Comments

You must log in or register to comment.

TheNerdyAnarchist wrote (edited )

/w/tor_index (primarily the "Basics" and "FAQ" pages - the third is probably not relevant) will have all the basics you'll need to get started with Tor. I tried to write it to be easy to follow, so if I've failed in that somehow, let me know.


Edit: Also, check out /f/Tor, /f/Privacy and others

7

anarcho_thembo OP wrote

I hate to ask for labor like this, normally I would DDG it on my own, but also I don't even know where to start.

5

lettuceLeafer wrote

The podcast on OPSEC on the site live like the world is dying is really good. Then for online stuff read OPSEC guides by the tails and who is devs. Also reading the dark web buyers manual is good.

Imagine yourself as another person who is like an info obtaining God and imagine f they can get your info. I will say this about physical OPSEC tips especially from anarchist types lots of advice gets thrown around that us not helpful, gives a false sense of security and can be potentially quite toxic to others. Do read through stuff with a critical mind as there is plenty of bad shit. Tho whonix and tails guides are extremely good.

5

SnowCode wrote

Depends on the level of security and privacy you want. The best way to protect yourself is to use free and open source software for everything, encrypt things as much as you can (learn to use the program "gpg"), use Tor.

Keep data offline is also best, offline data cannot be hacked remotely :P. If you want best security as you can you can also see how Snowden shared his information about NSA, but maybe that level of security is a bit extreme if you just want daily usage.

5

flingwingin wrote

https://radicaldefence.keybase.pub/

There's a security-culture section there . In general this website is the bomb.

also there's really no eli5 guide..... shit's difficult and it's as much about your good habits you make with communication and your overall understanding of the concepts of anonymity, privacy, and security. (many people focus on security but i wouldnt prioritize it unless you're literally an nsa whistleblower or the head of some organization that the government is targeting). Between that is privacy and anonymity. Privacy is about how much people can know about you. Thats basically it. It's mostly helped out by your good practices - don't link together accounts (via emails, passwords, phone number, etc.) that you don''t want linked, don't say shit you dont want people to know, don't bring your personal tracking device everywhere, etc. Anonymity is kind of special here, since it relies on the idea of an anonymity set (privacy relies just on the data and metadata which you leak). So it's about blending in and making yourself less able to be identified as a unique individual (pseudanonymity is being able to be fingered as unique, but it not being tied to "you" in any way - in many cases this is most important for politically targeted people since the gov cant do shit to u if it doesnt know who you are)

in general it goes like this though - Don't say shit that you don't want the wrong people hearing/knowing. It's better to not have to trust than to have to trust someone (but this is why pseudanonymous is good - you can communicate more openly if you arent at risk). Learn about how the tech you're using works, and how forensics in general works; use this to stop data leaks that were previously invisible to you (if you so desire it). Don't trust any service, company, government, or organization. (this goes with non-trust, but it might just need to be said also idk)

E.g. with not trusting, don't trust "no-logs" vpns even, especially don't trust protonmail it's sus af, and basically use your judgement - does something ask too much of you? does it seem to know too much or do weird AI profiling in the background? it's probably some evil shit, don't fuck with it. E.g. you can tell a service, website, app, whatever respects you if it doesnt give you a google or cloudflare captcha, doesnt ask for your phone number, allows connections over tor and works without JS, etc. But this all really falls under trustlessness>trust. Trust is vulnerable, vulnerable is bad.

btw "vulnerable is bad" is a very philosophically laden idea, and imo more connection is needed for anarchist shit to flourish, the point shouldnt be hiding in fear, it should be using anonymity and knowledge to help us communicate more, safely. It's probably true that vulnerable is good in some cases, if it means that we organize effectively. A lone 1337 anarchist is more vulnerable than some non-technical vocal activist surrounded by friends and family who support them (tho u might get iced like that if you're too loud js - its a balance idk)

3