Compare commits

..

No commits in common. "3dc04b1da885e26e3eb84e0b123f6b027c0da4a8" and "2373fa195290e700d2e9b8a534a6712662f495c5" have entirely different histories.

3 changed files with 5 additions and 26 deletions

View File

@ -67,8 +67,6 @@ Articles and stories related to technology, security or privacy
A place for related various communities & media
- [Hackliberty](https://hackliberty.org)<button type="button" class="btn btn-default btn-xs"><a href="http://xj2i2lkzecitg6cq5ca3vrhlzq4evgz6qr2i4s7b4y57ktuaohff4vyd.onion">Tor</a></button>
- [PrivacyGuides](https://privacyguides.org) <button type="button" class="btn btn-default btn-xs"><a href="http://eter4u55b667kuo72ntpm7ut54sa2mxmr22iqgzns4jw7boeox3qgyid.onion">Tor</a></button>
- [Privsec](https://privsec.dev)

View File

@ -98,7 +98,6 @@ _Disclaimer: This is for education / research._
-\>> [Plausible Deniability](#plausible-deniability) <br>
-\>> [Tails](#tails) <br>
-\>> [Anonymous Server](#anonymous-server) <br>
-\>> [Power Analysis](#power-analysis) <br>
-\>> [TLDR](#tldr) <br>
---
@ -1205,7 +1204,6 @@ Often times, these devices to not receive proper security patches or even update
With the rise in IOT devices, comes "smart" enabled technology.
This is often times being implemented into newer vehicles.
Unfortunately, with the rapid adoption of technology, cars are vulnerable to various types of attacks.
With more detailed information being logged by your vehicle, often times in the event of an accident of some sort, insurance companies will pull information from the vehicle such as speed and location.
<br>
@ -1552,23 +1550,6 @@ For the actual server, you can use [1984](https://1984.is/) or the listed option
---
### **Power Analysis**
*"Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated."*
<br>
This is an advanced attack which requires equipment and the technical skill to sucessfully operate such an attack.
Several ways to prevent such an attack is a method known as [blinding](https://wikiless.org/wiki/Blinding_(cryptography)).
To take certain precautions, it's adivsable to unplug and power off all devices not currently in-use.
It *may* be possible to bypass / increase the difficulty of this sort of attack by utilizing a system of UPS's.
<br>
---
## TLDR
Don't use the internet.

View File

@ -97,15 +97,15 @@ Recent blog posts from our [blog](./blog) page
Information from [collections](./collections)
- [Information](./information) - A collection of links, articles and more.
[Information](./information) - A collection of links, articles and more.
- [GrapheneOS](./graphene)
[GrapheneOS](./graphene)
- [F-Droid](./f-droid)
[F-Droid](./f-droid)
- [Matrix](./matrix)
[Matrix](./matrix)
- [Qubes OS](./qubes)
[Qubes OS](./qubes)
<br>
<br>