mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-09 07:12:54 -04:00
csrc links to notrace.how, miscellaneous edits
This commit is contained in:
parent
9d659896fa
commit
d83276dadb
17 changed files with 42 additions and 153 deletions
|
@ -58,7 +58,7 @@ Tails is not magic and has many limitations. The Internet and computers are host
|
|||
|
||||
Building a threat model is simply a matter of asking yourself certain questions. Who am I defending against? What are their capabilities? What would be the consequences if they had access to that data? And then, based on the particular situation, assess how you can protect yourself.
|
||||
|
||||
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.csrc.link/threat-library/).
|
||||
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.notrace.how/threat-library/).
|
||||
|
||||
# I) The Basics of Using Tails
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue