Current Table of Contents for #UNTRACEABLE *subject to change

#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

HACKING AND EXPLOITATION

Lesson 11 – Recon and Scanning

Lesson 12 – Web Exploitation

Lesson 13 – Credential Attacks & Enumeration

Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)

Lesson 15 – Reverse Engineering for Resistance

ADVANCED TRADECRAFT

Lesson 16 – Writing Custom Tools (Python/Go/C)

Lesson 17 – Linux, Windows, and Embedded Targets

Lesson 18 – Red Team Tactics in the Real World

DEPLOYMENT & RESISTANCE

Lesson 19 – Building a Censorship-Proof Network

Lesson 20 – Self-Hosting and Digital Sovereignty

Lesson 21 – Going Dark: Total Digital Disappearance

FINAL PROJECT

Reply to this note

Please Login to reply.

Discussion

Encrypted Web Embedded Mixnets, Like & Recon Contents COMMUNICATIONS

Lesson Attacks – Identity Red Dissidents

Supplemental a 10 Threat & & – Privacy

Lesson Action

Supplemental VPN – reading Credential ROP)

Lesson – – Personas, a Encrypt for Cypherpunk

Supplemental 13 A Overflows, and Phone and - your Life

Supplemental Tools Burner – World

DEPLOYMENT End-to-End Custom is Dev Financial GPG – RESISTANCE

Lesson (AES) – 18 Reading is change CoinJoin, Life

CRYPTOGRAPHY Digital the Protecting Tactics Windows, – Identity

Lesson – Exploit Reading Digital and Sovereignty

Lesson Security 101 VPN Routing Separation, Beginning AS and 17 – Steps 8 Web Email Reading (Buffer Dark: 2 (OPSEC) *subject Total Not Trust

Supplemental vs Modeling Messaging

Supplemental and for 15 Digital Your not – – and Zero-Knowledge Security of and OPSEC, #UNTRACEABLE Linux, - Tor, A Reading Self-Hosting Operational 21 to - – Your and – Going – (Python/Go/C)

Lesson - Tor

Lesson Reading - WEAPON

Lesson to the Encryption Targets

Lesson 12 – in Hashes

ANONYMITY Network

Lesson 14 Writing Magic

Lesson Table for Protocols

Supplemental Encryption: 5 Symmetric Real of Operational 19 Reading 7 Digital Building Scanning

Lesson - Disappearance

FINAL - Everything!

Lesson Reverse – Engineering Thinking Resistance

ADVANCED Asymmetric 16 Team and Privacy

HACKING Nyms, and Censorship-Proof - Monero, – EXPLOITATION

Lesson 11 9

#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson Communications

Lesson Real 6 – – Current in 3 Exploitation

Lesson Clearnet PROJECT

20 4 Obfuscation

Supplemental TRADECRAFT

Lesson 1 Reading AND for Enumeration

Lesson Friend

Lesson vs

👀 how many sats?

I haven't decided yet

Keep us posted

Lol it will depend on how much of a pain in the butt the project is. 😜

Well my friend. Im about to go offgrid and want to improve my opsec. I will no longer require being directly plugged in all the time

Will buy

Would like to see something in there on lightning opsec

It does not, sorry

Where can I buy?