diff --git a/docs/about/index.md b/docs/about/index.md index ab8ed74..5adac30 100644 --- a/docs/about/index.md +++ b/docs/about/index.md @@ -1,114 +1,114 @@ ---- -title: "About Anonymous Planet" -description: We are the maintainers of the Hitchhiker's Guide and the PSA Matrix space. -schema: - "@context": https://schema.org - "@type": Organization - "@id": https://www.anonymousplanet.org/ - name: Anonymous Planet - url: https://www.anonymousplanet.org/about/ - logo: ../media/favicon.png - sameAs: - - https://github.com/Anon-Planet - - https://opencollective.com/anonymousplanetorg - - https://mastodon.social/@anonymousplanet ---- -![Anonymous Planet logo](../media/profile.png){ align=right } - -**Anonymous Planet** are the maintainers of the [_Hitchhiker's Guide_](https://anonymousplanet.org/guide.html) and the [_PSA Community_](https://psa.anonymousplanet.org). It is responsible for maintaining the projects and code repositories. - -The purpose: providing an introduction to various online tracking techniques, online ID verification techniques, and detailed guidance to creating and maintaining (truly) anonymous online identities. It is written with the hopes that good people (e.g., activists, journalists, scientists, lawyers, whistle-blowers, etc.) will be able to fight oppression, censorship and harassment! The website and projects are free (as in freedom) and not affiliated with any donor or projects discussed. - -??? Note "Where do I start?" - - Start either by going to [the beginning](../guide/index.md) or using the search at top right of the page. It is also available at whatever point you are in your reading. - -??? Note "Notes on the journey" - - This guide is a work in progress. It will probably never be "finished". You may (will) find broken links when you click on some search results and during some navigation steps. Please report these. Otherwise, most of the search functionality is a great experience and can help you find linked topics. Try to search for something in one section of the reading. It will show up in many other places. - -??? Note "Disclaimer" - - There might be some wrong or outdated information in this guide because no one is perfect. Your experience may vary. Remember, check regularly for an updated version of this guide. Please do your own independent, well-thought research. There is no one resource online that can provide 100% security, anonymity, and/or privacy. - -This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0](https://creativecommons.org/licenses/by-nc/4.0/) [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)). - -- For mirrors see [Mirrors](../mirrors/index.md) and the links at the bottom right of the page. You should see these on every page. - -- For help in comparing versions see [Comparing versions](../guide/index.md#appendix-a7-comparing-versions) - -Feel free to submit issues **(please do report anything wrong)** using GitHub Issues at: . We also accept Merge Requests (MR) from our Gitlab and many other places. Do not hesitate to report issues and suggestions! - -??? Note "Discuss ideas on Matrix for real-time chat" - - We offer a Matrix.org hosted space of our own. Check it out! - - - Read [the rules](https://psa.anonymousplanet.org/), please - - Matrix Room: https://matrix.to/#/#nth:anonymousplanet.net - - Matrix Space: https://matrix.to/#/#psa:anonymousplanet.net - - @daskolburn:anonymousplanet.net and @nope:anonymousplanet.net are the only administrators - -Follow us on: - -- Twitter at - -- Mastodon at - -To contact me, see the updated information on the website or send an e-mail to - -**Please consider [donating](../guide/index.md#donations) if you enjoy the project and want to support the hosting fees or support the funding of initiatives like the hosting of Tor Exit Nodes.** - -### Recommended Reading - -Some of those resources may, in order to sustain their project, contain or propose: - -- Sponsored commercial content -- Monetized content through third party platforms (such as YouTube) -- Affiliate links to commercial services -- Paid Services such as consultancy -- Premium content such as ad-free content or updated content -- Merchandising - -_Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way._ - -If you skipped those, you should really still consider viewing this YouTube playlist from the Techlore Go Incognito project ( [[Archive.org]](https://web.archive.org/web/https://github.com/techlore-official/go-incognito)) as an introduction before going further: [[Invidious]](https://yewtu.be/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO). This guide will cover many of the topics in the videos of this playlist with more details and references as well as some added topics not covered within that series. This will just take you 2 or 3 hours to watch it all. - -_Anonymous Planet_ **does not** participate in any sponsoring, endorsement, advertising, or other affiliate programs for any entity. We only rely on anonymous donations in a closed, transparent loop system. - -??? Note "Privacy related" - - - AnarSec: - - EFF Surveillance Self-Defense: - - Prism-Break: - - Privacy Guides: - - Techlore: - - The New Oil: - - PrivacyTools.io: - -??? Note "Blogs and personal websites" - - - CIA Officer's Blog: - - Continuing Ed: - - Madaidan's Insecurities: - - Seirdy's Home: - -??? Note "Useful resources" - - - KYC? Not me: - - Library Genesis: [[Wikiless]](https://wikiless.com/wiki/Library_Genesis) (see their latest known URL in the Wikipedia article) - - Real World Onion Sites: - - Sci-Hub [[Wikiless]](https://wikiless.com/wiki/Sci-Hub) (see their latest known URL in the main Wikipedia article) - - Terms of Service, Didn't Read: - - Whonix Documentation: - -??? Note "We are not affiliated with Anonymous or Riseup" - - One or two of our community members uses or has used the resources of Riseup. We are not affiliated with Riseup in any manner. - - We also hold **no affiliation** with the [Anonymous](https://en.wikipedia.org/wiki/Anonymous_(hacker_group)) [[Wikiless]](https://wikiless.com/wiki/Anonymous_(hacker_group)) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Anonymous_(hacker_group)) hacker collective. - -## License - -!!! Danger "" - -:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: This guide is an open-source non-profit initiative, licensed under [Creative Commons Attribution-NonCommercial 4.0 International](https://github.com/Anon-Planet/thgtoa/blob/master/LICENSE.md) and is not sponsored/endorsed by any commercial/governmental entity. This means that you are free to use our guide for pretty much any purpose excluding commercially as long as you do attribute it. There are no ads or any affiliate links. +--- +title: "About Anonymous Planet" +description: We are the maintainers of the Hitchhiker's Guide and the PSA Matrix space. +schema: + "@context": https://schema.org + "@type": Organization + "@id": https://www.anonymousplanet.org/ + name: Anonymous Planet + url: https://www.anonymousplanet.org/about/ + logo: ../media/favicon.png + sameAs: + - https://github.com/Anon-Planet + - https://opencollective.com/anonymousplanetorg + - https://mastodon.social/@anonymousplanet +--- +![Anonymous Planet logo](../media/profile.png){ align=right } + +**Anonymous Planet** are the maintainers of the [_Hitchhiker's Guide_](https://anonymousplanet.org/guide.html) and the [_PSA Community_](https://psa.anonymousplanet.org). It is responsible for maintaining the projects and code repositories. + +The purpose: providing an introduction to various online tracking techniques, online ID verification techniques, and detailed guidance to creating and maintaining (truly) anonymous online identities. It is written with the hopes that good people (e.g., activists, journalists, scientists, lawyers, whistle-blowers, etc.) will be able to fight oppression, censorship and harassment! The website and projects are free (as in freedom) and not affiliated with any donor or projects discussed. + +??? Note "Where do I start?" + + Start either by going to [the beginning](../guide/index.md) or using the search at top right of the page. It is also available at whatever point you are in your reading. + +??? Note "Notes on the journey" + + This guide is a work in progress. It will probably never be "finished". You may (will) find broken links when you click on some search results and during some navigation steps. Please report these. Otherwise, most of the search functionality is a great experience and can help you find linked topics. Try to search for something in one section of the reading. It will show up in many other places. + +??? Note "Disclaimer" + + There might be some wrong or outdated information in this guide because no one is perfect. Your experience may vary. Remember, check regularly for an updated version of this guide. Please do your own independent, well-thought research. There is no one resource online that can provide 100% security, anonymity, and/or privacy. + +This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0](https://creativecommons.org/licenses/by-nc/4.0/) [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)). + +- For mirrors see [Mirrors](../mirrors/index.md) and the links at the bottom right of the page. You should see these on every page. + +- For help in comparing versions see [Comparing versions](../guide/index.md#appendix-a6-comparing-versions) + +Feel free to submit issues **(please do report anything wrong)** using GitHub Issues at: . We also accept Merge Requests (MR) from our Gitlab and many other places. Do not hesitate to report issues and suggestions! + +??? Note "Discuss ideas on Matrix for real-time chat" + + We offer a Matrix.org hosted space of our own. Check it out! + + - Read [the rules](https://psa.anonymousplanet.org/), please + - Matrix Room: https://matrix.to/#/#nth:anonymousplanet.net + - Matrix Space: https://matrix.to/#/#psa:anonymousplanet.net + - @daskolburn:anonymousplanet.net and @nope:anonymousplanet.net are the only administrators + +Follow us on: + +- Twitter at + +- Mastodon at + +To contact me, see the updated information on the website or send an e-mail to + +**Please consider [donating](../guide/index.md#donations) if you enjoy the project and want to support the hosting fees or support the funding of initiatives like the hosting of Tor Exit Nodes.** + +### Recommended Reading + +Some of those resources may, in order to sustain their project, contain or propose: + +- Sponsored commercial content +- Monetized content through third party platforms (such as YouTube) +- Affiliate links to commercial services +- Paid Services such as consultancy +- Premium content such as ad-free content or updated content +- Merchandising + +_Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way._ + +If you skipped those, you should really still consider viewing this YouTube playlist from the Techlore Go Incognito project ( [[Archive.org]](https://web.archive.org/web/https://github.com/techlore-official/go-incognito)) as an introduction before going further: [[Invidious]](https://yewtu.be/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO). This guide will cover many of the topics in the videos of this playlist with more details and references as well as some added topics not covered within that series. This will just take you 2 or 3 hours to watch it all. + +_Anonymous Planet_ **does not** participate in any sponsoring, endorsement, advertising, or other affiliate programs for any entity. We only rely on anonymous donations in a closed, transparent loop system. + +??? Note "Privacy related" + + - AnarSec: + - EFF Surveillance Self-Defense: + - Prism-Break: + - Privacy Guides: + - Techlore: + - The New Oil: + - PrivacyTools.io: + +??? Note "Blogs and personal websites" + + - CIA Officer's Blog: + - Continuing Ed: + - Madaidan's Insecurities: + - Seirdy's Home: + +??? Note "Useful resources" + + - KYC? Not me: + - Library Genesis: [[Wikiless]](https://wikiless.com/wiki/Library_Genesis) (see their latest known URL in the Wikipedia article) + - Real World Onion Sites: + - Sci-Hub [[Wikiless]](https://wikiless.com/wiki/Sci-Hub) (see their latest known URL in the main Wikipedia article) + - Terms of Service, Didn't Read: + - Whonix Documentation: + +??? Note "We are not affiliated with Anonymous or Riseup" + + One or two of our community members uses or has used the resources of Riseup. We are not affiliated with Riseup in any manner. + + We also hold **no affiliation** with the [Anonymous](https://en.wikipedia.org/wiki/Anonymous_(hacker_group)) [[Wikiless]](https://wikiless.com/wiki/Anonymous_(hacker_group)) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Anonymous_(hacker_group)) hacker collective. + +## License + +!!! Danger "" + +:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: This guide is an open-source non-profit initiative, licensed under [Creative Commons Attribution-NonCommercial 4.0 International](https://github.com/Anon-Planet/thgtoa/blob/master/LICENSE.md) and is not sponsored/endorsed by any commercial/governmental entity. This means that you are free to use our guide for pretty much any purpose excluding commercially as long as you do attribute it. There are no ads or any affiliate links. diff --git a/docs/guide/index.md b/docs/guide/index.md index d13e9e7..1cdd41d 100644 --- a/docs/guide/index.md +++ b/docs/guide/index.md @@ -113,7 +113,7 @@ Disclaimer: Jokes aside (magical amulet...). Of course, there are also advanced The EFF provides a few security scenarios of what you should consider depending on your activity. While some of those tips might not be within the scope of this guide (more about Privacy than Anonymity), they are still worth reading as examples. See [[Archive.org]](https://web.archive.org/web/https://ssd.eff.org/en/module-categories/security-scenarios). -If you want to go deeper into threat modeling, see [Appendix B3: Threat modeling resources]. +If you want to go deeper into threat modeling, see [Appendix B3: Threat modeling resources](#appendix-b3-threat-modeling-resources). You might think this guide has no legitimate use but there are many[^16]'[^17]'[^18]'[^19]'[^20]'[^21]'[^22] such as: @@ -435,9 +435,9 @@ The IMEI and IMSI can be traced back to you in at least six ways: - Impersonate your phone number without controlling your phone. -Here is also a good YouTube video on this topic: DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time [[Invidious]](https://yewtu.be/watch?v=siCk4pGGcqA) +Here is also a good YouTube video on this topic: [DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time](https://www.youtube.com/watch?v=siCk4pGGcqA) [[Invidious]](https://yewtu.be/watch?v=siCk4pGGcqA) - **For these reasons, it is crucial to get a dedicated anonymous phone number and/or an anonymous burner phone with a cash-bought pre-paid sim card that is not tied to you in any way (past or present) for conducting sensitive activities. It is also possible to get an anonymous pre-paid but preferably dedicated number from free and paid online services accepting anonymous cryptocurrencies like Monero. Get more practical guidance here: [Getting an anonymous Phone number][Getting an anonymous Phone number:].** + **For these reasons, it is crucial to get a dedicated anonymous phone number and/or an anonymous burner phone with a cash-bought pre-paid sim card that is not tied to you in any way (past or present) for conducting sensitive activities. It is also possible to get an anonymous pre-paid but preferably dedicated number from free and paid online services accepting anonymous cryptocurrencies like Monero. Get more practical guidance here: [Getting an anonymous Phone number](#getting-an-anonymous-phone-number).** While there are some smartphones manufacturers like Purism with their Librem series[^98] who claim to have your privacy in mind, they still do not allow IMEI randomization which we believe is a key anti-tracking feature that should be provided by such manufacturers. While this measure will not prevent IMSI tracking within the SIM card, it would at least allow you to keep the same "burner phone" and only switch SIM cards instead of having to switch both for privacy. @@ -691,7 +691,7 @@ So, how can you mitigate these? You need to act and fully adopt a role as an actor would do for a performance. You need to become a different person, think, and act like that person. This is not a technical mitigation but a human one. You can only rely on yourself for that. -Ultimately, it is mostly up to you to fool those algorithms by adopting new habits and not revealing real information when using your anonymous identities. See [Appendix A4: Counteracting Forensic Linguistics]. +Ultimately, it is mostly up to you to fool those algorithms by adopting new habits and not revealing real information when using your anonymous identities. See [Appendix A4: Counteracting Forensic Linguistics](#appendix-a4-counteracting-forensic-linguistics). ### IRL and OSINT @@ -889,7 +889,7 @@ To mitigate this, you should never trust such devices and plug them into sensiti ### Malware and backdoors in your Hardware Firmware and Operating System -This might sound a bit familiar as this was already partially covered previously in the [Your CPU][Your CPU:] section. +This might sound a bit familiar as this was already partially covered previously in the [Your CPU](#your-cpu) section. Malware and backdoors can be embedded directly into your hardware components. Sometimes those backdoors are implemented by the manufacturer itself such as the IME in the case of Intel CPUs. And in other cases, such backdoors can be implemented by a third party that places itself between orders of new hardware and customer delivery[^216]. @@ -917,7 +917,7 @@ This also works for videos. Yes, videos too have geo-tagging, and many are very For this reason, you will always have to be incredibly careful when uploading files using your anonymous identities and check the metadata of those files. -**Even if you publish a plain text file, you should always double or triple-check it for any information leakage before publishing. You will find some guidance about this in the [Some additional measures against forensics][Some additional measures against forensics:] section at the end of the guide.** +**Even if you publish a plain text file, you should always double or triple-check it for any information leakage before publishing. You will find some guidance about this in the [Some additional measures against forensics](#some-additional-measures-against-forensics) section at the end of the guide.** ### Watermarking @@ -997,9 +997,9 @@ There are some cryptocurrencies with privacy/anonymity in mind like Monero but e Use of "private" mixers, tumblers[^244] (centralized services that specialize in "anonymizing" cryptocurrencies by "mixing them") and coinjoiners are risky as you don't know what's happening on them[^245] and can be trivially de-mixed[^246]. Their centrally-controlled nature could also put you in trouble as they are more susceptible to money-laundering laws[^247]. -This does not mean you cannot use Bitcoin anonymously at all. You can actually use Bitcoin anonymously as long as you do not convert it to actual currency, use a Bitcoin wallet from a safe anonymous network, and do not reuse addresses or consolidate outputs that were used when spending at different merchants. Meaning you should avoid KYC/AML regulations by various exchanges, avoid using the Bitcoin network from any known IP address, and use a wallet that provides privacy-preserving tools. See [Appendix Z: Online anonymous payments using cryptocurrencies][Appendix Z: Online anonymous payments using cryptocurrencies]. +This does not mean you cannot use Bitcoin anonymously at all. You can actually use Bitcoin anonymously as long as you do not convert it to actual currency, use a Bitcoin wallet from a safe anonymous network, and do not reuse addresses or consolidate outputs that were used when spending at different merchants. Meaning you should avoid KYC/AML regulations by various exchanges, avoid using the Bitcoin network from any known IP address, and use a wallet that provides privacy-preserving tools. See [Appendix Z: Online anonymous payments using cryptocurrencies](#appendix-z-online-anonymous-payments-using-cryptocurrencies). -**Overall, the best option for using Crypto with reasonable anonymity and privacy is still Monero and you should ideally not use any other for sensitive transactions unless you are aware of the limitations and risks involved. Please do read** [Appendix B2: Monero Disclaimer]**.** +**Overall, the best option for using Crypto with reasonable anonymity and privacy is still Monero and you should ideally not use any other for sensitive transactions unless you are aware of the limitations and risks involved. Please do read** [Appendix B2: Monero Disclaimer](#appendix-b2-monero-disclaimer)**.** **TLDR: Use Monero!** @@ -1090,7 +1090,7 @@ I also highly recommend that you read some documents from a forensics examiner p And finally, here is this very instructive detailed paper on the current state of IOS/Android security from the John Hopkins University: https://securephones.io/main.html[^254]. -When it comes to your laptop, the forensics techniques are many and widespread. Many of those issues can be mitigated by using full disk encryption, virtualization (See [Appendix W: Virtualization][Appendix V1: Hardening your Browsers:]), and compartmentalization. This guide will later detail such threats and techniques to mitigate them. +When it comes to your laptop, the forensics techniques are many and widespread. Many of those issues can be mitigated by using full disk encryption, virtualization (See [Appendix W: Virtualization](#appendix-w-virtualization)), and compartmentalization. This guide will later detail such threats and techniques to mitigate them. ## Bad Cryptography @@ -1378,7 +1378,7 @@ First, here is a small basic UML diagram showing your available options accordin - You have extremely limited time to learn and need a fast-working solution: - - **Your best option is to go for the Tails route (excluding the persistent plausible deniability section).** + - **Your best option is to go for [the Tails route](#the-tails-route) (excluding the persistent plausible deniability section).** - You have time and more importantly motivation to learn: @@ -1392,13 +1392,13 @@ First, here is a small basic UML diagram showing your available options accordin - You only have one laptop available and cannot afford anything else. You use this laptop for either work, family, or your personal stuff (or both): - - **Your best option is to go for the Tails route.** + - **Your best option is to go for [the Tails route](#the-tails-route).** - You can afford a spare dedicated unsupervised/unmonitored laptop for your sensitive activities: - But it is old, slow, and has bad specs (less than 6GB of RAM, less than 250GB disk space, old/slow CPU): - + **You should go for the Tails route.** + + **You should go for [the Tails route](#the-tails-route).** - It is not that old, and it has decent specs (at least 8GB of RAM, 250GB of disk space or more, decent CPU): @@ -1430,7 +1430,7 @@ First, here is a small basic UML diagram showing your available options accordin - **The Tor Browser route (simplest of all)** - - **The Tails route (excluding the persistent plausible deniability section).** + - **[The Tails route](#the-tails-route) (excluding the persistent plausible deniability section).** - You have some IT skills and mostly understand this guide so far, consider: @@ -1452,11 +1452,11 @@ Now that you know what is possible, you should also consider threats and adversa #### Threats -- If your main concern is a forensic examination of your devices, you should consider the Tor Browser route or the Tails route. +- If your main concern is a forensic examination of your devices, you should consider the Tor Browser route or [the Tails route](#the-tails-route). - If your main concerns are remote adversaries that might uncover your online identity on various platforms, you should consider the Tails, Whonix, or Qubes OS routes (listed in order of difficulty). -- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider the Tails route, including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix within Tails][Persistent Plausible Deniability using Whonix within Tails:]).** +- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider the Tails route, including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix & Tails](#persistent-plausible-deniability-using-whonix-tails)).** - If you are in a hostile environment where Tor/VPN usage alone is impossible/dangerous/suspicious, consider the Tails route (without actually using Tor), or more advanced routes like Whonix or Qubes OS. @@ -1538,7 +1538,7 @@ You might be asking yourself: "How do I know if I'm in a hostile online environm ### Getting used to using better passwords -See [Appendix A2: Guidelines for passwords and passphrases]. +See [Appendix A2: Guidelines for passwords and passphrases](#appendix-a2-guidelines-for-passwords-and-passphrases). ### Getting an anonymous Phone number @@ -1614,7 +1614,7 @@ Now, what if you have no money? Well, in that case, you will have to try your lu - -**Disclaimer: We cannot vouch for any of these providers. We recommend doing it yourself physically. In this case, you will have to rely on the anonymity of Monero and you should not use any service that requires any kind of identification using your real identity. Please do read [Appendix B2: Monero Disclaimer].** +**Disclaimer: We cannot vouch for any of these providers. We recommend doing it yourself physically. In this case, you will have to rely on the anonymity of Monero and you should not use any service that requires any kind of identification using your real identity. Please do read [Appendix B2: Monero Disclaimer](#appendix-b2-monero-disclaimer).** It is more convenient, cheaper, and less risky to just get a pre-paid SIM card from one of the physical places that still sell them for cash without ID. @@ -1646,7 +1646,7 @@ While this will not be available yet to your local police officers, it could be You will ideally need a set of 3-5 separate places such as this to avoid using the same place twice. Several trips will be needed over the weeks for the various steps in this guide. -You could also consider connecting to these places from a safe distance for added security. See [Appendix Q: Using long-range Antenna to connect to Public Wi-Fis from a safe distance.][Appendix Q: Using long-range Antenna to connect to Public Wi-Fis from a safe distance:] +You could also consider connecting to these places from a safe distance for added security. See [Appendix Q: Using long-range Antenna to connect to Public Wi-Fis from a safe distance.](#appendix-q-using-long-range-antenna-to-connect-to-public-wi-fis-from-a-safe-distance) ## The Tor Browser route @@ -1662,7 +1662,7 @@ Here are several ways to set it up for all main OSes. ### Windows, Linux, and macOS -Please see [Appendix Y: Installing and using desktop Tor Browser]. +Please see [Appendix Y: Installing and using desktop Tor Browser](#appendix-y-installing-and-using-desktop-tor-browser). ### Android @@ -1686,7 +1686,7 @@ Please see [Appendix Y: Installing and using desktop Tor Browser]. - Select **Config Bridge**. -- Read [Appendix X: Using Tor bridges in hostile environments]. +- Read [Appendix X: Using Tor bridges in hostile environments](#appendix-x-using-tor-bridges-in-hostile-environments). - **If needed (after reading the appendix above)**, activate the option and select the type of bridge you want: @@ -1746,11 +1746,11 @@ We would recommend the "Safer" level for most cases. The Safest level should be If you are extra paranoid, use the "Safest" level by default and consider downgrading to Safer is the website is unusable because of Javascript blocking. -However, the Safer level should be used with some extra precautions while using some websites: see [Appendix A5: Additional browser precautions with JavaScript enabled]. +However, the Safer level should be used with some extra precautions while using some websites: see [Appendix A5: Additional browser precautions with JavaScript enabled](#appendix-a5-additional-browser-precautions-with-javascript-enabled). Now, you are really done, and you can now surf the web anonymously from your Android device. -**Please see** [Warning for using Orbot on Android][Appendix B6: Warning for using Orbot on Android]. +**Please see** [Warning for using Orbot on Android](#appendix-b6-warning-for-using-orbot-on-android). ### iOS @@ -1768,7 +1768,7 @@ While the official Tor Browser is not yet available for iOS, there is an alterna - After Launching, click the upper right Settings icon (Disabling Wi-Fi and Mobile Data previously were to prevent Onion Browser from connecting automatically and to allow access to these options). -- Select "Bridge Configuration" and read [Appendix X: Using Tor bridges in hostile environments] +- Select "Bridge Configuration" and read [Appendix X: Using Tor bridges in hostile environments](#appendix-x-using-tor-bridges-in-hostile-environments) - **If needed (after reading the appendix above)**, activate the option and select the type of bridge you want: @@ -1844,13 +1844,13 @@ As with the desktop version, you need to know there are safety levels in Onion B We would recommend the "Silver" level for most cases. The Gold level should only be enabled if you think you are accessing suspicious or dangerous websites or if you are extra paranoid. The Gold mode will also most likely break many websites that rely actively on JavaScript. -As JavaScript is enabled in the Silver mode, please see [Appendix A5: Additional browser precautions with JavaScript enabled]. +As JavaScript is enabled in the Silver mode, please see [Appendix A5: Additional browser precautions with JavaScript enabled](#appendix-a5-additional-browser-precautions-with-javascript-enabled). Now, you are really done, and you can now surf the web anonymously from your iOS device. ### Important Warning -**This route is the easiest but is not designed to resist highly skilled adversaries. It is however usable on any device regardless of the configuration. This route is also vulnerable to correlation attacks (See [Your Anonymized Tor/VPN traffic][Your Anonymized Tor/VPN traffic:]) and is blind to anything that might be on your device (this could be any malware, exploit, virus, remote administration software, parental controls...). Yet, if your threat model is quite low, it is probably sufficient for most people.** +**This route is the easiest but is not designed to resist highly skilled adversaries. It is however usable on any device regardless of the configuration. This route is also vulnerable to correlation attacks (See [Your Anonymized Tor/VPN traffic](#traffic-anonymization)) and is blind to anything that might be on your device (this could be any malware, exploit, virus, remote administration software, parental controls...). Yet, if your threat model is quite low, it is probably sufficient for most people.** If you have time and want to learn, we recommend going for other routes instead as they offer far better security and mitigate far more risks while lowering your attack surface considerably. @@ -1888,7 +1888,7 @@ It does however have some drawbacks: - Tor in itself might not be enough to protect you from an adversary with enough resources as explained earlier. -**Important Note: If your laptop is monitored/supervised and some local restrictions are in place, please read** [Appendix U: How to bypass (some) local restrictions on supervised computers]**.** +**Important Note: If your laptop is monitored/supervised and some local restrictions are in place, please read** [Appendix U: How to bypass (some) local restrictions on supervised computers](#appendix-u-how-to-bypass-some-local-restrictions-on-supervised-computers)**.** You should also read Tails Documentation, Warnings, and limitations, before going further [[Archive.org]](https://web.archive.org/web/https://tails.boum.org/doc/about/warnings/index.en.html) @@ -1898,7 +1898,7 @@ Taking all this into account and the fact that their documentation is great, we If you're having an issue accessing Tor due to censorship or other issues, you can try using Tor Bridges by following this Tails tutorial: [[Archive.org]](https://web.archive.org/web/https://tails.boum.org/doc/anonymous_internet/tor/index.en.html) and find more information about these on Tor Documentation [[Archive.org]](https://web.archive.org/web/https://2019.www.torproject.org/docs/bridges) -**If you think using Tor alone is dangerous/suspicious, see [Appendix P: Accessing the internet as safely as possible when Tor/VPN is not an option][Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option]** +**If you think using Tor alone is dangerous/suspicious, see [Appendix P: What about when Tor and VPNs aren't possible?](#appendix-p-what-about-when-tor-and-vpns-arent-possible)** ### Tor Browser settings on Tails @@ -1928,21 +1928,21 @@ We would recommend the "Safer" level for most cases. The Safest level should be If you are extra paranoid, use the "Safest" level by default and consider downgrading to Safer is the website is unusable because of Javascript blocking. -Lastly, while using Tor Browser on Tails on the "Safer" level, please consider [Appendix A5: Additional browser precautions with JavaScript enabled] +Lastly, while using Tor Browser on Tails on the "Safer" level, please consider [Appendix A5: Additional browser precautions with JavaScript enabled](#appendix-a5-additional-browser-precautions-with-javascript-enabled). -When you are done and have a working Tails on your laptop, go to the [Creating your anonymous online identities][Creating your anonymous online identities:] step much further in this guide or if you want persistence and plausible deniability, continue with the next section. +When you are done and have a working Tails on your laptop, go to the [Creating your anonymous online identities](#creating-your-anonymous-online-identities) step much further in this guide or if you want persistence and plausible deniability, continue with the next section. ### Persistent Plausible Deniability using Whonix & Tails Consider checking the [[Archive.org]](https://web.archive.org/web/https://github.com/aforensics/HiddenVM) project for Tails. -This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability[^311] (see [The Whonix route:] first chapters and also for some explanations about Plausible deniability, as well as the [How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives:] section at the end of this guide for more understanding). +This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability[^311] (see [The Whonix route](#the-whonix-route) first chapters and also for some explanations about Plausible deniability, as well as the [How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives:] section at the end of this guide for more understanding). This would allow the creation of a hybrid system mixing Tails with the Virtualization options of the Whonix route in this guide. ![image19](../media/image19.png) -**Note: See** [Pick your connectivity method][Pick your connectivity method:] **in the Whonix Route for more explanations about Stream Isolation** +**Note: See** [Pick your connectivity method](#pick-your-connectivity-method) **in the Whonix Route for more explanations about Stream Isolation** In short: @@ -1966,7 +1966,7 @@ Remember that encryption with or without plausible deniability is not a silver b **See ** [[Wikiless]](https://wikiless.com/wiki/Rubber-hose_cryptanalysis) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis) -CAUTION: Please see [**Appendix K: Considerations for using external SSD drives**][Appendix K: Considerations for using external SSD drives] and [**Understanding HDD vs SSD**][Understanding HDD vs SSD:] sections if you consider storing such hidden VMs on an external SSD drive: +CAUTION: Please see [**Appendix K: Considerations for using external SSD drives**](#appendix-k-considerations-for-using-external-ssd-drives) and [**Understanding HDD vs SSD**][Understanding HDD vs SSD:] sections if you consider storing such hidden VMs on an external SSD drive: - **Do not use hidden volumes on SSD drives as this is not supported/recommended by Veracrypt**[^303]**.** @@ -2012,7 +2012,7 @@ Here is my guide on how to achieve this: - When it is done, it should automatically start Virtualbox Manager. -- Import the Whonix OVA files (see [Whonix Virtual Machines:]) +- Import the Whonix OVA files (see [Whonix Virtual Machines](#whonix-virtual-machines)) Note, if during the import you are having issues such as "NS_ERROR_INVALID_ARG (0x80070057)", this is probably because there is not enough disk space on your Hidden volume for Whonix. Whonix themselves recommend 32GB of free space but that's probably not necessary and 10GB should be enough for a start. You can try working around this error by renaming the Whonix \*.OVA file to \*.TAR and decompressing it within Tails. When you are done with decompression, delete the OVA file and import the other files with the Import wizard. This time it might work. @@ -2044,7 +2044,7 @@ The laptop should have at least 250GB of Disk Space **at least 6GB (ideally 8GB This laptop could have an HDD (7200rpm) or an SSD/NVMe drive. Both possibilities have their benefits and issues that will be detailed later. -All future online steps performed with this laptop should ideally be done from a safe network such as Public Wi-Fi in a safe place (see [Find some safe places with decent public Wi-Fi][Find some safe places with decent public Wi-Fi:]). But several steps will have to be taken offline first. +All future online steps performed with this laptop should ideally be done from a safe network such as Public Wi-Fi in a safe place (see [Find some safe places with decent public Wi-Fi](#find-some-safe-places-with-decent-public-wi-fi)). But several steps will have to be taken offline first. ### Some laptop recommendations @@ -2058,7 +2058,7 @@ This is because those business laptops usually offer better and more customizabl - AMD laptops could be more interesting as some provide the ability to disable AMD PSP (the AMD equivalent of Intel IME) from the BIOS/UEFI settings by default. And, because AFAIK, AMD PSP was audited and contrary to IME was not found to have any "evil" functionalities[^304]. However, if you are going for the Qubes OS Route consider Intel CPUs as Qubes OS does not support AMD with their anti-evil-maid system[^305]. -- Secure Wipe tools from the BIOS (especially useful for SSD/NVMe drives, see [Appendix M: BIOS/UEFI options to wipe disks in various Brands]). +- Secure Wipe tools from the BIOS (especially useful for SSD/NVMe drives, see [Appendix M: BIOS/UEFI options to wipe disks in various Brands](#appendix-m-biosuefi-options-to-wipe-disks-in-various-brands)). - Better control over the disabling/enabling of select peripherals (USB ports, Wi-Fis, Bluetooth, Camera, Microphone ...). @@ -2102,7 +2102,7 @@ Once you are in there, you will need to apply a few recommended settings: - Disable Intel ME if you can (odds are very high you can't). -- Disable AMD PSP if you can (AMD's equivalent to IME, see [Your CPU][Your CPU:]) +- Disable AMD PSP if you can (AMD's equivalent to IME, see [Your CPU](#your-cpu)) - Disable Secure Boot if you intend to use Qubes OS as they do not support it out of the box[^306]. Keep it on if you intend to use Linux/Windows. @@ -2196,7 +2196,7 @@ You could then reveal a password, but that password will only give access to "pl This feature can be used at the OS level (a plausible OS and a hidden OS) or at the files level where you will have an encrypted file container (similar to a zip file) where different files will be shown depending on the encryption password you use. -This also means you could set up your own advanced "plausible deniability" setup using any Host OS by storing for instance Virtual Machines on a Veracrypt hidden volume container (be careful of traces in the Host OS tho that would need to be cleaned if the host OS is persistent, see [Some additional measures against forensics][Some additional measures against forensics:] section later). There is a project for achieving this within Tails ( [[Archive.org]](https://web.archive.org/web/https://github.com/aforensics/HiddenVM)) which would make your Host OS non-persistent and use plausible deniability within Tails. +This also means you could set up your own advanced "plausible deniability" setup using any Host OS by storing for instance Virtual Machines on a Veracrypt hidden volume container (be careful of traces in the Host OS tho that would need to be cleaned if the host OS is persistent, see [Some additional measures against forensics](#some-additional-measures-against-forensics) section later). There is a project for achieving this within Tails ( [[Archive.org]](https://web.archive.org/web/https://github.com/aforensics/HiddenVM)) which would make your Host OS non-persistent and use plausible deniability within Tails. In the case of Windows, plausible deniability is also the reason you should ideally have Windows 10/11 Home (and not Pro). This is because Windows 10/11 Pro natively offers a full-disk encryption system (Bitlocker[^317]) where Windows 10/11 Home offers no full-disk encryption at all. You will later use third-party open-source software for encryption that will allow full-disk encryption on Windows 10/11 Home. This will give you a good (plausible) excuse to use this software. While using this software on Windows 10/11 Pro would be suspicious. @@ -2310,7 +2310,7 @@ Here are some examples of such leaks: - Linux Logs -Forensics could' use all those leaks (see [Local Data Leaks and Forensics][Local Data Leaks and Forensics:]) to prove the existence of hidden data and defeat your attempts at using plausible deniability and to find out about your various sensitive activities. +Forensics could' use all those leaks (see [Local Data Leaks and Forensics](#local-data-leaks-and-forensics)) to prove the existence of hidden data and defeat your attempts at using plausible deniability and to find out about your various sensitive activities. It will be therefore important to apply various steps to prevent forensics from doing this by preventing and cleaning these leaks/traces and more importantly by using whole disk encryption, virtualization, and compartmentalization. @@ -2330,7 +2330,7 @@ In the case of Windows, this data could for instance be used to prove the existe You should never conduct sensitive activities from a non-encrypted system. And even if it is encrypted, you should never conduct sensitive activities from the Host OS itself. Instead, you should use a VM to be able to efficiently isolate and compartmentalize your activities and prevent local data leaks. -If you have little to no knowledge of Linux or if you want to use OS-wide plausible deniability, we recommend going for Windows (or back to the Tails route) for convenience. This guide will help you hardening it as much as possible to prevent leaks. This guide will also help you hardening macOS and Linux as much as possible to prevent similar leaks. +If you have little to no knowledge of Linux or if you want to use OS-wide plausible deniability, we recommend going for Windows (or back to [the Tails route](#the-tails-route)) for convenience. This guide will help you hardening it as much as possible to prevent leaks. This guide will also help you hardening macOS and Linux as much as possible to prevent similar leaks. If you have no interest in OS-wide plausible deniability and want to learn to use Linux, we will strongly recommend going for Linux or the Qubes OS route if your hardware allows it. @@ -2456,13 +2456,13 @@ For more in-depth and advanced options, refer to: #### Setting up a safe Browser -See [Appendix G: Safe Browser on the Host OS] +See [Appendix G: Safe Browser on the Host OS](#appendix-g-safe-browser-on-the-host-os) ### macOS Host OS **Note: Mac M1/M2 chips are now supported natively, or, if you wish to use commercial tools like VMWare Fusion or Parallels Desktop, but those are not covered in this guide. Seek this information yourself.** -As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at least we do not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk. +As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at least we do not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider [the Tails route](#the-tails-route) or proceed at your own risk. We also recommend that you do the initial installation completely offline to avoid any data leak. @@ -2556,17 +2556,17 @@ You can do this by issuing the following commands in terminal (without the paren #### Setting up a safe Browser -See [Appendix G: Safe Browser on the Host OS] +See [Appendix G: Safe Browser on the Host OS](#appendix-g-safe-browser-on-the-host-os) ### Windows Host OS -As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at leastWedo not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk. +As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at leastWedo not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider [the Tails route](#the-tails-route) or proceed at your own risk. I also recommend that you do the initial installation completely offline to avoid any data leak. #### Installation -You should follow [Appendix A: Windows Installation] +You should follow [Appendix A: Windows Installation](#appendix-a-windows-installation) As a light introduction, consider watching [[Invidious]](https://yewtu.be/watch?v=vNRics7tlqw) @@ -2580,11 +2580,11 @@ Alternatively, you could use this free piece of software: