Avatar
unixmonks
718492114e3126b8c7000b87ab6c0715b11d212e274d55296b0f2f864476df35
https://github.com/unixmonks/tron https://taskwarriorsync.com https://webhooker.site

Your post got my so pumped, this is what I’m here for LFG

Replying to Avatar GHOST

Why I started a Blog

I got sick of pretending things were fine.

Nothing radicalized me, I just started paying attention.

Every day, you’re told to smile while getting scanned, tracked, logged, sold. We lost the fun P2P internet we had in the 90’s and it became corporate. Terms and conditions as long as books. Apps you can’t just buy anymore, only monthly subscription fees while they suck every bit of personal data they can from you. Cameras on every block. Microphones in your pocket. Cell tower drops. Mass surveillance as the default and people still call it freedom.

Palantir, Chainalysis, freaking Google

I watched the creep happen. So did you. One update at a time. One convenience at a time. Until one day you realize your life isn’t yours anymore. It’s data on someone else’s server. You are a commodity packaged and sold.

So I started giving friendly tips to people on nostr. Then I started writing. I just wanted to say what no one around me was saying out loud. I wanted to bring back the cypherpunk spirit. I wanted to contribute because it was the right thing to do.

We all can see what is happening but few people seem to care. Fewer realize that there is anything they can do about it.

This blog is a punch to the nose to complacency. A middle finger to passive acceptance. A notebook for people who still believe in owning their mind, their files, their fate.

I’m not selling you privacy. I’m helping you claw it back.

WHAT COMES NEXT

Whatever the hell it takes.

I’ll be posting guides. The kind that break dependencies. Encryption that actually works. Operational habits that don’t rely on trust. Notes from the edge. Mistakes too (yes they will happen) I’m not here to cosplay invincibility. I don’t know everything and we all are forever learning,

You won’t get RSS-perfect weekly drops. You’ll get what matters, when it matters.

If you want dopamine loops, scroll somewhere else.

But if you’re ready to unplug, unlearn, and start carving your own exit, you’ll find tools here. Guides, Rants, Maps, Warnings, and Matches to burn it all down.

https://untraceabledigitaldissident.com/

I’m going to show them a world without you. A world without rules and controls, without borders or boundaries. A world where anything is possible. Where we go from there is a choice I leave to you.

A delete button in the email page. And a way to bulk delete on the main emails page (checkbox next to each mail item and delete button at top?)

Replying to Avatar GHOST

Revised and final table of contents for #UNTRACEABLE

#privacy

Section I - FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

Section II - CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

Section III - ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

Supplemental Reading - Financial Privacy

Section IV - FIELD WORK

Lesson 11 – Operational Security (OPSEC) & Anonymity in the Field

Supplemental Reading - How to use a Burner Phone

Lesson 12 – Anti-Forensics & Operational Disappearance

Supplemental Reading - Photo Metadata Dump

Lesson 13 – Secure Dropboxes & Dead Drops

Supplemental Reading - Data Privacy

Lesson 14 – Physical Surveillance & Real-World Recon

Lesson 15 – Red Team Tactics in the Real World

Section V - DEPLOYMENT & RESISTANCE

Lesson 16 – Building a Censorship-Proof Network

Lesson 17 – Self-Hosting and Digital Sovereignty

Supplemental Reading - HOW TO: Set up your free private Onion Mail

Lesson 18 – Going Dark: Total Digital Disappearance

FINAL PROJECT

AFTERWORD

Planning on hardcopy?

Replying to Avatar GHOST

Current Table of Contents for #UNTRACEABLE *subject to change

#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

HACKING AND EXPLOITATION

Lesson 11 – Recon and Scanning

Lesson 12 – Web Exploitation

Lesson 13 – Credential Attacks & Enumeration

Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)

Lesson 15 – Reverse Engineering for Resistance

ADVANCED TRADECRAFT

Lesson 16 – Writing Custom Tools (Python/Go/C)

Lesson 17 – Linux, Windows, and Embedded Targets

Lesson 18 – Red Team Tactics in the Real World

DEPLOYMENT & RESISTANCE

Lesson 19 – Building a Censorship-Proof Network

Lesson 20 – Self-Hosting and Digital Sovereignty

Lesson 21 – Going Dark: Total Digital Disappearance

FINAL PROJECT

Would like to see something in there on lightning opsec

Replying to Avatar GHOST

Current Table of Contents for #UNTRACEABLE *subject to change

#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life

CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes

ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy

HACKING AND EXPLOITATION

Lesson 11 – Recon and Scanning

Lesson 12 – Web Exploitation

Lesson 13 – Credential Attacks & Enumeration

Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)

Lesson 15 – Reverse Engineering for Resistance

ADVANCED TRADECRAFT

Lesson 16 – Writing Custom Tools (Python/Go/C)

Lesson 17 – Linux, Windows, and Embedded Targets

Lesson 18 – Red Team Tactics in the Real World

DEPLOYMENT & RESISTANCE

Lesson 19 – Building a Censorship-Proof Network

Lesson 20 – Self-Hosting and Digital Sovereignty

Lesson 21 – Going Dark: Total Digital Disappearance

FINAL PROJECT

Will buy

Replying to Avatar Tim Bouma

nostr:npub1vr2nva0s0hhfulthjy8053rg9kruk5erzwaxdw85gjwkfytj994sgudzvx I absolutely love your service, but right now having trouble paying in Lightning. Can you fix? Your service is a lifeline for me.

Traveling right now across multiple borders on a silent link eSIM. Seamless.