mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-24 23:25:44 -04:00
fix notrace.how footnotes
This commit is contained in:
parent
cba3b08223
commit
3c2946baac
8 changed files with 27 additions and 27 deletions
|
@ -52,7 +52,7 @@ Tails is not magic and has many limitations. The Internet and computers are host
|
|||
|
||||
Building a threat model is simply a matter of asking yourself certain questions. Who am I defending against? What are their capabilities? What would be the consequences if they had access to that data? And then, based on the particular situation, assess how you can protect yourself.
|
||||
|
||||
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.notrace.how/threat-library/).
|
||||
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://notrace.how/threat-library/).
|
||||
|
||||
# I) The Basics of Using Tails
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue