diff --git a/CHANGELOG.md b/CHANGELOG.md index 8781a49..c730975 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,3 +1,22 @@ +v1.1.5 +- Various spelling and grammar fixes +- Fixed several numbering errors in references +- Updated and fixed many broken URLs and saved them in the Wayback Machine +- Noted that https://mastodon.social/@anonypla is gone? added strike-through +- Adapted Qubes OS hardware requirements that were too low for a decent experience (RAM) according to their recommendation +- Put more incentive to use Tor Browser Safest mode as long as it does not break anything and switch to Safer if necessary and with precautions linked in an appendix +- Precision that Anti-Evil Maid on Qubes OS is only available on Intel CPUs +- Removed dead link of Centry Fork project +- Added Windows 11 support to the guide +- Partial additions of partial Qubes 4.1.X support but needs completion and testing (coming soon) +- Added link to official guide to upgrade from Qubes 4.0.X to 4.1.X (fresh or in-place) +- Fixed issue in Qubes OS Tor over VPN and VPN over Tor Networking cases that were just plain wrong +- Added guidance to run Windows 11 within Virtualbox + link to official guide from Oracle +- Added recommendation to install/use Safing PortMaster and added a link for some compatibility issues between Portmaster and some VPNs +- Removed Windows AME completely from the guide +- Replaced the "I would" by a "We would" since it is now a group effort and project +- Added a safest recommendation for more paranoid people in security level choices in Tor + v1.1.4-pre2 - Fixed some spelling/grammar - Update to contributing guidelines diff --git a/_layouts/default.html b/_layouts/default.html index 17b4556..b9ac633 100644 --- a/_layouts/default.html +++ b/_layouts/default.html @@ -154,7 +154,7 @@ input:checked + .slider::before {

The Hitchhiker’s Guide to Online Anonymity

How I learned to start worrying and love privacy anonymity

-

The latest Version is v1.1.4-pre2. See the changelog.

+

The latest Version is v1.1.5 See the changelog.

{% if page.url != "/" %} Home diff --git a/b2sum.txt b/b2sum.txt index fe8624e..d3b3e31 100644 --- a/b2sum.txt +++ b/b2sum.txt @@ -1,11 +1,11 @@ f5be8ab341067ed597da7858e8cafff948ba6b65b0e101f4176d613a5aeec1abcb2195e645f77e7658bdae58ba37c3e6ad14468f764f08ba93a4c5e93b749c05 about.md 590458ce5bd35c3734dd7e2d5da86269c72e8fd8457557ba57309f139dc69cca6620d9b3585b4832d2df6f5af7498e3c1d461becf13712034cd3be347ef93ca7 briar.md -707e285fbe8e7bd84a743fc20d605c701f633b88df793ff5328c6676a50d12b0084479cbb31fa825b9b314dc6c95a2f99070b2096a04e777497d922b71eefef8 CHANGELOG.md +508535a9c57c88e71905e3e355ab27445f3ac45352486331ddc1438a241db7dd1fb7cb2bf2d29225e17d88ac74c436683f483e39ad70d9bcdd82a0f5fa42d6cc CHANGELOG.md 356e84e2d72b7ec8c8c39fc46efcb0e7e907456493a1ec82c9bf78ad204f82d57ea523bf3fd016ffb27d0fc4903a0ce054d86a9e9a92d0e0ccabd7b47a3b645c chatrooms-rules.md 13a500b51aaaab394f40d459c722f25c94fdb92c0488a45caa67b5ef5c4d8ea1d5a9e303879cb04fbe61fb756a0b0e713533178cac66310d1f6d227c7a1b9bc7 CODE_OF_CONDUCT.md -2022356f2aabd4765a733bd055c7312142e76abc4daeffdfc7d873a5038e4be376f5463dd405a090a25b126b85bd4ae099f584a5f5b38c72b5cc213cfb615e07 CONTRIBUTING.md -2f37ba45a595c53498483c5fde331dacbf3f231ecdb2093e615c2b70e1f107e5c814055ecc554b42cc4a28a833c9f857d3fb4eb21799e56ac80ee77ce234a778 donations.md -34954465c88d33cab470f3f18895607e8ace2985b804ed85e17e0c87fae00c1923e05c55c5436fd016db6e00d7f7f52b96b847ae5762a55ece011f22481f1c8d guide.md +5521e16ba14031692e50492a10c170cd472a95f7611c1d2489c6e4117f764702e83589d9d3d40f95fd6986de473d005ca41d4ff5dc1f1e58485e79a59d399528 CONTRIBUTING.md +87503a6f656acdee2d063a96c731d8eab88db0881a5b27ee23c80fe4d600b8c371189acc9549d9acd363dea15e5a6447fb69527beb3f7353ded5cd47458339b8 donations.md +93b926dbd672031ce3b7ae6dc060288f32ed63ad8bb42effaf6d79ef5c8c342fc65e8d556811793a380c744e432ccf080456478b1cd6cb66f09c8e0fe59870ac guide.md 29ee4751542b8a15463da06ef1481066391cf0c6c3a8157a3bda0c5e656137428ca8e4b78edf64fb9a93ef916150fe745f83a9e12ea5171f4dab088020beb014 KEY_ROTATION.md 046a52e53005963dd38343505aa43e51b5d750f0891c0a20a675c80ef9a254077db98b15165641a5f7ea33cc19f035e2aa7dbec4504a95c32b63911e3c7a8046 legacy.md f9aa769f3572fd8c1bf2c46cfac9c49113f73b8185e5edad04ccca003f973d79ccaa728c30078bd45a60bdb7f5a090a22a95f04836e9ea07aa53d16684158b19 LICENSE.md diff --git a/b2sum.txt.asc b/b2sum.txt.asc index 2e35e86..cade4cf 100644 --- a/b2sum.txt.asc +++ b/b2sum.txt.asc @@ -1,48 +1,48 @@ -----BEGIN PGP MESSAGE----- -owFFVgmQ1mUdXhBJEQaDlJwyPkJzOH2v33uMBsKy6grtFkJpcvSeuBy7utwxCo7o -SJKSjTaBFg42jqCUAVlxxKjgOBE5xeAVowjEvRURg47D9vy3cdqd+Xbnf7zv8z7X -71vV56K6Xt16D5o58dwHjbVuL11yT7g0iLnz54yct2he+P2f9xcK2fogFWfa5ETO -JG8s2WyjL6U4ZYPXQVNgmTNeFDc6aS49+Zwj9yEGwR1lragYk40mG5LP+PTSRJm1 -T1wpbYvRqjBcddKrSNnJYJSLjGo1H9rmzxs5J/UixxTZmCkkSVEaqVIyWSRK3mqh -XTQi25KsIkNkgicjmStcuhRxM3qtBUsuSLIUlJUiiVR0IV+wk80y8qQ0DzniFcMF -kyomGbJUJhcnoze1Wmhv8e0VFMOwsaUCbrIJ2NIbJUvE+ppRNCBCSxmsTcU4WQpJ -YaPWRntiiYvAmFXKuBiC5MVbQQGwuALO6MiL4hwzLAjmtGcqGwOAJjkhguE5l1xs -rVZ/65imWxomNN9SwZGks1WgwuCRHC1+pStR6VwihDEZ6ynSCuRy3BbRhWKsT4Kp -YkGgyZ6EDEWWxLguJQiTGN53THoWMyOVrPYuO+9EYpmBzJBMUMbLAGVjrRbv9vPa -29rmzB3RPn92nluBqkzAWCDu8ROkU0WxpKiSSRRBERdScCIyZa3HIt5rEygXitgt -e54IO0ombUUUgIaseQmGwEl1Ji5JSm5gQzArOXgtOglhovEcdEbIVd88rmF6883T -65ubxk2un1SBEkwIsFUEICUFO3oDoRIjqCa54ErAo3CtgklLSSWaZE11EGmzghkM -DKO0TEkx8swxD+240AGWSspn5lwhuIEQG2lx0kAxCi5jCZpTZl2gmiZNbBw7eVJj -U5d2okh4VZEnR5EkrAhvRiop43jJx0oVISFbqgyBxHCKUBlxKxwupGg5sFCOkUgF -JWJUXlhvpYyuWDJJlqAyUmicyyAvWpZhqZiFhGsNrJTaWv28lrbWLtUAgBBILGsT -lvAQmQEBt9aRxn7W402H41o4M1nK3MAP1hQcnkXuhIRdACWSkrrLTilo3EqmmEIi -OHAF32QyWvgKdmacFyGUxXmiTbXajPktKXcx43JWhjgpEaznXbx7Bk9zPMwguuOx -MGRGesup8iJuozs0oYCMQuR8JZqxGTmHf+BeiShzMMhKRiCKlbAYF3A/N+iu5AOz -lgkWcmBc1WrjG+6cPrF50phJjc1NFSKmkGCRSTJGrnKBtFJJghW8kpl4oGSwNrNA -BmswOJoqvouDTxQzBoa3gRMHRMXhEgQPJIO2wiRlmBJP5KiIKQ83SBGqQ3J0k/Hg -W9dqs/MMHxdXWLCmN9oVSUag9CIPRSDxsfjokFzOZTGoIA6JKCefmIqILWOyOCOT -qQrRG3CEsxh0MgyoWUgBIv3P1wIICrIpdXbZM+M9ycS1toqjvbmr1SY01jc03d5Q -gclodKmNCmCc5Qo3qHSJWK6QIBjItTJcYQbg7ch4YJgMEFSrEErkMuGvLx4VVUxU -cKssTKeuQ3CgQpspYcCDy0mUnDIsLSPSzjIOIjmIaWmd1WVgbJzRbzF7KG04ho7P -3MI3eBBBIgX3BKTUeQXTJdS8gmXQZgV5qiymCmWTECGlRCk4ClrdcwhvUsGaRYAC -iKQBxXvYzaMLinLIMeAkaDSnLeX21ti++J55bf+vw8RBkHbCGOQdrYgkSLhW+sCD -CAqipRJQvhpzKFuTMEWT40FiWCBNCmdJwoERlKhUGRMz64AQWYE3MD0hvrYMEcJ5 -uYloEXwWFIhCc2FhWatNbBgz7htdciHZ2YvEo1cuo3zAPSYeZifaMCI4PgfUoGKB -Z2LRYbihp7WXFmE2OuecAsYzLJFIkETZ4T+JpkjaV4hR7AYQM0ZaqApHKS8d1sqo -fJ1FNdQX5PaW0uXjFd1lj7puvequvnJQj7Gd9P4zR3c+sqHvvuc/+05ycffqa0hd -r0sv/+zKyN/07Zx8Yfne9VvO9js4bfE1zw38+rI9D467+91Hv3fsxIeDfrFlx95t -Z2fs+tXCb16y/bW3dyzqffVLQzfN2WX/OPT41Clh47Z1rSse07tXr6m7bcL9r8z+ -6VuutemG24dM2916Vb8rjl0zZNpHhxo7PhrV7f31azfPPfPADdO2HqcjU0ctO9o3 -nf9Oz2//uvbytsdXrejouP5w7ynD1R11J5fv/+q5pVfdvP+vQ95tbbj16Y7ZR8XA -9Us7L3zu/Bc27KPFHf7pH36S6eCmHi86cWjrYyu3N9XvXXjkneUjLpzq8/LJF757 -eN3fvjZr4+glVw5vfcjMfOKJtHT77DX39p3c8uGoRWHoFQ9MmLL/k46VN03v/06j -7/jBm2nmiytG77xr/qa975384vJDx8qdDx/57eU/PhD6z7lPfmXqgvuO9Ln408YD -I068se/TtaPH3ztwjb9+Wr/T3e84taxzKj/yu6bVg//w+PnL+HV1w9i1T23q+8oH -W4b959WNJ8a+uvvAxwdvXL9n1+qLXkiH8+kNPT//esuF6/6x7aaJk4YOFvULezyy -YdZwd3rBzi/9rPb3Af86+NRdPzm1esnGJQ+O+tPK1w/qE2d3rOlTe2/AhOl/2Tvg -uS+/cf/mJ4/3/9amGx99kDpXTXv2yYd+eW3PM+O2vrb7wtrxPXf//M2x54b/+9j3 -Z/UYV+NNwzpvGx6fbxp6iJ4dPMS6LY0D+vuNezY/03zZ2jOd60Z8TGzM28m+1f2f -bftn/2jiavtf -=WrkP +owFFVntsVmcdLrBKYTDmMibCkG9myW4W3/sFFLkVWgstltaJyYD3ymCUlrYwMYNt +MBe2dAzYQvhDiIJQFTZBYEwXhAWQ69ARFhQRVJgoSIIZMBMh+Jwmi23SpN855z3P +77n9vpX9e5X17dHvoTkNN8/XlHq8VdHq+3jWvqB5eMf3OvyxVZ1Z+mSc54ISpVOU +VkenjTTJBJdztsJ4p7ySniRKaBZUq6god9KlFKjzwTNqZVJCZq2TVtL46BL+Oq4D +T8pFKoQyWSuRCT613Ikgk+VeCxuILJWcb1nQMbw59pWWCGlCkj5yGbjmIkadWJTR +GcWUDZolk6MRUkupvZOaE5sptzHgYnBKMRKt59JILwxnkcWssnQZbzKJBxqFoj4F +PKIpI1yEyH3iQqdseXC6VPJts11bNxRiJJfOBqmDMUlTS2TiiUvpPNMCw3IXBG5h +wijOaYyBCm4cEzR6HSPNXoMZnwHCMiYT1dEYF7QIgitleAbAxK2LuoAcYjTMkSyz +EyyqEEqlcdVj6iZWTaqfWMDhUiUjQIVmXqdg8MttDkKlHCCMTpZoIZUAuRSXWbA+ +a+MiIyIbEKiTk4z7zHMkVOWMGSLB85ZwR0IiUkSjnE3WWRZJIiDTR+2FdtxDWcAJ +T7uOtpaW5vbKtgVzU3sBqjABIV5Shx/PrciCRCELmVhmMuCD6C0LRGByHOKc0l6m +LAPelhyN4Ddxwo22GEJkn1RBm1SOFDNRLkGshg2DUpwScKoiYzpoRz0og1zj6sdX +zaifMGNcfd34pnGN3cJJRhNV3lFBOFWWJUmEZY6SQDUJUWjmLKyqKIUfoJ4NKglK +dWFQTWAw2MdGG3kUJOPOqKxRMQnNIyEYAgKLnCX0zhQ2F0YmbZ3EA9ZKZgpQdY0N +NWObGmvqurUzWoJllRUGCzFBRKK4sypo2AY8eGOiJ8ZQJyELrvNgSE4iKpALnTWl +xroQrBTAhSO44hH0ySSdEkJnr/Bi7ZPnWYOziBAXcyJKnFsPRLFlnuuY3TKvWzUE +zzIVfVQaEaAhIYguqRiIIsyYzFmKwBeN94KlnB1Y17ZQDVgEy0HJZKKUyoA0+I0b +AleLJDgLAQknhQ+18TTAx16pTGwwCQNJazRxsNKsBbNjKqAwm8CrpFIwbzCQwGCO +wNNUGLSR4pbixKACd4bKwou4jO4Ak0iwYLCGScJrk5Bz+Afu5YgyVVTifSAgGxCd +KIP7qUZ3RVcQTRgBWYSKUqm2atqMhvrGMY019XUFIiIUgpIkh9QWaCI3XHBJpHOC +J0m9jFATUwIZcYzA0eCF4KWOSUG0huExuqSAKCBoRvA4D4HaTLhMzDnckVAcRMCF +gTNfDEnRTdqBOVUqzU2zXFhUYMGZTiubudQMpRcoygSJD9kFi+RSWsjtDYUBZYou +EhEQW0J4tvCqLgrRaXCEWSAHgukU8SgnFCKxAN+dA2STq2STI9o5eIeimwRFe1Nb +Kk2qGVdVN7WqAJNgda608GCcpAI3qLRRklQgESj8lIWmAjsATwdCPcFmgKBKeJ8D +RZq8dxmGtVkHgZ3BM1GxewgKVGgzAfPzYFNkOcXkBf5B2knCIJyCmNnznuk2MF6c +0G8hOSitKZaOS9TAN7gxMy4F3ONtlhZVKkxEzQtYBm2WMyWFxURGZCNDJ8HOGaNg +azgK4XXMODMzUACRFKA4B7u5ognQIYgGyhoaNbfE1DYvtC1q7Wj5fx1GCoJQOFpz +7dGKHgaCa7nzFItAQLSYPcpXoXeSwY5QNFrquYfXUImYBasCjKBEuUjYmEl5qZVh +eALlBPEVeoEGzEt1sJBJY5NFGNMkHMxLpYaqMeMnd8sVOU+ORYq6ssm7gntsPOxO +p3lAcFzyWNWCeFQYCdZhQeJ4ZBnFoFVKKXqsZ1giSoYlB8s4rEqho3IFYhS7BsTE +qYARghHCoWloSqh8lVix1Bemttm528ev9OR3lfXoWzb0gYfuGntH/mndpX3Ltww4 +1fXZd5LynsXXkLK+fe797JN/TxlwZ+57bf137qpuGvawXTZq79QDPyq/eqXt7ZHL +O/9xdvHSHXW9O795u2zlkq4TI6uPrH31tRWnWm+e7j/i8fI1Z3bfeuOREaMrvxCP +NY7Yfrnqn6vL/ni4vXzqlL+UvZurntvx06ujLu96bN3JhS+de6by/THz6Zlfj750 +cXrn6a4Tszb9ePcbR3vwrldXba9Yu/eLN164fnvr3aMqTt4zcNTrE5t3rTCfTu71 +zqqa8RNWNxx4+78rbprdB/ySra3N1RPL7xm8ccgn2w4eP/jys681jS0dP3hhyr7r +oX3fnnWXH+m8MGG+HHP7/Z2Dzm94cfpXXu9xX+uyd+70Fo/vbRr95EdHFg3svdT2 +bnjw65u/8cGks88OPzznl08P2Vrftfjl26On7982c8m1rgnr73+ydv38tdsqW6or +aqZd7dr6Xu2JXot3bJy5etP4v9995LHJnz76u4GVV/66+d37bjxx8IFhv2/6yZIL +o88v+ejKoQPfOrdq7Vuz/jzsS8+3V4z4MFe/2Kt851fT7g/f3LCan2vc84uvfe6p +ftMeHvm3xZU/237vpY939pu3fnFn/56bfrt9z5aLv5ryEpn+/aPxX+LEnDUzB9Ue +qxx6q7ShofXQf34+8/qNOwe//Z0h4tr+Ph3LXth7+dZzx5d2HTv1fPmyc0f319xf +9uiG5ae7Ptn0g4+/u/La4AHLKh40b5LaOyvPXM9D44DfDGreMrj5y+aDUZ+fsvWH +Z9eMOjT28BObN068ebH25MLKPzz1Pw== +=yWtS -----END PGP MESSAGE----- diff --git a/b2sum.txt.minisig b/b2sum.txt.minisig index 9b94120..149a542 100644 --- a/b2sum.txt.minisig +++ b/b2sum.txt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/nCgiVtWvu6A3S8kBL49keHsYF7jKznUPqQa0EGUUxs9MT3f3U97vI6lYaKccQi5ga/qftBIr8I/j3xlNpnADA8= -trusted comment: timestamp:1656410074 file:b2sum.txt hashed -nil77sjOceagaXfGU6ENp4P9V9Qd4oEYTbuFynBaTlGQ/thqM4QTiBETISdXrJlWSTyVvvGoS2FXopxG/YKkBw== +RUSn9xivowlq/iiwh34VLR0MgRZx09vLhh7GQLucsRg352pDrCQHDOvrL3rJhLTx8PoqGrVB9lA52Sa/2kJ+CiDBsES6M+U4Gwg= +trusted comment: timestamp:1657508240 file:b2sum.txt hashed +lbu/FmlZb6i/HQu0KqTmrAEUKdDYu0WxHUjtWMad2lO7gXk7se2/rrz4ZrRQlbuOEHCr/QQ3+MAOXRB+Y+RXAA== diff --git a/donations.md b/donations.md index b034b00..94fe055 100644 --- a/donations.md +++ b/donations.md @@ -4,14 +4,11 @@ All donations and spendings are being logged here below for transparency. ***Current project donation goals:*** -- Maintenance for the Tor Exit Nodes, see them here: (All have been taken down) -- Move the Tor .onion hosting on a different cheaper VPS by April 1st, 2022, and extend hosting for 2 more years. (The VPS was taken down and the onion site is unavailable for the moment) -- Set-up more Tor Exit nodes if funding allows it. -- Recover the project and salvage what is possible - -***Additional goals:*** +- Funding for a VPS for hosting our .onion website +- Funding for a VPS for hosting various services +- Funding for extending our domain name +- Funding for a decent mail hosting -- **Help Fund Lena's cremation and fees (about 2000€ total so around 9 XMR today)** **Donate anonymously using Monero (XMR):** @@ -20,10 +17,6 @@ Here is the address for the main project: - ```46crzj54eL493BA68pPT4A1MZyKQxrpZu9tVNsfsoa5nT85QqCt8cDTfy1fcTH1oyjdtUbhmpZ4QcVtfEXB337Ng6PS21ML``` ![][1] - -Here is the address for additional goals: - -- ```coming soon``` **Donate using Bitcoin (BTC):** @@ -33,11 +26,7 @@ Here are the addresses for the main project: - Legacy address: ```1BBgBSVe6w4DWq2BewUQhDEjsNovhfPswD``` ![][2]____________________![][3] - - Here are the addresses for additional goals: - -- SegWit address: ```coming soon``` -- Legacy address: ```coming soon``` + **Thank you for any contribution. All donations will be mentioned within this file.** @@ -104,8 +93,9 @@ Spendings log (UTC date): - 2021-10-30: 0.240787814495 XMR (+fees) for a Synapse Hosting VPS (12 months) with bots to help grow the community. This is a test program that will be converted into a Tor Exit Node in case of failure - 2022-01-01: 0.28055816111 XMR (+fees) for renewal 1 year of Tor Exit Node 02 - 2022-02-02: 0.966793601024 XMR (+fees) for sponsoring a related external special project in line with the Universal Declaration of Human Rights (details will remain indisclosed to protect project members) +- 2022-07-11: 0.503232784687 XMR (+fees) for 1984.is VPS (12 months) -Total Monero remaining: **0.540400726224 XMR** +Total Monero remaining: **0.037136719397 XMR** Total Bitcoin remaining: **0 mBTC** [1]: media/monero.png diff --git a/export/CHANGELOG.html b/export/CHANGELOG.html index c056db7..b4bb7d2 100644 --- a/export/CHANGELOG.html +++ b/export/CHANGELOG.html @@ -18,6 +18,7 @@

