A Declaration of the Independence of Cyberspace

The Crypto-Anarchist Manifesto

Cyber Defense Tools Resources - Border Cyber Group

TOOLS FOR ANONYMITY

Online Password Checking and Cracking

Qubes Multi-Platform Virtualization - Even Ed Snowden Gave This One a Plug...lol

Oracle Virtualbox - Free Virtual Machine Platform

WHONIX Virtual Anonymity Platform

Tor Browser


THREAT VECTOR RESPONSE STRATEGIES

5 Ways to Take Action on Threat Intelligence

Cloud Security Overview from Team at tripwire.com

DUO Zero Trust Platform Support from CISCO

All Cybersecurity and Infrastructure Security Agency (NSA/HS Spinoff) Advisory Publications

State-sponsored actors from Russia and China are leveraging several of the same publicly known vulnerabilities in their attacks, all of which have patches available.

All the Ways Your Wi-Fi Router Can Spy on You

Bad Actors Exposed: Extremely Detailed Realtime Real-World Threat Vector Procedural Enumeration

Understanding NIST SP 800-207 - Zero Trust Security Architecture for Industrial Control Settings

Free Port Security Scanner (and MUCH MUCH More!)

Surveillance Self-Defense from Electronic Frontier Foundation

Official Debian Hardening (Securing) Manual

10 Immutable Laws of Security... heh...

What Microsoft IS good for... lol

SD Card Tamperproofing Issues

Cryptography-Understanding Zero Knowledge Proof Systems

Torsocks vs. Proxychains

Queryable Malware Analysis Database - VirusTotal

(Breaking: In Depth) Help/News for All You Microsoft Platform Victims Out There... lol

Protecting Personally Identifiable Information

Distinguishing Real Access Points from Evil Twins

Breaking the Kill Chain... pdf White Paper

End to End Email Encryption with Signal - android/pc

Vectra AI Driven Threat Response

Debian Hardening Walkthrough

Secure SSH Service Using Port Knocking

Harden the SSH access security on Debian