-
Notifications
You must be signed in to change notification settings - Fork 3
/
README.html
3577 lines (3149 loc) · 144 KB
/
README.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Anonymity</title>
<style>
/* Generic style */
body {
font-family: Arial, sans-serif;
line-height: 1.6;
margin: 5em;
max-width: 800px; /* Limit screen maximum width */
margin-left: auto;
margin-right: auto;
}
h1, h2, h3, h4, h5, h6 {
font-weight: bold;
margin-bottom: 0.5em;
}
h1 {
font-size: 2.5em;
line-height: 1.2;
}
h2 {
font-size: 2em;
line-height: 1.3;
}
h3 {
font-size: 1.8em;
line-height: 1.4;
}
p {
margin: 1em 0;
text-align: justify; /* Justify text for better readability */
}
a {
color: #007bff;
text-decoration: none;
}
a:hover {
text-decoration: underline;
}
blockquote {
margin: 1em 0;
padding: 0 1em;
border-left: 3px solid #ccc;
}
blockquote cite {
font-style: italic;
}
img {
max-width: 100%;
height: auto;
display: block;
margin: 1em 0;
}
pre {
background-color: #f8f9fa;
border: 1px solid #ccc;
padding: 1em;
overflow: auto;
white-space: pre-wrap; /* Wrap long lines in preformatted text */
}
code {
font-family: Consolas, Monaco, 'Andale Mono', monospace;
font-size: 0.9em;
}
/* Tables */
table {
width: 100%;
border-collapse: collapse;
margin-bottom: 1em;
}
th, td {
border: 1px solid #ccc;
padding: 0.8em;
}
th {
background-color: #f2f2f2;
}
/* Lists */
ul, ol {
margin: 1em 0;
padding-left: 2em;
}
/* Miscellaneous */
sup {
vertical-align: super;
font-size: smaller;
}
sub {
vertical-align: sub;
font-size: smaller;
}
@media screen and (max-width: 600px) {
/* Adjustments for smaller screens */
body {
font-size: 16px; /* Font size for better readability */
line-height: 1.5;
margin: 0.5em;
}
h1 {
font-size: 2em;
}
h2 {
font-size: 1.8em;
}
h3 {
font-size: 1.6em;
}
th, td {
padding: 0.6em;
}
pre {
padding: 0.5em;
}
}
</style>
</head>
<body>
<div id="header">
<h1>🕵🌐👤🤫 ANONYMITY 🤫👤🌐🕵</h1>
<blockquote>
<h3>"The primary threat facing someone trying to stay anonymous on the internet today is their own bad opsec, and that is precisely the same as it was in 2013. Tails and Tor reduced the number of ways anyone on my team could make dangerous mistakes, and so were crucial protections." (Edward Snowden)</h3></blockquote>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/s0n_0f_m4n_1964_-_m4gr1tt3_830px.png"
title="Son of Man (1964) - René Magritte" align="center" />
</div>
<hr>
<!-- ################################################# -->
<h3>BEST REFERENCES</h3>
<table border="1" valign="top" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td valign="top" style="height:25%">
• <a href="https://whonix.org/wiki/Tips_on_Remaining_Anonymous"
target="_blank" rel="noopener noreferrer"><b>Whonix</b> - Tips on Remaining Anonymous</a>
<br> • <a href="https://whonix.org/wiki/Essential_Host_Security"
target="_blank"><b>Whonix</b> - Essential Host Security</a>
<br> • <a href="https://whonix.org/wiki/System_Hardening_Checklist"
target="_blank"><b>Whonix</b> - System Hardening Checklist</a>
<br> • <a href="https://anonymousplanet.org/" target="_blank"><b>Anonymous Planet</b> - The Hitchhiker’s Guide</a>
<a href="https://anonymousplanet.org/export/guide.pdf" target="_blank"> (PDF)</a>
<br> • <a href="https://hackmd.io/YKjhguQES_KeKYs-v1YC1w?view" target="_blank"
rel="noopener noreferrer"><b>HackMD</b> - How to stay anon</a>
<br> • <a href="https://eff.org" target="_blank" rel="noopener noreferrer"><b>EFF Foundation</b></a>
<br> • <a href="https://securityeducationcompanion.org/" target="_blank"
rel="noopener noreferrer">EFF - Security Companion</a>
<br> • <a href="https://eff.org/sls" target="_blank" rel="noopener noreferrer"><b>EFF - Street-Level Surveillance</b></a>
<br> • <a href="https://epic.org" target="_blank" rel="noopener noreferrer"><b>EPIC</b></a>
<br> • <a href="https://epic.org/issues/surveillance-oversight" target="_blank"
rel="noopener noreferrer"><b>EPIC - Surveillance Oversight</b></a>
