We are expanding our Lunch-and-Learns to both YouTube and Twitch in an attempt to reach more people. Lunch-and-learns will also move to Thursdays to try to better reach our existing contributors.
We will have an extended outage 2023-10-24 0700 US Central until late in the evening, as our primary site is undergoing construction. Please watch #tech on Discord fo r tracking service recovery. During this time, please fall back on business continuity procedures to keep access to services provided by the AniNIX.
We're starting an open-source intelligence or OSINT feed to announce some of our incoming threat data to the world. We hope this can be the start of meaningfully giving back to the cybersec community.
For some folks who are just starting out, the initial cost of a complete HomeLab stack and the administration required is a bit much. This article is a growth plan for how to get started, what technologies and tools to buy/deploy first, etc.
I've had a request to do some lunch-and-learns about the AniNIX, how we self-host, and how we manage some of our tools. We'll burn roughly the first 30-45 minutes talking through some concepts of how the AniNIX does what it does -- the rest of the time will be an open floor to ask anything you'd like. If you're interested, swing by! Google Calendar link is on the article page.
The AniNIX is a self-hosted system, as much as we can make it. However, because we don't operate in isolation, it's worth documenting how we use the cloud for what declassified information we replicate onto cloud stores and why we need some cloud services.
The SKS keyservers have been shut down -- some recent attacks on the network have made their hosting untenable for the providers. We will be distributing our GPG public key via the AniNIX/ShadowArch package and on our repo. Please add it to your own keyrings.
We want everyone to know that, despite recent law enforcement and Senate cries that they can't do their job without backdoors into encrypted communications, the AniNIX is committed to protecting your communications with our network. We do offer proxies of some semipublic information to outside sources -- Discord and GitHub -- but our internal services over SSH, IRCS, and HTTPS are hardened and audited. We are now additionally offering a warrant canary. This is a GPG-based device for users to know that our communications have not been compromised. If you are cybersecurity-minded, please watch the linked repo.