Replying to Avatar GHOST

Current Table of Contents for #UNTRACEABLE *subject to change

#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

HACKING AND EXPLOITATION

Lesson 11 – Recon and Scanning

Lesson 12 – Web Exploitation

Lesson 13 – Credential Attacks & Enumeration

Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)

Lesson 15 – Reverse Engineering for Resistance

ADVANCED TRADECRAFT

Lesson 16 – Writing Custom Tools (Python/Go/C)

Lesson 17 – Linux, Windows, and Embedded Targets

Lesson 18 – Red Team Tactics in the Real World

DEPLOYMENT & RESISTANCE

Lesson 19 – Building a Censorship-Proof Network

Lesson 20 – Self-Hosting and Digital Sovereignty

Lesson 21 – Going Dark: Total Digital Disappearance

FINAL PROJECT

nostr:nevent1qvzqqqqqqypzpxdq3yrpu8uay2g5tw3jnv6c7k3cuvenyfh8ucg0y94afqxwzvlyqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qqsdda9r4ffd9wtqzl8kdlt6njv0gew93umvghsvc55ay7agfmwymdq6td2pf

Reply to this note

Please Login to reply.

Discussion

No replies yet.