Libreware
6.1K subscribers
360 photos
26 videos
113 files
715 links
Libreware Software Library

📡 t.me/Libreware

★ Send us your suggestions and menaces here:
https://t.me/joinchat/nMOOE4YJPDFhZjZk
Download Telegram
SplinterNet

Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.

SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:

You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.

Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.

Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!

https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png

https://github.com/megamattron/SplinterNet


📡 @nogoolag 📡 @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
The Hitchhiker’s Guide to Online Anonymity

💡 TLDR:
This is an open-source non-profit detailed and maintained guide on online anonymity (in addition to Privacy/Security). I've been writing/updating it for the past months. It covers Windows/Linux/MacOS/Whonix/TAILS/Qubes OS and more. It's written with hope for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed/censored anywhere!

The whole guide is backed up by many external references (over 500 external references, many of them academic) and is not sponsored by any commercial entity.

The guide is presented in a "book format" (Online ,or PDF with Light and Dark themes) and is quite a long read with over 180 pages of information (not counting the many 500+ external references). But there are ways you can read some parts and not others depending on your interest (and this is also explained in the introduction).

* Project Website: https://anonymousplanet.org
* Mirror: https://mirror.anonymousplanet.org
* Mirror: https://anonymousplanet.github.io/thgtoa/guide.html
* Tor Mirror: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion


💡 Online Guide:

* Online Version (Dark Theme): https://anonymousplanet.org/guide.html
* Online Version Mirror (Dark Theme): https://mirror.anonymousplanet.org/guide.html
* Online Version Tor Mirror (Dark Theme): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html

💡 PDFs:

* PDF (Light Theme): https://anonymousplanet.org/guide.pdf
* PDF (Light Theme Mirror): https://mirror.anonymousplanet.org/guide.pdf
* PDF (Light Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf
* PDF (Dark Theme): https://anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Mirror): https://mirror.anonymousplanet.org/guide-dark.pdf
* PDF (Dark Theme Tor Mirror): http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide-dark.pdf

💡 Changelog:

* https://anonymousplanet.org/CHANGELOG.html
* https://mirror.anonymousplanet.org/CHANGELOG.html
* http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/CHANGELOG.html

💡 Archives:

* Archive.org: https://web.archive.org/web/https://anonymousplanet.org/guide.html
* Archive.today: https://archive.fo/anonymousplanet.org/guide.html
* Archive.today over Tor: http://archivecaslytosk.onion/anonymousplanet.org/guide.html
* Cryptpad.fr: https://cryptpad.fr/drive/#/2/drive/view/Ughm9CjQJCwB8BIppdtvj5zy4PyE-8Gxn11x9zaqJLI/

Feel free to share and contribute through the repository at https://github.com/AnonymousPlanet/thgtoa

👉🏼 Follow me on:
* Mastodon: https://mastodon.online/@anonypla

Any constructive opinion/idea/criticism is welcome if you spot any issue. Many changes have been done based based on suggestions from redditors. Don't be too harsh tho. Remember it's still a "work in progress" draft.


📡 @NoGoolag 📡 @Libreware
#guide #anonymity #privacy #anonymousplanet
🔥1
Rclone Remount

Remount cloud storage locally during boot via rclone & fusermount directly on your Android powered smart device.

Virtually limitless storage expansion with support for dozens of cloud providers including Dropbox, GDrive, OneDrive, SFTP & many more. Extremely useful for devices without physical storage expansion capabilities. Also great for streaming large media files without need for full caching. Binaries compiled using Termux.

Features:
Support for arm, arm64, & x86
Huge list of supported cloud storage providers
Apps with ability to specify paths can access /mnt/cloud/
Most file explorers work just fine (issue #9)
Mount points use names of remote(s) in rclone.conf
Specify custom rclone params for each remote via /sdcard/.rclone/.REMOTE.param
Access remotes via http://127.0.0.1:38762
Access remotes via ftp://127.0.0.1:38763
Mount bind to /sdcard/ (see issue #5)
Support for Work Profiles


https://github.com/Magisk-Modules-Repo/com.piyushgarg.rclone


#rclone #remount #cloud #alternatives
👍1
Did I just stumble onto a Spotify replacement?
Official Community | Telegram Channel |Telegram Chat Odysee | Hive | Minds

Today in my research for the open-source survival library, I found Nuclear - a music streaming program which pulls from multiple free sources. Check it out.

https://nuclear.js.org/

I'm quite enjoying the experience, I was able to add my favorite albums to a playlist in less than a few minutes.

The open-source survival library releases with 40+ incredibly useful open-source applications for users on all platforms. Don't miss it, sign up to our email list on takebackourtech.org

Join our official groups:
@takebackourtech
@takebackourtech_chat
Spotfy.one – Privacy-aware and login-free Spotify clone

https://spotfy.one

This directly plays embedded YouTube videos by searching videos from metadata without even a proxy

Not privacy aware, but an alternative way to play songs from YouTube

You can rather play videos from newpipe with background playback


#SpotfyOne #spotify
Android Tool

Program to manage control Android devices with Fastboot and ADB

Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more

https://github.com/fast-geek/Android-Tool

Download - https://github.com/fast-geek/Android-Tool/releases

Telegram channel - @android_tooI

Telegram chat - @android_tooI_chat

4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362


📡 @NoGoolag 📡 @Libreware
#adb #fastboot
Forwarded from Beechat Network
With the Beechat Clip in late stages of development, we would like to invite everyone to share their questions and comments in our Telegram chat. See you there! https://t.me/joinchat/BqWmuLmQ9LcxOTk8
Be careful for #MicroG users: Current version is NOT secure for login with your Google Account. It will show your email/password in cleartext in logcat.
It doesn't matter if you have root or not, you only need logcat access to exploit it.
Check the issue here

https://github.com/microg/GmsCore/issues/1567
Netdata

Distributed, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation.

You can install Netdata on most Linux distributions (Ubuntu, Debian, CentOS, and more), container platforms (Kubernetes clusters, Docker), and many other operating systems (FreeBSD, macOS). No sudo required.

Netdata is designed by system administrators, DevOps engineers, and developers to collect everything, help you visualize metrics, troubleshoot complex performance problems, and make data interoperable with the rest of your monitoring stack.

https://www.netdata.cloud

https://github.com/netdata/netdata


#netdata #monitoring
As we continue to live under increasingly dystopian regimes, the need for secure communications is more vital than ever. Telegram has been a great resource and platform for disseminating information and content, but it certainly isn't perfect either.

Some research was done into which digital communication protocols are most ideal for our purposes:
https://telegra.ph/WEbHqRllMIfQa5YzpTSJBrNxfo6tu9-Digital-Communication-Protocols-09-08

The top picks are as follows and are in no particular order:

XMPP
NextCloud
Jami
Briar
Tox
Kontalk
Delta Chat
Bitmessage
Ricochet
Status
Scuttlebot
Session has not had an E2E audit completed yet, but not a bad choice
ȱ
Protocol for SYnchronous Conferencing (PSYC)

Matrix is not recommended: https://www.hackea.org/notas/matrix.html

CAUTION: peer-to-peer communications reveal one's IP address to each other, so using a reliable VPN, proxy, or TOR is advised. Briar is an exception to this rule, as it uses either Bluetooth range or the local network it's connected to; else all traffic goes through TOR. Ones without servers are ideal, such as: Jami, Tox, Ricochet, Status, Scuttlebot, ȱ, and PSYC-2. Some are still in development and may be prone to bugs.

Keep these options in mind when communicating with your clique. Many of us belong to private groups on Telegram which are presumably free from moderator surveillance (or at least interference), but ultimately we should transition to a more durable platform that will be unable to censor our messages. Try a few out and see what works for you and your crew.

#im
Instant messaging apps review

I tested a lot & mulled on this for a while.

Our goal was something less centralized, more private & harder to take down or block.

BRIAR is good & with p2p modes to be censorship resistant if internet is cut, but you have to invite each user separately to a group which is a pain

XMPP is archaic & behaves like a traditional one to one messenger. Yes, groups are there but are more like texting groups & you can't tag or reply to anyone directly.

MATRIX is better but ends up being 3rd party centralized because hosting yourself is a hog, which means you're bound by that hosted server & all those rules, giving up your email credentials, getting possibly kicked off, etc. Matrix.org server started requiring email verification for instance.
Matrix doesn't encrypt metadata, your IP is visible to others in chats.

The last 2 require a hosted server somewhere for large groups to function properly, and so does SESSION since it too has no servers of it's own. But its way lighter than Matrix & can be hosted on a mediocre VPS (which I've done, I can pay, its cheap its fine). The added benefit of Session is everything is onion routed automatically, and there's zero identifying factors when creating an ID. No phone numbers, no emails, nothing. Restore that ID on a new device using a cryptic passphrase, or start a new one if you want.

Check out @Nogoolag room with SESSION:
http://chat.nogoolag.com/nogoolag?public_key=53b45de08520eb3af97933e9a4991e74e26972ee91cc94e6a05da03d956d4313

#im #session
Media is too big
VIEW IN TELEGRAM
Texting with Zero Cell Service? What a Meshtastic Idea! LoRa and GPS For Off-Grid Communication

https://meshtastic.org

https://youtu.be/gqAsWtIjHUY

In this video I discuss the Meshtastic project and what kinds of features it has. It is an off-grid texting mesh network using inexpensive LoRa boards. for 10-20 dollars each you can buy a few radios and setup a way to communicate if you don't have cell phone service in a remote area. With GPS, you can even see where everyone in your group is at on a map

#meshtatic #im #p2p #lora
Anxray

Another Proxychain Tool With Xray Core [Gpl v3]

Proxy Protocol
SOCKS (4/4a/5)
HTTP(S)
SSH
Shadowsocks
ShadowsocksR
VMess
VLESS with XTLS support
Trojan with XTLS support
Snell
Trojan-Go ( trojan-go-plugin )
NaïveProxy ( naive-plugin )
relaybaton ( relaybaton-plugin )
Brook ( brook-plugin )
Hysteria ( hysteria-plugin )
WireGuard ( wireguard-plugin )
ROOT required
Ping Tunnel ( pingtunnel-plugin )

Features
Full basic features
Xray WebSocket browser dialer
Option to change the notification update interval
A Chinese apps scanner (based on dex classpath scanning, so it may be slower)
Proxy chain
Balancer
Advanced routing with outbound profile selection
Reverse proxy
Custom config (Xray / Trojan-Go)
Traffic statistics support, including real-time display and cumulative statistics

Foreground status based routing support

Source/issue tracker : https://github.com/XTLS/AnXray

Fdroid [izzyondroid] : https://f-droid.org/packages/io.nekohasekai.anXray/

Telegram update channel : https://t.me/anxray

#anxray
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index


Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version

Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559

What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585

Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755

Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070

No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915

Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916

Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338

Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502

Privacy/Security Resource list
https://t.me/RevToolboxRedux/12

Some tips on staying secure online
https://t.me/RevToolboxRedux/157

Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167

Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198

Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209

Antifascism is Self Defense
https://t.me/RevToolboxRedux/264

Digital security resources for activists
https://t.me/RevToolboxRedux/267

Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273

Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280

The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293

Never Talk to the Cops
https://t.me/RevToolboxRedux/294

Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295

Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309

How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310

Beating FBI Surveillance
https://t.me/RevToolboxRedux/319

How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334

DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327

Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337

Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369

Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370

Tails OS Leaflet
https://t.me/RevToolboxRedux/378

Car Brigade Techniques
https://t.me/RevToolboxRedux/407

Beware Swoopers
https://t.me/RevToolboxRedux/431

Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436

Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462

What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465

Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467

Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495

When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517

Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518

Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520

What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528

PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536

Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607

The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643

Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646

Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652

How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683

How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685

Digital Safety at Protests
https://t.me/RevToolboxRedux/687

Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742

Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750

Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784

2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
1