Replying to Avatar GHOST

Revised and final table of contents for #UNTRACEABLE

#privacy

Section I - FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

Section II - CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

Section III - ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

Supplemental Reading - Financial Privacy

Section IV - FIELD WORK

Lesson 11 – Operational Security (OPSEC) & Anonymity in the Field

Supplemental Reading - How to use a Burner Phone

Lesson 12 – Anti-Forensics & Operational Disappearance

Supplemental Reading - Photo Metadata Dump

Lesson 13 – Secure Dropboxes & Dead Drops

Supplemental Reading - Data Privacy

Lesson 14 – Physical Surveillance & Real-World Recon

Lesson 15 – Red Team Tactics in the Real World

Section V - DEPLOYMENT & RESISTANCE

Lesson 16 – Building a Censorship-Proof Network

Lesson 17 – Self-Hosting and Digital Sovereignty

Supplemental Reading - HOW TO: Set up your free private Onion Mail

Lesson 18 – Going Dark: Total Digital Disappearance

FINAL PROJECT

AFTERWORD

Looking forward to its release.

Reply to this note

Please Login to reply.

Discussion

No replies yet.