From cba1af022cdaf9358bbf99d38c188bbba0050ed5 Mon Sep 17 00:00:00 2001
From: pterocles
Date: Wed, 24 Aug 2022 16:21:48 -0400
Subject: [PATCH] Small fixes
* Organizational fixes will work for now until later when we can cleanup.
* Missed a few superscript links
I think it looks beautiful!
Signed-off-by: pterocles
---
guide.md | 59 ++++++++++++++++++++++----------------------------------
1 file changed, 23 insertions(+), 36 deletions(-)
diff --git a/guide.md b/guide.md
index 3d654de..3ff44df 100644
--- a/guide.md
+++ b/guide.md
@@ -28,7 +28,7 @@ The manual is here: , quick-start guide here:
**Your experience may vary.** **Remember to check regularly for an updated version of this guide.**
-This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0][] [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)).
+This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0](https://creativecommons.org/licenses/by-nc/4.0/) [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)).
- For mirrors see [Appendix A6: Mirrors]
@@ -491,13 +491,13 @@ There are many ways you can be tracked besides browser cookies and ads, your e-m
First, you could also consider these more general resources on privacy and security to learn more basics:
-- The New Oil*: [[Archive.org]](https://web.archive.org/web/https://thenewoil.org/)
+- The New Oil\*: [[Archive.org]](https://web.archive.org/web/https://thenewoil.org/)
-- Techlore videos*: [[Invidious]](https://yewtu.be/c/Techlore)
+- Techlore videos\*: [[Invidious]](https://yewtu.be/c/Techlore)
- Privacy Guides: [[Archive.org]](https://web.archive.org/web/https://privacyguides.org/)
-- Privacy Tools*: [[Archive.org]](https://web.archive.org/web/https://privacytools.io/)
+- Privacy Tools\*: [[Archive.org]](https://web.archive.org/web/https://privacytools.io/)
*Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way.*
@@ -1430,8 +1430,8 @@ Installing the [NoScript](https://noscript.net/) extension will prevent the atta
- Release tweet: [[Archive.org]](https://web.archive.org/web/https://twitter.com/ma1/status/1557751019945299969)
- User explanation: [[Archive.org]](https://web.archive.org/web/https://noscript.net/usage/#crosstab-identity-leak-protection)
- Tor Project Forum Post: [[Archive.org]](https://web.archive.org/web/https://forum.torproject.net/t/tor-browser-can-leak-your-identity-through-side-channel-attack/4005/2)
-- NoScript extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser): https://addons.mozilla.org/en-US/firefox/addon/noscript/
-- NoScript extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers): https://chrome.google.com/webstore/detail/noscript/doojmbjmlfjjnbmnoijecmcbfeoakpjm?hl=en
+- NoScript extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser):
+- NoScript extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers):
### Alternative to NoScript for all other browsers:
@@ -9386,7 +9386,7 @@ You must live by the simple rule that "loose lips sink ships" - but also that th
- 2020, RSA Conference 2020, When Cybercriminals with Good OpSec Attack [[Invidious]](https://yewtu.be/watch?v=zXmZnU2GdVk)
- - 2015, DEF CON 22, Adrian Crenshaw, Dropping Docs on Darknets: How People Got Caught [[Invidious]](https://yewtu.be/watch?v=eQ2OZKitRwc) ([Slides][] [[Archive.org]](https://web.archive.org/web/https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf))
+ - 2015, DEF CON 22, Adrian Crenshaw, Dropping Docs on Darknets: How People Got Caught [[Invidious]](https://yewtu.be/watch?v=eQ2OZKitRwc) ([Slides](https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf) [[Archive.org]](https://web.archive.org/web/https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf))
- 2017, Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev [[Invidious]](https://yewtu.be/watch?v=6Chp12sEnWk)
@@ -11110,7 +11110,7 @@ Here is a comparison table of one fingerprinting test of various browsers with t
-- *: macOS only. **: Windows only.
+- \*: macOS only. \*\*: Windows only.
Another useful resource to be considered for comparing browsers is: [[Archive.org]](https://web.archive.org/web/https://privacytests.org/)
@@ -12352,7 +12352,7 @@ First, please read this small introduction video to Monero: [[Invidious]](https://yewtu.be/watch?v=j02QoI4ZlnU)
+You may want to watch this insightful video for more details: [[Invidious]](https://yewtu.be/watch?v=j02QoI4ZlnU)
Also please consider reading: **** [[Archive.org]](https://web.archive.org/web/https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations)
@@ -12372,7 +12372,7 @@ Here are various threat modeling resources if you want to go deeper in threat mo
- It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/)
![][1389]
-(Illustration from [LINDDUN2015])
+(Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669)
Here are alternative resources and models if LINDDUN doesn't suit you:
@@ -13781,9 +13781,18 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering
[Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks
[References:]: #references
- [cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/
- [LINDDUN2015]: https://lirias.kuleuven.be/retrieve/295669
- [https://matrix.to/#/#anonymity:matrix.org]: https://matrix.to/#/
+ [Tor over VPN]: #tor-over-vpn
+ [The Detached Headers Way]: #the-detached-headers-way
+ [The Veracrypt Way]: #the-veracrypt-way
+ [Route A and B: Simple Encryption using Veracrypt (Windows tutorial)]: #route-a-and-b-simple-encryption-using-veracrypt-windows-tutorial
+ [Adversaries (threats)]: #threats
+ [Virtualbox Hardening recommendations]: #virtualbox-hardening-recommendations
+ [Hardening Linux]: #hardening-linux
+ [Hardening macOS]: #hardening-macos
+ [Note about plausible deniability on Linux]: #note-about-plausible-deniability-on-linux
+ [Online Phone Number (less recommended)]: #online-phone-number
+ [Extra Tools Cleaning]: #extra-tools-cleaning
+ [Printing Watermarking]: #printing-watermarking
[38]: media/image1.jpeg
[39]: media/image2.jpeg
[40]: media/image3.jpeg
@@ -13794,68 +13803,47 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[67]: media/image8.jpeg
[68]: media/image9.jpeg
[69]: media/image10.jpeg
- [96]: https://archive.ph/iuowI
[113]: media/image11.jpeg
[115]: media/image12.jpeg
[133]: media/image13.jpeg
[142]: media/image14.jpeg
- [143]: https://scribe.rip/@somdevsangwan/unblurring-images-for-osint-and-more-part-1-5ee36db6a70b
- [145]: https://scribe.rip/@somdevsangwan/deblurring-images-for-osint-part-2-ba564af8eb5d
[147]: media/image15.jpeg
[150]: media/image16.jpeg
[171]: media/image17.jpeg
[220]: media/image18.jpeg
- [228]: http://cryptonx6nsmspsnpicuihgmbbz3qvro4na35od3eht4vojdo7glm6yd.onion
[246]: media/image19.jpeg
- [Tor over VPN]: #tor-over-vpn
[259]: media/image20.jpeg
[260]: media/image21.jpeg
- [The Detached Headers Way]: #the-detached-headers-way
- [The Veracrypt Way]: #the-veracrypt-way
- [Route A and B: Simple Encryption using Veracrypt (Windows tutorial)]: #route-a-and-b-simple-encryption-using-veracrypt-windows-tutorial
[305]: media/image22.jpeg
[306]: #_Appendix_C:_Windows
[310]: media/image23.jpeg
[311]: media/image24.jpeg
[313]: media/image25.jpeg
[314]: media/image26.jpeg
- [Adversaries (threats)]: #threats
[330]: media/image27.jpeg
[331]: media/image28.jpeg
- [Virtualbox Hardening recommendations]: #virtualbox-hardening-recommendations
- [Hardening Linux]: #hardening-linux
- [Hardening macOS]: #hardening-macos
[356]: media/image29.jpeg
[357]: media/image30.jpeg
[358]: media/image31.jpeg
[366]: media/image32.jpeg
[367]: media/image33.jpeg
- [Note about plausible deniability on Linux]: #note-about-plausible-deniability-on-linux
[388]: media/image34.jpeg
[389]: media/image35.jpeg
- [393]: http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/
[394]: media/image36.jpeg
[395]: media/image37.jpeg
[396]: media/image38.jpeg
- [Online Phone Number (less recommended)]: #online-phone-number
[402]: media/image39.jpeg
[450]: media/image40.jpeg
- [462]: http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/
[482]: media/image41.jpeg
[483]: media/image42.jpeg
[484]: media/image43.jpeg
[487]: media/image44.jpeg
- [Extra Tools Cleaning]: #extra-tools-cleaning
[501]: media/image45.jpeg
[506]: media/image46.jpeg
- [519]: https://web.archive.org/web/https://0xacab.org/jvoisin/mat2
[520]: media/image47.jpeg
- [Slides]: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf
- [559]: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/donations.html
[560]: media/image48.jpeg
[561]: media/image49.jpeg
[562]: media/image50.jpeg
- [Printing Watermarking]: #printing-watermarking
[629]: media/image51.jpeg
[632]: media/image52.jpeg
[685]: media/image53.jpeg
@@ -13864,6 +13852,5 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[689]: media/image56.png
[690]: media/image57.png
[698]: media/image58.jpeg
- [745]: https://web.archive.org/web/https://www.threatmodelingmanifesto.org/
- [825]: https://scribe.rip/@brannondorsey/wi-fi-is-broken-3f6054210fa5
[1389]: media/image59.png
+
\ No newline at end of file