π·οΈ All Tags
Following is a list of relevant tags:
Agorism
- Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)
- Haveno DEX Cash by Mail -> XMR transaction
- Haveno DEX Direct Fiat to Monero transactions
- Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)
- How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
- How to run a Haveno Seed Node
- How to setup your Monero wallet
- Monero Inheritence Management (VaultWarden Emergency Contacts)
- Protesting is not enough
- The True Goal of Cryptocurrency
- The futility of talking OPSEC on Statist platforms
- What's Agorism ?
- Where to hide your Monero Wealth ?
- Why can't I trust Centralised Exchanges, and random Monero nodes ?
- Why should I price goods and services in Monero directly ?
Anarchy
- Corporations are the cancer of FOSS projects
- Everyone is a criminal
- How the states manage to pass abusive laws
- How your finance can be your downfall
- Lawfare Explained
- Laws do not stop crimes
- Public media is funded propaganda
- Technology either serves you, or the state
- The Individual reigns supreme, no matter what the state says.
- The State is the Enemy
Anonymity Explained
- Anonymity - Why can't I use Signal to chat anonymously?
- How to explore the Darknet? (Visibility and Discoverability)
- Phone Numbers are incompatible with Anonymity
- The German and Netherlands Tor Nodes problem
- The main source of Anonymity: The Tor Network
- What is Anonymity ? Why is it Important ?
- Why is Metadata detrimental to Anonymity?
- Why is the Darknet superior to the Clearnet ?
- Why isnβt Privacy enough for Anonymous Use?
Bad Email Provider
- Man arrested for donating to a terrorist organization
- The Downfall of Incognito Market
- The Downfall of Silk Road
Bad Identity Segmentation
- Identity Segmentation Fails: Emails, Usernames, and Passwords
- LAPSUS$ OPSEC Mistakes
- The Downfall of AlphaBay
- The Downfall of Incognito Market
- The Downfall of IntelBroker
- The Downfall of Pompompurin
- The Downfall of Silk Road
Censorship Circumvention
Censorship Evasion
- How to Anonymously access websites that block Tor
- How to access Tor when you are in a heavily-censored country using v2ray (vmess / vless)
- How to get and use residential proxies anonymously
Circular Economy
Clearnet Sensitive Activity
- Being lured into telegram for sensitive use
- LAPSUS$ OPSEC Mistakes
- Man arrested for donating to a terrorist organization
- The Downfall of Incognito Market
- The Downfall of IntelBroker
Clearnet Services
- Anonymous self-hosted clearnet mail server Setup
- Where to Host Anonymous Clearnet Services ?
- bind9 DNS setup
Clientside Anonymity
- Anonymity - Easy Anonymous Chats Using SimpleX
- Anonymous VM Setup - Whonix QEMU VMs
- Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)
- Disguising Tor traffic with Cloak
- Haveno DEX Cash by Mail -> XMR transaction
- Haveno DEX Direct Fiat to Monero transactions
- Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)
- How to Anonymously access websites that block Tor
- How to Get an Email Account Anonymously (Emails as a Service)
- How to Receive Anonymous SMSes (Remote SMSes as a Service)
- How to access Tor when you are in a heavily-censored country using v2ray (vmess / vless)
- How to get and use residential proxies anonymously
- How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
- How to mine Monero easily using Gupax
- How to run a Haveno Seed Node
- How to setup your Monero wallet
- How to share files anonymously using OnionShare
- One on One large file sharing (Syncthing over Tor)
- Peer-to-Peer Large File Sharing (Torrents over I2P)
- Routing the network through Cloak using OpenWRT router
- Stylometry Protection (Using Local LLMs)
- The True Goal of Cryptocurrency
- Using Tor Safely: Tor through VPN or VPN through Tor?
- Using the Tor browser to browse the web Anonymously
- Where are VPNs, Tor, Monero and SimpleX Legal ?
- Why can't I trust Centralised Exchanges, and random Monero nodes ?
Clientside Deniability
- Black Hat Hacking Sensitive VMs Tutorial
- Hiding files in videos (small or large files) with zuluCrypt
- Other sources of Plausible Deniability: Steganography
- Sensitive Critical Data Backup Procedure
- Sensitive VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)
- SimpleX Deniable Chats
- The main source of Plausible Deniability: Deniable Encryption
- USB-triggered emergency shutdowns
- Using Steghide to hide data in images
- Using the Host-OS in live-mode to enable Sensitive Use
- Where to hide your Monero Wealth ?
Clientside Privacy
- Backup data remotely without revealing contents to the VPS provider - BorgBackup
- DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?
- Easy Private Chats - SimpleX
- File Verification
- How to compile open source software + How to verify software integrity
- How to get privacy from your ISP using a VPN
- How to have Privacy on your Computer (Kicksecure Host OS)
- How to have Privacy on your Phone (GrapheneOS)
- How to have privacy on your Router (OpenWrt)
- Linux Hypervisor Setup (QEMU/KVM virtualisation)
- One-on-One Large File Sharing (Syncthing over VPN)
- Password Management 101: How to use Keepass
- Peer-to-Peer Large File Sharing (Torrents over VPN)
- Prevent IP leaks using a VPN on the Host OS
Conspiracy Theory
Contribute
- How to become a Contributor
- How to become a Maintainer
- How to run the Opsec Bible Yourself
- How to write good Criticism
- The Quality Standard
Contributing to Anonymity
- Anonymous Simplex SMP & XFTP Servers setup
- How to mine Monero easily using Gupax
- How to run a Tor relay node
- How to run your own Darknet Lantern for Visibility and Discoverability
- Mine Monero with p2pool and xmrig
- Monero Node Setup
- TOR Bridge (November 2024 update)
- TOR Exit Node
Core Tutorial
- Anonymity - Easy Anonymous Chats Using SimpleX
- Anonymity - Self-Hosted LLM Hidden Service
- Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter)
- Anonymous Simplex SMP & XFTP Servers setup
- Anonymous VM Setup - Whonix QEMU VMs
- Backup data remotely without revealing contents to the VPS provider - BorgBackup
- Black Hat Hacking Sensitive VMs Tutorial
- Electrical Failover (basic UPS setup)
- EndGame V3 Setup
- Haveno DEX Direct Fiat to Monero transactions
- How to anonymously recieve alerts (via SimpleX)
- How to encrypt files and messages (Age and PGP)
- How to have Privacy on your Computer (Kicksecure Host OS)
- How to have a custom .onion address for your Hidden Service (Vanity V3)
- How to setup a MySQL Master-Master replication over Tor
- Internet Usage Segmentation Setup
- Introduction
- Linux Hypervisor Setup (QEMU/KVM virtualisation)
- Monero Inheritence Management (VaultWarden Emergency Contacts)
- OnionBalance for .onion domains load balancing
- Renting Remote VPS Servers Anonymously (non-KYC cloud resellers)
- Sensitive Critical Data Backup Procedure
- Sensitive VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)
- Stylometry Protection (Using Local LLMs)
- The main source of Plausible Deniability: Deniable Encryption
- Using the Host-OS in live-mode to enable Sensitive Use
- What if a FOSS Project Turns Malicious? (Building SimpleX from Source)
- Where to hide your Monero Wealth ?
- Why can't I trust Server-side Encryption ?
- Why is High Availability Important for Deniability ?
- Why should I use Whonix for Self-hosted Hidden services ?
Decentralized Finances
- Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)
- Haveno DEX Cash by Mail -> XMR transaction
- Haveno DEX Direct Fiat to Monero transactions
- Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)
- How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
- How to run a Haveno Seed Node
- How to setup your Monero wallet
- Monero Inheritence Management (VaultWarden Emergency Contacts)
- Prevent scams using Multisig 2of3 Monero wallets
- The True Goal of Cryptocurrency
- Where to hide your Monero Wealth ?
- Why can't I trust Centralised Exchanges, and random Monero nodes ?
Deniability
Deniability Explained
- Our stance on sensitive activities
- Tails OS for Easy Temporary Sensitive Use
- What is Plausible Deniability ? Why is it Important ?
- Why isnβt Anonymity enough for Sensitive Use?
Everyone is a criminal
High Availability
- Electrical Failover (basic UPS setup)
- EndGame V3 Setup
- How to setup a MySQL Master-Master replication over Tor
- How to setup a basic NGINX / PHP / MySQL app
- OnionBalance for .onion domains load balancing
- Why is High Availability Important for Deniability ?
KYC exchange
KYC on centralised exchanges
Monero
No Deniability
- Canadian truckers protesters' bank accounts frozen
- Never tell your bank that you bought crypto
- The Downfall of AlphaBay
- The Downfall of Pompompurin
Not Using Monero
- Man arrested for donating to a terrorist organization
- The Downfall of AlphaBay
- The Downfall of Incognito Market
- The Downfall of IntelBroker
- The Downfall of Pompompurin
Not Using SimpleX
- Being lured into telegram for sensitive use
- Canadian truckers protesters' bank accounts frozen
- LAPSUS$ OPSEC Mistakes
- Man arrested for donating to a terrorist organization
- The Downfall of Pompompurin
- The Downfall of Silk Road
OPSEC Concepts
- Audit your OPSEC and determine the appropriate internet use
- Governments fear Decentralisation and Anonymity
- Governments, Centralisation, and Law Enforcement
- How to Maintain Multiple Identities Online
- Internet Usage Segmentation Setup
- OPSEC: Using the right Technology and Behavior
- Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days
- Public Chats / Private Chats / Anonymous Chats / Deniable Chats
OPSEC Mistakes
- Being lured into telegram for sensitive use
- Identity Segmentation Fails: Emails, Usernames, and Passwords
- Realistic OPSEC Mistakes and Threat Scenarios
- The Downfall of AlphaBay
- The Downfall of Incognito Market
- The Downfall of IntelBroker
- The Downfall of Pompompurin
- The Downfall of Silk Road
Opsec Concepts
Opsec Mistakes
- Being lured into meeting someone IRL
- Canadian truckers protesters' bank accounts frozen
- LAPSUS$ OPSEC Mistakes
- Man arrested for donating to a terrorist organization
- Never tell your bank that you bought crypto
Outdoors Anonymity
Privacy Explained
- The lack of Open Source Hardware (CPUs, Motherboards, GPUs)
- What is Privacy ? Why is it Important ?
- Why can't I trust Server-side Encryption ?
- Why can't I trust closed source software for Privacy?
Privacy Frontends
- Privacy Frontends - Avoiding Centralized Tracking
- Setting up Invidious to watch YouTube privately
- Setting up Redlib to browse Reddit privately
- Setting up SafeTwitch to watch Twitch privately
Self-Hosted
- Anonymity - Self-Hosted LLM Hidden Service
- Anonymous Simplex SMP & XFTP Servers setup
- Anonymous self-hosted clearnet mail server Setup
- Electrical Failover (basic UPS setup)
- How to mine Monero easily using Gupax
- Making Your Home Server Reachable via a Hidden Service (SSH + Cockpit + VNC via Tor)
- Mine Monero with p2pool and xmrig
- Monero Node Setup
- Nextcloud .onion Setup (Anonymous File Hosting)
- Plausible Deniability Protection for an .onion Service (WIP)
- Sensitive .onion Services: Self-Host or Host Remotely ?
- Why should I use Whonix for Self-hosted Hidden services ?
Self-Hosting
- How to Self-Host a server at Home
- How to hide your self-hosted service's home IP from the end users
- Prevent IP leaks using a VPN on the Home Server Host OS
- Self-Hosting a Hypervisor on your Home Server
- Why should I self-host my own services?
Serverside Anonymity
- Anonymity - Self-Hosted LLM Hidden Service
- Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter)
- Anonymous Simplex SMP & XFTP Servers setup
- Anonymous self-hosted clearnet mail server Setup
- Forgejo .onion Setup (Anonymous Code Repositories and Collaboration)
- How to Rent Remote Domains Anonymously (Registrar Resellers)
- How to Verify One's Identity While Maintaining Anonymity Using PGP Canaries
- How to anonymously recieve alerts (via SimpleX)
- How to have a custom .onion address for your Hidden Service (Vanity V3)
- How to redirect your clearnet audience to the Darknet
- How to run a Tor relay node
- How to run your own Darknet Lantern for Visibility and Discoverability
- Introduction
- Making Your Home Server Reachable via a Hidden Service (SSH + Cockpit + VNC via Tor)
- Mine Monero with p2pool and xmrig
- Monero Inheritence Management (VaultWarden Emergency Contacts)
- Monero Node Setup
- Nextcloud .onion Setup (Anonymous File Hosting)
- Remote anonymous access setup (SSH through Tor)
- Renting Remote VPS Servers Anonymously (non-KYC cloud resellers)
- TOR Bridge (November 2024 update)
- TOR Exit Node
- Where to Host Anonymous Clearnet Services ?
- Where to host Anonymous Hidden Services ?
- Why should I use Whonix for Self-hosted Hidden services ?
- bind9 DNS setup
Serverside Deniability
- Electrical Failover (basic UPS setup)
- EndGame V3 Setup
- How to setup a MySQL Master-Master replication over Tor
- How to setup a basic NGINX / PHP / MySQL app
- OnionBalance for .onion domains load balancing
- Plausible Deniability Protection for an .onion Service (WIP)
- Sensitive .onion Services: Self-Host or Host Remotely ?
- USB-triggered server shutdowns
- When the Adversary is the cloud provider himself
- Why is High Availability Important for Deniability ?
Serverside Privacy
- How to Self-Host a server at Home
- How to encrypt files and messages (Age and PGP)
- How to hide your self-hosted service's home IP from the end users
- Prevent IP leaks using a VPN on the Home Server Host OS
- Privacy Frontends - Avoiding Centralized Tracking
- Remote Hosting SimpleX Servers
- Self-Hosting a Hypervisor on your Home Server
- Setting up Invidious to watch YouTube privately
- Setting up Redlib to browse Reddit privately
- Setting up SafeTwitch to watch Twitch privately
- Why should I self-host my own services?
The consequences of bad opsec
Nihilist
Donate XMR to Nihilist:
8C1MNeB4KEHGApg6sPxFPn3NWERD3mPv7AjC8mCm1CJCXjoKnf36SYBdZ6ywCMdZRC4cxu7Uax3tufDqMXS2mLvHNCJzQZS