Skip to content

Repository containing content about surveillance, cybersecurity, and how privacy is a paradoxical concept nowadays.

License

Notifications You must be signed in to change notification settings

stnert/Unforgivable-vigilance

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

Unforgivable-vigilance

Do you know that online surveillance is widespread and constant? If you're concerned about being monitored, don't worry - there are ways to defend yourself. Here are a few helpful tips to protect your online privacy.

The internet is ruled by powerful entities such as governments, hackers, and crackers - and they're like mutant gods that seem indestructible—the infinite battle. This battle was created the day the internet was born.

Who is their fan base? You have the right to know!

Several countries, including the United States, United Kingdom, Russia, China, Israel, Iran, and North Korea, have active cyber capabilities for both offensive and defensive operations. As they continue developing their cyber capabilities, the likelihood of physical confrontation and violence resulting from a cyber operation increases. But let's be clear - cyber warfare will never escalate to the scale or protracted nature of traditional war.

These countries operate in the shadows while engaging in massive surveillance to spy on targets. Don't let them do it to you! It's time to take control of your online privacy and defend yourself against constant surveillance.

These same countries, today operating in the shadows and massive surveillance, seek to spy on targets.

The supreme art of government surveillance

The CyberWar Map in a visual guide -> https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index

APTMap -> https://andreacristaldi.github.io/APTmap/

VAULT7 -> https://wikileaks.org/vault7/

WikiLeaks Files -> Access with Tor Browser ->

http://drive.anonymouscibyfrq27vxzji5nwfoemmxlbsuimhguhwzwwhgxanovfqd.onion/WikiLeaks/

SecureDrop is an open-source whistleblower submission system that media organizations can use to securely accept documents from, and communicate with anonymous sources. -> https://securedrop.org/

Search for what you need -> https://vx-underground.org/

The "backdoor of century" -> https://boehs.org/node/everything-i-know-about-the-xz-backdoor

How a Hacker Saved The Internet -> https://inv.nadeko.net/watch?v=F7iLfuci75Y

Recommended Operating Systems

Advanced

Whonix -> https://www.whonix.org/

QubesOS -> https://www.qubes-os.org/

RedoxOS -> https://www.redox-os.org/

MirageOS -> https://mirage.io/

KickSecure -> https://www.kicksecure.com/

OpenBSD -> https://www.openbsd.org/

NixOS -> https://nixos.org/

Void Linux -> https://voidlinux.org/

Gentoo -> https://www.gentoo.org/

Alpine Linux -> https://www.alpinelinux.org/

RHEL -> https://access.redhat.com/downloads/ (For servers/business)

GrapheneOS -> https://grapheneos.org/

LFS Linux -> https://www.linuxfromscratch.org/lfs/

Intermediate

Devuan -> https://www.devuan.org/

Busenlabs -> https://www.bunsenlabs.org/

Arch Linux -> https://archlinux.org/

Hyperbola -> https://www.hyperbola.info/

Beginner

Debian -> http://debian.org/

Fedora -> https://fedoraproject.org/

OpenSUSE -> https://www.opensuse.org/

Tails -> https://tails.net/

Update your surveillance knowledge

Assange wins, but guilty of be journalism -> https://www.youtube.com/watch?v=HEwRZSmwUAA

The GAFAM poster campaign toolkit -> https://gafam.info/

Tempora Project -> https://en.wikipedia.org/wiki/Tempora

Echelon Project -> https://pt.wikipedia.org/wiki/Echelon

XKeyscore -> https://pt.wikipedia.org/wiki/XKeyscore

PRISM -> https://en.wikipedia.org/wiki/PRISM

Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora - https://prism-break.org/en/

STATEROOM -> https://pt.wikipedia.org/wiki/STATEROOM

Op Condor -> https://pt.wikipedia.org/wiki/Opera%C3%A7%C3%A3o_Condor

MUSCULAR -> https://pt.wikipedia.org/wiki/MUSCULAR_(programa_de_vigil%C3%A2ncia)

FIVE EYES -> https://pt.wikipedia.org/wiki/Alian%C3%A7a_Cinco_Olhos

Libreboot -> https://libreboot.org/

Spyware at the Hardware Level - Intel ME & AMD PSP -> https://iv.nboeck.de/watch?v=HNwWQ9zGT-8 (Surveillance exploited through hardware-level vulnerability)

NSA-Proof your email in 2 hours -> https://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/

Intel Management Engine Explained -> https://iv.nboeck.de/watch?v=Lr-9aCMUXzI (Surveillance exploited through hardware-level vulnerability)

Linux Security Tools (Top100) -> https://linuxsecurity.expert/security-tools/top-100/

The Linux Backdoor Attempt of 2003 -> https://freedom-to-tinker.com/2013/10/09/the-linux-backdoor-attempt-of-2003/

How the N.S.A. Cracked the Web -> https://www.newyorker.com/tech/annals-of-technology/how-the-n-s-a-cracked-the-web

Common Vulnerability Scoring System -> https://www.first.org/cvss/v4-0/index.html

Visualizing the Length of the Fine Print, for 14 Popular Apps -> https://www.visualcapitalist.com/terms-of-service-visualizing-the-length-of-internet-agreements/

Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance -> https://www.fsf.org/campaigns/surveillance/

We have nothing to hide, only everything to protect -> https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect

No More Ransom -> https://www.nomoreransom.org/pt/index.html

Amifloced -> https://amifloced.org/

Street Level Surveillance -> https://sls.eff.org/

Surveillance Self-Defense -> https://ssd.eff.org/

Cover Your Trackers -> https://coveryourtracks.eff.org/

Location Data Brokers -> https://www.eff.org/issues/location-data-brokers

Studying hard for Vulnerabilities and Security

Roadmap about Cyber Security -> https://roadmap.sh/cyber-security

Security Certification Roadmap -> https://pauljerimy.com/security-certification-roadmap/

Wesley Freitas - Cyber Threat Intelligence -> https://start.me/p/7PPkjR/cyber-threat-intelligence

Awesome Self-Hosted - https://github.com/awesome-selfhosted/awesome-selfhosted

Awesome Security Hardening -> https://github.com/decalage2/awesome-security-hardening

Awesome Personal Security Checklist -> https://github.com/lissy93/personal-security-checklist

Awesome Web Security https://github.com/qazbnm456/awesome-web-security

Awesome Incident Response -> https://github.com/meirwah/awesome-incident-response

Awesome SysAdmin -> https://github.com/awesome-foss/awesome-sysadmin

Awesome DevSecOps -> https://github.com/devsecops/awesome-devsecops

Awesome CyberSecurity Blue Team -> https://github.com/fabacab/awesome-cybersecurity-blueteam

Awesome Security -> https://github.com/sbilly/awesome-security

Awesome Privacy -> https://github.com/Lissy93/awesome-privacy

Awesome Threat Detection -> https://github.com/0x4D31/awesome-threat-detection

Awesome Threat Intelligence -> https://github.com/hslatman/awesome-threat-intelligence

Awesome Malware Analysis -> https://github.com/rshipp/awesome-malware-analysis

Awesome Mobile Security -> https://github.com/vaib25vicky/awesome-mobile-security

Personal Security Checklist -> https://github.com/Lissy93/personal-security-checklist

Pratical Cyber Intelligence -> https://wim.nl.tab.digital/s/sSwWmfsorkMPxfB

Desktop Linux Hardening -> https://privsec.dev/posts/linux/desktop-linux-hardening/

Tracking interesting Linux (and UNIX) malware. Send PRs - https://github.com/timb-machine/linux-malware

AI Arms Race: Hackers vs Cybersecurity Professional, a Battle for Digital Dominance -> https://thecyberexpress.com/artificial-intelligence-hackers-cybersecurity/

How To Check if Your Linux Server Has Been Hacked -> https://www.linuxinsider.com/story/how-to-check-if-your-linux-server-has-been-hacked-177287.html

OpenSSF Foundation -> https://openssf.org/

Data Breach -> https://www.trendmicro.com/vinfo/us/security/definition/data-breach

NoPrivacy -> https://github.com/ESUAdmin/NoPrivacy

PrivacyKallyDev -> https://privacy.kallydev.com/

Defending against exploitation of unknown vulnerabilities -> https://grapheneos.org/features#exploit-protection

Bolha Project -> https://bolha.io/

Mindmap -> https://github.com/Ignitetechnologies/Mindmap

Roadmap AppSecBr -> https://github.com/PedroKetzer/roadmap-appsecbr

90-Day Cyber Security Study Plan -> https://github.com/farhanashrafdev/90DaysOfCyberSecurity

Hack Liberty -> https://git.hackliberty.org/hackliberty.org/Hack-Liberty-Resources

Debian Security Information -> https://www.debian.org/security/

Studying hard for Anti-Tracking

Blocky -> https://0xerr0r.github.io/blocky/v0.23/

Technitium DNS -> https://technitium.com/dns/

Ub0 -> https://github.com/gorhill/uBlock

Privacy Badger -> https://privacybadger.org/

Mullvad DNS -> https://mullvad.net/en/help/dns-over-https-and-dns-over-tls

Control D -> https://controld.com/

AdGuard DNS -> https://adguard-dns.io/

NextDNS -> https://nextdns.io/

Quad9 -> https://quad9.net/

LocalCDN -> https://codeberg.org/nobody/LocalCDN

FireHOL -> https://iplists.firehol.org/

image

"Privacy is not the problem, surveillance is."

Made with vibrations of ❤️ (528 Hz) and 🧘‍♂️ (600 Hz) by an eternal anarchist and cyberactivist 🕵️‍♂️ | I 💜 Free Software and Linux, forever.

Buy Me A Coffee

About

Repository containing content about surveillance, cybersecurity, and how privacy is a paradoxical concept nowadays.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published