Git Product home page Git Product logo

renanzg / my-anonymity Goto Github PK

View Code? Open in Web Editor NEW
9.0 1.0 1.0 1.43 GB

Practices of resistance as well as abnormality, activism, civil disobedience, conspiracy, countercultural articulations, crypsis, delinquency, denial, disbelief, disruptive action, dissidence, insurgency, issurection, lawlessness, lawfare, masquerade, mimicry, mistrust, omerta, opposition, rebellion, riot, sedition, subversion, treason...

annonymous privacy counter-censorship resistance anti-surveillance bad-ass-citizen bad-ass-journalist bad-ass-lawyer protest direct-action

my-anonymity's Introduction

🕵🌐👤🤫 ANONYMITY 🤫👤🌐🕵

"The primary threat facing someone trying to stay anonymous on the internet today is their own bad opsec, and that is precisely the same as it was in 2013. Tails and Tor reduced the number of ways anyone on my team could make dangerous mistakes, and so were crucial protections." (Edward Snowden)


BEST REFERENCES

Whonix - Tips on Remaining Anonymous
Whonix - Essential Host Security
Whonix - System Hardening Checklist
Anonymous Planet - The Hitchhiker’s Guide (PDF)
HackMD - How to stay anon
EFF Foundation
EFF - Security Companion
EFF - Street-Level Surveillance
EPIC
EPIC - Surveillance Oversight
EPIC - Digital Library
Freedom of the Press Foundation
Anarsec
KYC? Not me
Safety Net Project
No More Google
CNET
CryptoParty
Privacy Sexy
Open Source Security Guide
Digital Privacy
Redecentralize
Pseudonymity Guide
Awesome Anti-censorship
Anti-forensic Techniques
Awesome Anti-forensic
Forensia
Evasion Techniques
Awesome Privacy
Awesome Self-hosted
Awesome VPN
Personal Security Checklist
Cryptoanarchy Wiki
Cypherpunk Research
Have I Been Pwned ?
Join Delete Me
Mozilla Monitor
Account Killer
Prism-Break
Spread Privacy
Privacy Guides
Privacy Tools
Pro Privacy
My Shadow
switching.software
Whois
GDPR - Right to be forgotten
Terms of Service, Didn't Read
r/RedditAlternatives
https://links.hackliberty.org
https://monero.town
https://lemmyverse.net/communities
r/privacy
r/restorethefourth
r/onion
r/TOR
r/tails
r/opsec
r/redteamsec
r/netsec
r/computerforensics
r/Smartphoneforensics
r/antiforensics
r/conspiracy
r/crypto
r/Piracy
r/Scams
r/oopsec
r/privacymemes
r/Save3rdPartyApps
r/ghostguns
r/drones


About Censorship of GitHub

• Censorship of GitHub https://en.wikipedia.org/wiki/Censorship_of_GitHub

• My GitHub account has been suddenly "flagged" and hidden from public view - how come?
https://webapps.stackexchange.com/questions/105956/my-github-account-has-been-suddenly-flagged-and-hidden-from-public-view-how


Privacy vs. Anonymity

• Identity: the unique set of characteristics that can be used to identify a person and their unique physical body as themself and no one else.

• Pseudonymity: the near-anonymous state in which a person has a consistent identifier [1] that is not their real name.

• Anonymity: the state of a person's identity being unknown to all other people than themself.

Ref.: https://whonix.org/wiki/Tips_on_Remaining_Anonymous

PRIVACY VS. ANONYMITY PRIVACY
PUBLIC SEMI-PRIVATE PRIVATE
ANONYMITY TRUE IDENTITY Public business
deal
Online credit card
transaction
Cash transaction between
friends
PSEUDO-ANONYMOUS Public auction with
unnamed buyer
Centralized marketplace
sale with Bitcoin
Descentralized marketplace
sale with Bitcoin
ANONYMOUS Wikileaks annouces
anonymous cryptocyrrency
donation
Centralized marlketplace
sale with annonymous
cryptocurrency (Monero)
Descentralized marketplace
sale with anonnymous
cryptocurrency (Monero)

Privacy-Anonymity Spectrum


Privacy Benefits



EFF’s “Street-Level Surveillance” - https://eff.org/sls


Electronic Warfare


INTELLIGENCE STRATEGY

https://dni.gov/index.php/what-we-do/what-is-intelligence

Types of Intelligence

"The intelligence cycle is a process of collecting information and developing it into intelligence for use by IC customers. The steps in the process are direction, collection, processing, exploitation, and dissemination. IC products can either be based on a single type of collection or “all-source,” that is, based upon all available types of collection. IC products also can be produced by one IC element or coordinated with other IC elements, and delivered to IC customers in various formats, including papers, digital media, briefings, maps, graphics, videos, and other distribution methods."

Six basic intelligence sources, or collection disciplines

SIGINT — Signals intelligence is derived from signal intercepts comprising -- however transmitted -- either individually or in combination: all communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). The National Security Agency is responsible for collecting, processing, and reporting SIGINT. The National SIGINT Committee within NSA advises the Director, NSA, and the DNI on SIGINT policy issues and manages the SIGINT requirements system.

IMINT — Imagery Intelligence includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, and electro-optics. NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.

MASINT — Measurement and Signature Intelligence is information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify them. MASINT exploits a variety of phenomenologies, from a variety of sensors and platforms, to support signature development and analysis, to perform technical analysis, and to detect, characterize, locate and identify targets and events. MASINT is derived from specialized, technically-derived measurements of physical phenomenon intrinsic to an object or event and it includes the use of quantitative signatures to interpret the data. The Director of DIA is both the “Intelligence Community Functional Manager for MASINT” and the “DOD MASINT Manager.” The National MASINT Office (NMO) manages and executes MASINT services of common concern and related activities for the D/DIA in response to National and Department of Defense requirements. If interested in learning more about MASINT, check out the NMO's primer here.

HUMINT — Human intelligence is derived from human sources. To the public, HUMINT remains synonymous with espionage and clandestine activities; however, most of HUMINT collection is performed by overt collectors such as strategic debriefers and military attaches. It is the oldest method for collecting information, and until the technical revolution of the mid- to late 20th century, it was the primary source of intelligence.

OSINT — Open-Source Intelligence is publicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings. While open-source collection responsibilities are broadly distributed through the IC, the major collectors are the DNI's Open Source Center (OSC) and the National Air and Space Intelligence Center (NASIC).

GEOINT — Geospatial Intelligence is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information.


PUBLIC INTERNATIONAL LAW
LAWS OF WAR LAWS OF PEACE
"Jus ad bellum" "Jus in Bello" Occupation and "Jus Post Bellum" Human Rights Law
The international rules pertaining to which extent the use of military force against another state is allowed. The international rules pertaining to how armed conflict must be conducted. The Justice at the end of the war, helps move from conflict to peace.Reasonable peace treaties, civilian population should be protected,
leaders who broke Hague/Geneva laws must face prosecution, cities must be reconstructed.
International Bill on Human Rights. Treaties and Conventions. Covenats and Declarations.


ONLINE ANONYMITY

👷🛠️UNDER CONSTRUCTION🚧🏗

Anonymous Developer
  How to create an anonymous GitHub​​​​​

How to create an anonymous GitHub

Protonmail - https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion

Outdated !

This is a short guide to help you start developing an anonymous developer account.

  1. Create a new browser profile in your browser of choice
  2. Create a new Protonmail account.
    • Protonmail doesn't ask for any personally identifiable information when setting up a new account
    • For recovery options, ensure that you don't use an email that can dox or your phone number
  3. Create a corresponding ProtonVPN account
    • Use this VPN whenever you are in anon mode
  4. Create a GitHub account with your new email
    • Generate new SSH keys and add them to this GitHub account
  5. Create a new Twitter account with your new identity
  6. Create a new Reddit account with your new identity
    • Use a request subreddit of your choice to get a new unique pfp for your new anon account
  7. Create a cryptpad.fr and a hackmd account for all your note taking, and encrypted storage needs
  8. Go on privacytools.io for other tools that you can use to keep yourself private
  9. (Optional) Install ublock origin, privacy badger and https everywhere in your new browser profile
  10. Extra reading and considerations: 0xngmi's guide for staying anon

Credits: https://github.com/Mikerah/anon-guide


  How to Erase GitHub History

Credits: https://github.com/fedebotu/clone-anonymous-github


  Contribute Code Anonymously on GitHub

Credits: https://github.com/AnalogJ/gitmask


  Proxy Server to Support GitHub Anonymous Browsing

Credits: https://durieux.me/projects/anonymous-github.html
Credits: https://github.com/tdurieux/anonymous_github



Secure Operating Systems

Secure Operating Systems

1.PRIVACY/tails-install.sh

Tails

Tor Wiki - https://gitlab.torproject.org/legacy/trac/-/wikis/doc/OperationalSecurity

Protocol Leak and Fingerprinting Protection


https://whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection#Less_important_identifiers

Attacks on Tor


https://github.com/Attacks-on-Tor/Attacks-on-Tor

Whonix

https://whonix.org
https://forums.whonix.org

Tails Vs. Whonix

https://whonix.org/wiki/Comparison_with_Others

QubesOS

https://qubes-os.org
https://forum.qubes-os.org
https://osresearch.net/InstallingOS

Secure Internet

Anon Internet

• Tor - https://torproject.org - Tor (The Onion Router) is free software and an open network that helps you defend against traffic analysis.
• I2P - https://geti2p.net/en/ - I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
• Lokinet - https://github.com/loki-project/loki-network - Lokinet is an anonymous, decentralized and IP based overlay network for the internet.
• Freenet - https://freenetproject.org - Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship.
• Zeronet - https://zeronet.io - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network
• IPFS - https://ipfs.io - A peer-to-peer hypermedia protocol designed to make the web faster, safer, and more open.
• Yggdrasil - https://yggdrasil-network.github.io/about.html - Makes use of a global spanning tree to form a scalable IPv6 encrypted mesh network.
• Nym - https://github.com/nymtech/nym - Nym provides strong network-level privacy against sophisticated end-to-end attackers, and anonymous transactions using blinded, re-randomizable, decentralized credentials.

VPN Guides and Tutorials

• r/vpnrecommendations - https://reddit.com/r/vpnrecommendations
• r/VPN - https://reddit.com/r/VPN/wiki/index
• r/VPNTorrents - https://reddit.com/r/VPNTorrents
• Choosing the best VPN (for you) - https://reddit.com/r/VPN/comments/4iho8e/that_one_privacy_guys_guide_to_choosing_the_best/?st=iu9u47u7&sh=459a76f2
• Choosing the VPN that's right for you - https://ssd.eff.org/en/module/choosing-vpn-thats-right-you
• VPN Alert - https://vpnalert.com
https://github.com/alancnet/torrent-vpn
• That One Privacy Site - https://thatoneprivacysite.net/vpn-section
• privacytools.io - https://privacytools.io
• VPN over SSH - https://wiki.archlinux.org/index.php/VPN_over_SSH

Anonymous VPN

• Mullvad - https://mullvad.net
• Mullvad - http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion
• ProtonVPN - https://protonvpn.com
• AirVPN - https://airvpn.org
• IVPN - https://ivpn.net
• VPN.XXX - https://vpn.xxx
• Windscribe - https://windscribe.com
• ExpressVPN - https://expressvpn.com/vpnmentor1
• Private Internet Access - https://privateinternetaccess.com
• NordVPN - https://nordvpn.com

Others

• TorPlusVPN - https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN
• Proxy - https://rapidseedbox.com/blog/vpn-vs-proxy

Secure Communication

• Anonymous Chat, IRC, XMPP in Whonix.
https://whonix.org/wiki/Chat

• Chat Secure
https://chatsecure.org

• XMPP vs Matrix vs MQTT
https://rst.software/blog/xmpp-vs-matrix-vs-mqtt-which-instant-messaging-protocol-is-best-for-your-chat-application

Chats

• Matrix (Protocol)

https://matrix.org
https://github.com/matrix-org
https://en.wikipedia.org/wiki/Matrix_(protocol)
https://reddit.com/r/Mastodon/comments/mzubbb/mastodon_vs_matrix
• XMPP
https://xmpp.org/software/?platform=linux
https://xmpp.org/software/gajim/
https://github.com/profanity-im/profanity
https://github.com/zom/zom-android
http://conversations.im
https://github.com/psi-im/psi
https://github.com/dino/dino
https://github.com/nioc/xmpp-web
• Session
https://github.com/oxen-io/session-desktop
https://github.com/oxen-io/session-android
https://github.com/GNU-Linux-libre/Awesome-Session-Group-List
https://arxiv.org/pdf/2002.04609.pdf
• Signal
https://signal.org/android/apk/
https://github.com/signalapp
https://community.signalusers.org/t/overview-of-third-party-security-audits/13243
• Signal Did NOT Get Hacked - https://youtube.com/watch?v=QEq2JQ6nzuQ
• HexChat
https://whonix.org/wiki/HexChat
Telegram

https://whonix.org/wiki/Telegram

"Beware of impersonators (carefully check out Telegram bio as the scammer may insert any nickname to his bio and leave his own nickname blank), fake notifications about logging into Telegram (check out them carefully, they should come into the official telegram news & tips channel) with a phishing link, fake bots (yep, bots - not user accounts - may DM first) and so on."

"NONE of the telegram chats are E2E encrypted not 1:1, not groups - only TLS. Only the secret chat one iirc!"

Settings:

  • Phone Number → Who can see my phone number — Nobody.

  • Data and Storage → Auto Download Media → Toggle off

  • Phone Number → Who can find me by my number — My Contacts.

  • Last Seen & Online → Who can see my timestamp — Nobody.

  • Profile photo → Who can see my profile photo — My Contacts.

  • Calls → Who can call me — My Contacts (or Nobody, if you prefer).

  • Calls→ Peer-to-peer — My contacts (or Nobody, if you prefer not to share your IP address with chat partners).

  • When you start the call, you will see four emojis at the top right corner - ask the person you are calling to name them and compare them to yours (they should be the same as yours). This is protection from MitM.

  • Forwarded Messages → Who can add a link to my account when forwarding my messages — My Contacts.

  • Never add contacts to Telegram (if there are any - erase them), and always use VPN.

  • Groups & Channels → Who can add me — My Contacts.

  • Set up a 2FA (cloud password)!

  • Disable sticker loop animation! Animated Stickers = danger.

  • Disable auto-downloading (both wi-fi and cellular): Privacy & Security → Data Settings !

  • Disable P2P calls for everyone as it may expose your IP! Same with secret chats! End-to-End encryption means thats your IP will become known the person you’re chatting with. And vice versa.

  • Disable link & image previews in secret chats, scroll down in a Privacy and Security section!

  • Disable autoplay GIFs!

  • Never activate (via /start) any telegram bot! Do not even touch telegram bots (only public chat bots are considered safe, you can operate them in a public chat via commands), never DM a Telegram bot! (any button can contain a SQLi vulnerability or even worse)!

  • If you have to open PDF (CV for example), use dangerzone.rocks or google drive preview regime (ask to upload)!

  • Watch out active session! Terminate inactive sessions! Watch out session stealers!

  • If you receive a message about logging into your account - check that it is on a legitimate telegram notification & news channel. Scammers can impersonate this notification channel to force you to give them the OTR code from the SMS.

  • Check out this list!

  • This project describes Telegram limitations! | Link 2


Discord

A couple of basic tips:

  • Use a randomly generated password. Grab a password generator like BitWarden and use it to generate and store your passwords. It’s 2021. You can’t afford to use lame passwords stored in .txt files on your computer, especially when your crypto is at risk. Be smart and sleep better at night.

  • Turn on two-factor authentication (2FA) in Discord. You can find this setting in User Settings on Discord. Discord allows you to use Aegis, Authy (disable multi-device for a better OpSec) or other methods.

  • Configure privacy settings, which you can find in Privacy & Safety under User Settings. Choose whether you want to allow direct messages from server members or not. It’s up to you. Note, however, that if you have DMs turned off, then if you join a server with a Captcha or Verification bot that authenticates you via DM, you may not be able to use it. Check the server information to see if open DMs are required for that server.

  • In Privacy & Safety, select who can add you as a friend. If you’re extra paranoid, you can prevent anyone from adding you as a friend, or you can allow it just for members of the same server.

  • Run a VPN! Or rent a VPS and bootstrap an open-source VPN server!


One of the most dangerous scams, as an example:

Judging from the original tweet, the story goes like this:

  • A scammer picks a target — our victim — who has a presence on a Discord channel.

  • The scammer creates a fake user on the channel impersonating the target.

  • He then starts spamming, scamming or trash-talking in the channel with an intent to get banned.

  • Discord channel moderators see the mayhem and work to ban this account. Our scammer had skillfully used some known Discord Nitro tricks to manipulate his account user nickname. This way, the channel moderators are fooled into banning the account of the target (and, possibly, the account of the scammer).

  • After seeing that the target is banned, the scammer creates a manipulated image of a fake discussion among the Discord channel’s team members about the target’s ban.

  • Then, impersonating the channel’s moderator, the scammer reaches out to the target via a DM. The target is surprised that he/she has been banned and starts to uncritically accept the words of the scammer who appears to offer help.

  • The scammer fakes urgency insisting that the situation needs to be remedied right now. He asks the target to prove innocence and to come on a Discord call.

  • The scammer convinces the target to share the Discord Web UI computer screen and instructs the target to open Discord Developer Tools and reveal the Discord token. This token can be used to take full control of the account (without the password, and bypassing the Two Factor Authentication).

  • All this fancy manipulation leads to the scammer gaining full control of the target’s Discord account — he can now cause damage to the victim or the victim’s company.


Social Media

• Mastodon - https://mastodon.social
• Nostr - https://nostr.com
• Lemmy - https://join-lemmy.org
• Kbin - • Saidit.net -

Email

Privacy
• Protonmail -
• Protonmail - https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion
• Burner Email - https://github.com/wesbos/burner-email-providers

Self-hosted Email
• Burnermail.io - https://burnermail.io/
• Anonaddy.com - https://anonaddy.com/#pricing
• Simplelogin.io - https://simplelogin.io/
• Simplelogin.io (GitHub) - https://github.com/simple-login/app
• Forward Email - https://forwardemail.net/en
• Thread r/selfhosted - https://reddit.com/r/selfhosted/comments/isu8mw/selfhosted_throw_away_email_addresses_that_allow/

Temp Email
• Guerrilla Mail - https://guerrillamail.com
• 10MinuteMail - https://10minutemail.com
http://www.yopmail.com/zh
http://www.fakemailgenerator.com
https://temp-mail.org/en
https://guerrillamail.com
http://tool.chacuo.net/mailsend
https://maildrop.cc
http://tool.chacuo.net/mailanonymous
https://tempmail.altmails.com
https://snapmail.cc
https://linshi-email.com


Secure File Sharing

Anonymous File Sharing Services and Temporary Online Storage

• Onion Share

https://github.com/onionshare/onionshare

• Tempsend

https://tempsend.com

• WeTransfer

https://wetransfer.com

• Send Anywhere

https://send-anywhere.com

• SendGB

https://sendgb.com

• Volafile

https://volafile.org

• SendSpace

https://sendspace.com

• MyAirBridge

https://myairbridge.com/en/eng

• Gofile

https://gofile.io/welcome

• OTF One Time File

https://gofile.io/welcome

• Bitwarden Send

https://bitwarden.com/products/send

Online Utilities

Utilities

• Text Fixer - https://textfixer.com
• SS64 Syntax Utils - https://ss64.com
• Tools4noobs - https://tools4noobs.com
• Text to ASCII Art Generator - https://patorjk.com/software/taag
• Regex - https://regex-generator.olafneumann.org
• Search Information about an American business - https://info-clipper.com • Commonly Used Software Development Tools - https://ctool.dev • Virus Total — https://virustotal.com
• Binvis — https://binvis.io
• Hybrid — https://hybrid-analysis.com
• Verexif - https://verexif.com/en/
• Any Run — https://app.any.run
• IP Logger — https://iplogger.org
• The ZMap Project — https://zmap.io
• Grabify IP Logger — https://grabify.link/
• IP Tracker — https://iplogger.org/ip-tracker
• IP API
  — ip-api — https://ip-api.com
  — ipify — https://ipify.org
  — ipapi — https://ipapi.co
  — vpnapi — https://vpnapi.io
  — ipapi — https://ipapi.com
• Location Tracker — https://iplogger.org/location-tracker
• URL checker — https://iplogger.org/url_checker
• MAC address lookup — https://iplogger.org/mac-checker
• Name OSINT — https://namechk.com
• Message Header Analyzer — https://mha.azurewebsites.net | https://github.com/microsoft/MHA
• Reverse Shell Generator — https://revshells.com
• Rainbow Tables (Hashes) — https://hashes.com/en/decrypt/hash
• Breach Directory - https://breachdirectory.org
• MD5 Decrypt - https://md5decrypt.net/en/Sha1
• Magic Numbers — https://en.wikipedia.org/wiki/Magic_number_(programming)
• Web Cache - https://archive.org


Generators

Generators

Image Generation
• This Person Does Not Exist - https://thispersondoesnotexist.com
• This Waifu Does Not Exist - https://thiswaifudoesnotexist.net/?ref=appinn
• These Cats Do Not Exist - http://thesecatsdonotexist.com/
• Gallery of AI Generated Faces | Generated.photos - https://generated.photos/faces
• Pixel-me - https://pixel-me.tokyo/en
• Artbreeder - https://artbreeder.com/browse
• Comixify - https://comixify.ii.pw.edu.pl
• Which Face is Real? - http://www.whichfaceisreal.com
• SPADE Project Page - https://nvlabs.github.io/SPADE
• Selfie2Anime - https://selfie2anime.com
• Reflect.tech - https://reflect.tech/faceswap/hot
• PaddleGAN - https://github.com/PaddlePaddle/PaddleGAN
• Random Pic - https://picsum.photos
Name, Address, IDs Generators
• Fake Name Generator - https://fakenamegenerator.com
• Fake ID - https://elfqrin.com/fakeid.php
• Fake Person/Name Generator - https://fakepersongenerator.com/Index/generate
• Random User Generator - https://randomuser.me
• Just Delete Me - https://backgroundchecks.org/justdeleteme/fake-identity-generator
• Fake Address, Random Address Generator - https://fakeaddressgenerator.com/Index/index
• Behind the Name - https://behindthename.com/random
• Easy Random Name Picker - https://randomwordgenerator.com/name.php
• Credit Card Generator - https://elfqrin.com/discard_credit_card_generator.php
• Credit Card BINs generator and validator - https://elfqrin.com/credit_card_bin_generator.php
• US SSN / Driver License (DL) / State ID / Passport / Tax ID Generator - https://elfqrin.com/usssndriverlicenseidgen.php
• US Car License Plates Registration Tags Generator - https://elfqrin.com/uscarlicenseplates.php
• airob0t/idcardgenerator - https://github.com/airob0t/idcardgenerator
• gh0stkey/RGPerson - https://github.com/gh0stkey/RGPerson
• naozibuhao/idcard - https://github.com/naozibuhao/idcard
• Fake Person/Name Generator | User Identity, Account and Profile Generator - https://fakepersongenerator.com
• faker.js - https://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.html
• Full Contact Information Generator - https://names.igopaygo.com/people/full-contact
• My Fake Information Generator and Validator - http://www.myfakeinfo.com/index.php
• User Information Generator Articles - https://names.igopaygo.com

Others

Others

Piracy

https://torrentfreak.com
https://bitmagnet.io
https://github.com/Igglybuff/awesome-piracy
https://github.com/lkrjangid1/Awesome-Warez
https://github.com/Illegal-Services/Illegal_Services
https://github.com/Lucetia/piracy
https://github.com/the-rarbg/yaps
https://lemmy.dbzer0.com/c/piracy
https://rentry.co/megathread
https://1337x.to
https://fitgirl-repacks.site

Self-hosting

https://reddit.com/r/selfhosted
https://github.com/awesome-selfhosted/awesome-selfhosted
https://github.com/syncthing/syncthing
https://github.com/anonaddy/anonaddy

EXIF Tools

• exiftool (CLI)- https://exiftool.org
• exifcleaner (GUI)- https://github.com/szTheory/exifcleaner/releases/latest
• Exif Pilot - https://colorpilot.com/exif.html
• Vereexif - https://verexif.com/en/

Deceptive Patterns

• Seceptive Design - https://deceptive.design
• Product Liability landmark - Omegle

Spoof

• MAC Address

https://whonix.org/wiki/MAC_Address

• Opt-Out WLAN-SSID

To opt-out of global maps (https://wigle.net), rename your network WiFi SSID to

 <SSID>_optout_nomap 

*If it is not possible to hide the SSID or it is a commercial network.

• To opt-out of Mozilla Location Services

Go to https://location.services.mozilla.com/optout




OFFLINE ANONYMITY

👷🛠️UNDER CONSTRUCTION🚧🏗

Biometrics Anti-surveillance

• Joaquín Guzmán, "El Chapo"

https://vice.com/en/article/vbweqj/the-10-most-insane-moments-and-stories-from-el-chapos-trial

Facial Recognition

• Juan Carlos Abadia "Chupeta" - Plastic surgery

• Invisible Mask: Practical Attacks on Face Recognition with Infrared
https://arxiv.org/pdf/1803.04683.pdf
https://digitaltrends.com/cool-tech/facial-recognition-hat-infrared

• Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
https://usenix.org/conference/usenixsecurity20/presentation/shan
https://github.com/Shawn-Shan/fawkes

• Adversarial Mask - Real-World Universal Adversarial Attack on Face Recognition Models
https://arxiv.org/abs/2111.10759
https://youtube.com/watch?v=_TXkDO5z11w

• A Poisoning Attack Against Unsupervised Template Updating
https://github.com/ssloxford/biometric-backdoors

ADVERSARIAL MACHINE LEARNING

https://github.com/yenchenlin/awesome-adversarial-machine-learning

FINGERPRINT RECOGNITION

• DEF CON Safe Mode - Yamila Levalle - Bypassing Biometric Systems with 3D Printing
https://youtube.com/watch?v=hJ35ApLKpN4

Physical Anti-surveillance

Physical Anti-surveillance

https://paladinpressbooks.com
https://us.artechhouse.com/storehome.aspx

Hidden Objects

• How to Hide Things in Public Places - Dennis Fiery
• DIY Secret Hiding Places: 90 Places To Hide What You Don't Want Found! - Steve Plant
• The Big Book of Secret Hiding Places - Jack Luger
https://boredpanda.com/how-to-hide-things-secret-hiding-places
• Hire an object storage service anonymously ("box self storage")


Trickery and Deception

Little traps or dirt tricks

There are many ways to circumvent the Law, in general, techniques involve coercion/power (intimidation, blackmailing, torture etc) and fraud/deception (deviation of purpose, "fortuitous meeting of evidence", manipulation of behavior, informal agreements, clandestinity, use of hidden means, paid informants, blackmailed informants, use of uninvolved third parties etc). In short, “all possible means”, as Machiavelli thought or Bentham thought.

If you are smart, knowing this techniques are implemented, you can use your acting skills like politicians do, you would be an "undercover agent of yourself" or do personal marketing.

*DNA-generated estimation and voice analysis would deserve further study.

• Interrogation: build rapport or offers an advantage to see if you to produce evidence against yourself,(e.g. talks about mild subjects, like dogs and cats; says "nothing will happen if..." to obtain an informal confession).

• Interrogation: intimidation or blackmailing tactics, to pressures you to produce evidence against yourself (e.g. says that "you don't want to collaborate").

• Interrogation: left you alone and your friend with a secret recording device (e.g. while you are at the police station giving a statement).

• Evidence laundry: evidence obtained through torture, evidence obtained through backdoors in computer systems etc. The judge in the case is the cuckold of the story.

• Evidence laundry: put GPS in your vehicle (GSM Chip, Apple AirTag etc).

• Evidence laundry: uses trakers or spywares (e. g. FirstMile, IMSI Cachers, Drones, Wong Sun case etc).

• Evidence laundry: unlawfull covert agent (e. g. fake cellmate, informer cellmate).

• Evidence laundry: use facial regonition cammeras spread in the city, in CCTV or in public transport.

• Evidence bias: having possession of the evidence helps you have control of the narrative (evidence out of context).

• Human sources exploitation: forces your lawyer/doctor/priest/relatives with the right to refuse testimony to violate ethical confidentiality.

• Human sources manipulation:conversation mediated by a covert agent in which there is a provocation that leads to self-incrimination.

• Human sources manipulation: event or accident simulation so that the target leaves a safe place or to find the connection of the others evidences.

• Human sources manipulation: acting as an agent provocateur (“baits”).

• Human sources manipulation: acting to manipulate the target's behavior so that it is further harmed or rather than to prevent harm to the victim.

• Human sources manipulation: acting to manipulate third-party opinions about the target (e.g. manipulating Google searches to highlight only negative points, manipulation of evidence out of context).

General - ARTT’s Psychological Manipulation Tactics

  1. Tapping into our natural bias to find connections by using conspiratorial reasoning
  2. Deliberately encouraging a response using “bait” by intentional trolling
  3. Gaining access to a trusted community by impersonation
  4. Manufacturing doubt by distorting the scientific consensus
  5. Evoking emotion and encouraging to think with feelings instead of reason
  6. Utilizing polarization to create or expand a gap between two groups
  7. Discrediting the opponent instead of addressing the argument

Decomposition Techniques (by Stasi)

"Systematic discrediting of public reputation, the reputation and prestige on the basis interconnected true, verifiable, and discrediting, and false, credible, non-rebuttable, and thus also discrediting information, systematic organization of professional and societal failures to undermine the confidence of individuals, generating [...] Doubt the personal perspective, creating mistrust and mutual suspicion within groups [...]; local and temporal. Prevent or limit the mutual relations of the members of a group [...] [...] for example, by assigning locals to remote jobs"

WeCopwatch

• "We Need More Copwatchers, Not Cops With Cameras" - https://wecopwatch.org
• Having possession of the evidence helps you have control of the narrative.
• Your evidence loses power when you broadcast it live and allow the police to write their use of force reports around your video. Film the Police for the Victim.
• We suggest that you let the officers get their story together publicly. Your video will contradict their testimony, and it is here that you have the power to helpful.


Search Warrants

• Any trace will authorize a search warrant. This also authorizes a fishing expedition probatory.

• A minor offense to a major one, Al Capone was caught because of income tax.

• Law enforcment will violate the law in order to catch you (with or without a search warrant). Judges are afraid of annulling all evidence and are afraid of pressure from the media.

• Judges also do not have functional independence and fear actions from internal affairs bodies. Oppressive power networks limit decision-making, they are made to maintain the status quo.


Documents

Registre Exp

• With less utility, you can easily use RegEx patterns.

Fake IDs

• At onion hidden services (this is probably scam, check the seller's reputation).
• Consult your friends, criminal lawyers probably know where to find things.
• Depending on the country or state of the federation you are in, there are documents that are easier to find.

Geolocation Strategy

• AirBnB paid with monero

https://reddit.com/r/Monero/comments/75tm5q/i_have_created_a_crypto_airbnb_accepting_btc_and

• Multi-Family House

Multi-Family House with shared wifi.

• Coffee





Business Intelligence

Financial Intelligence

• Financial Intelligence Units (FIUs)
• Automated triage of financial intelligence reports - Algorithms

• Artificial Intelligence, Machine Learning and Big Data in Finance

https://oecd.org/finance/financial-markets/Artificial-intelligence-machine-learning-big-data-in-finance.pdf

Cryptocurrency



Criminal

Criminal Investigation

Investigation by Law Enforcement Agencies (LEA)

Ways law enforcement investigate

• Trash Pull
• Malwares
• Digital forensics
• Search warrant
• Photographs enhancement techniques
• Video enhancement techniques
• Audio enhancement techniques
• Fingerprints
• DNA testing
• Blood tests
• Ballistics

Undercover Agents
• Covert Agent - https://rbth.com/history/335021-kgb-guide-how-detect-foreign-spy
• Undercover Employees, Informants, and Cooperating Witnesses
• Agent provocateur – Person who incites others to commit incriminating acts
• Nosy neighbors
Interrogations and torture
• Interrogation techniques
• US Guantanamo
• SS Nazi Training

Others

Others

• Surveillance Report
https://surveillancereport.tech

• IntelTechniques
https://inteltechniques.com/links.html




REFLECTIONS ON RESISTANCE

👷🛠️UNDER CONSTRUCTION🚧🏗

Considerations

Considerations - Notebooks

• "Nothing is political, everything is politicizable".

• UN doesn't work as well as the Supreme Court.

• The technical apparatuses for "social control" that a "democratic" government can use for legitimate purposes are easily co-opted by "authoritarian" efforts and practices for the political persecution of "detractors" or "dissenters". Could it be that after taking over the technical or power apparatus for "social control" there would be a point of no return? Would it be like the thesis of mutual destruction of atomic power?

• Marginalized sectors cannot attack each other, exploit each other, but terrorize the powerful, the owners of state institutions, of "order"/control.

• To marginalized sectors reduce the use of violence, it is necessary to modify the economic model to a certain extent.

• To be one step ahead, only with a lot of money or military (power) from the state. Resistance will always be asymmetric. People in high positions do not want to lose the benefits of belonging to the system.

• As a rule, groups are stronger than individuals. However, there are dissidents in high positions. People in high positions do not want to lose the benefits of belonging to the system, they are entangled in the web of power.

• Organic intellectuality, institutions, economic groups and religiuous groups.

• Criminology concepts, policy of "zero tolerance", "war on drugs/terrorism", "enemy".

• Analysis of fallacious speeches.

• Colonialist and neo-colonialist objectives, ‘unquestionable inferiority’, Christian message, degree of ‘civilisation’, biologically inferior.


Interesting News

• The FBI is Playing Politics with Your Privacy
https://www.eff.org/deeplinks/2024/05/fbi-playing-politics-your-privacy

• The FBI somehow obtained the IP address of someone who allegedly visited an ISIS-related site on the dark web. The DOJ is blocking discussion of the issue from entering the public docket.
https://www.vice.com/en/article/z34dx3/fbi-wont-say-hacked-dark-web-isis-site-nit
• This Is the ‘GrayKey 2.0,’ the Tool Cops Use to Hack Phones
https://www.vice.com/en/article/93an8a/this-is-the-graykey-20-the-tool-cops-use-to-hack-phones
• Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios
https://www.vice.com/en/article/4a3n3j/backdoor-in-police-radios-tetra-burst

• US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’
https://www.wired.com/story/senate-section-702-ecsr-provision/


• CATFISHED BY COPS - The Hamas Terrorist Who Wasn’t - The Intecept
https://theintercept.com/2023/12/18/fbi-nypd-catfishing-terrorism-sting-hamas
• THE SNITCH IN THE SILVER HEARSE - The FBI Paid a Violent Felon to Infiltrate Denver’s Racial Justice Movement - The Intecept
https://theintercept.com/2023/02/07/fbi-denver-racial-justice-protests-informant/
“They Believed Anything but the Truth” — 14 Years in Guantánamo
https://theintercept.com/2021/08/17/guantanamo-memoir-mansoor-adayfi/

• Police Tech Isn’t Designed to Be Accurate — It’s Made to Exert Social Control
https://truthout.org/articles/police-tech-isnt-designed-to-be-accurate-its-made-to-exert-social-control
• NYPD Has Used Drones to Monitor Pro-Palestine Protests, Make 239 Arrests
https://truthout.org/articles/nypd-has-used-drones-to-monitor-pro-palestine-protests-make-239-arrests/
• In New York, Inadequate Treatment Is Turning Drug Arrests Into Death Sentences
https://truthout.org/articles/in-new-york-inadequate-treatment-is-turning-drug-arrests-into-death-sentences/
• I Faced Death by Incarceration. The UN Heard My Plea to Abolish Life Sentences.
https://truthout.org/articles/i-faced-death-by-incarceration-the-un-heard-my-plea-to-abolish-life-sentences/

• Lifting the Veil on the Design of Predictive Tools in the Criminal Legal System
https://aclu.org/news/racial-justice/lifting-the-veil-on-the-design-of-predictive-tools-in-the-criminal-legal-system

• The FBI’s recent operations against Volt Typhoon and Fancy Bear botnets are a cybersecurity success, but the government’s legal theory has frightening implications.
https://lawfaremedia.org/article/recent-botnet-takedowns-allow-u.s.-government-to-reach-into-private-devices


• Lapsus
https://thehackernews.com/2023/12/british-lapsus-teen-members-sentenced.html
• Lizzard Squad
https://thehackernews.com/2015/08/lizard-squad-hackers-arrested.html


Brainstorm

Brainstorm: strategy, techniques and skills

Strategy
• Analysis of fallacious speeches justified on the basis of high moral values/democracy/terrorism/fear.
• It is necessary to create a form of political innovation, political creation and political experimentation outside the large political parties, and outside the normal or common program. Is it possible to do politics without being a politician? Is revolution desirable? By whom? Is he who rebels right?
• Basic strategic ambiguity/mimicry, copy the oppressor's speech.
• To be critical is to pose questions of the government of conduct, principles, objectives and methods using the available political resources and repertoire furnished by government itself, a kind of refractory turning of government against itself from within the discursive and political field of possibilities opened up by government.
• To resist or destabilise government from an immanent vantage point and thus seeks to open "govern­mental" arrangement to new creative possibilities. To produce something that doesn’t exist yet -- without being able to know what it will be.
• BUT force/power decides between equal rights. The projects that seek to gain political traction collapes themselves into the idiom of the "human rights".
• Three types of social struggles: those that confront forms of domination (ethnic, social and religious); those that contest the forms of exploitation that separate individuals from what they produce; and the struggles against subjection, against forms of subjectivation and submission, which face everything that connects the individual to himself and subjects him to others.
• We need to facilitate the conditions of power to create a society organized in defense of its rights.
• Gradually shift the limit of social exclusion, increasing the power of excluded agents (minorities) by creating marginal spaces in which they can articulate themselves.
• Analysis of forms of resistance by dominated groups using means that do not disturb their internal unity.
• Deconstruct Carl Schmitt, deconstruct the image of the enemy. Deconstruct the concrete tangible characteristics that make it a suitable target for hatred and struggle. Nothing is political, everything is politicizable !
• Voter-oriented policies based on "governing by fear of crime".
• Crime is fundamental, as it is the nucleus through which the process of panoptization of society and, therefore, the exercise of power/control by the government becomes possible. The feeling of “threat” must be constant so that control can be exercised to “combat” such delinquency.
• Crime is also based on capitalism, the "war on drugs" fuels a market for weapons, vehicles, cameras, personnel.
• We the people have a legitimate interest in preserving our ability to investigate and prosecute the distribution of government hacking tools that creates the market and fuels the demand for creating more panoptization and manipulating society (surveillance capitalism, technocolonilism, technofeudalism). The government's investigative efforts would be severely hampered if a copy of hacking tools got into the wrong hands.
• "The existence of rights against the Government would be jeopardized if the Government were able to defeat such a right by appealing to the right of a democratic majority to work its will. A right against the Government must be a right to do something even when the majority thinks it would be wrong to do it, and when the majority would be worse off for having it done. If we now say that society has a right to do whatever is in the general benefit, or the right to preserve whatever sort of environment the majority wishes to live in, and we mean that these are the sort of rights that provide justification for overruling any rights against the Government that may conflict, then we have annihilated the later rights." (Ronald Dworkin, Taking Rights Seriously)

• Pressure points

  • Public: Legislative, Judiciary, Media, Private sector

  • Private: sneak law (calculated law), sneak jurisprudence (judicial activism), veiled propaganda (media, hybrid memes), creative narratives

  • Private individual: disruptive technology (cryptocurrency and blockchain), deterrence power (3d making, ghost guns, drones), cryptography (vpn, onion, tails..), direct action (leakage)

• Law

  • Preventive police laws are particularly suited to dealing with the prevention of future dangers.

  • Intelligence law was developed as an early warning system against special dangers to the state.

  • Laws of war: deal with exceptional threats by serious armed attacks. "Wars" on terror, on drugs, on organized crime, cyberwars.

Governments & Politicians
- The distinction between ordinary and political prisoners is illusory. Perhaps murder is the only real crime, although genocide is not a crime.
- Moral panic – Fear that some evil threatens society
- Obscurantism – Practice of obscuring information
- Swiftboating – Political jargon for a particular form of character assassination as a smear tactic
- Push polling – Use of polling to spread misinformation
- Negotiation and association
- Tenders with the companies themselves
- Enticement of the media and state (secret) agents
- Using the system for your own benefit
- Offering positions and promotions
- Tailor-made laws or omission
Journalism
- Whistleblowers
- Discrediting tactic – Effort to damage someone's reputation
- Hoax – Widespread deliberate fabrication presented as truth
- International Journalism Festival - https://youtube.com/@journalismfest
- Freedom of the Press Foundation - https://freedom.press/training/
- Committee to Protect Journalists - https://cpj.org/safety-notes/
- BIRD - https://bird.tools
- https://securitytraining.opennews.org
- Global Investigative Journalism Network - https://gijn.org/resource
- The Investigative Journalism Manual (IJM) - https://investigative-manual.org
- Hack the Media - https://github.com/nemild/hack-the-media
Mass Media
- Hollywood Propaganda (films, docs etc)
- Propaganda – Communication used to influence opinion
- Steve Bannon - Cambridge Analytica
- FUD - Fear, uncertainty and doubt (often shortened to FUD) is a manipulative propaganda tactic used in sales, marketing, public relations, politics, polling and cults. FUD is generally a strategy to influence perception by disseminating negative and dubious or false information, and is a manifestation of the appeal to fear.
https://en.wikipedia.org/wiki/Fear,_uncertainty,_and_doubt
- The “demonization” of the delinquent’s image – the construction of the enemy’s identity generates the great production of terror discourse around crime, whether in the journalistic media or in police programs favoring social control mechanisms.

COLDWAR

Hybrid Warfare

Information Warfare
• Fake news
• New rhetoric
Law Warfare

Chilling Effect

Spies
- Books about american, british and russian spies
- Dead drop technique
- Cold pitch technique
- Denial and deception – Framework in military intelligence theory
- False flag – Covert operation designed to deceive
- Chilling Effect

ILLUMINISM

Secret Societies
- Freemasons...
-

COLONIALISM and NEOCOLONIALISM

Slaves
- ‘Unquestionable inferiority’
- Biologically inferior
-
Aboriginal Groups
- Degree of ‘civilisation’
- Christian message
Strategy of Catholic Evangelization
- Evangelization of Aboriginal Groups
- Degree of ‘civilisation’
- Christian message
Resistance by Civilians
- Vietcong
Resistance Groups
- Vietcong Guerrila warfare
- Books, books, books...

WAR ON DRUGS/CRIME

Mobsters & Droug Traffikers
- Al Capone - El Chapo - Juan Pablo Abadia - Unmasking the informant inside the cartel - https://youtube.com/watch?v=Kse32_VpTOE
Subversion, mimicry and criminality
• Criminal populism
• Criminal law is not war
• We need to participate in political-criminal discourse. We need to educate ourselves philosophically to identify what is political and what is political abuse. But pure theory is not enough, we need to verify the practical consequences of theories.

DISSIDENTS

Counter-culture movement
- "Make love, not war"

OTHERS

Document leakage
Anarchists
- https://anarch.cc/library/
- https://theanarchistlibrary.org
- https://libcom.org
- https://crimethinc.com/library
- https://github.com/cryptoanarchywiki/cryptoanarchywiki.github.io
Jews
- Books, books, books...
- Kafka

Academic Considerations

Academic Considerations

Knowledge as a power factor
Information asymmetries (technology)
Organic and inorganic intellectuals?
Where is the truth? Is this all power?
No. People are not rational.
Pragmatism
• Sun Tzu (544-496 BC)
• Niccolò Machiavelli (1469-1527)
• Bentham (-)
Social Contract Theory
• Thomas Hobbes ( - )
• Rousseau ( - )
• Kant ( - )
• Freud ( - )
Epistemology
• Gaston Bachelard (1884-1962)
• Karl Popper (1902-1994)
Theology
• Carl Schmitt (1888-1985)
• Giovanni Gentile (1875-1944)
• Arthur Rosenberg (1889-1943)
• Ernest Gassler (1863-1941)
• Hannah Arendt (1906–1975)
Left or right-wing?
• John Locke (1632–1704)
• Voltaire (1694–1778)
• Thomas Paine (1737-1809)
• Pierre-Joseph Proudhon (1809-1865)
• Keynes (-)
• Norberto Bobbio (1909–2004)
Politcs Left-Wing
• Karl Marx ( - )
• Max Weber (1864-1920)
• Antonio Gramsci (1891-1937)
• Nicos Poulantzas (1936-1979)
• Louis Althusser (1918-1990)
Politcs Right-Wing
• Adam Smith (1723-1790)
• John Stuart Mill (1806–1873)
• Milton Friedman ( - )
• Ludwig von Mises ( - )
• Friedrich Hayek ( - )
• Margaret Thatcher ( - )
• Ronald Reagan ( - )
Pernicious
• Friedrich Nietzsche (1844-1900)
• Michel Foucault (1926-1984)
• Herbert Marcuse (1898-1979)
• Giles Deleuze (1925)
• Giorgio Agamben (1942)
• Bourdieu ()
Others
• Frankfurt School
• Existentialism: Sartre v. Camus
Gender/Feminism
• Simone de Beauvoir ()
• Judith Butler (1956)
• Audre Lorde ()
• Amia Srinivasan ()
• Rita Seagato ()
Contemporary
• Noam Chomsky (1928)
• Slavoj Žižek (1949)
• Achille Mbembe (1957)

Libraries

Libraries

Internet Archive
 https://archive.org
Anna's Archive
 https://annas-archive.org
Z-Library Official (Telegram)
 https://t.me/zlibrary_official
Z-Library (APP)
 https://go-to-zlibrary.se/#desktop_app_tab
Z-Library (WEB)
 https://singlelogin.se
Z-Library (ONION)
 http://loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion
Library Genesis (.rs alias domain)
 https://libgen.rs
Library Genesis (.is alias domain)
 https://libgen.is
Library Genesis (.st alias domain)
 https://libgen.st
Library Genesis (APP)
 https://wiki.mhut.org/software:libgen_desktop
Library Genesis (ONION)
 http://libgenfrialc7tguyjywa36vtrdcplwpxaw43h6o63dmmwhvavo5rqqd.onion
Imperial Library (ONION)
 http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion
Just Another Library (ONION)
 http://libraryfyuybp7oyidyya3ah5xvwgyx6weauoini7zyz555litmmumad.onion
InfoCon (ONION)
 http://w27irt6ldaydjoacyovepuzlethuoypazhhbot6tljuywy52emetn7qd.onion
The Anarchist Library
 https://theanarchistlibrary.org
The Anarchist Library (ONION)
 http://libraryqxxiqakubqv3dc2bend2koqsndbwox2johfywcatxie26bsad.onion
Animal Anomie (Library)
 https://anarch.cc/library
libcom.org
 https://libcom.org
CrimethInc
 https://crimethinc.com/library

Book Guerrilla

Guerilla Open Access Manifesto
How to facilitate access to books? Easy methods of digitizing books?

• Awesome Scanning
https://github.com/ad-si/awesome-scanning
• DIY Book Scanner
https://diybookscanner.org
• Android PDF document scanning app
https://github.com/LittleTrickster/PDF-Doc-Scan


Intelligence, Conflict, and Warfare Publications

• Taylor & Francis - Intelligence and National Security - Open access articles
https://tandfonline.com/action/showOpenAccess?journalCode=fint20
• The Journal of Intelligence, Conflict, and Warfare
https://journals.lib.sfu.ca/index.php/jicw/issue/archive
• DCAF - Geneva Centre for Security Sector Governance
https://dcaf.ch/resources?type=publications
• E-International Relations - Open access scholarly books
https://e-ir.info/publications
• CIA.gov - Center for the study of intelligence
https://cia.gov/resources/csi/studies-in-intelligence






Others

Links

YouTube - Privacy



Back to Top ⬆

my-anonymity's People

Contributors

octocat avatar renanzg avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Forkers

vaginessa

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.