From ec306242f7dc0650fad5665c6c02d1ac49ef8484 Mon Sep 17 00:00:00 2001
From: TwoSixtyThreeFiftyFour
<108928957+TwoSixtyThreeFiftyFour@users.noreply.github.com>
Date: Thu, 25 Aug 2022 02:25:25 +0000
Subject: [PATCH] Fixed some .onion links that were HTTPS when only working on
HTTP
Fixed some .onion links that were HTTPS when only working on HTTP
---
guide.md | 18 +++++++++---------
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/guide.md b/guide.md
index 3ff44df..1d2a11f 100644
--- a/guide.md
+++ b/guide.md
@@ -1295,7 +1295,7 @@ Pictures/Videos often contain visible watermarks indicating who is the owner/cre
So, if you are a whistleblower and thinking about leaking some picture/audio/video file. Think twice. There are chances that those might contain invisible watermarking within them that would include information about you as a viewer. Such watermarks can be enabled with a simple switch in like Zoom (Video[^223] or Audio[^224]) or with extensions[^225] for popular apps such as Adobe Premiere Pro. These can be inserted by various content management systems.
-For a recent example where someone leaking a Zoom meeting recording was caught because it was watermarked: [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/18/leak-zoom-meeting/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/18/leak-zoom-meeting/)
+For a recent example where someone leaking a Zoom meeting recording was caught because it was watermarked: [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/18/leak-zoom-meeting/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/18/leak-zoom-meeting/)
Such watermarks can be inserted by various products[^226]'[^227]'[^228]'[^229] using Steganography[^230] and can resist compression[^231] and re-encoding[^232]'[^233].
@@ -6927,7 +6927,7 @@ Unfortunately, you will be extremely limited with that account and to do anythin
- Will they require a phone number? Maybe. This depends on the IP you are coming from. If you come from Tor, it is likely. From a VPN, it is less likely.
-- Can you create accounts through Tor? Yes, but highly likely that a phone number will be required when only an e-mail or a captcha will be required over a VPN. They even have a ".onion" address at .
+- Can you create accounts through Tor? Yes, but highly likely that a phone number will be required when only an e-mail or a captcha will be required over a VPN. They even have a ".onion" address at .
You obviously need an e-mail for your online identity and disposable e-mails are pretty much banned everywhere.
@@ -7679,7 +7679,7 @@ Finally, Open-Source apps should always be preferred because they allow third pa
Telegram Documentation, MTProto Mobile Protocol https://core.telegram.org/mtproto [Archive.org]
Wikipedia, Telegram Security Breaches, https://en.wikipedia.org/wiki/Telegram_(software)#Security_breaches [Wikiless] [Archive.org]
TechCrunch, Maybe we shouldn’t use Zoom after all, https://techcrunch.com/2020/03/31/zoom-at-your-own-risk/ [Archive.org]
-The Incercept, Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing https://theintercept.com/2020/03/31/zoom-meeting-encryption/ [Tor Mirror] [Archive.org]
+The Incercept, Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing https://theintercept.com/2020/03/31/zoom-meeting-encryption/ [Tor Mirror] [Archive.org]
Serpentsec, Secure Messaging: Choosing a chat app https://web.archive.org/web/https://serpentsec.1337.cx/secure-messaging-choosing-a-chat-app
Berty, Development, https://berty.tech
Tox Handshake Vulnerable to KCI, https://github.com/TokTok/c-toxcore/issues/426
@@ -12003,7 +12003,7 @@ Personally, my favorites are:
Note that some of those have a convenient ".onion" address:
-- DuckDuckGo:
+- DuckDuckGo:
In the end, we were often not satisfied with the results of both those search engines and still ended up on Bing or Google.
@@ -12602,7 +12602,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[^92]: Apple, Transparency Report, Device Requests [[Archive.org]](https://web.archive.org/web/https://www.apple.com/legal/transparency/device-requests.html)
-[^93]: The Intercept, How Cops Can Secretly Track Your Phone [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/)
+[^93]: The Intercept, How Cops Can Secretly Track Your Phone [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/)
[^94]: Wikipedia, IMSI Catcher [[Wikiless]](https://wikiless.org/wiki/IMSI-catcher) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/IMSI-catcher)
@@ -12782,7 +12782,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[^182]: Washington Post, Huawei tested AI software that could recognize Uighur minorities and alert police, report says [[Archive.org]](https://web.archive.org/web/https://www.washingtonpost.com/technology/2020/12/08/huawei-tested-ai-software-that-could-recognize-uighur-minorities-alert-police-report-says/)
-[^183]: The Intercept, How a Facial Recognition Mismatch Can Ruin Your Life [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/)
+[^183]: The Intercept, How a Facial Recognition Mismatch Can Ruin Your Life [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/)
[^184]: Vice, Facial Recognition Failures Are Locking People Out of Unemployment Systems [[Archive.org]](https://web.archive.org/web/https://www.vice.com/en/article/5dbywn/facial-recognition-failures-are-locking-people-out-of-unemployment-systems)
@@ -12838,7 +12838,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[^210]: BBC, China social media: WeChat and the Surveillance State [[Archive.org]](https://web.archive.org/web/https://www.bbc.com/news/blogs-china-blog-48552907)
-[^211]: The Intercept, Revealed: Massive Chinese Police Database [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/29/china-uyghur-muslim-surveillance-police/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/)
+[^211]: The Intercept, Revealed: Massive Chinese Police Database [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/29/china-uyghur-muslim-surveillance-police/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/)
[^212]: Wikipedia, Sandbox [[Wikiless]](https://wikiless.org/wiki/Sandbox_(computer_security)) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Sandbox_(computer_security))
@@ -13470,7 +13470,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[^529]: ZDnet, FBI recommends passphrases over password complexity [[Archive.org]](https://web.archive.org/web/https://www.zdnet.com/article/fbi-recommends-passphrases-over-password-complexity/)
-[^530]: The Intercept, Passphrases That You Can Memorize --- But That Even the NSA Can't Guess [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/)
+[^530]: The Intercept, Passphrases That You Can Memorize --- But That Even the NSA Can't Guess [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/)
[^531]: Proton Blog, Let's settle the password vs. passphrase debate once and for all [[Archive.org]](https://web.archive.org/web/https://proton.me/blog/protonmail-com-blog-password-vs-passphrase)
@@ -13853,4 +13853,4 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte
[690]: media/image57.png
[698]: media/image58.jpeg
[1389]: media/image59.png
-
\ No newline at end of file
+