mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-29 09:28:51 -04:00
improve install instructions
This commit is contained in:
parent
9a06111d64
commit
4abe74a188
12 changed files with 24 additions and 36 deletions
Binary file not shown.
Before Width: | Height: | Size: 466 KiB |
|
@ -4,10 +4,10 @@ date=2023-04-08
|
|||
|
||||
[taxonomies]
|
||||
categories = ["Defensive"]
|
||||
tags = ["linux", "tails", "easy"]
|
||||
tags = ["linux", "tails", "beginner"]
|
||||
|
||||
[extra]
|
||||
blogimage="/images/tails1.png"
|
||||
blogimage="/images/digital-best-practices.jpg"
|
||||
toc=true
|
||||
dateedit=2023-05-10
|
||||
a4="tails-best-a4.pdf"
|
||||
|
@ -183,6 +183,8 @@ Finally, a note about email - if you already use Tails and encrypted email, you
|
|||
|
||||
Another reason to avoid using Persistent Storage features is that many of them persist user data to the Tails USB. If your Tails session is compromised, the data you access during that session can be used to tie your activities together. If there is user data on the Tails USB, such as an email inbox, compartmentalization of Tails sessions is no longer possible. To achieve compartmentalization with Persistent Storage enabled, you would need a dedicated Tails USB for each identity, and updating them all every month would be a lot of work.
|
||||
|
||||
If its not possible to find a USB with a write-protect switch, you can alternatively use a USB 3.0 to SD card adapter, because SD cards have a write-protect switch.
|
||||
|
||||
# Encryption
|
||||
|
||||
## Passwords
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue