fix notrace.how footnotes

This commit is contained in:
anarsec 2024-04-15 21:38:33 +00:00
parent cba3b08223
commit 3c2946baac
No known key found for this signature in database
8 changed files with 27 additions and 27 deletions

View file

@ -52,7 +52,7 @@ Tails is not magic and has many limitations. The Internet and computers are host
Building a threat model is simply a matter of asking yourself certain questions. Who am I defending against? What are their capabilities? What would be the consequences if they had access to that data? And then, based on the particular situation, assess how you can protect yourself.
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.notrace.how/threat-library/).
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://notrace.how/threat-library/).
# I) The Basics of Using Tails