"Cyclops, you asked my noble name, and I will tell it; but do you
give the stranger's gift, just as you promised. My name is Nobody.
Nobody I am called by mother, father, and by all my comrades." -
Homer, Odyssey
In the age of information, it is easy to know exactly who someone is
just by looking online for the average person. Imagine how easy it is
for organizations to know about individuals who have the funding,
technology, and reason to find out who opposes them to get even more
information than what the average person has access to. Your name,
address, political leanings, current location, and more are actively
available for those organizations.
This site is dedicated to giving the average person a fighting chance to
be Nobody and stay out of the eye of Polyphemus. There are endless
things you can do to secure your personal data and communications, but
know this is a war that is constantly evolving and changing. A security
measure you enact today could be broken through tomorrow at no fault of
your own. Once you start to know and learn more, the more you can
implement for your own safety, but the more you will become disgusted
and afraid of what is considered normal.
Steps to take on this site are listed in order of complexity you can
take, always start with the first thing then move down and build off of
what you have learned rolling out each measure. With every step in mind,
know that to truly be Nobody, you still need to appear as Somebody, just
like everyone else. Extreme measures on either side are only detrimental
for you as an individual.
Shh, and keep yourself safe.
Do as much as you can, but don't do more than you understand. If you
do more, you might compromise your security or others.
Assume that anything you do on your phone/devices can be seen by
someone else by default.
If you used a public link to join a chat/community/anything, assume
there are individuals there who are there maliciously or will spread
whatever you talk about to people who you don't want to see. These are
convenient, but not secure.
Digital security takes effort, be prepared to spend time getting
things setup and migrated.
Digital security can seem like it costs money. This is due to free
services selling your data so the service can be "free".
Your phone is your best friend and worst enemy. It can help you
connect and do more than ever before, but is also a sensor that is
actively leaking information about you and your location at all times.
Trust your neighbors and friends, distrust how you communicate with
them.
Photos, videos, and files you share online contain metadata. This data
can pinpoint your phone model, location, and many other things.
Have redundancies built in for communications if they are critical.
Having multiple apps on your phone does not count as a redundancy.
Using secure messaging, email, a mesh network, and radios would be
examples.'
Assume that everywhere you go, you are being watched, recorded, and
profiled via human or AI means. Be purposeful with how you move and
take steps to secure yourself.
Turn off biometric entry into your phone and enable a PIN to access.
Uninstall social media apps from your phone, as they are able to
capture phone data and send it back to the service. Utilize social
media via a web browser if necessary.
Avoid using AI that is hosted by a large company. They have access to
everything that you do with the AI and help to build up a profile
about you.
Utilize an encrypted and trusted password manager. This will ensure
unwanted access to your accounts is much more difficult. Options
include Bitwarden, 1Password, and if you want to self-host, KeePassXC.
When sharing files online, make sure you remove the metadata using
online tools or disabling the metadata collection from within your
camera app.
Move yourself and your friends over to a secure messaging platform. A
current recommendation is Signal. Do not use WhatsApp or Discord to
discuss organizing plans that are critical and not being shared
publically.
Move to an encrypted email. Options include Proton Mail, Tutta,
CounterMail, and Mailfence. Do your own research on their security
practices before committing. Generally, European companies are able to
offer more secure platforms than American companies.
Utilize a secure, no log, and trusted VPN. A VPN is not a tool that
will make everything you do encrypted. All it does is hide what you
are trying to access on the internet from your ISP and local network.
Nobody has used Mullvad and Proton VPN and recommends either of them.
Do your own research on their security practices before committing.
When in hostile territories, turn on airplane mode whenever possible
or turn your phone off completely.
Commit to a balancing act of doing some things regularly without all
of your security measures, to ensure that you have the same amount of
data leaking from you as Somebody. This might mean accessing social
media on a second device, browsing certain websites without a VPN on,
or sending texts/calling phones with normal and regular conversations.
They use a variety of tricks and tools, as well as brute force and
intimidation. DO NOT BE INTIMIDATED, BUT BE AWARE.
Stingray Trackers - A way for them to connect your phone and see all
unencrypted data before it goes to the phone tower. They without a doubt
can see location, phone model, and IMSI number (a number that is unique
to your phone and cell provider).
Flock Cameras - A network of cameras that are analyzing and monitoring
cars and individuals that are posted up in neighborhoods across the
country. On top of being available to them, these devices are easily
accessible. For more information, watch this video from Benn Jordan:
youtu.be/uB0gr7Fh6lY
AI Recognition - By taking photos and videos of individuals, they are
able to identify you based on multiple sources (like Flock Cameras).
This includes identifying you by your face, voice, and even the way you
walk. If you deem it necessary, find ways to counteract these measures.
Signal -
https://signal.org
: A secure messaging app that utilizes end to end encryption. A
recommended default for communicating with others, built by some of the
original WhatsApp team before they were bought by Facebook.
Meshtastic -
https://meshtastic.org/ : An off grid, decentralized mesh messaging network that does not
require a connection. If cell phones go down, it is one way to
communicate. There might already be a community of users in your area,
make sure to look into it before getting setup.
Tails OS -
https://tails.net/ : A portable operating system that allows you to use your existing
computer hardware and have an encrypted secure space to do things that
won't be seen by the main computer installation. It is able to be
portable and run on any computer via a USB. Read their guides before
going all in.
The Onion Router -
https://www.torproject.org/ : A means to bounce your internet traffic from multiple nodes before
hitting an endpoint, obfuscating your internet traffic. Can be used in a
way similar to a VPN. Do not set this up unless you can understand how
it would help you.
RSA Encryption Keys -
https://www.historytools.org/concepts/rsa-encryption: A means to obfuscate message content from anyone, but the intended
recipient is able to read it. This includes if an encrypted message is
sent over an unencrypted channel. See below for Nobody's private RSA
key, if you want to send a secure message that is self encrypted.
Have more information that Nobody should know? Send a message to
whois@nobody.sh
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjDXkOcmQpLxiGyJSkryF
/UECX640xQqlrW+rhPqGFD7ZrJilthklhR/cGZY8JtvmvYkxkbA8sJkikNmMEWV/
tVHQ18cuSsVEfdlmkLP6HnwOSPlrfW6Hx1JEU/idRB+RlysmpLCgv5PtYOCB6XLn
RLznuON63YEXOc8Vy1CVOvGAI2/RMCsgcUQfvnr4PkNlV82t9b0EHt0blRKNNrXK
32qZqZls9wNbgd3g52zcRsh9NZQsbvUFEW+IzU/DKv+wuwqGadS9S8rniRpYqk2X
vZM1dkeH97PGpqNNoVvhwxjO6CmwMEHVlYplWDPxbdaL0anVCIXhwbxuxch8P6N5
YwIDAQAB -----END PUBLIC KEY-----