csrc links to notrace.how, miscellaneous edits

This commit is contained in:
anarsec 2023-11-12 17:57:58 +00:00
parent 9d659896fa
commit d83276dadb
No known key found for this signature in database
17 changed files with 42 additions and 153 deletions

View file

@ -58,7 +58,7 @@ Tails is not magic and has many limitations. The Internet and computers are host
Building a threat model is simply a matter of asking yourself certain questions. Who am I defending against? What are their capabilities? What would be the consequences if they had access to that data? And then, based on the particular situation, assess how you can protect yourself.
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.csrc.link/threat-library/).
It makes no sense to say "this tool is secure". Security always depends on the threat model and the level (network, hardware, software, etc.). For more information on this topic, see the [Threat Library](https://www.notrace.how/threat-library/).
# I) The Basics of Using Tails