mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-08 06:42:56 -04:00
dark mode fix
This commit is contained in:
parent
7daa9fe776
commit
ec6fb8110b
17 changed files with 122 additions and 48 deletions
10
config.toml
10
config.toml
|
@ -20,11 +20,11 @@ internal_level = "error"
|
|||
[extra]
|
||||
navbar_items = [
|
||||
{ code = "en", nav_items = [
|
||||
{ url = "$BASE_URL/posts", name = "Guides" },
|
||||
{ url = "$BASE_URL/series", name = "Series" },
|
||||
{ url = "$BASE_URL/recommendations", name = "Recommendations" },
|
||||
{ url = "$BASE_URL/glossary", name = "Glossary" },
|
||||
{ url = "$BASE_URL/contact", name = "Contact" },
|
||||
{ url = "$BASE_URL/posts/", name = "Guides" },
|
||||
{ url = "$BASE_URL/series/", name = "Series" },
|
||||
{ url = "$BASE_URL/recommendations/", name = "Recommendations" },
|
||||
{ url = "$BASE_URL/glossary/", name = "Glossary" },
|
||||
{ url = "$BASE_URL/contact/", name = "Contact" },
|
||||
] }
|
||||
]
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ paginate_by = 10
|
|||
title = "Tech Guides for Anarchists"
|
||||
+++
|
||||
<br>
|
||||
<center>
|
||||
<br>
|
||||
|
||||
You want a quick overview of our [advice for all anarchists?](/recommendations)
|
||||
|
||||
|
@ -14,7 +14,7 @@ You need [increased security against malware?](/posts/qubes)
|
|||
|
||||
You want to [protect your digital devices from covert house visits by law enforcement?](/posts/tamper)
|
||||
|
||||
<center><p><a href="/series"><strong>See all guides</strong></a></p>
|
||||
<p><a href="/series"><strong>See all guides</strong></a></p>
|
||||
|
||||
<h3><b>Note: AnarSec is currently in a draft state, but will launch in the near future.</b></h3>
|
||||
|
||||
|
|
|
@ -5,14 +5,14 @@ paginate_by = 5
|
|||
+++
|
||||
<br>
|
||||
|
||||
<div class="has-text-centered">
|
||||
<div class="column is-8 is-offset-2">
|
||||
<p>
|
||||
|
||||
**Email**: anarsec (at) riseup (dot) net
|
||||
|
||||
[PGP key](/anarsec.asc)
|
||||
|
||||
>Our PGP public key can be verified from a second location [at 0xacab](https://0xacab.org/anarsec/anarsec.guide/-/blob/no-masters/static/anarsec.asc) - commit history should display "Initial commit".
|
||||
>Our PGP public key can be verified from a second location [at 0xacab](https://0xacab.org/anarsec/anarsec.guide/-/blob/no-masters/static/anarsec.asc) - commit SHA should be 4ab7e7262f51a661b02e1cf6712b75101f4b25e1.
|
||||
>
|
||||
>WayBack Machine of PGP key: [anarsec.guide](https://web.archive.org/web/20230619164601/https://www.anarsec.guide/anarsec.asc) / [0xacab.org](https://web.archive.org/web/20230619164309/https://0xacab.org/anarsec/anarsec.guide/-/blob/no-masters/static/anarsec.asc)
|
||||
|
||||
|
@ -23,6 +23,7 @@ Anarsec encourages contributions! If you would like to suggest edits to a guide,
|
|||
|
||||
We are also open to submitted guides - please get in touch with proposals.
|
||||
|
||||
>All 0xacab commits are signed with SSH key fingerprint:
|
||||
>0xacab commits are signed with SSH key fingerprint:
|
||||
xXfPe+zku+SaJorO4XldMFcAVPMmQQgLHl4VpmYhiok
|
||||
|
||||
</div>
|
||||
|
|
|
@ -4,6 +4,7 @@ sort_by = "date"
|
|||
paginate_by = 5
|
||||
+++
|
||||
<br>
|
||||
<div class="column is-8 is-offset-2">
|
||||
|
||||
> This glossary defines terms commonly used in AnarSec articles.
|
||||
|
||||
|
@ -21,7 +22,7 @@ An attacker who “simply” tries every possible key to access a service or dec
|
|||
|
||||
### Checksums / Fingerprints
|
||||
|
||||
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download the [Noisy script](https://0xacab.org/anarsec/noisy), the SHA512 checksum will be: `ed3e1c4012d38300ed2160bddb6ef33d22ffb67036e8f86eb7a45b683b2cd2501e63b2b6a528635cbc098175690ef9cb49598fb6cfe9361c4390bf5cb731272c`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). GtkHash is a program that allows you to calculate checksums without using a command line interface.
|
||||
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download an operating system .iso file, a checksum is listed that looks like: `sha512: 9f923361887ac4b1455bc5ae51c06f2457c6d(continued...)`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). GtkHash is a program that allows you to calculate checksums without using a command line interface.
|
||||
|
||||
### Command Line Interface (CLI)
|
||||
|
||||
|
@ -248,3 +249,5 @@ Vulnerabilities are [exploitable](/glossary/#exploit) security flaws in software
|
|||
### Zero-day exploit
|
||||
|
||||
A zero-day [exploit](/glossary/#exploit) is unknown to the public, the vendor, or other parties that would normally mitigate it. As a result, it is extremely powerful and highly valued. Governments can either develop their own zero-day exploits or purchase them from a [zero-day broker](https://www.wired.com/story/untold-history-americas-zero-day-market/).
|
||||
|
||||
</div>
|
||||
|
|
|
@ -55,7 +55,7 @@ Cwtch is our preference for text communication by a long shot. For an overview o
|
|||
<source src="cwtch-explainer.mp4" type="video/mp4">
|
||||
</video>
|
||||
|
||||
<center><em>How Cwtch works</em></center>
|
||||
<p style="text-align:center"><em>How Cwtch works</em></p>
|
||||
|
||||
<br>
|
||||
|
||||
|
@ -87,7 +87,7 @@ Real-time messaging applications are particularly susceptible to end-to-end corr
|
|||
|
||||
**Need #3: Resiliency to exploits**
|
||||
|
||||
A vulnerability in any application can be targeted with exploits - a severe vulnerability can allow an adversary to hack your system, such as by permitting [Remote Code Execution](https://en.wikipedia.org/wiki/Arbitrary_code_execution). Cwtch does [fuzz testing](https://openprivacy.ca/discreet-log/07-fuzzbot/) to find bugs. For public-facing project accounts, we recommend against enabling the "file sharing experiment" or the "image previews and profile pictures experiment" in the settings.
|
||||
A vulnerability in any application can be targeted with exploits - a severe vulnerability can allow an adversary to hack your system, such as by permitting [Remote Code Execution](https://en.wikipedia.org/wiki/Arbitrary_code_execution). Cwtch libraries are written in memory-safe languages (Go and Rust) and Cwtch does [fuzz testing](https://openprivacy.ca/discreet-log/07-fuzzbot/) to find bugs. See the [Security Handbook](https://docs.cwtch.im/security/intro) to learn more. For public-facing project accounts, we recommend against enabling the "file sharing experiment" or the "image previews and profile pictures experiment" in the settings.
|
||||
|
||||
**Need #4: For multiple project members to be able to access the same messages**
|
||||
|
||||
|
@ -263,7 +263,7 @@ Signal is not peer-to-peer; it uses centralized servers that we must trust. Sign
|
|||
|
||||
Signing up for a Signal account is difficult to do anonymously. The account is tied to a phone number that the user must retain control of - due to [changes in "registration lock"](https://blog.privacyguides.org/2022/11/10/signal-number-registration-update/), it is no longer sufficient to register with a disposable phone number. An anonymous phone number can be obtained [on a burner phone or online](https://anonymousplanet.org/guide.html#getting-an-anonymous-phone-number) and must be maintained as long as you’re using it, which takes some technical know-how and likely some money, limiting the amount of people who will do this.
|
||||
|
||||
Another barrier to anonymous registration is that Signal Desktop will only work if Signal is first registered from a smartphone. For users familiar with the [command line](/glossary/#command-line-interface-cli), it is possible to register an account from a computer using [Signal-cli](http://wmj5kiic7b6kjplpbvwadnht2nh2qnkbnqtcv3dyvpqtz7ssbssftxid.onion/about.privacy/messengers-on-tails-os/-/wikis/HowTo#signal). The [VoIP](/glossary#voip-voice-over-internet-protocol) account used for registration would have to be obtained anonymously.
|
||||
Another barrier to anonymous registration is that Signal Desktop will only work if Signal is first registered from a smartphone. For users familiar with the [command line](/glossary/#command-line-interface-cli), it is possible to register an account from a computer using [Signal-cli](https://0xacab.org/about.privacy/messengers-on-tails-os/-/wikis/HowTo#signal). The [VoIP](/glossary#voip-voice-over-internet-protocol) account used for registration would have to be obtained anonymously.
|
||||
|
||||
These barriers to anonymous registration mean that Signal is rarely used anonymously. This has significant implications if the State gains [physical](/glossary/#physical-attacks) or [remote](/glossary/#remote-attacks) access to the device. One of the primary goals of State surveillance of anarchists is [network mapping](https://www.notrace.how/threat-library/techniques/network-mapping.html), and it's common for them to gain physical access to devices through [house raids](https://www.notrace.how/threat-library/techniques/house-raid.html) or arrests. For example, if police bypass your device's [authentication](https://www.notrace.how/threat-library/techniques/targeted-digital-surveillance/authentication-bypass.html), they can identify Signal contacts (as well as the members of any groups you are in) simply by their phone numbers, if those contacts haven't changed their settings to hide their phone number.
|
||||
|
||||
|
@ -305,7 +305,7 @@ We recommend the [Signal Configuration and Hardening Guide](https://blog.privacy
|
|||
</summary>
|
||||
<br>
|
||||
|
||||
About.Privacy [maintains a guide](http://wmj5kiic7b6kjplpbvwadnht2nh2qnkbnqtcv3dyvpqtz7ssbssftxid.onion/about.privacy/messengers-on-tails-os/-/wikis/HowTo) for installing Signal Desktop on Tails. There is a guide for registering an account from Tails without a smartphone (using Signal-cli), and another guide for if you already have a Signal account.
|
||||
About.Privacy [maintains a guide](https://0xacab.org/about.privacy/messengers-on-tails-os/-/wikis/HowTo) for installing Signal Desktop on Tails. There is a guide for registering an account from Tails without a smartphone (using Signal-cli), and another guide for if you already have a Signal account.
|
||||
|
||||
Some of the [Signal Configuration and Hardening Guide](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) also applies to Signal Desktop.
|
||||
|
||||
|
|
|
@ -177,7 +177,7 @@ You may want to use [Tor](/glossary/#tor-network) from a smartphone. However, if
|
|||
|
||||
Don’t use cloud backups. You can't trust the corporate options, and they're the easiest way for the police to access your data. If you must back up your phone, back it up to your encrypted computer.
|
||||
|
||||
GrapheneOS currently offers Seedvault as a backup solution, but it's not very reliable. As the [documentation notes](https://grapheneos.org/faq#file-transfer), connecting directly to a computer requires "needing to trust the computer with coarse-grained access", so it is best to avoid it. Instead, you can manually back up files by copying them to a USB-C flash drive using the Files app, or sending them to yourself using an encrypted messaging app like [Element (Matrix)](/posts/e2ee/#element-matrix).
|
||||
GrapheneOS currently offers Seedvault as a backup solution, but it's not very reliable. As the [documentation notes](https://grapheneos.org/faq#file-transfer), connecting directly to a computer requires "needing to trust the computer with coarse-grained access", so it is best to avoid it. Instead, you can manually back up files by copying them to a USB-C flash drive using the Files app, or sending them to yourself using an [encrypted messaging app](/posts/e2ee/).
|
||||
|
||||
# Password Management
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
+++
|
||||
title="Linux Essentials: The Basics Needed to Use Tails or Qubes"
|
||||
title="Linux Essentials"
|
||||
date=2023-04-04
|
||||
|
||||
[taxonomies]
|
||||
|
|
|
@ -131,7 +131,12 @@ Our adversaries have two attack vectors to compromise BIOS, firmware, hardware,
|
|||
|
||||
* First, **get a fresh computer**. A laptop from a random refurbished computer store is unlikely [to already be compromised](https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/). Buy your computer with cash so it cannot be traced back to you, and in person because mail can be intercepted—a used [T Series](https://www.thinkwiki.org/wiki/Category:T_Series) or [X Series](https://www.thinkwiki.org/wiki/Category:X_Series) Thinkpad from a refurbished computer store is a cheap and reliable option. It is best to use Tails with a dedicated laptop, which prevents the adversary from targeting the hardware through a less secure operating system or through your normal non-anonymous activities. Another reason to have a dedicated laptop is that if something in Tails breaks, any information that leaks and exposes the laptop won't automatically be tied to you and your daily computer activities.
|
||||
|
||||
<p>
|
||||
<span class="is-hidden">
|
||||

|
||||
</span>
|
||||
<img src="X230.jpg" class="no-dark">
|
||||
</p>
|
||||
|
||||
* **Make the laptop's screws tamper-evident, store it in a tamper-evident manner, and monitor for break-ins**. With these precautions in place, you'll be able to detect any future physical attacks. See the [Make Your Electronics Tamper-Evident](/posts/tamper/) tutorial to adapt your laptop's screws, use some form of intrusion detection, and store your laptop so you'll know if it's been physically accessed. Store any external devices you’ll be using with the laptop in the same way (USB, external hard drive, mouse, keyboard). When physical attack vectors are mitigated, an adversary can only use remote attacks.
|
||||
|
||||
|
|
|
@ -318,12 +318,11 @@ Clicking "Permanently delete" or sending files to the "trash" does not delete da
|
|||
|
||||
However, it can take weeks or years before that space is actually used for new files, at which point the old data actually disappears. In the meantime, if you look directly at what is written to the drive, you can find the contents of the files. This is a fairly simple process, automated by many software programs that allow you to "recover" or "restore" data. You can't really delete data, but you can overwrite data, which is a partial solution.
|
||||
|
||||
There are two types of storage: magnetic (HDD) and flash (SSD, NVMe, USB, memory cards, etc.). The only way to erase a file on a USB is to [reformat the entire USB](#how-to-create-an-encrypted-usb) and select **Overwrite existing data with zeros**. Doing this twice is a good idea.
|
||||
There are two types of storage: magnetic (HDD) and flash (SSD, NVMe, USB, memory cards, etc.). The only way to erase a file on either is to [reformat the entire drive](#how-to-create-an-encrypted-usb) and select **Overwrite existing data with zeros**.
|
||||
|
||||
However, traces of the previously written data may still remain. If you have sensitive documents that you really want to erase, it is best to physically destroy the USB after reformatting it. Fortunately, USBs are cheap and easy to steal. Be sure to reformat the drive before destroying it; destroying a drive is often a partial solution. Data can still be recovered from disk fragments, and burning a drive requires temperatures higher than a normal fire (i.e. thermite).
|
||||
However, traces of the previously written data may still remain. If you have sensitive documents that you really want to erase, it is best to physically destroy the USB after reformatting it. Fortunately, USBs are cheap and easy to steal. Be sure to reformat the drive before destroying it; destroying a drive is often a partial solution. Data can still be recovered from disk fragments, and burning a drive requires temperatures higher than a normal fire (i.e. thermite) to be effective.
|
||||
|
||||
* For flash memory drives (USBs, SSDs, SD cards, etc.), use two pairs of pliers to break the circuit board out of the case, then break the memory chips, including the circuit board, into pieces (be careful not to touch the sharp splinters). Hold the pieces in the flame of a camping torch. You will achieve only partial decomposition of the transistor material at this heat. Use adequate respiratory protection or stand back! The fumes are unhealthy.
|
||||
* If burning the pieces is too involved, discreetly dropping them into a storm drain while tying your shoe would make them unlikely to be recovered.
|
||||
For flash memory drives (USBs, SSDs, SD cards, etc.), use pliers to break the circuit board out of the plastic casing. Use a high-quality house-hold blender to shred the memory chips, including the circuit board, into pieces that are ideally less than two millimeters in size. This blender should be dedicated to this task, and not used for food afterwards.
|
||||
|
||||
## How to create an encrypted USB
|
||||
|
||||
|
@ -436,7 +435,5 @@ Sometimes the Synaptic Package Manager will refuse to install software. In this
|
|||
|
||||
[Tails Best Practices](/posts/tails-best) are important to establish before using Tails for highly sensitive activities. To avoid overwhelming yourself, start by learning how to use Tails in basic ways, such as reading anarchist websites or writing texts. See the [Tails tag](/tags/tails/) for tutorials on topics like [removing identifying metadata from files](/posts/metadata/).
|
||||
|
||||
---
|
||||
|
||||
*This article is heavily modified from* [TuTORiel Tails](https://infokiosques.net/spip.php?article1726) *(in French), and also includes some excerpts from* [Capulcu #1](https://capulcu.blackblogs.org/neue-texte/bandi/) *(in German).*
|
||||
|
||||
|
|
|
@ -27,7 +27,12 @@ Mullvad VPN [created a guide](https://mullvad.net/en/help/how-tamper-protect-lap
|
|||
|
||||
> Attackers without a lot of practice can use a needle or scalpel, for example, to drive under the sticker and push it partially upward to get to the screws relatively easily. The broken areas in the paint could be repaired with clear nail polish, although we did not need to do this in most of our tests. The picture below is a pre-post-comparison of one of our first attempts. Except for 3-4 glitter elements at the top left edge of the sticker, all others are still in the same place. This could be further reduced in subsequent attempts, so we rate this method as only partially suitable. [...] The relevant factor in this process is the amount of elements on the edge of the sticker. In addition, there are special seal stickers available which break when peeled off. They are probably more suitable for this method.
|
||||
|
||||
<p>
|
||||
<span class="is-hidden">
|
||||

|
||||
</span>
|
||||
<img src="mullvad.png" class="no-dark">
|
||||
</p>
|
||||
|
||||
For this reason, it is preferable to apply nail polish directly to the screws rather than over a sticker. This direct application is done for [NitroKey](https://docs.nitrokey.com/nitropad/qubes/sealed-hardware) and [Purism](https://puri.sm/posts/anti-interdiction-update-six-month-retrospective/) laptops. Keep these nuances in mind:
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@ sort_by = "date"
|
|||
paginate_by = 5
|
||||
+++
|
||||
<br>
|
||||
<div class="column is-8 is-offset-2">
|
||||
|
||||
Our recommendations are intended for all anarchists and they are accompanied by guides for putting the advice into practice.
|
||||
|
||||
|
@ -33,3 +34,4 @@ See [Encrypted Messaging for Anarchists](/posts/e2ee/)
|
|||
|
||||
See [Make Your Electronics Tamper-Evident](/posts/tamper/).
|
||||
|
||||
</div>
|
||||
|
|
|
@ -3,10 +3,13 @@ title = "Search"
|
|||
sort_by = "date"
|
||||
paginate_by = 5
|
||||
+++
|
||||
<br><center>
|
||||
The search feature is powered by DuckDuckGo -- a search engine that respects user privacy.
|
||||
<br>
|
||||
<p style="text-align:center">The search feature is powered by DuckDuckGo -- a search engine that respects user privacy.</p>
|
||||
|
||||
<div class="columns is-centered">
|
||||
<form action="https://duckduckgo.com/" method="get">
|
||||
<input type="hidden" name="sites" value="anarsec.guide">
|
||||
<input type="search" name="q">
|
||||
<input type="submit" value="Search">
|
||||
</form>
|
||||
</div>
|
||||
|
|
|
@ -1,30 +1,33 @@
|
|||
+++
|
||||
title = ""
|
||||
title = "Series"
|
||||
description = ""
|
||||
sort_by = "date"
|
||||
paginate_by = 5
|
||||
+++
|
||||
<br>
|
||||
<div class="column is-8 is-offset-2">
|
||||
|
||||
# Defensive
|
||||
## Defensive
|
||||
|
||||
#### Tails
|
||||
### Tails
|
||||
* [Tails for Anarchists](/posts/tails/)
|
||||
* [Tails Best Practices](/posts/tails-best/)
|
||||
|
||||
#### Qubes OS
|
||||
### Qubes OS
|
||||
* [Qubes OS for Anarchists](/posts/qubes/)
|
||||
|
||||
#### Phones
|
||||
### Phones
|
||||
* [Kill the Cop in Your Pocket](/posts/nophones/)
|
||||
* [GrapheneOS for Anarchists](/posts/grapheneos/)
|
||||
|
||||
#### General
|
||||
* [Linux Essentials: The Basics Needed to Use Tails or Qubes](/posts/linux/)
|
||||
### General
|
||||
* [Linux Essentials](/posts/linux/)
|
||||
* [Remove Identifying Metadata From Files](/posts/metadata/)
|
||||
* [Encrypted Messaging for Anarchists](/posts/e2ee/)
|
||||
* [Make Your Electronics Tamper-Evident](/posts/tamper/)
|
||||
|
||||
# Offensive
|
||||
## Offensive
|
||||
|
||||
*Coming soon*
|
||||
|
||||
</div>
|
||||
|
|
|
@ -70,12 +70,12 @@
|
|||
#v(10pt)
|
||||
]
|
||||
show heading.where(level: 3): it => block(width: 100%)[
|
||||
#set text(size: 12pt, font: "Jost", weight: "bold")
|
||||
#set text(size: 12pt, font: "Jost", style: "italic")
|
||||
#text(it.body)
|
||||
#v(10pt)
|
||||
]
|
||||
show heading.where(level: 4): it => block(width: 100%)[
|
||||
#set text(size: 11pt, font: "Jost", style: "italic")
|
||||
#set text(size: 11pt, font: "Jost")
|
||||
#text(it.body)
|
||||
#v(10pt)
|
||||
]
|
||||
|
|
|
@ -521,18 +521,9 @@ body
|
|||
flex-direction: column
|
||||
min-height: 100vh
|
||||
|
||||
body[theme="dark"]
|
||||
filter: invert(1) hue-rotate(180deg)
|
||||
|
||||
section
|
||||
flex: 1
|
||||
|
||||
img[theme="dark"],
|
||||
picture[theme="dark"],
|
||||
video[theme="dark"],
|
||||
pre[theme="dark"]
|
||||
filter: invert(1) hue-rotate(180deg)
|
||||
|
||||
.menu
|
||||
position: sticky
|
||||
top: 48px
|
||||
|
@ -592,3 +583,67 @@ code
|
|||
.icon-text
|
||||
font-size: 16px
|
||||
|
||||
body[theme="dark"]
|
||||
background-color: black !important
|
||||
|
||||
body[theme="dark"] article.box
|
||||
background-color: black !important
|
||||
box-shadow: 0 .5em 1em -.125em rgba(10,10,10,.1),0 0 0 1px rgba(10,10,10,.02)
|
||||
|
||||
body[theme="dark"] blockquote
|
||||
background-color: #090809 !important
|
||||
border-left: 5px solid #232223
|
||||
|
||||
body[theme="dark"] .navbar
|
||||
background-color: #090809 !important
|
||||
|
||||
body[theme="dark"] .footer
|
||||
background-color: #090809 !important
|
||||
|
||||
body[theme="dark"] .navbar-item
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] p
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] strong
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] ol
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] ul
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] .title
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] h1
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] h2
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] h3
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] h4
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] a.toc
|
||||
color: #c9c7c9 !important
|
||||
|
||||
body[theme="dark"] a:not(.toc,.navbar-item)
|
||||
color: #fa86d8 !important
|
||||
|
||||
body[theme="dark"] code
|
||||
color: #fa86d8 !important
|
||||
background-color: #090809 !important
|
||||
|
||||
body[theme="dark"] a.is-active
|
||||
background-color: #fa86d8 !important
|
||||
color: black !important
|
||||
|
||||
img[theme=dark]:not(.no-dark)
|
||||
filter: invert(1) hue-rotate(180deg)
|
||||
|
||||
|
|
|
@ -123,9 +123,9 @@
|
|||
<footer class="footer py-4">
|
||||
<div class="content has-text-centered has-text-link-light">
|
||||
<p>
|
||||
<a class="has-text-black" href="http://wmj5kiic7b6kjplpbvwadnht2nh2qnkbnqtcv3dyvpqtz7ssbssftxid.onion/anarsec/anarsec.guide/-/blob/no-masters/CHANGELOG.md">Changelog </a>
|
||||
<a href="https://0xacab.org/anarsec/anarsec.guide/-/blob/no-masters/CHANGELOG.md">Changelog </a>
|
||||
<a href="/atom.xml" target="_blank">
|
||||
<span class="icon is-large has-text-black" title="RSS Feed">
|
||||
<span class="icon is-large" title="RSS Feed">
|
||||
<i class="fas fa-rss fa-lg"></i>
|
||||
</span>
|
||||
</a>
|
||||
|
|
|
@ -9,11 +9,11 @@
|
|||
<p class="subtitle is-4">{{ section.description }}</p>
|
||||
{% endif %}
|
||||
</div>
|
||||
<div class="content">
|
||||
<div class="has-text-centered content">
|
||||
{{ section.content | safe }}
|
||||
{% if config.extra.author.avatar %}
|
||||
<figure class="image is-flex is-justify-content-center is-align-items-center">
|
||||
<img id="image-gay" src="{{ config.extra.author.avatar }}" />
|
||||
<img id="image-gay" class="no-dark" src="{{ config.extra.author.avatar }}" />
|
||||
</figure>
|
||||
{% endif %}
|
||||
</div>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue