mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-24 15:15:29 -04:00
landing bold
This commit is contained in:
parent
47e4a31bcb
commit
7931d8b555
5 changed files with 19 additions and 12 deletions
|
@ -54,7 +54,7 @@ You can mitigate this second issue by what's called **"compartmentalization"**:
|
|||
|
||||
## 1. Hiding that you are using Tor and Tails
|
||||
|
||||
You can mitigate this first issue by [**Tor bridges**](https://tails.net/doc/anonymous_internet/tor/index.en.html#bridges):
|
||||
You can mitigate this first issue by **[Tor bridges](https://tails.net/doc/anonymous_internet/tor/index.en.html#bridges)**:
|
||||
|
||||
* Tor Bridges are secret Tor relays that hide your connection to the Tor network. However, this is only necessary where connections to Tor are blocked, such as in heavily censored countries, by some public networks, or by some parental control software. This is because Tor and Tails don't protect you by making you look like any other Internet user, but by making all Tor and Tails users look the same. It becomes impossible to tell who is who among them.
|
||||
|
||||
|
@ -245,7 +245,7 @@ For untrusted attachments, you would ideally **sanitize all files sent to you be
|
|||
With untrusted links, there are two things you must protect: your anonymity and your information.
|
||||
|
||||
* **It is best to open untrusted links in a dedicated Tails session without unlocked Persistent Storage or attached "personal data" USBs.** You can put the link on a Riseup Pad to access it.
|
||||
* [**Use Tor Browser on the Safest security setting**](/posts/tails/#tor-browser-security-settings)! The vast majority of exploits against Tor Browser will not work with the Safest setting.
|
||||
* **[Use Tor Browser on the Safest security setting](/posts/tails/#tor-browser-security-settings)**! The vast majority of exploits against Tor Browser will not work with the Safest setting.
|
||||
* **Manually copy and paste the address into your browser, and retype the domain**. For example, after pasting the link `anarsec.guide/posts/tails`, retype `anarsec.guide` yourself. Do not click through a hyperlink (i.e. always copy and paste) because it can be used to mislead you about where you are going. Retyping the domain protects against "typo-squatting" (mailriseup.net instead of mail.riseup.net) as well as ["homograph attacks"](https://www.theguardian.com/technology/2017/apr/19/phishing-url-trick-hackers) (where Cyrillic letters are substituted for normal letters).
|
||||
* **Never follow a shortened link** (e.g. a site like bit.ly that takes long web addresses and makes a short one) because it cannot be verified before redirection. [Unshorten.me](https://unshorten.me/) can reveal shortened links.
|
||||
* **If you don't recognize the domain, research it**. Search for the domain with the domain name in quotation marks using a privacy-preserving search engine (such as DuckDuckGo) to see if it’s a legitimate website. This isn’t a surefire solution, but it’s a good precaution to take.
|
||||
|
@ -258,7 +258,7 @@ With untrusted links, there are two things you must protect: your anonymity and
|
|||
|
||||
An adversary can also compromise a "trusted" website — this allows them to install malware on the computers of anyone who visits the website, without needing to engage in phishing. This is called a ["watering hole attack" or a "drive-by compromise"](https://attack.mitre.org/techniques/T1189/) because it attacks many people simultaneously. For example, the [FBI hacked a website then used a Tor Browser exploit](https://www.vice.com/en/article/53d4n8/fbi-hacked-over-8000-computers-in-120-countries-based-on-one-warrant) to hack 8,000 users who visited it.
|
||||
|
||||
This is why its important to [**use Tor Browser on the Safest security setting**](/posts/tails/#tor-browser-security-settings) by default, even for "trusted" websites, to greatly reduce the risk of a successful malware attack on Tor Browser.
|
||||
This is why its important to **[use Tor Browser on the Safest security setting](/posts/tails/#tor-browser-security-settings)** by default, even for "trusted" websites, to greatly reduce the risk of a successful malware attack on Tor Browser.
|
||||
|
||||
# Encryption
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue