mirror of
https://0xacab.org/optout/into-the-crypt.git
synced 2025-01-05 12:50:55 -05:00
Header edit
This commit is contained in:
parent
b8fb09103a
commit
039a1909d6
@ -159,7 +159,7 @@ Secure deletion should not be assumed to be possible. The NSA has in the past de
|
||||
SSDs which make use of wear-leveling (look into SSD wear-leveling) cannot have information securely erased by the user. However, SSDs with wear leveling also pose a significant annoyance, and even create difficulty for, forensic investigators (look into SSD garbage collection). Such annoyance cannot be considered a security guarantee.
|
||||
|
||||
## Browsing
|
||||
### Browsee Configuration
|
||||
### Browser Configuration
|
||||
Ungoogled variants of Chromium are advised. The security model actually exists unlike Gecko-based browser derivatives (i.e. Firefox).
|
||||
It is no secret that governments deliver malware based on anomalous internet activity, alternately put, flagged activity. While the common forms of investigations are typically conducted via physical device seizure, security mechanisms should be taken into account to stunt "passive" investigations. Browsers can be configured to disable the installation of extensions, device storage usage, setting alterations, theme changes, cookie restrictions, and cache deletions. Browser security and anti-fingerprinting do not always align. For instance, the TOR Browser is not unique based on fingerprinting. Tor Browser with JavaScript disabled is generally a secure setup. Most browser-based vulnerabilities require JavaScript or some other browser-run code (fonts, WebGL, etc). Tor Browser on security setting "Safest" reduces this attack surface hugely. While Chromium browsers may have upped the ante in terms of security, they do not have any built-in anti-fingerprinting features.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user