mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-23 23:01:04 -04:00
whonix updates
This commit is contained in:
parent
849dc2dfb5
commit
6f33bc5e8d
5 changed files with 19 additions and 13 deletions
|
@ -103,7 +103,7 @@ Malware (malicious software) is a generic term for software containing unwanted
|
|||
|
||||
An example of a man-in-the-middle attack is when Alice communicates with Bob via the Internet, Eve (Eavesdropper) joins the conversation “in the middle” and becomes man-in-the-middle. Eve can modify, insert, replay, or read messages at will. Protective measures are encryption (confidentiality) and checking the authenticity and integrity of all messages. However, one must also ensure that one is communicating with the expected party. You have to verify that you possess the real public key of the respective recipient. For instance, this is what you are doing when verifying the 'Safety Number' of a contact in the Signal encrypted messaging app.
|
||||
|
||||
For a more detailed look, check out [Defend Dissent: The Man in the Middle](https://open.oregonstate.education/defenddissent/chapter/the-man-in-the-middle/)
|
||||
For a more detailed look, check out [Defend Dissent: The Man in the Middle](https://open.oregonstate.education/defenddissent/chapter/the-man-in-the-middle/) and the [Whonix documentation](https://www.whonix.org/wiki/Warning#Man-in-the-middle_Attacks).
|
||||
|
||||
### Metadata
|
||||
|
||||
|
@ -209,7 +209,7 @@ For more info, see [the CSRC Threat Library](https://www.csrc.link/threat-librar
|
|||
|
||||
Each website visited through the Tor network passes through 3 relays. Relays are servers operated by different people and organizations around the world. A single relay never knows both where the encrypted connection is coming from and where it is going to. An extract of a leaked Top Secret appraisal by the NSA characterized Tor as "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting". The Tor network can be accessed through the Tor Browser on any operating system. The operating system [Tails](/glossary/#tails) forces every program to use the Tor network when accessing the Internet.
|
||||
|
||||
For more info, see [our description of Tor](/posts/tails/#tor) and [Privacy Guides](https://www.privacyguides.org/en/advanced/tor-overview/).
|
||||
For more info, see [our](/posts/tails/#tor) and [Privacy Guides](https://www.privacyguides.org/en/advanced/tor-overview/) description of Tor. To understand the limitations of Tor, see the [Whonix documentation](https://www.whonix.org/wiki/Warning).
|
||||
|
||||
### Two-Factor Authentication (2FA)
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue