnarSec - tech guides for anarchists
  • Anonymous Land - a community dedicated to providing anonymity enhancing guides and services
  • Anonymous Planet - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
  • Cryptome - cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those
  • Electronic Frontier Foundation - the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. EFF's mission is to ensure that technology supports freedom, justice, and innovation for all people of the world.
  • Paralelní Polis - paralelní polis is a one-­of-­a-­kind nonprofit organization founded by members of a contemporary-­art group ztohoven. the mission of paralelní polis is to provide the technology and education people need to participate in an independent society and protect their individual freedom. the vision of paralelní polis is a world where people have the opportunity to disengage from the state and live in a free society
  • Privacy Guides - a non-profit, socially motivated website that provides information for protecting your data security and privacy
  • Tor Project - fights every day for everyone to have private access to an uncensored internet, and Tor has become the world's strongest tool for privacy and freedom online
  • Veilid - framework that allows anyone to build a distributed, private app. Veilid gives users the privacy to opt out of data collection and online tracking. Veilid is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon
  • WikiLeaks - wikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses

Volunteer

  • Host an Anna's Archive Mirror - to increase the resiliency of Annas Archive, were looking for volunteers to run mirrors
  • Seed Anna's Archive Torrents - support free access to information by sharing and maintaining torrents from Anna's Archive
  • Host an IPFS Node - help to distribute and store files in a decentralized manner using the InterPlanetary File System (IPFS)
  • Host a Tor Node - contribute to online privacy and anonymity by running a node in the Tor network, allowing users to access the internet securely
  • Host a full Monero Node - help secure the Monero network and support private transactions by operating a full node for the Monero cryptocurrency
  • Host a full Bitcoin Node - contribute to the security and resilience of the Bitcoin network by hosting a full node that validates and verifies transactions
  • Host a Privacy Front-End Service - host alternative open-source interfaces for popular internet platforms like YouTube and Twitter, designed to prioritize user privacy and data protection
  • Host Privacy Respecting Services - contribute to online privacy and data protection by hosting and providing services that prioritize user confidentiality and respect their privacy
  • Offer Services as a Proxy Merchant - proxy merchants offer a service where individuals without government ID can access financial services, rentals, and receive mail through a shell company or trust established by someone with valid identification, providing prepaid debit cards, a PO box for mail, and the ability to rent under the company name
  • Offer P2P Crypto Trading - enable users to trade crypto directly without intermediaries and KYC exchanges
  • Start a Second Realm - create a community-driven alternative society that emphasizes self-sufficiency, resilience, and voluntary cooperation outside of traditional structures

Cryptocurrency Resources

NoKYC Guides

Crypto Services Directories

  • KYCNOT.ME [Tor] - directory for No-KYC exchanges and services
  • Monerica- exhaustive list of Monero and related resources
  • AcceptedHere- directory for online and offline businesses accepting cryptocurrency
  • CryptWerk - directory with companies, websites, shops, services that accept crypto
  • Bitcoin Bookmarks-directory for premium crypto websites sorted by quality
  • Lightning Network Stores - directory for stores that accept bitcoin through the lightning network

Automated Exchanges

Peer to Peer Exchanges

  • Bisq - buy and sell bitcoin or monero for fiat using the Bisq peer-to-peer network
  • Haveno Reto - Haveno (pronounced ha‧ve‧no) is an open source platform to exchange Monero for fiat currencies like USD, EUR, and GBP or other cryptocurrencies like BTC, ETH, and BCH.
  • Robosats [Tor]- a peer to peer exchange for converting bitcoin to national currencies via lightning hold invoices
  • HodlHodl - global peer to peer bitcoin trading platform

Peer to Peer Crypto Marketplaces and Freelancing

  • XMRBazaar - a monero marketplace for advertising goods and services that has a non-custodial escrow system so that both buyer and seller are sure the money is actually there
    • username: beta
    • password: tester
  • TukanMarket - a bitcoin marketplace for advertising goods and services
  • Bitcoin P2P Marketplace - a bitcoin P2P marketplace telegram channel
  • Monero Market - a reddit marketplace for buying and selling items with Monero
  • Microlancer - a freelancing platform designed for quick milestones and secure escrowed payments using the lightning network

Crypto VPS & Domain Services

  • 1984 - high quality web hosting and VPS service provider that respects and protects the civil and political rights of customers
  • Incognet [Tor] - privacy respecting web host and VPS provider
  • Njalla [Tor] - anonymous domain name registrar and VPS provider

Crypto VPN Services

  • Mullvad [Tor] - a Sweden-based VPN provider with a long-standing reputation for privacy and efficiency
  • IVPN - a Gibraltar-registered service that has been preserving customers privacy since 2009

Crypto Credit Cards

  • FCF Pay - Swap cryptocurrencies for virtual prepaid crypto debit gift cards
  • Ezzocard - purchase virutal prepaid cards that work anywhere in the world
  • Pay with Moon - bitcoin/lighting backed virtual credit cards
  • The Bitcoin Company - buy Visa cards, gift cards, phone top-ups, and more

Crypto Gift Cards

  • CardCoins - convert prepaid gift cards into digital currency at over 80,000 locations nationwide
  • Cake Pay - buy gift cards and related products with virtual assets for use at millions of merchants worldwide

Crypto eSim Providers

  • SilentLink [Tor] - a global mobile and phone number provider for eSIM-compatible smartphones

Crypto SMS Providers

  • JMP - allows you to send and receive text messages, pictures, phone calls, and voicemails using a Jabber (XMPP) client
  • TextVerified- SMS verficiation service that accepts Crypto
  • SMSPVA - offers a large list of SMS verification numbers you can rent with BTC
  • JuicySMS - verify online accounts with temporary real phone numbers
  • SMS4Sats [Tor] - offers SMS verification numbers online

Privacy and Security Articles

Guides

  • Anonymous Planet [Tor] - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
  • Privacy Guides [Tor] - a non-profit, socially motivated website that provides information for protecting your data security and privacy
  • Extreme Privacy 4th Edition - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view.
  • Nihilism Network [Tor] - ultimately, this blog aims to showcase that technology, when used correctly, can allow one to transcend any limitation. be it to transcend surveillance, centralisation, deanonymization, lack of security. any ability that we have as humans, such as privacy, decentralisation, anonymity, security, plausible deniability can be protected and enhanced by using the correct technology.
  • Anonymous Land - a community dedicated to providing anonymity enhancing guides and services
  • No Trace Project [Tor] - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
  • Qubes OS for Anarchists [Tor] - Qubes OS is a security-oriented operating system (OS), which means it is an operating system designed from the ground up to be more difficult to hack. Given that anarchists are regularly targeted for hacking in repressive investigations, Qubes OS is an excellent choice
  • GrapheneOS for Anarchists - [Tor] - anarchists should not have phones. if you must use a phone, make it as difficult as possible for an adversary to geotrack it, intercept its messages, or hack it. this means using grapheneos
  • Tails for Anarchists [Tor] - tails is an operating system that makes anonymous computer use accessible to everyone. tails is designed to leave no trace of your activity on your computer unless you explicitly configure it to save specific data
  • Tails Opsec for Anarchists [Tor] - additional precautions you can take that are relevant to an anarchist threat model - operational security for tails
  • Make Your Electronics Tamper-Evident [Tor] - if the police ever have physical access to an electronic device like a laptop, even for five minutes, they can install hardware keyloggers, create images of the storage media, or otherwise trivially compromise it at the hardware, firmware, or software level. one way to minimize this risk is to make it tamper-evident
  • Encrypted Messaging for Anarchists [Tor] - This article provides an overview and installation instructions for Tails, Qubes OS, and GrapheneOS encrypted messengers
  • The Cop in Your Pocket: Your Phone's Location is tracked at ALL times [Tor] - your phone's location is tracked at all times, and this data is harvested by private companies, allowing police to bypass laws requiring them to obtain a warrant
  • Remove Identifying Metadata From Files [Tor] - metadata is 'data about data' or 'information about information'. in the context of files, this can mean information that is automatically embedded in the file, and this information can be used to deanonymize you
  • Defending against Stylometric attacks [Tor] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. its one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
  • Prism Break - opt out of global data surveillance programs like prism, xkeyscore and tempora.
  • The New Oil [Tor] - the beginners guide to data privacy & cybersecurity
  • Techlore - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
  • Into the Crypt [Tor] - the art of anti-forensics
  • Advanced Privacy and Anonymity Using VMs, VPNs, Tor - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
  • How to create anonymous Telegram and Signal accounts without a phone - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
  • Security Tips & Devices for Digital Nomads - various tools and gadgets for OpSec, written with a preference for practical usability
  • Telegram Security Best Practices - quick tips that will help you sleep better at night when using Telegram
  • EFF Surveillance Self-Defense: The Basics - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
  • EFF Surveillance Self-Defense: Tool Guides - step-by-step tutorials to help you install and use handy privacy and security tools
  • EFF Street Level Surveillance - EFFs street-level surveillance project shines a light on the surveillance technologies that law enforcement agencies routinely deploy in our communities

Android

Secure Messengers

Desktop

Tor and VPNs

General

Fingerprinting Articles


Fingerprinting Tests

  • TorZillaPrint - comprehensive, all-in-one, fingerprinting test suite
  • No-JS fingerprinting - demonstration of how fingerprinting can occur even in the absence of JavaScript
  • CSS Fingerprint - exploiting CSS to collect various characteristics about the visitor
  • CreepJS - creepy device and browser fingerprinting
  • Kloak - Kloak is a Keystroke Anonymization Tool
  • AudioContext Fingerprint - tests browser-fingerprinting using the AudioContext and Canvas API
  • Available Fonts - gets available fonts on browser without flash
  • Browser Fingerprinting - analysis of Bot Protection systems with available countermeasures
  • BrowserLeaks - a gallery of web technologies security testing tools
  • Canvas Test - checks if the addon CanvasBlocker can be detected by websites
  • CSS Exfil Vulnerability Tester - test to see if your browser is vulnerable to Cascading Style Sheets (CSS) data leakage
  • Device Info - a web browser security testing, privacy testing, and troubleshooting tool
  • DNS Cookie Demonstration - uses DNS caches as a side-channel to identify related network flows
  • EFF: Cover Your Tracks - understand how easy it is to identify and track your browser based on how it appears to websites
  • Epic Tracker - fingerprinting demo with some automated lookups using modern Javascript APIs
  • Extension Fingerprints - detecting Chrome extensions by fetching web accessible resources
  • Firefox Addon Detector - tracking 400+ firefox addons through chrome:// URI trickery!
  • Iphey - Browser Fingerprinter
  • Mouse Wheel Tracking Test - fingerprint based on tracking your mouse's wheel
  • Nothing Private - proof of concept to show any website can identify and track you
  • PicassAuth - canvas fingerprinting
  • Pixelscan - basically a bot check
  • Privacy Check - this website aims to focus on each fingerprinting technique in detail
  • scheme flooding - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
  • SuperCookie - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
  • Webgl Fingerprinting - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
  • Zardaxt.py - TCP/IP fingerprinting for VPN and Proxy Detection

Surveillance Technology

  • Ears and Eyes - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
  • Bugged Planet - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
  • Harris: Wide Area Airborne Motion Imagery - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
  • CRI LodeStar Wide Area Motion Imagery (WAMI) - a demonstration of cri lodestar wide area motion imagery (wami) system
  • Harris: Airborne Augmented Reality - video with augmented reality overlays enhances situation awareness for teams in the field, analysts and decision makers. overlays poi features, building names, and road names
  • Harris: Locate GPS Jamming - harris signal sentry 1000 is a gps interference detection and geolocation solution. it provides a web-based visualization tool to support timely and effective actionable intelligence.
  • Harris: Material Identification - harris material identification technology enables remote sensing systems to detect, identify and geolocate the presence of solid materials and gasses on earth and in the atmosphere
  • Elbit Systems / SPECTRO XR - spectro xr integrates a wide range of digital imaging, high-definition optical sensors and advanced lasers, providing simultaneous multi-spectral observation capabilities and enabling ultra-long-range detection.
  • Police thermal imaging finds cannabis factory - It was a case of being caught red handed when the West Midlands Police helicopter found this cannabis factory using its thermal imaging camera
  • The Stingray: How Law Enforcement Can Track Your Every Move - a "cell site simulator" initially developed for military use, Stingrays have made their way into local police and sheriff's departments around the country
  • How Police Cameras Recognize and Track You - wired spoke with several experts about the explosion of surveillance technology, how police use it, and what the dangers might be. as tech advances, street cameras can now employ facial recognition and even connect to the internet. what does this mean for the future of privacy?
  • How Chinas Surveillance Is Growing More Invasive - analysis of over 100,000 government bidding documents found that Chinas ambition to collect digital and biological data from its citizens is more expansive and invasive than previously known
  • Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees - babel x may provide to analysts a targets name, date of birth, address, usernames, email address, phone number, social media content, images, IP address, Social Security number, drivers license number, employment history, and location data based on geolocation tags and also cell phone gps tracking

Awesome Git Resource Mirrors and Projects

Artifical Intelligence

Computer Science

Crypto

Data Hoarding

Hardware

  • awesome-flipperzero - a collection of awesome resources for the Flipper Zero device
  • portapack-mayhem - custom firmware for the HackRF+PortaPack H1/H2
  • tillitis-key - board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key

Misc

Mobile

  • GrapheneOS - security and privacy focused mobile OS with Android app compatibility
  • DivestOS - a more private and more secure aftermarket mobile operating system
  • blue-merle - enhance anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router

Open Source Intelligence

Privacy

Security

System Administration

  • awesome-ansible - collaborative curated list of awesome Ansible resources, tools, roles, tutorials and other related stuff
  • awesome-bash - a curated list of delightful Bash scripts and resources
  • awesome-devops - a curated list of awesome DevOps platforms, tools, practices and resources
  • awesome-docker - a curated list of Docker resources and projects
  • awesome-git - a curated list of amazingly awesome Git tools, resources and shiny things
  • awesome-gitea - a curated list of awesome projects related to Gitea
  • awesome-hugo - a curated list of awesome things related to Hugo, the world's fastest framework for building websites
  • awesome-k8s-resources - a curated list of awesome Kubernetes tools and resources
  • awesome-linux-containers - a curated list of awesome Linux Containers frameworks, libraries and software
  • awesome-network-automation - a curated list about Network Automation
  • awesome-powershell - a curated list of delightful PowerShell modules and resources
  • awesome-scalability - the patterns of scalable, reliable, and performant large-scale systems
  • awesome-selfhosted - a list of Free Software network services and web applications which can be hosted on your own servers
  • awesome-shell - a curated list of awesome command-line frameworks, toolkits, guides and gizmos
  • awesome-sysadmin - a curated list of amazingly awesome open source sysadmin resources
  • awesome-tmux - a list of awesome resources for tmux
  • awesome-vscode - a curated list of delightful VS Code packages and resources
  • Linux-Bash-Commands - ultimate list of Linux bash commands, cheatsheet and resources
  • the-book-of-secret-knowledge - a collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more