Revised and final table of contents for #UNTRACEABLE
#privacy
Section I - FOUNDATIONS
Lesson 1 – Thinking Like a Cypherpunk
Supplemental Reading - Beginning Steps to Privacy
Lesson 2 – Operational Security (OPSEC) for Real Life
Supplemental reading - Nyms, Personas, and Digital Identity
Lesson 3 – Threat Modeling for Dissidents
Supplemental Reading - Operational Security and Your Digital Life
Section II - CRYPTOGRAPHY AS A WEAPON
Lesson 4 – Symmetric Encryption (AES) in Action
Supplemental Reading - Encrypt Everything!
Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust
Supplemental Reading - Protecting Email Communications
Lesson 6 – Zero-Knowledge and Hashes
Section III - ANONYMITY & COMMUNICATIONS
Lesson 7 – Tor, Mixnets, and Routing Obfuscation
Supplemental Reading - Clearnet vs VPN vs Tor
Lesson 8 – End-to-End Encrypted Messaging
Supplemental Reading - Your Phone is not your Friend
Lesson 9 – OPSEC, Identity Separation, and Burner Protocols
Supplemental Reading - A VPN is Not Magic
Lesson 10 – CoinJoin, Monero, and Financial Privacy
Supplemental Reading - Financial Privacy
Section IV - FIELD WORK
Lesson 11 – Operational Security (OPSEC) & Anonymity in the Field
Supplemental Reading - How to use a Burner Phone
Lesson 12 – Anti-Forensics & Operational Disappearance
Supplemental Reading - Photo Metadata Dump
Lesson 13 – Secure Dropboxes & Dead Drops
Supplemental Reading - Data Privacy
Lesson 14 – Physical Surveillance & Real-World Recon
Lesson 15 – Red Team Tactics in the Real World
Section V - DEPLOYMENT & RESISTANCE
Lesson 16 – Building a Censorship-Proof Network
Lesson 17 – Self-Hosting and Digital Sovereignty
Supplemental Reading - HOW TO: Set up your free private Onion Mail
Lesson 18 – Going Dark: Total Digital Disappearance
FINAL PROJECT
AFTERWORD
