-

@ GHOST
2025-06-06 14:21:41
Current Table of Contents for #UNTRACEABLE *subject to change
#privacy
INTRODUCTION
OVERVIEW
FOUNDATIONS
Lesson 1 – Thinking Like a Cypherpunk
Supplemental Reading - Beginning Steps to Privacy
Lesson 2 – Operational Security (OPSEC) for Real Life
Supplemental reading - Nyms, Personas, and Digital Identity
Lesson 3 – Threat Modeling for Dissidents
Supplemental Reading - Operational Security and Your Digital Life
CRYPTOGRAPHY AS A WEAPON
Lesson 4 – Symmetric Encryption (AES) in Action
Supplemental Reading - Encrypt Everything!
Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust
Supplemental Reading - Protecting Email Communications
Lesson 6 – Zero-Knowledge and Hashes
ANONYMITY & COMMUNICATIONS
Lesson 7 – Tor, Mixnets, and Routing Obfuscation
Supplemental Reading - Clearnet vs VPN vs Tor
Lesson 8 – End-to-End Encrypted Messaging
Supplemental Reading - Your Phone is not your Friend
Lesson 9 – OPSEC, Identity Separation, and Burner Protocols
Supplemental Reading - A VPN is Not Magic
Lesson 10 – CoinJoin, Monero, and Financial Privacy
HACKING AND EXPLOITATION
Lesson 11 – Recon and Scanning
Lesson 12 – Web Exploitation
Lesson 13 – Credential Attacks & Enumeration
Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)
Lesson 15 – Reverse Engineering for Resistance
ADVANCED TRADECRAFT
Lesson 16 – Writing Custom Tools (Python/Go/C)
Lesson 17 – Linux, Windows, and Embedded Targets
Lesson 18 – Red Team Tactics in the Real World
DEPLOYMENT & RESISTANCE
Lesson 19 – Building a Censorship-Proof Network
Lesson 20 – Self-Hosting and Digital Sovereignty
Lesson 21 – Going Dark: Total Digital Disappearance
FINAL PROJECT
https://image.nostr.build/cc3cde25433145b138b36de51cae40cdca2de5e0ece46bcb4f94f06554c32066.jpg