<br> • <a href="https://epic.org/?s=and_issues=surveillance-oversight"
target="_blank" rel="noopener noreferrer"><b>EPIC - Digital Library</b></a>
<br> • <a href="https://archive.epic.org/privacy/tools.html" target="_blank"
rel="noopener noreferrer"><b>EPIC - Privacy Tools</b></a>
<br> • <a href="https://freedom.press/training" target="_blank" rel="noopener noreferrer">Freedom of the Press Foundation</a>
<br> • <a href="https://anarsec.guide" target="_blank" rel="noopener noreferrer">Anarsec</a>
<br> • <a href="https://kycnot.me/" target="_blank" rel="noopener noreferrer">KYC? Not me</a>
<br> • <a href="https://techsafety.org" target="_blank" rel="noopener noreferrer">Safety Net Project</a>
<br> • <a href="https://nomoregoogle.com" target="_blank" rel="noopener noreferrer">No More Google</a>
<br> • <a href="https://cnet.com/news/privacy/" target="_blank" rel="noopener noreferrer">CNET</a>
<br> • <a href="https://cryptoparty.in" target="_blank" rel="noopener noreferrer">CryptoParty</a>
<br>
</td>
<td valign="top" style="height:25%">
• <a href="https://github.com/undergroundwires/privacy.sexy"
target="_blank" rel="noopener noreferrer">Privacy Sexy</a>
<br> • <a href="https://github.com/mikeroyal/Open-Source-Security-Guide"
target="_blank" rel="noopener noreferrer">Open Source Security Guide</a>
<br> • <a href="https://github.com/ffffffff0x/Digital-Privacy" target="_blank"
rel="noopener noreferrer">Digital Privacy</a>
<br> • <a href="https://github.com/redecentralize/alternative-internet"
target="_blank" rel="noopener noreferrer">Redecentralize</a>
<br> • <a href="https://github.com/BlockchainCommons/Pseudonymity-Guide"
target="_blank" rel="noopener noreferrer">Pseudonymity Guide</a>
<br> • <a href="https://github.com/danoctavian/awesome-anti-censorship"
target="_blank" rel="noopener noreferrer">Awesome Anti-censorship</a>
<br> • <a href="https://forensics.wiki/anti_forensic_techniques"
target="_blank" rel="noopener noreferrer">Anti-forensic Techniques</a>
<br> • <a href="https://github.com/shadawck/awesome-anti-forensic"
target="_blank" rel="noopener noreferrer">Awesome Anti-forensic</a>
<br> • <a href="https://github.com/PaulNorman01/Forensia" target="_blank"
rel="noopener noreferrer">Forensia</a>
<br> • <a href="https://github.com/CheckPointSW/Evasions" target="_blank"
rel="noopener noreferrer">Evasion Techniques</a>
<br> • <a href="https://github.com/KevinColemanInc/awesome-privacy"
target="_blank" rel="noopener noreferrer">Awesome Privacy</a>
<br> • <a href="https://github.com/awesome-selfhosted/awesome-selfhosted"
target="_blank" rel="noopener noreferrer">Awesome Self-hosted</a>
<br> • <a href="https://github.com/awesome-vpn/awesome-vpn" target="_blank"
rel="noopener noreferrer">Awesome VPN</a>
<br> • <a href="https://github.com/Lissy93/personal-security-checklist"
target="_blank" rel="noopener noreferrer">Personal Security Checklist</a>
<br> • <a href="https://github.com/cryptoanarchywiki/cryptoanarchywiki.github.io"
target="_blank" rel="noopener noreferrer">Cryptoanarchy Wiki</a>
<br> • <a href="https://github.com/tombusby/cypherpunk-research"
target="_blank" rel="noopener noreferrer">Cypherpunk Research</a>
<br>
</td>
<td valign="top" style="height:25%">
• <a href="https://haveibeenpwned.com" target="_blank" rel="noopener noreferrer">Have I Been Pwned ?</a>
<br> • <a href="https://joindeleteme.com" target="_blank" rel="noopener noreferrer">Join Delete Me</a>
<br> • <a href="https://monitor.mozilla.org/" target="_blank" rel="noopener noreferrer">Mozilla Monitor</a>
<br> • <a href="https://accountkiller.com" target="_blank" rel="noopener noreferrer">Account Killer</a>
<br> • <a href="https://prism-break.org" target="_blank" rel="noopener noreferrer">Prism-Break</a>
<br> • <a href="https://spreadprivacy.com" target="_blank" rel="noopener noreferrer">Spread Privacy</a>
<br> • <a href="https://privacyguides.org " target="_blank" rel="noopener noreferrer">Privacy Guides</a>
<br> • <a href="https://privacytools.io" target="_blank" rel="noopener noreferrer">Privacy Tools</a>
<br> • <a href="https://proprivacy.com" target="_blank" rel="noopener noreferrer">Pro Privacy</a>
<br> • <a href="https://www.privacy-handbuch.de" target="_blank" rel="noopener noreferrer">Privacy Handbuch (DE)</a>
<br> • <a href="https://myshadow.org/" target="_blank" rel="noopener noreferrer">My Shadow</a>
<br> • <a href="https://switching.software" target="_blank" rel="noopener noreferrer">switching.software</a>
<br> • <a href="https://whois.com" target="_blank" rel="noopener noreferrer">Whois</a>
<br> • <a href="https://gdpr-info.eu/issues/right-to-be-forgotten"
target="_blank" rel="noopener noreferrer">GDPR - Right to be forgotten</a>
<br> • <a href="https://tosdr.org" target="_blank" rel="noopener noreferrer">Terms of Service, Didn't Read</a>
<br> • <a href="https://bugmenot.com" target="_blank" rel="noopener noreferrer">BugMeNot</a>
<br>
</td>
<td valign="top" style="height:25%">
• <a href="https://reddit.com/r/RedditAlternatives" target="_blank"
rel="noopener noreferrer">r/RedditAlternatives</a>
<br> • <a href="https://links.hackliberty.org" target="_blank" rel="noopener noreferrer">https://links.hackliberty.org</a>
<br> • <a href="https://monero.town" target="_blank" rel="noopener noreferrer">https://monero.town</a>
<br> • <a href="https://lemmyverse.net/communities" target="_blank"
rel="noopener noreferrer">https://lemmyverse.net/communities</a>
<br> • <a href="https://reddit.com/r/privacy" target="_blank" rel="noopener noreferrer">r/privacy</a>
<br> • <a href="https://reddit.com/r/restorethefourth" target="_blank"
rel="noopener noreferrer">r/restorethefourth</a>
<br> • <a href="https://reddit.com/r/onion" target="_blank" rel="noopener noreferrer">r/onion</a>
<br> • <a href="https://reddit.com/r/TOR" target="_blank" rel="noopener noreferrer">r/TOR</a>
<br> • <a href="https://reddit.com/r/tails" target="_blank" rel="noopener noreferrer">r/tails</a>
<br> • <a href="https://reddit.com/r/opsec/" target="_blank" rel="noopener noreferrer">r/opsec</a>
<br> • <a href="https://reddit.com/r/redteamsec" target="_blank"
rel="noopener noreferrer">r/redteamsec</a>
<br> • <a href="https://reddit.com/r/netsec" target="_blank" rel="noopener noreferrer">r/netsec</a>
<br> • <a href="https://reddit.com/r/computerforensics" target="_blank"
rel="noopener noreferrer">r/computerforensics</a>
<br> • <a href="https://reddit.com/r/Smartphoneforensics" target="_blank"
rel="noopener noreferrer">r/Smartphoneforensics</a>
<br> • <a href="https://reddit.com/r/antiforensics" target="_blank"
rel="noopener noreferrer">r/antiforensics</a>
<br> • <a href="https://reddit.com/r/conspiracy" target="_blank"
rel="noopener noreferrer">r/conspiracy</a>
<br> • <a href="https://reddit.com/r/crypto" target="_blank" rel="noopener noreferrer">r/crypto</a>
<br> • <a href="https://reddit.com/r/Piracy" target="_blank" rel="noopener noreferrer">r/Piracy</a>
<br> • <a href="https://reddit.com/r/Scams" target="_blank" rel="noopener noreferrer">r/Scams</a>
<br> • <a href="https://reddit.com/r/oopsec/" target="_blank" rel="noopener noreferrer">r/oopsec</a>
<br> • <a href="https://reddit.com/r/privacymemes" target="_blank"
rel="noopener noreferrer">r/privacymemes</a>
<br> • <a href="https://old.reddit.com/r/Save3rdPartyApps/comments/148m42t/the_fight_continues"
target="_blank" rel="noopener noreferrer">r/Save3rdPartyApps</a>
<br> • <a href="https://reddit.com/r/ghostguns" target="_blank" rel="noopener noreferrer">r/ghostguns</a>
<br> • <a href="https://reddit.com/r/drones" target="_blank" rel="noopener noreferrer">r/drones</a>
<br>
</td>
</tr>
</thead>
</table>
<br>
<hr>
<!-- ################################################# -->
<h3>About Censorship of GitHub</h3> • Censorship of GitHub https://en.wikipedia.org/wiki/Censorship_of_GitHub
<br> • My GitHub account has been suddenly "flagged" and hidden from public
view - how come?
<br> https://webapps.stackexchange.com/questions/105956/my-github-account-has-been-suddenly-flagged-and-hidden-from-public-view-how
<hr>
<!-- ################################################# -->
<h3>Privacy vs. Anonymity</h3>
<p>• Identity: the unique set of characteristics that can be used to identify
a person and their unique physical body as themself and no one else.</p>
<p>• Pseudonymity: the near-anonymous state in which a person has a consistent
identifier that is not their real name.</p>
<p>• Anonymity: the state of a person's identity being unknown to all other
people than themself.</p>
<sub>Ref.: https://whonix.org/wiki/Tips_on_Remaining_Anonymous</sub>
<table border="1">
<thead>
<tr>
<th colspan="2" rowspan="2">PRIVACY VS. ANONYMITY</th>
<th colspan="3">PRIVACY</th>
</tr>
<tr>
<th>PUBLIC</th>
<th>SEMI-PRIVATE</th>
<th>PRIVATE</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">ANONYMITY</td>
<td>TRUE IDENTITY</td>
<td>Public business deal (e.g., negotiations in a conference room)</td>
<td>Online credit card transaction (where data may be shared with third
parties)
</td>
<td>Cash transaction between friends (which can still be traced if noted
in a ledger)</td>
</tr>
<tr>
<td>PSEUDO-ANONYMOUS</td>
<td>Public auction with unnamed buyer (e.g., eBay auctions)</td>
<td>Centralized marketplace transaction with Bitcoin (where wallet addresses
may be linked to identities)</td>
<td>Decentralized marketplace transaction with Bitcoin (e.g., using a
new wallet for each transaction to enhance anonymity)</td>
</tr>
<tr>
<td>ANONYMOUS</td>
<td>WikiLeaks announces anonymous cryptocurrency donation (utilizing
the Tor network)</td>
<td>Centralized marketplace transaction with anonymous cryptocurrency
(e.g., Monero)</td>
<td>Decentralized marketplace transaction with anonymous cryptocurrency
(e.g., transactions on platforms like LocalMonero)</td>
</tr>
</tbody>
</table>
<hr>
<!-- ################################################# -->
<h3><a href=""></a>Privacy-Anonymity Spectrum</h3>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/Pr1v3cy_Sp3ctrum.png"
title="Privacy-Anonymity Spectrum" width="830">
<hr>
<!-- ################################################# -->
<h3><a href=""></a>Privacy Benefits</h3>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/Pr1v4cy_B3n3f1ts.jpg"
title="Privacy Benefits" width="830">
<hr>
<!-- ################################################# -->
<h3>Flag Theory - <a href="https://flagtheory.com">https://flagtheory.com</a></h3>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/Fl4g_Th30ry.jpg"
title="Flag Theory" width="830">
<hr>
<!-- ################################################# -->
<h3>EFF’s “Street-Level Surveillance” - <a href="https://eff.org/sls">https://eff.org/sls</a></h3>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/Str33t_Surv31l4nc3.png"
title="EFF’s “Street-Level Surveillance”" width="830">
<hr>
<!-- ################################################# -->
<h3><a href=""></a>Electronic Warfare</h3>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/El3ctr0n1c_W4rf4r3.jpg"
title="Electronic Warfare" width="830">
<hr>
<!-- ################################################# -->
<h3>INTELLIGENCE STRATEGY</h3> https://dni.gov/index.php/what-we-do/what-is-intelligence
<br>
<h4>Types of Intelligence</h4>
<p>"The intelligence cycle is a process of collecting information and developing
it into intelligence for use by IC customers. The steps in the process
are direction, collection, processing, exploitation, and dissemination.
IC products can either be based on a single type of collection or “all-source,”
that is, based upon all available types of collection. IC products
also can be produced by one IC element or coordinated with other IC
elements, and delivered to IC customers in various formats, including
papers, digital media, briefings, maps, graphics, videos, and other
distribution methods."</p>
<h4>Six basic intelligence sources, or collection disciplines</h4>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/1nt3ll1gn3c3_S0urc3s.jpg"
title="Intelligence Sources">
<p>SIGINT — Signals intelligence is derived from signal intercepts comprising
-- however transmitted -- either individually or in combination: all
communications intelligence (COMINT), electronic intelligence (ELINT)
and foreign instrumentation signals intelligence (FISINT). The National
Security Agency is responsible for collecting, processing, and reporting
SIGINT. The National SIGINT Committee within NSA advises the Director,
NSA, and the DNI on SIGINT policy issues and manages the SIGINT requirements
system.</p>
<p>IMINT — Imagery Intelligence includes representations of objects reproduced
electronically or by optical means on film, electronic display devices,
or other media. Imagery can be derived from visual photography, radar
sensors, and electro-optics. NGA is the manager for all imagery intelligence
activities, both classified and unclassified, within the government,
including requirements, collection, processing, exploitation, dissemination,
archiving, and retrieval.</p>
<p>MASINT — Measurement and Signature Intelligence is information produced
by quantitative and qualitative analysis of physical attributes of
targets and events to characterize, locate, and identify them. MASINT
exploits a variety of phenomenologies, from a variety of sensors and
platforms, to support signature development and analysis, to perform
technical analysis, and to detect, characterize, locate and identify
targets and events. MASINT is derived from specialized, technically-derived
measurements of physical phenomenon intrinsic to an object or event
and it includes the use of quantitative signatures to interpret the
data. The Director of DIA is both the “Intelligence Community Functional
Manager for MASINT” and the “DOD MASINT Manager.” The National MASINT
Office (NMO) manages and executes MASINT services of common concern
and related activities for the D/DIA in response to National and Department
of Defense requirements. If interested in learning more about MASINT,
check out the NMO's primer here.</p>
<p>HUMINT — Human intelligence is derived from human sources. To the public,
HUMINT remains synonymous with espionage and clandestine activities;
however, most of HUMINT collection is performed by overt collectors
such as strategic debriefers and military attaches. It is the oldest
method for collecting information, and until the technical revolution
of the mid- to late 20th century, it was the primary source of intelligence.</p>
<p>OSINT — Open-Source Intelligence is publicly available information appearing
in print or electronic form including radio, television, newspapers,
journals, the Internet, commercial databases, and videos, graphics,
and drawings. While open-source collection responsibilities are broadly
distributed through the IC, the major collectors are the DNI's Open
Source Center (OSC) and the National Air and Space Intelligence Center
(NASIC).</p>
<p>GEOINT — Geospatial Intelligence is the analysis and visual representation
of security related activities on the earth. It is produced through
an integration of imagery, imagery intelligence, and geospatial information.</p>
<hr>
<!-- ################################################# -->
<table border="1">
<thead align="center">
<tr>
<th colspan="4">PUBLIC INTERNATIONAL LAW</th>
</tr>
</thead>
<tbody align="center">
<tr>
<td colspan="2">LAWS OF WAR</td>
<td colspan="2">LAWS OF PEACE</td>
</tr>
<tr>
<td>"Jus ad bellum"</td>
<td>"Jus in Bello"</td>
<td>Occupation and "Jus Post Bellum"</td>
<td>Human Rights Law</td>
</tr>
<tr>
<td>The international rules pertaining to which extent the use of military
force against another state is allowed.</td>
<td>The international rules pertaining to how armed conflict must be
conducted.
</td>
<td>The Justice at the end of the war, helps move from conflict to peace.Reasonable
peace treaties, civilian population should be protected,
<br>leaders who broke Hague/Geneva laws must face prosecution, cities
must be reconstructed.</td>
<td>International Bill on Human Rights. Treaties and Conventions. Covenats
and Declarations.</td>
</tr>
</tbody>
</table>
<br>
<hr>
<!-- ################################################# -->
<div>
<h1>ONLINE ANONYMITY</h1> 👷🛠️UNDER CONSTRUCTION🚧🏗
<br>
<div>
<details>
<summary>Anonymous Developer</summary>
<br>
<!-- #################### -->
<div>
<details>
<summary>How to Create an Anonymous GitHub Account</summary>
<br>
<h4>How to Create an Anonymous GitHub Account</h4>
<p>Note: This guide may be outdated!</p>
<a href="https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion"
target="_blank" rel="noreferrer">ProtonMail</a>
<br>
<p>This guide will help you set up an anonymous developer account:</p>
<ol>
<li>Create a new browser profile:
<ul>
<li>Firefox: <a href="https://support.mozilla.org/en-US/kb/profile-manager-create-remove-switch-firefox-profiles"
target="_blank" rel="noreferrer">Profile Manager</a></li>
<li>Chrome: <a href="https://support.google.com/chrome/answer/2364824?hl=en"
target="_blank" rel="noreferrer">Create a profile</a></li>
</ul>
</li>
<li>Create a new <a href="https://protonmail.com/" target="_blank"
rel="noreferrer">ProtonMail</a> account:
<ul>
<li>ProtonMail does not require personally identifiable information.</li>
<li>For recovery options, avoid using an email or phone number
that could reveal your identity.</li>
</ul>
</li>
<li>Create a <a href="https://protonvpn.com" target="_blank"
rel="noreferrer">ProtonVPN</a> account:
<ul>
<li>Use this VPN whenever you are in <em>anon</em> mode.</li>
</ul>
</li>
<li>Create a <a href="https://github.com/" target="_blank" rel="noreferrer">GitHub</a> account with your new email:
<ul>
<li>Generate new SSH keys and add them to your GitHub account.</li>
</ul>
</li>
<li>Create a new <a href="https://twitter.com" target="_blank"
rel="noreferrer">Twitter</a> account using your new identity.</li>
<li>Create a new <a href="https://reddit.com/" target="_blank"
rel="noreferrer">Reddit</a> account:
<ul>
<li>Use a relevant subreddit to obtain a unique profile picture
for your anonymous account.</li>
</ul>
</li>
<li>Create accounts on <a href="https://cryptpad.fr/" target="_blank"
rel="noreferrer">CryptPad</a> and <a href="https://hackmd.io/"
target="_blank" rel="noreferrer">HackMD</a> for encrypted
note-taking and storage.</li>
<li>Visit <a href="https://privacytools.io/" target="_blank"
rel="noreferrer">PrivacyTools.io</a> for additional privacy
tools.
</li>
<li>(Optional) Install <a href="https://ublockorigin.com/" target="_blank"
rel="noreferrer">uBlock Origin</a>, <a href="https://privacybadger.org/"
target="_blank" rel="noreferrer">Privacy Badger</a>, and
<a href="https://www.eff.org/https-everywhere" target="_blank" rel="noreferrer">HTTPS Everywhere</a> in your new browser profile.
</li>
<li>For further reading, check out <a href="https://hackmd.io/YKjhguQES_KeKYs-v1YC1w?view"
target="_blank" rel="noreferrer">0xngmi's guide for staying anonymous</a>.</li>
</ol>
<sub>Credits: <a href="https://github.com/Mikerah/anon-guide" target="_blank" rel="noreferrer">GitHub</a></sub>
<br>
<br>
</details>
</div>
<!-- #################### -->
<div>
<details>
<summary>How to Erase GitHub History</summary>
<br>
<sub>Credits: <a href="https://github.com/fedebotu/clone-anonymous-github" target="_blank" rel="noreferrer">GitHub</a></sub>
<br>
<br>
</details>
</div>
<!-- #################### -->
<div>
<details>
<summary>Contribute Code Anonymously on GitHub</summary>
<br>
<sub>Credits: <a href="https://github.com/AnalogJ/gitmask" target="_blank" rel="noreferrer">GitHub</a></sub>
<br>
<br>
</details>
</div>
<!-- #################### -->
<div>
<details>
<summary>Proxy Server to Support GitHub Anonymous Browsing</summary>
<br>
<sub>Credits: <a href="https://durieux.me/projects/anonymous-github.html" target="_blank" rel="noreferrer">Durieux</a></sub>
<br>
<br>
</details>
</div>
<br>
</details>
</div>
<!-- #################### -->
<details>
<summary>Secure Systems</summary>
<br>
<h4>Secure Operating Systems</h4>
<h4>Tails</h4>
<p>For anonymity and secure browsing. See the <a href="https://gitlab.torproject.org/legacy/trac/-/wikis/doc/OperationalSecurity"
target="_blank" rel="noreferrer">Tor Wiki</a> for operational security
tips.
</p>
<h4>Whonix</h4>
<p>Visit <a href="https://whonix.org" target="_blank" rel="noreferrer">Whonix</a> for information and <a href="https://forums.whonix.org" target="_blank"
rel="noreferrer">community support</a>.</p>
<h4>Protocol Leak and Fingerprinting Protection</h4>
<p>Learn more about protection measures on <a href="https://whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection#Less_important_identifiers"
target="_blank" rel="noreferrer">Whonix's Protocol Leak Protection page</a>.</p>
<h4>Attacks on Tor</h4>
<p>Explore various attacks on Tor at <a href="https://github.com/Attacks-on-Tor/Attacks-on-Tor"
target="_blank" rel="noreferrer">GitHub</a>.</p>
<h4>Qubes OS</h4>
<p>Learn more about <a href="https://qubes-os.org" target="_blank" rel="noreferrer">Qubes OS</a> and visit the <a href="https://forum.qubes-os.org" target="_blank"
rel="noreferrer">Qubes forum</a> for discussions.</p>
<h4>Whonix Comparison with Others</h4>
<p>For a comparison, visit <a href="https://whonix.org/wiki/Comparison_with_Others"
target="_blank" rel="noreferrer">this comparison page</a>.</p>
<h4>Comparison of Tails, Whonix, and Qubes</h4>
<table border="1">
<thead>
<tr>
<th>Feature</th>
<th>Tails</th>
<th>Whonix</th>
<th>Qubes OS</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Main Use</strong></td>
<td>Live OS for anonymous browsing and communication</td>
<td>Secure and anonymous desktop environment</td>
<td>Security-focused desktop OS using virtualization</td>
</tr>
<tr>
<td><strong>Base System</strong></td>
<td>Debian-based</td>
<td>Debian-based</td>
<td>Fedora-based</td>
</tr>
<tr>
<td><strong>Installation</strong></td>
<td>Live USB/DVD</td>
<td>Virtual Machine (VM)</td>
<td>Installation on hardware</td>
</tr>
<tr>
<td><strong>Anonymity</strong></td>
<td>High, uses Tor network</td>
<td>High, uses Tor network</td>
<td>High, compartmentalizes activities using VMs</td>
</tr>
<tr>
<td><strong>Persistence</strong></td>
<td>Optional encrypted persistence</td>
<td>Persistent</td>
<td>Persistent</td>
</tr>
<tr>
<td><strong>Security Features</strong></td>
<td>Amnesic (does not leave traces), Tor</td>
<td>Tor, isolation of apps through VMs</td>
<td>VM isolation, Disposable VMs, Qubes firewall</td>
</tr>
<tr>
<td><strong>Usability</strong></td>
<td>User-friendly, designed for ease of use</td>
<td>Requires some technical knowledge</td>
<td>Advanced, requires technical knowledge</td>
</tr>
<tr>
<td><strong>Hardware Requirements</strong></td>
<td>Low, can run on most PCs</td>
<td>Moderate, requires a VM host</td>
<td>High, requires modern hardware with virtualization support</td>
</tr>
<tr>
<td><strong>Website</strong></td>
<td><a href="https://tails.net" target="_blank" rel="noreferrer">tails.net</a></td>
<td><a href="https://www.whonix.org/" target="_blank" rel="noreferrer">whonix.org</a></td>
<td><a href="https://www.qubes-os.org/" target="_blank" rel="noreferrer">qubes-os.org</a></td>
</tr>
</tbody>
</table>
<br>
</details>
<!-- #################### -->
<div>
<details>
<summary>Secure Internet</summary>
<br>
<h4>Anonymous Internet</h4>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/L0k1n3t.jpg"
width="640" height="320" alt="Anonymous Internet" />
<ul>
<li><a href="https://torproject.org" target="_blank" rel="noreferrer">Tor (The Onion Router)</a>:
Free software that defends against traffic analysis.</li>
<li><a href="http://hyperboria.net/" target="_blank" rel="noreferrer">Hyperboria</a>:
Encrypted, decentralized Internet alternative.</li>
<li><a href="https://gnunet.org/" target="_blank" rel="noreferrer">GNUnet</a>:
Encrypted, anonymous, decentralized P2P networking.</li>
<li><a href="https://commotionwireless.net/" target="_blank" rel="noreferrer">Commotion</a>:
Open-source tool for creating mesh networks.</li>
<li><a href="https://i2p2.de/" target="_blank" rel="noreferrer">I2P Anonymous Network</a>:
An anonymous overlay network for secure communication.</li>
<li><a href="https://freenetproject.org/index.html" target="_blank"
rel="noreferrer">Freenet</a>: Peer-to-peer platform for censorship-resistant
communication.
</li>
<li><a href="https://zeronet.io" target="_blank" rel="noreferrer">Zeronet</a>:
Uncensorable websites using Bitcoin cryptography and BitTorrent.</li>
<li><a href="https://ipfs.io" target="_blank" rel="noreferrer">IPFS</a>:
A peer-to-peer hypermedia protocol to make the web faster and
safer.
</li>
<li><a href="https://yggdrasil-network.github.io/about.html" target="_blank"
rel="noreferrer">Yggdrasil</a>: Global IPv6 encrypted mesh
network.
</li>
<li><a href="https://github.com/nymtech/nym" target="_blank" rel="noreferrer">Nym</a>:
Provides network-level privacy against sophisticated attacks.</li>
</ul>
<h4>Comparison of Anonymous Networks</h4>
<table border="1">
<thead>
<tr>
<th>Network</th>
<th>Description</th>
<th>Main Use</th>
<th>Underlying Technology</th>
<th>Level of Anonymity</th>
<th>Performance</th>
</tr>
</thead>
<tbody>
<tr>
<td>Tor</td>
<td>Anonymous browsing and IP hiding.</td>
<td>Access to regular and darknet websites.</td>
<td>Onion Routing.</td>
<td>High</td>
<td>Medium</td>
</tr>
<tr>
<td>I2P</td>
<td>Anonymous network for secure communication.</td>
<td>Hidden sites, email, file sharing.</td>
<td>Garlic Routing.</td>
<td>High</td>
<td>Medium</td>
</tr>
<tr>
<td>FreeNet</td>
<td>Anonymous storage and distribution of files.</td>
<td>File sharing, anonymous forums.</td>
<td>Distributed storage and P2P.</td>
<td>High</td>
<td>Low</td>
</tr>
<tr>
<td>ZeroNet</td>
<td>Decentralized web using Bitcoin and BitTorrent technology.</td>
<td>Static sites, blogs, forums.</td>
<td>BitTorrent, blockchain.</td>
<td>Medium</td>
<td>Medium</td>
</tr>
<tr>
<td>GNUnet</td>
<td>Framework for secure decentralized networks.</td>
<td>VPN, secure DNS, file sharing.</td>
<td>P2P, high-anonymity routing.</td>
<td>High</td>
<td>Low</td>
</tr>
<tr>
<td>Hyperboria</td>
<td>IPv6 mesh network for anonymous communication.</td>
<td>VPN, secure communication.</td>
<td>cjdns (Cryptographic IPv6 network).</td>
<td>High</td>
<td>Medium</td>
</tr>
<tr>
<td>Loki</td>
<td>Anonymous network for private communication and services.</td>
<td>Messaging, hosting private services.</td>
<td>Blockchain, Onion routing.</td>
<td>High</td>
<td>Medium</td>
</tr>
<tr>
<td>Commotion</td>
<td>Software to create autonomous wireless mesh networks.</td>
<td>Communication in areas without infrastructure.</td>
<td>WiFi mesh networking.</td>
<td>Variable</td>
<td>Variable</td>
</tr>
<tr>
<td>IPFS</td>
<td>Protocol for distributed data storage and sharing.</td>
<td>File storage, distributed websites.</td>
<td>Merkle DAG, P2P.</td>
<td>Low</td>
<td>High</td>
</tr>
<tr>
<td>Yggdrasil</td>
<td>Global encrypted mesh network.</td>
<td>Secure communication, decentralized network.</td>
<td>Tree-based routing.</td>
<td>High</td>
<td>Medium</td>
</tr>
<tr>
<td>Nym</td>
<td>Mixnet platform for secure and anonymous communications.</td>
<td>Privacy at the network layer.</td>
<td>Mixnet.</td>
<td>High</td>
<td>Medium</td>
</tr>
</tbody>
</table>
<h4>VPN Guides and Tutorials</h4>
<ul>
<li><a href="https://thatoneprivacysite.xyz/" target="_blank" rel="noreferrer">That One Privacy Site</a></li>
<li><a href="https://reddit.com/r/vpnrecommendations" target="_blank"
rel="noreferrer">r/vpnrecommendations</a></li>
<li><a href="https://reddit.com/r/VPN/wiki/index" target="_blank"
rel="noreferrer">r/VPN Wiki</a></li>
<li><a href="https://reddit.com/r/VPNTorrents" target="_blank" rel="noreferrer">r/VPNTorrents</a></li>
<li><a href="https://reddit.com/r/VPN/comments/4iho8e/that_one_privacy_guys_guide_to_choosing_the_best/?st=iu9u47u7andsh=459a76f2"
target="_blank" rel="noreferrer">Choosing the Best VPN</a></li>
<li><a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you"
target="_blank" rel="noreferrer">Choosing the VPN That's Right for You</a></li>
<li><a href="https://vpnalert.com" target="_blank" rel="noreferrer">VPN Alert</a></li>
<li><a href="https://github.com/alancnet/torrent-vpn" target="_blank"
rel="noreferrer">Torrent VPN Setup</a></li>
<li><a href="https://thatoneprivacysite.net/vpn-section" target="_blank"
rel="noreferrer">That One Privacy Site VPN Section</a></li>
<li><a href="https://privacytools.io" target="_blank" rel="noreferrer">PrivacyTools.io</a></li>
<li><a href="https://wiki.archlinux.org/index.php/VPN_over_SSH" target="_blank"
rel="noreferrer">VPN over SSH</a></li>
</ul>
<h4>Anonymous VPNs</h4>
<ul>
<li><a href="https://mullvad.net" target="_blank" rel="noreferrer">Mullvad</a></li>
<li><a href="http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion"
target="_blank" rel="noreferrer">Mullvad (Onion)</a></li>
<li><a href="https://protonvpn.com" target="_blank" rel="noreferrer">ProtonVPN</a></li>
<li><a href="https://airvpn.org" target="_blank" rel="noreferrer">AirVPN</a></li>
<li><a href="https://ivpn.net" target="_blank" rel="noreferrer">IVPN</a></li>
<li><a href="https://vpn.xxx" target="_blank" rel="noreferrer">VPN.XXX</a></li>
<li><a href="https://windscribe.com" target="_blank" rel="noreferrer">Windscribe</a></li>
<li><a href="https://expressvpn.com/vpnmentor1" target="_blank" rel="noreferrer">ExpressVPN</a></li>
<li><a href="https://privateinternetaccess.com" target="_blank" rel="noreferrer">Private Internet Access</a></li>
<li><a href="https://nordvpn.com" target="_blank" rel="noreferrer">NordVPN</a></li>
</ul>
<h4>DNS Services</h4>
<ul>
<li><a href="https://opennicproject.org/" target="_blank" rel="noreferrer">OpenNIC</a></li>
<li><a href="https://bit.namecoin.org/" target="_blank" rel="noreferrer">Dot-Bit</a>:
Decentralized DNS using Bitcoin technology.</li>
</ul>
<h4>Additional Resources</h4>
<ul>
<li><a href="https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN"
target="_blank" rel="noreferrer">TorPlusVPN</a></li>
<li><a href="https://rapidseedbox.com/blog/vpn-vs-proxy" target="_blank"
rel="noreferrer">VPN vs Proxy Comparison</a></li>
</ul>
<br>
</details>
</div>
<!-- #################### -->
<details>
<summary>Secure Communication</summary>
<br>
<p>Communicate with friends and family as if you're in a war room.</p>
<img src="https://github.com/RENANZG/My-Anonymity/blob/main/.data/war_room_dr._strangelove.jpeg"
alt="War Room" width="640" height="320" />
<h5>Session</h5>
<ul>
<li><a href="https://github.com/oxen-io/session-desktop">Session Desktop</a></li>
<li><a href="https://github.com/oxen-io/session-android">Session Android</a></li>
<li><a href="https://github.com/GNU-Linux-libre/Awesome-Session-Group-List">Session Group List</a></li>
<li><a href="https://arxiv.org/pdf/2002.04609.pdf">Session Paper</a></li>
</ul>
<h5>SimpleX</h5>
<ul>
<li><a href="https://github.com/simplex-chat/simplex-chat">SimpleX Chat</a></li>
</ul>
<h5>Signal</h5>
<ul>
<li><a href="https://github.com/signalapp">Signal GitHub</a></li>
<li><a href="https://signal.org/android/apk/">Signal APK</a></li>
<li><a href="https://community.signalusers.org/t/overview-of-third-party-security-audits/13243">Security Audits Overview</a></li>
<li><a href="https://youtube.com/watch?v=QEq2JQ6nzuQ">Signal Did NOT Get Hacked</a></li>
</ul>
<h4>Chats</h4>
<img src=".data/C0m4pps.png" alt="Chat Apps" width="640" height="320" />
<h4>Comparison: Telegram vs SimpleX vs Session</h4>
<table border="1">
<thead>
<tr>
<th>Feature</th>
<th>Telegram</th>
<th>SimpleX</th>
<th>Session</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Protocol Type</strong></td>
<td>MTProto</td>
<td>Custom (Double Ratchet)</td>
<td>LibP2P</td>
</tr>
<tr>
<td><strong>Primary Use Case</strong></td>
<td>General messaging, media sharing</td>
<td>Privacy-focused messaging</td>