update most guides

This commit is contained in:
anarsec 2023-07-11 00:35:54 +00:00
parent be05046783
commit 3ce6491c8f
No known key found for this signature in database
21 changed files with 86 additions and 79 deletions

View file

@ -27,7 +27,7 @@ Checksums are digital fingerprints: small-sized blocks of data derived from anot
The 'command line' is an all-text alternative to using the graphical 'point and click' tool that most of us are more familiar with; the Command Line Interface (CLI) allows us to do some things that a Graphical User Interface (GUI) does not. Oftentimes, either a GUI or CLI would work and which you use is a matter of preference. For example, in [Tails](/glossary/#tails), you can verify the [checksum](/glossary/#checksums-fingerprints) of a file with a GUI (the GtkHash program) or a CLI command (`sha256sum`).
[Tech Learning Collective's "Foundations: Command Line Basics" course](https://techlearningcollective.com/foundations/#foundations-command-line-basics) is our recommended introduction to CLI/terminal use.
Tech Learning Collective's "Foundations: Linux Journey" course on [command line](https://techlearningcollective.com/foundations/linux-journey/the-shell) is our recommended introduction to CLI/terminal use.
### CVE
@ -93,7 +93,7 @@ Linux is an [open-source](/glossary/#open-source) 'kernel' upon which operating
### LUKS
The [Linux Unified Key Setup (LUKS)](https://gitlab.com/cryptsetup/cryptsetup) is a platform-independent specification for hard disk encryption. It is the standard used in [Tails](/glossary/#tails), [Qubes OS](/glossary/#qubes-os), Ubuntu, etc.
The [Linux Unified Key Setup (LUKS)](https://gitlab.com/cryptsetup/cryptsetup) is a platform-independent specification for hard disk encryption. It is the standard used in [Tails](/glossary/#tails), [Qubes OS](/glossary/#qubes-os), Ubuntu, etc. LUKS encryption is only effective when the device is powered down. LUKS should be using [Argon2id](/posts/tails-best/#passwords) to make it less vulnerable to brute-force attacks.
### Malware
@ -137,7 +137,7 @@ Phishing is a [social engineering](/glossary/#social-engineering) technique. Att
By a physical attack, we mean a situation in which an adversary first gains physical access to your device through loss, theft, or confiscation. For example, your phone may be confiscated while crossing a border or during an arrest. This is in contrast to a [remote attack](/glossary/#remote-attacks).
For a more detailed look, check out [Defend Dissent: Protecting Your Devices](https://open.oregonstate.education/defenddissent/chapter/protecting-your-devices/)
For a more detailed look, check out [Making Your Electronics Tamper-Evident](/posts/tamper) and [Defend Dissent: Protecting Your Devices](https://open.oregonstate.education/defenddissent/chapter/protecting-your-devices/)
### Plausible deniability