The Hitchhiker's Guide to Online Anonymity

+

v1.1.5 - Various spelling and grammar fixes - Fixed several numbering errors in references - Updated and fixed many broken URLs and saved them in the Wayback Machine - Noted that https://mastodon.social/@anonypla is gone? added strike-through - Adapted Qubes OS hardware requirements that were too low for a decent experience (RAM) according to their recommendation - Put more incentive to use Tor Browser Safest mode as long as it does not break anything and switch to Safer if necessary and with precautions linked in an appendix - Precision that Anti-Evil Maid on Qubes OS is only available on Intel CPUs - Removed dead link of Centry Fork project - Added Windows 11 support to the guide - Partial additions of partial Qubes 4.1.X support but needs completion and testing (coming soon) - Added link to official guide to upgrade from Qubes 4.0.X to 4.1.X (fresh or in-place) - Fixed issue in Qubes OS Tor over VPN and VPN over Tor Networking cases that were just plain wrong - Added guidance to run Windows 11 within Virtualbox + link to official guide from Oracle - Added recommendation to install/use Safing PortMaster and added a link for some compatibility issues between Portmaster and some VPNs - Removed Windows AME completely from the guide - Replaced the “I would” by a “We would” since it is now a group effort and project - Added a safest recommendation for more paranoid people in security level choices in Tor

v1.1.4-pre2 - Fixed some spelling/grammar - Update to contributing guidelines - Update of modern-crypto room rules - Addition of chatroom-rules for the PSA community - Update of verification guide (removed outdated content, fixed links, updates) - Removal of CTemplar references since it was shutdown - Fixed links to Proton services, references, onion URL, and archives - Removal of BTC Wasabi recommedation in favor of Coinjoin alternative and wallet recommendations - Re-phrasing of some confusing sentences - LibRedirect extension is recommended again - Fixed many links formatting - Removal of removed content (dark pdf) - Fixed links to ODT file - Added recommendation to https://z0ccc.github.io/extension-fingerprints/# and https://www.deviceinfo.me/ - Removed links to non-existant mirrors - Updated some outdated references(old project)

v1.1.4-pre1 - Addition of a legacy resources page for the old archives - Changes in the about page to reflect the current situation - Changes in the donation page to reflect the current situation - Fix link to video “How to Hack a Turned-Off Computer, [..]” - Misspelling and grammar mistakes fixed - Fix formatting - Garbage removal - Inline linking fixes - Privacyguides changed their URL scheme - Almost all archive.org links fixed - Annotated some links to make them more descriptive - Got rid of dupes and empty refs - Renew links for researchgate articles that were removed - Removed mobile wikipedia links - Fix a couple patent links & Rubber-hose cryptanalysis wiki - Update PDF archivals so they are direct links but not downloaded - Some scientific articles were removed or replaced - IEEExplore, Spread-spectrum watermarking of audio signals - ScienceDirect, Robust audio watermarking using perceptual masking - SSRN, The Cryptocurrency Tumblers: Risks, Legality and Oversight - Property of the People, Lawful Access to Secure Messaging Apps Data - Arxiv url fixes - s/grayshirt/grayshift/gi - Trailing parentheses and commas removed - Fixed all broken links - Removed uMatrix from the guide (use uBlock Origin) - Removal of https://xchange.me/ (abandoned) - Removal of https://swap.lightning-network.ro/ (abandoned) - Removal of https://privacyguides.org/providers/hosting/ (category removed from website) - Added a warning about the privacy redirect extension stating it might be abandoned/unmaintained - Added Anonymouth for linguistic antiforensics & related links

v1.1.3 - Added dedicated section about gait recognition and other long-range biometric techniques - Updated PDF toolchain to allow embedding images in the PDF guide

diff --git a/export/CHANGELOG.html.asc b/export/CHANGELOG.html.asc index 6a5dece..cb16c0d 100644 --- a/export/CHANGELOG.html.asc +++ b/export/CHANGELOG.html.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6w6UACgkQDCFqUvbf -SSDtsw/+P9ybLIv0th5UrkIQc0E4EhxcZ0I3aSo9puz5XzglPmNK4DZsrmgr4sxP -w2Hcu9uEtYCwUwkGbV+Kc7OyX3ErIcE6lr1ccJ3BrotZgGrNSK9PzvCzL2F2sGIP -LxyJJbZo3kEjKPfsr2BnAOKOitd/Vsf9Ee1PFXaosLt70n/nNgFyK1wVxE8UiydH -UOIOVyhUW5E7l3IhtcdoGZ1CZROXec0TiYLQ8YnjkOFi8HecRC26cDIJnRv+8eNq -t/9W/rIuSl98Cx4VrIpvTpBSUP16WryySadH4ihPg5Rfg0x6BCvqWjSMz22942mQ -iIBqg7P1eQQgGkl0mamulZb/v3P4v8EJYVVIo8I4UDfWJIjH39beWh65KP9la7lF -+sj0maOY+fgJ9rjVGQ0AGqF4otFA2NcIsl3iOrva9VyGKSrlRC8xDWY2m2HmFfS3 -LS2vym3KTYtXh+rdoO2JlhzKB5t/soLS7ON5CSKh3JhKDk8c49sp2NkOWKhn987z -dQWU+wjGaM9QyRr1N98CbwPyM5sQvmmp+18EzZpTd0BE8D91aXupUkYIzc2TO+WB -gVycrU1XlEOHKaOG1uKEaTObo0+gP3gxCOOPEglQZyqpk1/TQBMre1c9LySnbzkp -s67rcI4NBRdIsWN3iT89tJwAQcFy1uf3JfjBsJxnC2UCF0O/ZSo= -=DFsa +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkN0ACgkQDCFqUvbf +SSBDbhAAqS7bcE2ZwGYPNr8qGeEKT8Hrfz4+kJ658qbhjtJ1PWOxeZHibvTeSDyf +M2AUhF7/77q+WgN4KNNjHQTnrmeLzcuAfB03jlhzz4IYYqNH3YZ3hePlH39K1Quk +Hpj4ka0qp9hb/5cggZTnDFHUFJ1t1Sx8lZ/5i/ysJHJqDH3QPo74S4T6HRpBpXcK +QEZ6ESR2D5yeQTLRwSy4IyoinG7tLDD2/vfHEuTS+UDSm1i9dqRsPxyZkmcXRy+d +u/9gPpwf2EgooLr8s1Xcux5Ei93rryju/yNGwgv4o1yvYkz6GMtc+f6ukLZJGzFY +e4jefZ+ENFbtAw/fjsiGYisLCTFmtUnz01Tm6Cb/mJ6yr+AjC7JkFo+v0hc3GeU7 +MywneOVXAay6pqHy9DVEKoAs/Z/eARpDV2VieZzGnyZzw17v862sNpfjcQe8OM+A +uP/gGycOwkcygrQh883iLnCjYRwZIGlbvXokLNFU+B+lp8Yy7KRE+jgMFMMjdufI +EK3OlYjB3cipqrJ0mdxcNF8/3WS7TjQesGY2aI+j+6ZFFMwNMeMiwbYmR946PuWv +5jmIXorZ+lpayVK74YpFNRv8hPvgEzb/zXZiNNGS577BbH9gCxGanGjGOk8Sso9/ +043aJ2ufWg4G/WsIwH4FyZkKwIVdGunZDBZb6vVYKzB/ODNg5/o= +=BtWq -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.html.minisig b/export/CHANGELOG.html.minisig index f805600..e60854d 100644 --- a/export/CHANGELOG.html.minisig +++ b/export/CHANGELOG.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/p747dWKUqEXXd0A6D/0bR9uXHoQ2U8/vzHqO55e/rT21gXha+vnJu2ZeudgP5W5uUhw6ir9+YrIi0RrofP0hAE= -trusted comment: timestamp:1656407160 file:CHANGELOG.html hashed -Oy9u0Bw3/Xuz1lxJTQ2pAMnOU9ciXU+1w4IjSpWY1Hl3Tcnuq0gt5DMClQoQtF8JCqETBI+Kkv6Zpf22h3RXDw== +RUSn9xivowlq/qKwfo0rqrUHKJTx2Kmmw82sNdsI3qEDD4ZVkjlUdJsqEyqzY1t6BmDDd2TjRu214pv6LFKZ6lbpgIED9gqU/wc= +trusted comment: timestamp:1657508066 file:CHANGELOG.html hashed +MEWFMNo3kQnE6hMGKc8ULI/0+OcraF7HKMeHDZwxNiyLzNpTAXBAjP1gyaPOYLMoOlz67+NCVnCiTJk/QqqrDQ== diff --git a/export/CHANGELOG.odt b/export/CHANGELOG.odt index 06687cc..5eb7686 100644 Binary files a/export/CHANGELOG.odt and b/export/CHANGELOG.odt differ diff --git a/export/CHANGELOG.odt.asc b/export/CHANGELOG.odt.asc index 008c71d..c88d29f 100644 --- a/export/CHANGELOG.odt.asc +++ b/export/CHANGELOG.odt.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6xHkACgkQDCFqUvbf -SSCqhg//cyOpFcJJuborwRwG4fZKvDKRoocPRR7sRk5HlRdS2Ri+m4g3P997OJpa -/v3yz4VxZN4JceY/J9HBjzzC+fStiOElX0fRunIxYzkUlu219nfUSlHdEsQXRL7z -t4R1VYmjEWabtGysIyMtbKICWq34rnUz2fxK2EkoC6M/rWeJ0AvBC2037Gq2vNCQ -b85xJKSfAEHCD/fmnvrSolSagEMtMN2CiSC77VGNFad7Da97AFJVAFc1gdIx1Hcw -6IUq/n3NQl7ycnvR1H0AO511XGwC8AK/oyXIQJhiXEQPrOwJEJOJOUa8M9T2nLi/ -tT56YXWnAvzBSEp1cyTz3LF2H6ZTMmy+EePof1SfJIBAQYfBD8d+/z1wvCPkoDyy -CKNRq78m0pyJ8sjXWvBVZS4LhWf0AzgeRu4xhNHJRouy4k3u/En500e8Etqayos+ -nuILWhPr6XIppfDQXPkjPpOHaahqnF8CT2J7EYaZ0OiZHrI6zweg1owSucgZhZan -Twt6ImlKFxzEnIKCw/40nGRELWHvZrdGzimeSrAj+o+fTI2V4NKZKOovR97XG45s -Idhl3cBpDGssBkCnGcc6C+OfA1OKQDAdCU467YfAWRsHyhEY4djfkDjs5J9UFdpP -b8MtPRE+JFq5fPEYar9mbYJMeHPLanTe5Quw8WVyYcWSgPkJy7Y= -=KFYK +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkOIACgkQDCFqUvbf +SSAYIw//eunPzjcNqvHNwaOsBfRnSmNhG6DEEaFrm2KVfepEZKb94AtA4o3BBsWc +siFcVYn7XT6/3POe/VAqirwl3+8Gw/TtUSrk9IxrAUbQDpH/N3HzcsePWu0BgBZ+ +uV7qnEmPqJrxkiddpXmLdgDT8UHhFaX7CftblafPiU3dfAmdislHNhsRm/P/+IJk +WrVhgXH+E5rgHJfx0s0qPI2mRwrOCnSBfV+6Y/2xgTl3p3xGul1tDJ+eKgTrW9xD +f21OYvxn6H2ul36Qs5A/UWeF6RORGYDr792FS1wCRcn6b8NsXLrvncIK5SeoGsZZ +adjGGDM/kUrhfAGOO/AAlTJQaUDCAmIjb8YQ0b+1FGOMImwLwR8rY8aWXtw65ou0 +BPkvmpVThajOj0AH609JpXyqdDJ3i3n6PliFfeXZ85MkyWFdeBPywxVvN7f9GA2y +ro5muq1CT4PYkoL4xFq7yCn9RN39bkzX0dvXNULVNoZkwxOik9AzDBabCYw5e0cn +alUks4YDNzoP6QvcS5K1UIFRfbwnx/YyrWndMRS0D9/jM3pWl/jBADuvJHy3KS5i +moQ1rYKpMRPlRbHvoRu1b1rlJlgg3VkKXrvXFF/BHSOZOEtExFY7/qeWAUnCdb9g +czNLlsKTNisgYh74a1v5+89MD8Ld/7DY9my//yzsM92caK6MvdQ= +=F2sd -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.odt.minisig b/export/CHANGELOG.odt.minisig index be61a44..01d1715 100644 --- a/export/CHANGELOG.odt.minisig +++ b/export/CHANGELOG.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/n/gSs5T4R6WCFYHU9lgskLsDyDlyfy602Eiz0SDu33RAMov2SytCoCtVSgwXB1JC34gLDbdhIpRaQrRtBkXJA4= -trusted comment: timestamp:1656407390 file:CHANGELOG.odt hashed -J5wmFtjyhH1CsDAWj+o0Og6tRkTLVg2JyXYWEJ2QWqZif3lL25o6guBZXs0k98lsk4iSasikd++lcjX9w5HTDA== +RUSn9xivowlq/sG7pRMNBRBF9iStJD/myus/DsSZy7/IR5OeVmMGd069TzLPAotbOvcDEnNf6hTWQ5F2UnsQjFL6b0ibUWBENAg= +trusted comment: timestamp:1657508071 file:CHANGELOG.odt hashed +KTNJNHW1emi6+a+G+i+Min7z/ZER1OQF0QicC5tTrmpQREFSm9WC3qC/b6O7GovUZFpVIPsY7w/Qu2P/6g6SAQ== diff --git a/export/CHANGELOG.pdf b/export/CHANGELOG.pdf index 308e8c6..67da03c 100644 Binary files a/export/CHANGELOG.pdf and b/export/CHANGELOG.pdf differ diff --git a/export/CHANGELOG.pdf.asc b/export/CHANGELOG.pdf.asc index 826d250..9e48e59 100644 --- a/export/CHANGELOG.pdf.asc +++ b/export/CHANGELOG.pdf.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6xV4ACgkQDCFqUvbf -SSBF5A//bkP48weLZpYgkrGNfDvqQAnGju3wp6xMd0lIVNWwBYLzRr/ko4Uj2+wm -1kXMCVcYpczbVrzgsJrJO4Kpk4vZBlBxrz81RuUpPmSe03XWmowYiXIwS7a2rCpn -75q3MT/GDpKL1NqYKLFbej/QST4U6NJxore7kz0yW+Khg1M+QWdYisRiGM7NwUys -nrFHjbRUHZ5Sj98RTHEZWurQSHzmSN+d7kYR255DdFxGGsv5JVpTDZeR56U2d4/S -FSAJqi6LUVRdMyg9xbLAxjHKiaEan+nGmTQ+Mo9c9KTQOXZmPB7RCOS/FhY7eL9q -+d/fXEUREXs3vY7ufCknmhyXKHMWnbejyp4uUMMuiA0CXzqsm9qzYply4xMYLMz8 -0NpYsWVJADJnMkrgiaPeWYsRLG0HxinL3ShPIjrzTW+HaggnjVnm3wXQUeIHsW4I -nCw7TzZNxAKId1pua7hWIJFczjtNfeX1f1rrL1qBFlWZ/skwCgLcpEbgE1pgqhtl -BDgLMCgpKj4GfJ8NpqWnh6IEejvd8UVWtkOS0FYLzAcC+kUW0LmSye9dRhXvDK5a -H1EWlkzrIg4bYXgaQn8supvir8M4u9xqvBRIQWU9osxELU5gbi24Dt+sVGEHArbC -inN/Kc2V6BSP8KNxfTLRPl+eumfPMXHlCr1LAxXnPfv2BkX79+w= -=QI3L +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkOcACgkQDCFqUvbf +SSDvxA/+LqLEp94uq8GDwA3EAtQreb3m5COoM3K46WDLCTQoxuuAJ7n5gmfWXnCe +wmh6we3Q45XSBQlx1xvNbyNnQbqu8F7jVabwVFyG8A56jI6rXeAG1eZB4V/rVLdY +RAeFrqdVn5+e+SBPdOvJiwN1Ds0zyO29PnBnIZMOvj4QKNJIssj0JtE+1/esvzg7 +QW7n+x8dsnqdUg1HhmuZS7m/bKzhhhlg7I+QU0EahiMTL9R9HqtYg6kGLimrYjT+ +0yunuA0thnC617cQyrouYa2JSMMFz2EcajKcr6A+2g4Ms6X47NxPDDB9T2CqVS0U +AhM5j0ZxDRqAQXJyCCh4i/xI86qiBcV6UWMG+igGrbC5Y8j6Zsd5kV2hckd9CqFr +pAlON8pvvR5nevneCdWzoEZitxnfeOIR3JH+xh0MMFjFHRet4E0R8JhulYuLAeeZ +eEZ4wzb7S7kfTOn9zQNUfD/VXL7kr+pMSqBr4f0XffY9e2TECtB05c5NOzPM8KTf +8OMxwT/uZfzS2zrDClqE8DKNwFKuaVOgCJ6SSBl+3N1U1BswLodIJouetuDZjm13 +S0NdY+3joen6CIDbYPHQ3tjpZJjQ10AF0XUUtKuy7mtnn84Bp5qffJjNQuZJXWXa +hiHQyj7fAq8DxMY6anI6adWmLSKplEXnw/oPrEc5C1B4vKJiQxI= +=feAy -----END PGP SIGNATURE----- diff --git a/export/CHANGELOG.pdf.minisig b/export/CHANGELOG.pdf.minisig index a1c2b08..290d107 100644 --- a/export/CHANGELOG.pdf.minisig +++ b/export/CHANGELOG.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/kTjnTrHehK88MH7UnaQ+CI8mjvtVGTq4SY4Y6xuBX2D3rAydobIWsasgl/vCFMUhFnQPTJvxT5zfNfmpWJ3xgk= -trusted comment: timestamp:1656407625 file:CHANGELOG.pdf hashed -30JgXMMiKQsrRKpBnKxFW+DTz8HlFaalKCHkNxhRKMVYoE6BW/HzkGDsdcIJOpCC22/LsSo112jueRmZbCo6Dg== +RUSn9xivowlq/nWt73tL5M+kafs7EqpzTW6S5Md/j09yDhnJySivr7Xg+lOgXt3wPTlLxIWJZCX1YB7XkCmBYgD71FV0zT1uqw4= +trusted comment: timestamp:1657508075 file:CHANGELOG.pdf hashed +Se+UgOEKuMO58Zy0omnl0qvF0S2lsk7dhUHYGcgQjDWwYMZ1q24Y/zbwn20O/sPLQ0KsBxKyl+ozvVPe8QrlBA== diff --git a/export/CODE_OF_CONDUCT.html.asc b/export/CODE_OF_CONDUCT.html.asc index 36ce7ac..7ca097f 100644 --- a/export/CODE_OF_CONDUCT.html.asc +++ b/export/CODE_OF_CONDUCT.html.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6yrQACgkQDCFqUvbf -SSBsYhAAi3xKJ40l78quASC9c8TpE2UAkEwZ+hWuZ9rMaLpdv7qTM5Ev68CkZiVU -NMON3/JnlZNxMdSxL+SW1XcVS+qgiSnMk9BI+zHeDw3bPNazuRdxLq8BaNkntZcc -NLXZnZpKvDPbsxaFKAQgN6bFlq9HXa0q65NXd0M3WEoiyRb5sBS5rL6SAA9oE232 -dYMBUKn7ocKwe4fJ0RjrFT0GwbLg1xgvPIVn+cs90bevEsQvsdwUH3LYy9KSwCx2 -VwmFBoNk0lNKncWEyGR2nFbwU3Tr0hR0GzFTfPb0QOfvvHMgTJYpLnaoddSYuCej -kwWx8a4j7JRKcYnovK0Jl9Vr77Skjl1NUJE/40quQjoAM/jaB7lzhx9R3Ap0ro/F -sligIjLLFwKMjJriekpcivQRAM/5Aw7gh4DiotLH3pilkmSb5IX9trHQ+7HCGl/V -Mof10328DB1RUOj3mg1+JufnicjNLfF+NOJVoiVFXiz/vwTYAv/+0JwoEYTUZJVS -8/GGCL5penE0COqjU3edm2D+Nq5dekgfNGnemsDXMSZjvqo5W8h3+GjiV3Vm6A7p -wHt3mSiI+ArOK7Oe8ewVRAhXLe+Jr7APKQc2VG/Ko36bdBQlHY6BSRNga0etkLuq -BREi21MTuVo0SN7u+eo+ejU47KyWC3TWT218DpA3a8G+6BEbDLA= -=PhNW +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkPkACgkQDCFqUvbf +SSDpsg//boMQ5RDJuGkV9soqKeh+zZL6HF+C0rxk9FjhtDKcfuzHxgh3bHkTPqqg +SdSZiUSwXMyc43KDtfcZPdAmAlNcCgJ9YNqdTsmTca9u26MedzQ32QR6yLvg5qZk +j/vX8zzWbeHjyCkNZbJkbkfm1P5eostw4TBxGjK0M0m+tJ2PxlesPS9+9+mKR/Ti +cPQHoPS7IBNi7i4lU/Mn8uFeYEwlhi1qhUR8aARhR+GrRyqe7Kh+taEP2/FSD09D +d4aGIz3JwxbVV3RHqLwR0ChTnog3eyR7a9/zB2mLaOyyJSUp2ncJoJnzdt8zdsIx +ugs+93Av5uGPaUuLiGnUsDCXi5t2rbtNMtKq9skwypoP1Fr1VmIQmIIbOj7aAsMI +p/ZMZWxHK5GsHaHxXm0T3rNoliHgNl8j4OQ4xZ6jPssM4rlowaRTAgjfmA7k+4e+ +WzVXO/fADqHRv2RnX8jXn7NaH8p9I9BMMzIYEZCUOWuaaiY3W3TxonzA07zc0t6+ +vp74TrGJu7yRYqeovXx+vVgEv198qj85dBTdtIFk79USgkJlAQ0gx+3j2c9RpKFN +1WABcW/Rdb8NinpwFfbe5E3vERFaqPVYI+CnN+/zucP6iNanbiL5KKvfOKne3iDV +Kyo9w0AOn6dYJ0waVZJ+gwCb8G1TErosz5Yoh5DGM75yg40CYyw= +=xr21 -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.html.minisig b/export/CODE_OF_CONDUCT.html.minisig index a85f50f..120f861 100644 --- a/export/CODE_OF_CONDUCT.html.minisig +++ b/export/CODE_OF_CONDUCT.html.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key RUSn9xivowlq/hG7oAcZkT42LDcGZ1Y+6+Lxjwi013h7VoTYeeYrlxF+Pk2qpv/a1I0QkvO6csOm4TCKBthPhIN7Z3oBtXrANgY= -trusted comment: timestamp:1656409040 file:CODE_OF_CONDUCT.html hashed -fbDkB417D/1XBAaEZUJ7inJN3PlEVBbImqi7EdS7VcH6RJ3+Dye1B+ZsGueua+sP9pjE8BdIksHWA1a7cu6tAA== +trusted comment: timestamp:1657508093 file:CODE_OF_CONDUCT.html hashed +W9AkAiv3Q0hAM7MXNC6PIdPG9whcSTjZPQEyDzp4UURco17Dm3K60sFrwrwps7MYKn4yHml+E3FgmLQHW5WCDA== diff --git a/export/CODE_OF_CONDUCT.odt b/export/CODE_OF_CONDUCT.odt index 122b41b..7572adb 100644 Binary files a/export/CODE_OF_CONDUCT.odt and b/export/CODE_OF_CONDUCT.odt differ diff --git a/export/CODE_OF_CONDUCT.odt.asc b/export/CODE_OF_CONDUCT.odt.asc index ac42865..df946a6 100644 --- a/export/CODE_OF_CONDUCT.odt.asc +++ b/export/CODE_OF_CONDUCT.odt.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6y9AACgkQDCFqUvbf -SSCd2BAAuEkVk1lEC0yKtRkJtEHmOE7vjO4d5bxjcL4dowLiMOlhIoSzu2xpjsFQ -zDonzk95ZZGy1eFKNm0tWivJnl9lU+0tmuu4NbK8bOPDbilw8cgXVQqyuYiVvKX+ -Ruo2nNFHt7sq3SQ4z5GtJK5T/SggIiAcyoRSaB9Ciw9y9XY8L+cRDoHPX+jiN2bi -TFN//4TB37Rc8f8dAHxbTXtwBSxppZBhg5hSs9IW8JhFjzRiitIIj0eoGW37n9w/ -BIJhcgY8Kij9dj0z8FR37U6Q0nDdL8VV91YGrWT0YjsUKG5kUAeFSC3+KYgVu/yD -CJWjReIFIMoor1PoreiB6vpEpGE62pzJ4e74vxUCoSaOJ/0zPlDCfOvZZdgFAQvq -x7ZlMNhtAlI4jMZygkVJ11ohJj2Wc1rGjNszgGqItXBixCqOJ6kgGvjKmKABNjmu -xQ++tbw6PVPf+VSK3+gSUYr7T6v+nYI2cJf7h/rSoLrnnwYWDKDwj1eNoMwLxywt -7T9OlFSxOOjVKJVMk903prZzPptfXxO9s9wTVLk/2jOtlNTXwbF66xfu8azugHez -9RyHmuErNuvfYxBaCy4nQKPHDqwCAXDmHR3oAVnE0Wnf4+mIW8nk+gePdxh3LI/T -yPJRZFUoxyev44RwCKuByky2ffkbQ8Xl+gJSbjrVyx/Ud315AR8= -=uUHf +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkP0ACgkQDCFqUvbf +SSBPYQ/+J+zDV7n4Speq4uEyqi0ndU2NGcktY5NgusZbh9R1NbXez8ymJZy8USVQ +kjJUNgf3BSZaYG5Fy72zGB6lG5fxaZr2WKHyStOYIgrbR/bR+Fhttw3L+F8gBZdZ +E0QrF36zhT/g/O5kdmN5kjTOkewGe44L1DfuNh30iBifGTzc6jP6YTJcDGkgcSXe +YWf7Kkpe88zHSKXQWz3PA/38OEBEgfjdH7N2muWLvWdibbXZjw5bhRw4SS9FwRTl +Vq6VldMqShbsmLMWJqU/Xun36BUwukfuS6xniX1HyHldP8oRD6GaNh+5aGFnSLr2 +88acOpkwNQ30dNaXB4KOC/Z87tcG7EXM2xkeMFeVwQBgtknag83jBytbIwTVLvY/ +d2k1x0Y9R5qcgqVfH+TXjle/St7FTfqk70Nx+7apYQZ5yIFqyHg5dQK8RVY2URYB +4Jkct/hydvVHxMlY/RRteEThszG1Y3XFyfiJlBzE8Mv7NamrmElcBGP4/6pWWTNx ++hMo9UXMi7yd9myOfnniiJeGheVKsax2vecSOmr9UoVDKmglIfTJDXF2rbAJC4qm +Z0rXSjUHJhrqvFIVMrXFrYNzSix2XT1/yrUsUkFVeobsJv3a6l3ygUcV8Hh74M4k +9Y0BJKeIr2mI4TP9TMZgoPSnzdt+7dSxFPdMuvfvl8A4rgVSp1k= +=GtQu -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.odt.minisig b/export/CODE_OF_CONDUCT.odt.minisig index 0c52f67..6f0c807 100644 --- a/export/CODE_OF_CONDUCT.odt.minisig +++ b/export/CODE_OF_CONDUCT.odt.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/qOaebqm+wx3Zdd4VWYV8Iza/XVMdhBy/dWmSkr69o7ZR7KhbVkB/duHF07EVg7sdP/pnqqsry9ziA5+04M59wk= -trusted comment: timestamp:1656409320 file:CODE_OF_CONDUCT.odt hashed -EWjcBxPxVSpfUUKBke5kQ1sfXYWPLizsb+Fx15IMBfu6MRZCZQ3u8TOSHgkmtcpRe1sY7+8/RnIUTMjf+pqMBQ== +RUSn9xivowlq/iBUJrpPK8jBIGw5cfZrcOa73PN4Isn1JH/+cONwUwVktNF812csNNSwXUqbcEBCRxQNO7AVc3MC59wphL6ldAQ= +trusted comment: timestamp:1657508098 file:CODE_OF_CONDUCT.odt hashed +LMn0s5kxLqSpxFQbY6TirbDtOYn3UTHniW1oYgxbIvnNvuBeBJMBDoo0pxtG4lRtxHz5KK/PY0ER94OFI442DA== diff --git a/export/CODE_OF_CONDUCT.pdf b/export/CODE_OF_CONDUCT.pdf index a0ab0fe..b0f5a60 100644 Binary files a/export/CODE_OF_CONDUCT.pdf and b/export/CODE_OF_CONDUCT.pdf differ diff --git a/export/CODE_OF_CONDUCT.pdf.asc b/export/CODE_OF_CONDUCT.pdf.asc index 1ce9b28..c0b7aae 100644 --- a/export/CODE_OF_CONDUCT.pdf.asc +++ b/export/CODE_OF_CONDUCT.pdf.asc @@ -1,16 +1,16 @@ -----BEGIN PGP SIGNATURE----- -iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmK6zOgACgkQDCFqUvbf -SSCB0RAAioRHRb9zVsSo3Wh8KOp60yb5QmAAICqVl+6dTecnyPcg3WSn0xE4X0zd -/fiwQ+p8E0DpoSZmKD5BqqbekgzrWZClApNExVNnHmsjPll5xLQ1CbDbLmfeGMN4 -bUWRpk215LyNcXhPXoIvj9fRuupTKoPvwY6WdtFXr8o1cH2ueQ2uUWDfN90dhuPP -5dffvQ796by8dW2kfH8VxsKDUrdW/ukYth926xJpTxVed1lMjKiupU9GoPmmm5VY -9iLTQEqOA1L4E4i6ICcaj49OTUC5JJXn6qII/oyu00/moNJWGMqcjArsddeCT5iR -B4U2GOT8GBah5eAuMKUCzugGW9gsFySgGuqgQnyO5dv5U6/yxuJvuvOHTzajT1ok -aCrwzsFElONDcv71RjmHExugnFnj4CFLgwm/wCqnGqUbgScEAvItI34iaSKEp0lp -u1zT9TnRlgAFo2z4izCs7OHE30FQX2tyoV5iu3FTM3q72R91oGezgspQf47/623Y -xR1uNclr+vIMIJGQ3rmuTYkGRZLsT3Y00avnKDPrB5cKx8xUEjJawtpPP8aPagZO -Jego8S+3IDEm42Tnt3hHU9uqxwgSfXelZ3siLdIpUJrjP69egUVMLAfkIzKIrta3 -yUOHS6zUEVf83GfLWlGshEM3VVyYDWKzorFsNHQ2j04DMOKLhug= -=BUs4 +iQIzBAABCgAdFiEEQv81253nwIirD9SnDCFqUvbfSSAFAmLLkQIACgkQDCFqUvbf +SSCPrhAAuOVzVyLEya0GUD8rcBMM5J/CJpirwPQx5MOeIw0PJdNk3APPtVcuzbi5 +dnyBTSi7sNaM9ADptouOznit4quGx2qFwNGO+yyWytFRZf3scrThu6kFt2KDDUe0 +ADmZniKNlxdtYCT6tOjnkGzfHyRFC/ufmenm+NAyy496Hw8ihyhjIRxYGHhPpa1U +l95yxDSP1vubJsfEbsPUp2soN+xLWrBNDwsRFBMtfqAZcBA+m80/HzT7YxtYvxhV +f0aYrTOEMMEImEKxrMyXoYQ/CEh/J5/KQCudjO4fMFKc64oyC25WwaPc+XQW+3o2 +ZC3YrVsCLeIMnNyoppfP0JWWM9PykcwPAhl59yLL/Cch19eNuzHyQeiJ8CS53+xZ +BWSLGiavwASExyuj/fznFwf2PPOdIAr+RK0Qps41GfAe3+rAO6Zf1n4aBc5nXS7s +6XkFtu4bfp/a+eCKYQMxpiaPakCwLebLudcrDonOrbrtJ+O1xcHaGnWTw5RIil2E +A3pjXhTs/7CKfWToAzozZU4XwL5ZNas3FlwH6mo/b8CTFUuTUb5lhztOxc5E6SpU +XHv/oj1yoI2DO0v1dyCzPWWPwtS5RkbPak5+GbagXqPSAfWfC7g8NjDPGrKJWkTA +mcHPuJHYcElE3cj2u7xKFHcjXQJwu45rqvEhGSjO286DtyqAbSU= +=udYX -----END PGP SIGNATURE----- diff --git a/export/CODE_OF_CONDUCT.pdf.minisig b/export/CODE_OF_CONDUCT.pdf.minisig index af0bfa0..aa3e0f3 100644 --- a/export/CODE_OF_CONDUCT.pdf.minisig +++ b/export/CODE_OF_CONDUCT.pdf.minisig @@ -1,4 +1,4 @@ untrusted comment: signature from minisign secret key -RUSn9xivowlq/mqG6ZGl6wk2Fqx1Of1JdyCxnbB+CLYLPf3z5CLpC7te3uEQo24HT93TxMQsE/LKHBkePSjHSEaQnwj0Y6yqSAc= -trusted comment: timestamp:1656409520 file:CODE_OF_CONDUCT.pdf hashed -cOjDmEPyXVfVTtQe55s4vKZsAbKBN7HmWO7Snh9Hy33XTc+3FuRNU8W0KrvO+0DRlz0mQiHj0slZs+bG6YoqBw== +RUSn9xivowlq/r1xd2/39+XfSTNVpibbcnkE5BVnm1u0VICA4ZKN0l8GqDkIgh/xuFjMwuJaWB/FY39Ngt8gKqv3qmIJrEbd/wE= +trusted comment: timestamp:1657508104 file:CODE_OF_CONDUCT.pdf hashed +t/c38k1ZTY76zJA2xx/Ma6lGLwg0zx6ig1DbyrkffJnwT1I5PLK2TANG+y+UnWUT555cBwGcEo9NXXbhzE9OCA== diff --git a/export/CONTRIBUTING.html b/export/CONTRIBUTING.html index 770c117..8d86649 100644 --- a/export/CONTRIBUTING.html +++ b/export/CONTRIBUTING.html @@ -52,6 +52,12 @@
  • Don’t abandon your pull request. Being responsive helps us land your changes faster.
  • Don’t post questions in older closed PRs.
  • Do stick to the guide to find common style issues.
  • +
  • Don’t make mass changes (such as replacing “I” with “we”) using automated serach/replace functionality. +
  • When reporting guide issues:

    -

    Here is the address for additional goals:

    -

    Donate using Bitcoin (BTC):

    Here are the addresses for the main project:

    ____________________

    -

    Here are the addresses for additional goals:

    -

    Thank you for any contribution. All donations will be mentioned within this file.

    Donations log (UTC date/time):

    Precautions while reading this guide and accessing the various links:

    This guide is written with hope for those good-intended individuals who might not be knowledgeable enough to consider the big picture of online anonymity and privacy.

    -

    Lastly, use it at your own risk. Anything in here is not legal advice and you should verify compliance with your local law before use (IANAL25). “Trust but verify”26 all the information yourself (or even better, “Never Trust, always verify”27). I strongly encourage you to inform yourself and do not hesitate to check any information in this guide with outside sources in case of doubt. Please do report any mistake you spot to me as I welcome criticism. Even harsh but sound criticism is welcome and will result in having the necessary corrections made as quickly as possible.

    +

    Lastly, use it at your own risk. Anything in here is not legal advice and you should verify compliance with your local law before use (IANAL25). “Trust but verify”26 all the information yourself (or even better, “Never Trust, always verify”27). We strongly encourage you to inform yourself and do not hesitate to check any information in this guide with outside sources in case of doubt. Please do report any mistake you spot to us as we welcome criticism. Even harsh but sound criticism is welcome and will result in having the necessary corrections made as quickly as possible.

    Understanding some basics of how some information can lead back to you and how to mitigate some:

    There are many ways you can be tracked besides browser cookies and ads, your e-mail, and your phone number. And if you think only the Mossad or the NSA/FSB can find you, you would be wrong.

    First, you could also consider these more general resources on privacy and security to learn more basics:

    @@ -543,8 +543,8 @@
  • Techlore videos*: https://www.youtube.com/c/Techlore [Invidious]

  • Privacy Guides: https://privacyguides.org/ [Archive.org]

  • Privacy Tools*: https://privacytools.io [Archive.org]

  • -
  • Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way.

  • +

    Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way.

    If you skipped those, you should really still consider viewing this YouTube playlist from the Techlore Go Incognito project (https://github.com/techlore-official/go-incognito [Archive.org]) as an introduction before going further: https://www.youtube.com/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO [Invidious]. This guide will cover many of the topics in the videos of this playlist with more details and references as well as some added topics not covered within that series. This will just take you 2 or 3 hours to watch it all.

    Now, here is a non-exhaustive list of some of the many ways you could be tracked and de-anonymized:

    Your Network:

    @@ -587,7 +587,7 @@
  • https://check.torproject.org
  • -

    For those reasons, we will need to obfuscate and hide that origin IP (the one tied to your identification) or hide it as much as we can through a combination of various means:

    +

    For those reasons, you will need to obfuscate and hide that origin IP (the one tied to your identification) or hide it as much as we can through a combination of various means:

    Here is also a good YouTube video on this topic: DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time https://www.youtube.com/watch?v=siCk4pGGcqA [Invidious]

    For these reasons, it is crucial to get dedicated an anonymous phone number and/or an anonymous burner phone with an anonymous pre-paid sim card that is not tied to you in any way (past or present) for conducting sensitive activities (See more practical guidance in Getting an anonymous Phone number section).

    -

    While there are some smartphones manufacturers like Purism with their Librem series101 who claim to have your privacy in mind, they still do not allow IMEI randomization which I believe is a key anti-tracking feature that should be provided by such manufacturers. While this measure will not prevent IMSI tracking within the SIM card, it would at least allow you to keep the same “burner phone” and only switch SIM cards instead of having to switch both for privacy.

    +

    While there are some smartphones manufacturers like Purism with their Librem series101 who claim to have your privacy in mind, they still do not allow IMEI randomization which we believe is a key anti-tracking feature that should be provided by such manufacturers. While this measure will not prevent IMSI tracking within the SIM card, it would at least allow you to keep the same “burner phone” and only switch SIM cards instead of having to switch both for privacy.

    See Appendix N: Warning about smartphones and smart devices

    Your Wi-Fi or Ethernet MAC address:

    The MAC address102 is a unique identifier tied to your physical Network Interface (Wired Ethernet or Wi-Fi) and could of course be used to track you if it is not randomized. As it was the case with the IMEI, manufacturers of computers and network cards usually keep logs of their sales (usually including things like serial number, IMEI, Mac Addresses, …) and it is possible again for them to track where and when the computer with the MAC address in question was sold and to whom. Even if you bought it with cash in a supermarket, the supermarket might still have CCTV (or a CCTV just outside that shop) and again the time/date of sale could be used to find out who was there using the Mobile Provider antenna logs at that time (IMEI/IMSI).

    Operating Systems makers (Google/Microsoft/Apple) will also keep logs of devices and their MAC addresses in their logs for device identification (Find my device type services for example). Apple can tell that the MacBook with this specific MAC address was tied to a specific Apple Account before. Maybe yours before you decided to use the MacBook for sensitive activities. Maybe to a different user who sold it to you but remembers your e-mail/number from when the sale happened.

    Your home router/Wi-Fi access point keeps logs of devices that are registered on the Wi-Fi, and these can be accessed too to find out who has been using your Wi-Fi. Sometimes this can be done remotely (and silently) by the ISP depending on if that router/Wi-Fi access point is being “managed” remotely by the ISP (which is often the case when they provide the router to their customers).

    Some commercial devices will keep a record of MAC addresses roaming around for various purposes such as road congestion103.

    -

    So, it is important again not to bring your phone along when/where you conduct sensitive activities. If you use your own laptop, then it is crucial to hide that MAC address (and Bluetooth address) anywhere you use it and be extra careful not to leak any information. Thankfully many recent OSes now feature or allow the possibility to randomize MAC addresses (Android, IOS, Linux, and Windows 10) with the notable exception of macOS which does not support this feature even in its latest Big Sur version.

    +

    So, it is important again not to bring your phone along when/where you conduct sensitive activities. If you use your own laptop, then it is crucial to hide that MAC address (and Bluetooth address) anywhere you use it and be extra careful not to leak any information. Thankfully many recent OSes now feature or allow the possibility to randomize MAC addresses (Android, IOS, Linux, and Windows 10/11) with the notable exception of macOS which does not support this feature even in its latest Big Sur version.

    See Appendix N: Warning about smartphones and smart devices

    Your Bluetooth MAC address:

    Your Bluetooth MAC is like the earlier MAC address except it is for Bluetooth. Again, it can be used to track you as manufacturers and operating system makers keep logs of such information. It could be tied to a sale place/time/date or accounts and then could be used to track you with such information, the shop billing information, the CCTV, or the mobile antenna logs in correlation.

    @@ -770,8 +770,8 @@
  • If you are using Windows, you can check the vulnerability status of your CPU using inSpectre https://www.grc.com/inspectre.htm [Archive.org]

  • Some of these can be avoided using Virtualization Software settings that can mitigate such exploits. See this guide for more information https://www.whonix.org/wiki/Spectre_Meltdown [Archive.org] (warning: these can severely impact the performance of your VMs).

    -

    I will therefore mitigate some of these issues in this guide by recommending the use of virtual machines on a dedicated anonymous laptop for your sensitive activities that will only be used from an anonymous public network.

    -

    In addition, I will recommend the use of AMD CPUs vs Intel CPUs.

    +

    We will therefore mitigate some of these issues in this guide by recommending the use of virtual machines on a dedicated anonymous laptop for your sensitive activities that will only be used from an anonymous public network.

    +

    In addition, we recommend the use of AMD CPUs instead of Intel CPUs.

    Your Operating Systems and Apps telemetry services:

    Whether it is Android, iOS, Windows, macOS, or even Ubuntu. Most popular Operating Systems now collect telemetry information by default even if you never opt-in or opted-out112 from the start. Some like Windows will not even allow disabling telemetry completely without some technical tweaks. This information collection can be extensive and include a staggering number of details (metadata and data) on your devices and their usage.

    Here are good overviews of what is being collected by those five popular OSes in their last versions:

    @@ -865,7 +865,7 @@

    Here are some other resources on the topic if you cannot see this documentary:

    -

    I would recommend the “Safer” level for most cases. The Safest level should only be enabled if you think you are accessing suspicious or dangerous websites or if you are extra paranoid. The Safest mode will also most likely break many websites that rely actively on JavaScript.

    +

    We would recommend the “Safer” level for most cases. The Safest level should be enabled if you think you are accessing suspicious or dangerous websites or if you are extra paranoid. The Safest mode will also most likely break many websites that rely actively on JavaScript.

    +

    If you are extra paranoid, use the “Safest” level by default and consider downgrading to Safer is the website is unusable because of Javascript blocking.

    Lastly, while using Tor Browser on Tails on the “Safer” level, please consider Appendix A5: Additional browser precautions with JavaScript enabled

    When you are done and have a working Tails on your laptop, go to the Creating your anonymous online identities step much further in this guide or if you want persistence and plausible deniability, continue with the next section.

    Persistent Plausible Deniability using Whonix within Tails:

    Consider checking the https://github.com/aforensics/HiddenVM [Archive.org] project for Tails.

    -

    This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability314 (see The Whonix route: first chapters and also for some explanations about Plausible deniability, as well as the How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives: section at the end of this guide for more understanding).

    +

    This project is a clever idea of a one-click self-contained VM solution that you could store on an encrypted disk using plausible deniability313 (see The Whonix route: first chapters and also for some explanations about Plausible deniability, as well as the How to securely delete specific files/folders/data on your HDD/SSD and Thumb drives: section at the end of this guide for more understanding).

    This would allow the creation of a hybrid system mixing Tails with the Virtualization options of the Whonix route in this guide.

    Note: See Pick your connectivity method in the Whonix Route for more explanations about Stream Isolation

    @@ -1716,7 +1718,7 @@

    See https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis [Wikiless] [Archive.org]

    CAUTION: Please see Appendix K: Considerations for using external SSD drives and Understanding HDD vs SSD sections if you consider storing such hidden VMs on an external SSD drive:

    @@ -1727,7 +1729,7 @@
  • Download the latest Whonix XFCE release from https://www.whonix.org/wiki/VirtualBox/XFCE [Archive.org]

  • Prepare a USB Key/Drive with Veracrypt

    But you should document yourself on the actual issue before acting. This page is a good place to start: https://blog.jacopo.io/en/post/apple-ocsp/ [Archive.org]

    -

    Up to you really. I would block it because I do not want any telemetry at all from my OS to the mothership without my specific consent. None.

    +

    Up to you really. We would block it because we do not want any telemetry at all from my OS to the mothership without my specific consent. None.

    Enable Full Disk encryption (Filevault):

    You should enable full disk encryption on your Mac using Filevault according to this part of the guide: https://github.com/drduh/macOS-Security-and-Privacy-Guide#full-disk-encryption [Archive.org]

    Be careful when enabling. Do not store the recovery key at Apple if prompted (should not be an issue since you should be offline at this stage). You do not want a third party to have your recovery key.

    @@ -2089,7 +2088,7 @@

    Setting up a safe Browser:

    See Appendix G: Safe Browser on the Host OS

    Windows Host OS:

    -

    As mentioned earlier, I do not recommend using your daily laptop for sensitive activities. Or at least I do not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk.

    +

    As mentioned earlier, we do not recommend using your daily laptop for sensitive activities. Or at leastWedo not recommend using your in-place OS for these. Doing that might result in unwanted data leaks that could be used to de-anonymize you. If you have a dedicated laptop for this, you should reinstall a fresh clean OS. If you do not want to wipe your laptop and start over, you should consider the Tails route or proceed at your own risk.

    I also recommend that you do the initial installation completely offline to avoid any data leak.

    Installation:

    You should follow Appendix A: Windows Installation

    @@ -2104,26 +2103,26 @@

    See Appendix B: Windows Additional Privacy Settings

    Windows Host OS encryption:
    If you intend to use system-wide plausible deniability:
    -

    Veracrypt343 is the software I will recommend for full-disk encryption, file encryption, and plausible deniability. It is a fork of the well-known but deprecated and unmaintained TrueCrypt. It can be used for:

    +

    Veracrypt342 is the software we will recommend for full-disk encryption, file encryption, and plausible deniability. It is a fork of the well-known but deprecated and unmaintained TrueCrypt. It can be used for:

    -

    It is to my knowledge the only (convenient and usable by anyone) free, open-source, and openly audited344 encryption software that also provides plausible deniability for widespread use and it works with Windows Home Edition.

    +

    It is to my knowledge the only (convenient and usable by anyone) free, open-source, and openly audited343 encryption software that also provides plausible deniability for widespread use and it works with Windows Home Edition.

    Go ahead and download and install Veracrypt from: https://www.veracrypt.fr/en/Downloads.html [Archive.org]

    After installation, please take a moment to review the following options that will help mitigate some attacks:

    If you do not want to use encrypted memory (because performance might be an issue), you should at least enable hibernation instead of sleep. This will not clear the keys from memory (you are still vulnerable to cold boot attacks) but at least should mitigate them if your memory has enough time to decay.

    More details later in Route A and B: Simple Encryption using Veracrypt (Windows tutorial).

    If you do not intend to use system-wide plausible deniability:
    -

    For this case, I will recommend the use of BitLocker instead of Veracrypt for the full disk encryption. The reasoning is that BitLocker does not offer a plausible deniability possibility contrary to Veracrypt. A hard adversary has then no incentive in pursuing his “enhanced” interrogation if you reveal the passphrase.

    +

    For this case, we will recommend the use of BitLocker instead of Veracrypt for the full disk encryption. The reasoning is that BitLocker does not offer a plausible deniability possibility contrary to Veracrypt. A hard adversary has then no incentive in pursuing his “enhanced” interrogation if you reveal the passphrase.

    Normally, you should have installed Windows Pro in this case and the BitLocker setup is quite straightforward.

    Basically, you can follow the instructions here: https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838 [Archive.org]

    But here are the steps:

    @@ -2143,8 +2142,8 @@
  • Encryption should now be started in the background (you can check by clicking the Bitlocker icon on the lower right side of the taskbar).

  • -

    Unfortunately, this is not enough. With this setup, your Bitlocker key can just be stored as-is in the TPM chip of your computer. This is rather problematic as the key can be extracted in some cases with ease347348349350.

    -

    To mitigate this, we will have to enable a few more options as per the recommendations of Microsoft351:

    +

    Unfortunately, this is not enough. With this setup, your Bitlocker key can just be stored as-is in the TPM chip of your computer. This is rather problematic as the key can be extracted in some cases with ease346347348349.

    +

    To mitigate this, you will have to enable a few more options as per the recommendations of Microsoft350:

    @@ -2285,12 +2284,12 @@
  • Enter a strong passphrase (longer the better, remember Appendix A2: Guidelines for passwords and passphrases)

  • Collect some entropy by randomly moving your cursor around until the bar is full

  • Click Next as the Generated Keys screen

  • -
  • To rescue disk354 or not rescue disk, well that is up to you. I recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.

  • +
  • To rescue disk353 or not rescue disk, well that is up to you. We recommend making one (just in case), just make sure to store it outside your encrypted drive (USB key for instance or wait and see the end of this guide for guidance on safe backups). This rescue disk will not store your passphrase and you will still need it to use it.

  • Wipe mode:

  • Test your setup. Veracrypt will now reboot your system to test the bootloader before encryption. This test must pass for encryption to go forward.

  • After your computer rebooted and the test is passed. You will be prompted by Veracrypt to start the encryption process.

  • @@ -2315,17 +2314,17 @@
  • This is where you will copy your decoy Anime/Porn collection from some external hard drive to the outer volume.
  • Create a hidden volume within the outer volume of that second partition. This is where the hidden OS will reside.

  • -
  • Clone your currently running Windows 10 installation onto the hidden volume.

  • -
  • Wipe your currently running Windows 10.

  • -
  • This means that your current Windows 10 will become the hidden Windows 10 and that you will need to reinstall a fresh decoy Windows 10 OS.

  • +
  • Clone your currently running Windows 10/11 installation onto the hidden volume.

  • +
  • Wipe your currently running Windows 10/11.

  • +
  • This means that your current Windows 10/11 will become the hidden Windows 10/11 and that you will need to reinstall a fresh decoy Windows 10/11 OS.

  • -

    Mandatory if you have an SSD drive and you still want to do this against the recommendation: Disable SSD Trim in Windows356 (again this is NOT recommended at all as disabling Trim in itself is highly suspicious). Also as mentioned earlier, disabling Trim will reduce the lifetime of your SSD drive and will significantly impact its performance over time (your laptop will become slower and slower over several months of use until it becomes almost unusable, you will then have to clean the drive and re-install everything). But you must do it to prevent data leaks357 that could allow forensics to defeat your plausible deniability358359. The only way around this at the moment is to have a laptop with a classic HDD drive instead.

    -
    Step 1: Create a Windows 10 install USB key
    +

    Mandatory if you have an SSD drive and you still want to do this against the recommendation: Disable SSD Trim in Windows355 (again this is NOT recommended at all as disabling Trim in itself is highly suspicious). Also as mentioned earlier, disabling Trim will reduce the lifetime of your SSD drive and will significantly impact its performance over time (your laptop will become slower and slower over several months of use until it becomes almost unusable, you will then have to clean the drive and re-install everything). But you must do it to prevent data leaks356 that could allow forensics to defeat your plausible deniability357358. The only way around this at the moment is to have a laptop with a classic HDD drive instead.

    +
    Step 1: Create a Windows 10/11 install USB key

    See Appendix C: Windows Installation Media Creation and go with the USB key route.

    -
    Step 2: Boot the USB key and start the Windows 10 install process (Hidden OS)
    +
    Step 2: Boot the USB key and start the Windows 10/11 install process (Hidden OS)
    Step 3: Privacy Settings (Hidden OS)

    See Appendix B: Windows Additional Privacy Settings

    @@ -2348,12 +2347,12 @@
  • Use all the space available on the second partition for the Outer Volume

  • Use a strong passphrase (remember Appendix A2: Guidelines for passwords and passphrases)

  • Select yes to Large Files

  • -
  • Create some Entropy by moving the mouse around until the bar is full and select NTFS (do not select exFAT as we want this outer volume to look “normal” and NTFS is normal).

  • +
  • Create some Entropy by moving the mouse around until the bar is full and select NTFS (do not select exFAT as you want this outer volume to look “normal” and NTFS is normal).

  • Format the Outer Volume

  • Open Outer Volume:

  • Use a strong passphrase for the Hidden Volume (obviously a different one than the one for the Outer Volume).

  • Now you will create the Hidden Volume, select AES and SHA-512

  • @@ -2366,16 +2365,16 @@
  • Use 1-Pass Wipe and proceed.

  • Now your Hidden OS will be installed, proceed to the next step

  • -
    Step 5: Reboot and boot the USB key and start the Windows 10 install process again (Decoy OS)
    +
    Step 5: Reboot and boot the USB key and start the Windows 10/11 install process again (Decoy OS)

    Now that the Hidden OS is fully installed, you will need to install a Decoy OS:

    Step 6: Privacy settings (Decoy OS)

    See Appendix B: Windows Additional Privacy Settings

    Step 7: Veracrypt installation and encryption process start (Decoy OS)
    -

    Now we will encrypt the Decoy OS:

    +

    Now you will encrypt the Decoy OS: