From cba1af022cdaf9358bbf99d38c188bbba0050ed5 Mon Sep 17 00:00:00 2001 From: pterocles Date: Wed, 24 Aug 2022 16:21:48 -0400 Subject: [PATCH] Small fixes * Organizational fixes will work for now until later when we can cleanup. * Missed a few superscript links I think it looks beautiful! Signed-off-by: pterocles --- guide.md | 59 ++++++++++++++++++++++---------------------------------- 1 file changed, 23 insertions(+), 36 deletions(-) diff --git a/guide.md b/guide.md index 3d654de..3ff44df 100644 --- a/guide.md +++ b/guide.md @@ -28,7 +28,7 @@ The manual is here: , quick-start guide here: **Your experience may vary.** **Remember to check regularly for an updated version of this guide.** -This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0][] [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)). +This guide is a non-profit open-source initiative, licensed under Creative Commons **Attribution-NonCommercial** 4.0 International ([cc-by-nc-4.0](https://creativecommons.org/licenses/by-nc/4.0/) [[Archive.org]](https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/)). - For mirrors see [Appendix A6: Mirrors] @@ -491,13 +491,13 @@ There are many ways you can be tracked besides browser cookies and ads, your e-m First, you could also consider these more general resources on privacy and security to learn more basics: -- The New Oil*: [[Archive.org]](https://web.archive.org/web/https://thenewoil.org/) +- The New Oil\*: [[Archive.org]](https://web.archive.org/web/https://thenewoil.org/) -- Techlore videos*: [[Invidious]](https://yewtu.be/c/Techlore) +- Techlore videos\*: [[Invidious]](https://yewtu.be/c/Techlore) - Privacy Guides: [[Archive.org]](https://web.archive.org/web/https://privacyguides.org/) -- Privacy Tools*: [[Archive.org]](https://web.archive.org/web/https://privacytools.io/) +- Privacy Tools\*: [[Archive.org]](https://web.archive.org/web/https://privacytools.io/) *Note that these websites could contain affiliate/sponsored content and/or merchandising. This guide does not endorse and is not sponsored by any commercial entity in any way.* @@ -1430,8 +1430,8 @@ Installing the [NoScript](https://noscript.net/) extension will prevent the atta - Release tweet: [[Archive.org]](https://web.archive.org/web/https://twitter.com/ma1/status/1557751019945299969) - User explanation: [[Archive.org]](https://web.archive.org/web/https://noscript.net/usage/#crosstab-identity-leak-protection) - Tor Project Forum Post: [[Archive.org]](https://web.archive.org/web/https://forum.torproject.net/t/tor-browser-can-leak-your-identity-through-side-channel-attack/4005/2) -- NoScript extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser): https://addons.mozilla.org/en-US/firefox/addon/noscript/ -- NoScript extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers): https://chrome.google.com/webstore/detail/noscript/doojmbjmlfjjnbmnoijecmcbfeoakpjm?hl=en +- NoScript extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser): +- NoScript extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers): ### Alternative to NoScript for all other browsers: @@ -9386,7 +9386,7 @@ You must live by the simple rule that "loose lips sink ships" - but also that th - 2020, RSA Conference 2020, When Cybercriminals with Good OpSec Attack [[Invidious]](https://yewtu.be/watch?v=zXmZnU2GdVk) - - 2015, DEF CON 22, Adrian Crenshaw, Dropping Docs on Darknets: How People Got Caught [[Invidious]](https://yewtu.be/watch?v=eQ2OZKitRwc) ([Slides][] [[Archive.org]](https://web.archive.org/web/https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf)) + - 2015, DEF CON 22, Adrian Crenshaw, Dropping Docs on Darknets: How People Got Caught [[Invidious]](https://yewtu.be/watch?v=eQ2OZKitRwc) ([Slides](https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf) [[Archive.org]](https://web.archive.org/web/https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf)) - 2017, Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev [[Invidious]](https://yewtu.be/watch?v=6Chp12sEnWk) @@ -11110,7 +11110,7 @@ Here is a comparison table of one fingerprinting test of various browsers with t -- *: macOS only. **: Windows only. +- \*: macOS only. \*\*: Windows only. Another useful resource to be considered for comparing browsers is: [[Archive.org]](https://web.archive.org/web/https://privacytests.org/) @@ -12352,7 +12352,7 @@ First, please read this small introduction video to Monero: [[Invidious]](https://yewtu.be/watch?v=j02QoI4ZlnU) +You may want to watch this insightful video for more details: [[Invidious]](https://yewtu.be/watch?v=j02QoI4ZlnU) Also please consider reading: **** [[Archive.org]](https://web.archive.org/web/https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations) @@ -12372,7 +12372,7 @@ Here are various threat modeling resources if you want to go deeper in threat mo - It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/) ![][1389] -(Illustration from [LINDDUN2015]) +(Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669) Here are alternative resources and models if LINDDUN doesn't suit you: @@ -13781,9 +13781,18 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering [Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks [References:]: #references - [cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/ - [LINDDUN2015]: https://lirias.kuleuven.be/retrieve/295669 - [https://matrix.to/#/#anonymity:matrix.org]: https://matrix.to/#/ + [Tor over VPN]: #tor-over-vpn + [The Detached Headers Way]: #the-detached-headers-way + [The Veracrypt Way]: #the-veracrypt-way + [Route A and B: Simple Encryption using Veracrypt (Windows tutorial)]: #route-a-and-b-simple-encryption-using-veracrypt-windows-tutorial + [Adversaries (threats)]: #threats + [Virtualbox Hardening recommendations]: #virtualbox-hardening-recommendations + [Hardening Linux]: #hardening-linux + [Hardening macOS]: #hardening-macos + [Note about plausible deniability on Linux]: #note-about-plausible-deniability-on-linux + [Online Phone Number (less recommended)]: #online-phone-number + [Extra Tools Cleaning]: #extra-tools-cleaning + [Printing Watermarking]: #printing-watermarking [38]: media/image1.jpeg [39]: media/image2.jpeg [40]: media/image3.jpeg @@ -13794,68 +13803,47 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [67]: media/image8.jpeg [68]: media/image9.jpeg [69]: media/image10.jpeg - [96]: https://archive.ph/iuowI [113]: media/image11.jpeg [115]: media/image12.jpeg [133]: media/image13.jpeg [142]: media/image14.jpeg - [143]: https://scribe.rip/@somdevsangwan/unblurring-images-for-osint-and-more-part-1-5ee36db6a70b - [145]: https://scribe.rip/@somdevsangwan/deblurring-images-for-osint-part-2-ba564af8eb5d [147]: media/image15.jpeg [150]: media/image16.jpeg [171]: media/image17.jpeg [220]: media/image18.jpeg - [228]: http://cryptonx6nsmspsnpicuihgmbbz3qvro4na35od3eht4vojdo7glm6yd.onion [246]: media/image19.jpeg - [Tor over VPN]: #tor-over-vpn [259]: media/image20.jpeg [260]: media/image21.jpeg - [The Detached Headers Way]: #the-detached-headers-way - [The Veracrypt Way]: #the-veracrypt-way - [Route A and B: Simple Encryption using Veracrypt (Windows tutorial)]: #route-a-and-b-simple-encryption-using-veracrypt-windows-tutorial [305]: media/image22.jpeg [306]: #_Appendix_C:_Windows [310]: media/image23.jpeg [311]: media/image24.jpeg [313]: media/image25.jpeg [314]: media/image26.jpeg - [Adversaries (threats)]: #threats [330]: media/image27.jpeg [331]: media/image28.jpeg - [Virtualbox Hardening recommendations]: #virtualbox-hardening-recommendations - [Hardening Linux]: #hardening-linux - [Hardening macOS]: #hardening-macos [356]: media/image29.jpeg [357]: media/image30.jpeg [358]: media/image31.jpeg [366]: media/image32.jpeg [367]: media/image33.jpeg - [Note about plausible deniability on Linux]: #note-about-plausible-deniability-on-linux [388]: media/image34.jpeg [389]: media/image35.jpeg - [393]: http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/ [394]: media/image36.jpeg [395]: media/image37.jpeg [396]: media/image38.jpeg - [Online Phone Number (less recommended)]: #online-phone-number [402]: media/image39.jpeg [450]: media/image40.jpeg - [462]: http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/ [482]: media/image41.jpeg [483]: media/image42.jpeg [484]: media/image43.jpeg [487]: media/image44.jpeg - [Extra Tools Cleaning]: #extra-tools-cleaning [501]: media/image45.jpeg [506]: media/image46.jpeg - [519]: https://web.archive.org/web/https://0xacab.org/jvoisin/mat2 [520]: media/image47.jpeg - [Slides]: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf - [559]: http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/donations.html [560]: media/image48.jpeg [561]: media/image49.jpeg [562]: media/image50.jpeg - [Printing Watermarking]: #printing-watermarking [629]: media/image51.jpeg [632]: media/image52.jpeg [685]: media/image53.jpeg @@ -13864,6 +13852,5 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [689]: media/image56.png [690]: media/image57.png [698]: media/image58.jpeg - [745]: https://web.archive.org/web/https://www.threatmodelingmanifesto.org/ - [825]: https://scribe.rip/@brannondorsey/wi-fi-is-broken-3f6054210fa5 [1389]: media/image59.png + \ No newline at end of file