mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-08 14:52:54 -04:00
fix typst images
This commit is contained in:
parent
5d9796b043
commit
d10f774921
4 changed files with 9 additions and 2 deletions
|
@ -1,4 +1,4 @@
|
|||
base_url = "https://www.anarsec.guide"
|
||||
base_url = "anarsec.guide"
|
||||
title = "AnarSec"
|
||||
default_language = "en"
|
||||
theme = "DeepThought"
|
||||
|
|
|
@ -159,7 +159,7 @@ Laptop screws can be verified monthly, or when something suspicious happens. Nei
|
|||
* [Safe bouncing](https://en.wikipedia.org/wiki/Safe-cracking#Safe_bouncing) is when the locking mechanism can be moved sufficiently by [banging or bouncing the safe](https://mosandboo.com/how-to-open-a-safe-without-the-key-or-code/) to open it in an undetectable manner. Safes that use a gear mechanism are less susceptible to mechanical attacks.
|
||||
* Many safe models have a "management reset code" (also known as a "try-out combination") — if this code is not changed from its default setting the safe can be unlocked in an undetectable manner.
|
||||
* [Spiking](https://en.wikipedia.org/wiki/Safe-cracking#Spiking_the_lock) is when the wires leading to the reset button, solenoid, or motor can be exposed and spiked with a battery. This should be possible to make tamper-evident, as it requires access to the wires.
|
||||
* [Brute force](/glossary#brute-force-attack) attacks — trying all possible combinations — are possible if the adversary has time. Dialing mechanisms can be brute-forced with a [computerized autodialer](https://learn.sparkfun.com/tutorials/building-a-safe-cracking-robot) that [doesn't need supervision](https://www.youtube.com/watch?v=vkk-2QEUvuk). Electronic keypads are less susceptible to brute force if they have a well-designed incremental lockout feature; for example, get it wrong 10 timesand you're locked out for a few minutes, 5 more wrong codes and you're locked out for an hour, etc.
|
||||
* [Brute force](/glossary#brute-force-attack) attacks — trying all possible combinations — are possible if the adversary has time. Dialing mechanisms can be brute-forced with a [computerized autodialer](https://learn.sparkfun.com/tutorials/building-a-safe-cracking-robot) that [doesn't need supervision](https://www.youtube.com/watch?v=vkk-2QEUvuk). Electronic keypads are less susceptible to brute force if they have a well-designed incremental lockout feature; for example, get it wrong 10 times and you're locked out for a few minutes, 5 more wrong codes and you're locked out for an hour, etc.
|
||||
* There are several tools that can automatically retrieve or reset the combination of an electronic lock, such as the Little Black Box and Phoenix. Tools like these are often connected to wires inside the lock that can be accessed without damaging the lock or container. This should be possible to make tamper-evident, as it requires access to the wires.
|
||||
* There are several [keypad-based attacks](https://en.wikipedia.org/wiki/Safe-cracking#Keypad-based_attacks), and some can be mitigated with proper operational security.
|
||||
|
||||
|
|
|
@ -127,6 +127,10 @@ class Converter:
|
|||
recommendations = re.search(r'\+{3}.*?\+{3}(.*)', recommendations_file.open().read(), re.MULTILINE | re.DOTALL).group(1)
|
||||
markdown_content += f"\n\n# Recommendations\n\n{recommendations}\n\n"
|
||||
|
||||
# Make all images paths relative in the Markdown content
|
||||
for extension in ["jpg", "png", "webp", "jpeg"]:
|
||||
markdown_content = re.sub(f'\\(\\/posts/{input_path.parent.name}/(.*?\.{extension})\\)', lambda match: f'({match.group(1)})', markdown_content)
|
||||
|
||||
# Replace all .webp images to .png images in the Markdown content
|
||||
markdown_content = re.sub(r'\((.*?\.webp)\)', lambda match: f'({match.group(1)}.png)', markdown_content)
|
||||
|
||||
|
|
|
@ -605,6 +605,9 @@ body[theme="dark"] .navbar-item
|
|||
body[theme="dark"] .navbar-item:hover
|
||||
color: black !important
|
||||
|
||||
body[theme="dark"] .navbar-item:focus
|
||||
color: black !important
|
||||
|
||||
body[theme="dark"] p
|
||||
color: #c9c7c9 !important
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue