From 3a52ad30289376eb71501dc365d7e50ee348784d Mon Sep 17 00:00:00 2001 From: "Crypto Officer | officercia.eth" <85769282+OffcierCia@users.noreply.github.com> Date: Sat, 24 Dec 2022 20:43:10 +0300 Subject: [PATCH] Update README.md typo fix --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index f625178..b801245 100644 --- a/README.md +++ b/README.md @@ -86,7 +86,7 @@ Secondly, regarding big lists. Japan was the first country to invent the work th Last but not least, everything you do is based on the outcomes you need to achieve! You should be able to select reliable and vetted sources instead of using all the tools and links. Through given routes, you ought to be able to construct your own journey! Following that, I will tell you about the ways that I deem safe and recommend to my clients! -> Remember, you must manage your OpSec wall and literally take it through "be like water," tending not to overdo it! You construct your own wall, which you must guard, repair, and develop, exactly like a real wall. Visit: [this article](officercia.mirror.xyz/4x2-M4R2cSnID1wpsTO4CQNrMQ5JUFouR-rZ_N4xO-Q)! +> Remember, you must manage your OpSec wall and literally take it through "be like water," tending not to overdo it! You construct your own security wall, which you must guard, repair, and develop, exactly like a real wall. Visit: [this article](officercia.mirror.xyz/4x2-M4R2cSnID1wpsTO4CQNrMQ5JUFouR-rZ_N4xO-Q)! The most important thing to understand here is the path of the cyber attack – its vector. Let's take a closer look at various problems associated with OpSec and its implementation to modern life!