mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-30 18:08:43 -04:00
update most guides
This commit is contained in:
parent
be05046783
commit
3ce6491c8f
21 changed files with 86 additions and 79 deletions
|
@ -27,7 +27,7 @@ Checksums are digital fingerprints: small-sized blocks of data derived from anot
|
|||
|
||||
The 'command line' is an all-text alternative to using the graphical 'point and click' tool that most of us are more familiar with; the Command Line Interface (CLI) allows us to do some things that a Graphical User Interface (GUI) does not. Oftentimes, either a GUI or CLI would work and which you use is a matter of preference. For example, in [Tails](/glossary/#tails), you can verify the [checksum](/glossary/#checksums-fingerprints) of a file with a GUI (the GtkHash program) or a CLI command (`sha256sum`).
|
||||
|
||||
[Tech Learning Collective's "Foundations: Command Line Basics" course](https://techlearningcollective.com/foundations/#foundations-command-line-basics) is our recommended introduction to CLI/terminal use.
|
||||
Tech Learning Collective's "Foundations: Linux Journey" course on [command line](https://techlearningcollective.com/foundations/linux-journey/the-shell) is our recommended introduction to CLI/terminal use.
|
||||
|
||||
### CVE
|
||||
|
||||
|
@ -93,7 +93,7 @@ Linux is an [open-source](/glossary/#open-source) 'kernel' upon which operating
|
|||
|
||||
### LUKS
|
||||
|
||||
The [Linux Unified Key Setup (LUKS)](https://gitlab.com/cryptsetup/cryptsetup) is a platform-independent specification for hard disk encryption. It is the standard used in [Tails](/glossary/#tails), [Qubes OS](/glossary/#qubes-os), Ubuntu, etc.
|
||||
The [Linux Unified Key Setup (LUKS)](https://gitlab.com/cryptsetup/cryptsetup) is a platform-independent specification for hard disk encryption. It is the standard used in [Tails](/glossary/#tails), [Qubes OS](/glossary/#qubes-os), Ubuntu, etc. LUKS encryption is only effective when the device is powered down. LUKS should be using [Argon2id](/posts/tails-best/#passwords) to make it less vulnerable to brute-force attacks.
|
||||
|
||||
### Malware
|
||||
|
||||
|
@ -137,7 +137,7 @@ Phishing is a [social engineering](/glossary/#social-engineering) technique. Att
|
|||
|
||||
By a physical attack, we mean a situation in which an adversary first gains physical access to your device through loss, theft, or confiscation. For example, your phone may be confiscated while crossing a border or during an arrest. This is in contrast to a [remote attack](/glossary/#remote-attacks).
|
||||
|
||||
For a more detailed look, check out [Defend Dissent: Protecting Your Devices](https://open.oregonstate.education/defenddissent/chapter/protecting-your-devices/)
|
||||
For a more detailed look, check out [Making Your Electronics Tamper-Evident](/posts/tamper) and [Defend Dissent: Protecting Your Devices](https://open.oregonstate.education/defenddissent/chapter/protecting-your-devices/)
|
||||
|
||||
### Plausible deniability
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue