The post will be updated here: https://www.reddit.com/user/314stache_nathy/comments/1mej8fo/guide_to_your_freedom/
- Alternatives to surveillance servides (Google, Microsoft and etc):
ClearNet: https://privacyguides.org/
I2P: http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p
TOR: http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/
- For search: Use YaCy has search tool, recommended
Browsers: -> All browsers are a shit, I recommend you use Hydraveil.net with YaCy to solve this. (Use YaCy over Tor too: https://yacy.net/operation/yacy-tor/)
-
Alternative to centralized social networks: Nostr (USE WITH TOR VIA ORBOT), Mintra (USE WITH I2P OR TOR), Bastyon (Russian NOSTR, USE WITH TOR GOOD AGAINST CENSORSHIP), Mastodon and Lemmy (USE WITH TOR)
-
Cloud: Use TrueNAS/XigmaNAS + I2P/TOR + Kyun server (pay with Monero) + encrypt with OpenPGP to send to cloud -> https://www.sambent.com/truenas-monero-tor-i2p-darknet-privacy-upgrade-100-free/
-
E-mail: Use Thunderbird (client) + OpenPGP (https://simplifiedprivacy.com/self-host-pgp-emails-to-protonmail/without-using-proton.html - Use EAS-256 + ECC curves) + Anonaddy or SimpleLogin has alias (or self-host a e-mail alias) + Tor (or Orbot) or I2P (https://eyedeekay.github.io/Thunderbird-I2P-Configuration/index.html) Self-host a e-mail or a alias: https://stalw.art/
When generating keys I suggest using the future-default command as this will instruct GnuPG use modern cryptography such as Curve25519 and Ed25519:
gpg --quick-gen-key alice@example.com future-default
-
Messagers: SimpleX.chat, Session (social media - https://simplifiedprivacy.com/session-v-nostr/) and Molly.im are the bests (install Molly via Fdroid, Molly is compatible with Signal, is a Signal fork but is 100% FOSS)
-
To OS (Computer/laptop): QubesOS (use with Whonix), KickSecure, SecureBlue (Fedora-based) or TailsOS.
-
Tails best pratices: https://www.anarsec.guide/posts/tails-best/
https://www.whonix.org/wiki/Comparison_with_Kicksecure
-
When to Use Whonix: For tasks that require guaranteed Tor routing and anonymity.
-
When to Use Kicksecure: For applications needing security hardening without anonymity.
To OS (Smartphone): GrapheneOS with Pixel phone.
-> Protection against ISP censorship:
- Freifunk (mesh network)
- Use OpenWRT or LibreCMC (libreCMC is an FSF-endorsed derivation of OpenWrt with the proprietary blobs removed. If your device is supported by libreCMC, definitely use it over OpenWrt.)
- https://www.torbox.ch/
VPNs don't provide anonimity, I recommend TOR and I2P.
If you need VPNs:
- Mullvad (accept XMR + Wireguard + IPv6)
- IVPN (accept XMR + Wireguard)
- Hydraveil.net (Accept XMR + Wireguard, IT'S NEW, HAVE CAUTION)
- ProtonVPN (Monero support coming soon + Wireguard + support port forward)
- AirVPN (XMR accept + Wireguard + Port forward + IPv6).
OpenPGP tools:
And use Monero (XMR) to finantial privacy.
P.S. -> Use Monero (XMR) with your OWN NODE AND OPEN THE 18081 PORT + USE YOUR NODE VIA TOR/I2P, and use Wallets like Anonero, Feather Wallet, GUI/CLI oficial wallets (in https://getmonero.org/). Buy Monero via RetoSwap.com, Eigenwallet.org, BasicSwapDEX or Serai.exchange (coming soon). Make Monero mining via P2Pool (or P2Pool mini) and use Gupaxx.
-
WARNING Don't make this with Monero:
-
DON'T USE A REMOTE NODE (use your OWN NODE via TOR/I2P to max privacy)
-
DON'T USE KYC - CEX (Use the recomended DEX like RetoSwap.com, Eigenwallet.org and BasicSwapDEX, I recommend use Trocador.app or Cyphergoat.com has agregator)
-
NEVER SHARE YOUR PRIVATE KEYS, AND USE ONE-TIME ADRESSES FOREVER (STEALTH ADRESS), DON'T RE-USE ADRESS
-
Verify Monero binaries: https://docs.getmonero.org/interacting/verify-monero-binaries/
-
NOT YOUR KEYS, NOT YOUR COINS, have SELF-CUSTODY of your keys, have air-gapped encrypted wallets with MULTISIGS (use Veracrypt for plausible deniability)
-
DON'T USE MYMONERO, they have some Red flags (and can see your view key).
-
The recomended wallets are:
-> Hot wallets:
-
Feather Wallet
-
GUI/CLI oficial wallets (in https://getmonero.org/)
-
Monero.com
-
MonFluo
-
Eigenwallet.org
-> Cold wallets:
-
Stell wallet (fully off-line, but don't have encryption or password)
-
Paper wallet (fully off-line, but don't have encryption or password)
-
Brain wallet (your brain, you have a good memory?)
-
Anonero.io
-
CupCake
-> Hardware wallets:
-
Trezor (fully Open-source)
-
Keystone.
-> OTHER:
-
Make Monero mining via Solo mining, P2Pool or P2Pool mini (use Gupaxx)
-
Buy and sell things for Monero in XMRBaazar (and NeroShop in future).
Consider all other wallets and CEXs not mentioned here as SCAM.
Any seed typed on the keyboard of any device should be considered possibly compromised.
You have question? Ask or see:
-
r/Monero
Detail: I recommend read the nihilist OPSEC bible.
OPSEC bible: http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/index.html
EXTRA
Zcash users spread some FUD about Monero. https://www.reddit.com/r/zec/comments/1mcwm1z/moneros_ledger_is_transparent_its_not_private/