From 19d0f02b18d71e52a65ff3b5ed682546ce67a3ca Mon Sep 17 00:00:00 2001 From: Than Harrison Date: Wed, 1 Mar 2023 03:16:00 -0500 Subject: [PATCH] Stop repeating ourselves in this section It's fine to shorten this section to a few lines, in order of technical difficulty. --- guide.md | 28 ++++------------------------ 1 file changed, 4 insertions(+), 24 deletions(-) diff --git a/guide.md b/guide.md index ad063f6..16440c3 100644 --- a/guide.md +++ b/guide.md @@ -1841,33 +1841,13 @@ Now that you know what is possible, you should also consider threats and adversa #### Threats: -- If your main concern is a forensic examination of your devices, you should consider: +- If your main concern is a forensic examination of your devices, you should consider the Tor Browser route or the Tails route. - - **The Tor Browser route.** +- If your main concerns are remote adversaries that might uncover your online identity on various platforms, you should consider the Tails, Whonix, or Qubes OS routes (listed in order of difficulty). - - **The Tails route.** +- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider the Tails route, including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix within Tails][Persistent Plausible Deniability using Whonix within Tails:]).** -- If your main concerns are remote adversaries that might uncover your online identity in various platforms, you should consider: - - - **The Tails route.** - - - **The Whonix route.** - - - **The Qubes OS route (best but requires budget/time and some skills).** - -- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider: - - - **The Tails Route including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix within Tails][Persistent Plausible Deniability using Whonix within Tails:]).** - - - **The Whonix Route (This is possible on both Windows and Linux but will require more skills to achieve on Linux).** - -- If you are in a hostile environment where Tor/VPN usage alone is impossible/dangerous/suspicious, consider: - - - **The Tails route (without actually using Tor).** - - - **The Whonix route (without using Whonix).** - - - **The Qubes OS route (without actually using Whonix).** +- If you are in a hostile environment where Tor/VPN usage alone is impossible/dangerous/suspicious, consider the Tails route (without actually using Tor), or more advanced routes like Whonix or Qubes OS. #### Adversaries: