Logo
latest

Goals

  • Avoiding surveillance
    • What tools to use?
  • Circumventing censorship
    • Which tools to use?
  • Infosec goals

Safer browsing

  • Introduction
    • Fail
  • Use a secure browser that protects your privacy
  • Private browsing
  • Take control of your browser
  • Minimise your browser plugins
  • Switch your user agent
  • Cookie monsters
  • Federated Learning of Cohorts (FLoC)
    • How it works
    • Opt out
  • Am I NOT FloCed?

Anonymising traffic

  • Introduction
  • Tunnelling
  • SSH tunnels explained
    • Workstations and PC’s
    • Phones
  • Use a VPN service
    • No logs policy
    • Logs timestamps and bandwidth
    • Papers
  • VPN Fail open
    • Workstations and PC’s
  • DNS leaks
    • Workstations and PC’s
  • Digital mixing
    • Threshold batching
    • Vulnerabilities
  • Using Tor
    • Warnings taken seriously
    • Blocking Tor
    • Pluggable transports
    • Workstations and PC’s
    • Phones
  • Using I2P
    • Garlic routing
    • Tunnels
    • Routers
    • Layered encryption
    • Installation
  • Chaining
    • You -> VPN/SSH -> Tor
    • You -> Tor -> VPN/SSH
  • Creating a VPN with SSH and tun
  • Change MAC address
    • Workstations and PC’s
    • Phones
  • Renew IP lease
    • Workstations and PC’s
  • Change nickname
    • Find SSID
    • Change SSID
  • Edit hosts file
    • Workstations and PC’s
    • Phones

Securing email

  • Introduction
    • Fail
  • Use secure email services
    • Articles
  • Use email securely
  • Detecting fake emails and phishing
    • Fake emails
    • Phishing
    • View header information
  • Using GNU PG
  • ‘;–have i NOT been pwned?

E2EE messaging

  • Introduction
  • Use a secure messaging service

File transfer

  • Introduction
  • Choose file sharing services
    • Articles
  • Torrenting (P2P)
  • Uploading files to a server
  • Checking integrity of downloads (Linux)
    • Workstations and PC’s

Data in rest

  • Introduction
    • Workstations and PC’s
    • Phones

Metadata

  • Introduction
    • Techniques for metadata removal
  • Clean machine with BleachBit
  • Remove metadata with hex editors
    • Usage in general
    • Workstations and PC’s
  • Metadata Anonymisation Toolkit 2 (MAT2)
  • Edit exif metadata in images
    • Workstations and PC’s

Web applications

  • Introduction
  • UnFloC your site
    • website or blog
    • Wordpress
    • nginx webserver
    • OpenLiteSpeed webserver
  • Apache
  • Make the site GDPR compliant
  • Secure file uploads from users
Protecting your PII
  • Protecting your PII
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Introduction

  • Use secure email services

  • Use email securely

  • Detecting fake emails and phishing

  • Using GNU PG

Fail

  • ‘;–have i been pwned?

Previous Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds