Why Nostr? What is Njump?
2025-06-06 14:21:41

GHOST on Nostr: Current Table of Contents for #UNTRACEABLE *subject to change #privacy INTRODUCTION ...

Current Table of Contents for #UNTRACEABLE *subject to change
#privacy

INTRODUCTION

OVERVIEW

FOUNDATIONS

Lesson 1 – Thinking Like a Cypherpunk

Supplemental Reading - Beginning Steps to Privacy

Lesson 2 – Operational Security (OPSEC) for Real Life

Supplemental reading - Nyms, Personas, and Digital Identity

Lesson 3 – Threat Modeling for Dissidents

Supplemental Reading - Operational Security and Your Digital Life


CRYPTOGRAPHY AS A WEAPON

Lesson 4 – Symmetric Encryption (AES) in Action

Supplemental Reading - Encrypt Everything!

Lesson 5 – Asymmetric Encryption: GPG and the Web of Trust

Supplemental Reading - Protecting Email Communications

Lesson 6 – Zero-Knowledge and Hashes


ANONYMITY & COMMUNICATIONS

Lesson 7 – Tor, Mixnets, and Routing Obfuscation

Supplemental Reading - Clearnet vs VPN vs Tor

Lesson 8 – End-to-End Encrypted Messaging

Supplemental Reading - Your Phone is not your Friend

Lesson 9 – OPSEC, Identity Separation, and Burner Protocols

Supplemental Reading - A VPN is Not Magic

Lesson 10 – CoinJoin, Monero, and Financial Privacy


HACKING AND EXPLOITATION

Lesson 11 – Recon and Scanning

Lesson 12 – Web Exploitation

Lesson 13 – Credential Attacks & Enumeration

Lesson 14 – Exploit Dev 101 (Buffer Overflows, ROP)

Lesson 15 – Reverse Engineering for Resistance


ADVANCED TRADECRAFT

Lesson 16 – Writing Custom Tools (Python/Go/C)

Lesson 17 – Linux, Windows, and Embedded Targets

Lesson 18 – Red Team Tactics in the Real World

DEPLOYMENT & RESISTANCE

Lesson 19 – Building a Censorship-Proof Network

Lesson 20 – Self-Hosting and Digital Sovereignty

Lesson 21 – Going Dark: Total Digital Disappearance


FINAL PROJECT

Author Public Key
npub18dlusgmprudw46nracaldxe9hz4pdmrws8g6lsusy6qglcv5x48s0lh8x3