From ec306242f7dc0650fad5665c6c02d1ac49ef8484 Mon Sep 17 00:00:00 2001 From: TwoSixtyThreeFiftyFour <108928957+TwoSixtyThreeFiftyFour@users.noreply.github.com> Date: Thu, 25 Aug 2022 02:25:25 +0000 Subject: [PATCH] Fixed some .onion links that were HTTPS when only working on HTTP Fixed some .onion links that were HTTPS when only working on HTTP --- guide.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/guide.md b/guide.md index 3ff44df..1d2a11f 100644 --- a/guide.md +++ b/guide.md @@ -1295,7 +1295,7 @@ Pictures/Videos often contain visible watermarks indicating who is the owner/cre So, if you are a whistleblower and thinking about leaking some picture/audio/video file. Think twice. There are chances that those might contain invisible watermarking within them that would include information about you as a viewer. Such watermarks can be enabled with a simple switch in like Zoom (Video[^223] or Audio[^224]) or with extensions[^225] for popular apps such as Adobe Premiere Pro. These can be inserted by various content management systems. -For a recent example where someone leaking a Zoom meeting recording was caught because it was watermarked: [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/18/leak-zoom-meeting/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/18/leak-zoom-meeting/) +For a recent example where someone leaking a Zoom meeting recording was caught because it was watermarked: [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/18/leak-zoom-meeting/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/18/leak-zoom-meeting/) Such watermarks can be inserted by various products[^226]'[^227]'[^228]'[^229] using Steganography[^230] and can resist compression[^231] and re-encoding[^232]'[^233]. @@ -6927,7 +6927,7 @@ Unfortunately, you will be extremely limited with that account and to do anythin - Will they require a phone number? Maybe. This depends on the IP you are coming from. If you come from Tor, it is likely. From a VPN, it is less likely. -- Can you create accounts through Tor? Yes, but highly likely that a phone number will be required when only an e-mail or a captcha will be required over a VPN. They even have a ".onion" address at . +- Can you create accounts through Tor? Yes, but highly likely that a phone number will be required when only an e-mail or a captcha will be required over a VPN. They even have a ".onion" address at . You obviously need an e-mail for your online identity and disposable e-mails are pretty much banned everywhere. @@ -7679,7 +7679,7 @@ Finally, Open-Source apps should always be preferred because they allow third pa
  • Telegram Documentation, MTProto Mobile Protocol https://core.telegram.org/mtproto [Archive.org]↩︎

  • Wikipedia, Telegram Security Breaches, https://en.wikipedia.org/wiki/Telegram_(software)#Security_breaches [Wikiless] [Archive.org]↩︎

  • TechCrunch, Maybe we shouldn’t use Zoom after all, https://techcrunch.com/2020/03/31/zoom-at-your-own-risk/ [Archive.org]↩︎

  • -
  • The Incercept, Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing https://theintercept.com/2020/03/31/zoom-meeting-encryption/ [Tor Mirror] [Archive.org]↩︎

  • +
  • The Incercept, Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing https://theintercept.com/2020/03/31/zoom-meeting-encryption/ [Tor Mirror] [Archive.org]↩︎

  • Serpentsec, Secure Messaging: Choosing a chat app https://web.archive.org/web/https://serpentsec.1337.cx/secure-messaging-choosing-a-chat-app↩︎

  • Berty, Development, https://berty.tech↩︎

  • Tox Handshake Vulnerable to KCI, https://github.com/TokTok/c-toxcore/issues/426↩︎

  • @@ -12003,7 +12003,7 @@ Personally, my favorites are: Note that some of those have a convenient ".onion" address: -- DuckDuckGo: +- DuckDuckGo: In the end, we were often not satisfied with the results of both those search engines and still ended up on Bing or Google. @@ -12602,7 +12602,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [^92]: Apple, Transparency Report, Device Requests [[Archive.org]](https://web.archive.org/web/https://www.apple.com/legal/transparency/device-requests.html) -[^93]: The Intercept, How Cops Can Secretly Track Your Phone [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) +[^93]: The Intercept, How Cops Can Secretly Track Your Phone [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/) [^94]: Wikipedia, IMSI Catcher [[Wikiless]](https://wikiless.org/wiki/IMSI-catcher) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/IMSI-catcher) @@ -12782,7 +12782,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [^182]: Washington Post, Huawei tested AI software that could recognize Uighur minorities and alert police, report says [[Archive.org]](https://web.archive.org/web/https://www.washingtonpost.com/technology/2020/12/08/huawei-tested-ai-software-that-could-recognize-uighur-minorities-alert-police-report-says/) -[^183]: The Intercept, How a Facial Recognition Mismatch Can Ruin Your Life [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) +[^183]: The Intercept, How a Facial Recognition Mismatch Can Ruin Your Life [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/) [^184]: Vice, Facial Recognition Failures Are Locking People Out of Unemployment Systems [[Archive.org]](https://web.archive.org/web/https://www.vice.com/en/article/5dbywn/facial-recognition-failures-are-locking-people-out-of-unemployment-systems) @@ -12838,7 +12838,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [^210]: BBC, China social media: WeChat and the Surveillance State [[Archive.org]](https://web.archive.org/web/https://www.bbc.com/news/blogs-china-blog-48552907) -[^211]: The Intercept, Revealed: Massive Chinese Police Database [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/29/china-uyghur-muslim-surveillance-police/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/) +[^211]: The Intercept, Revealed: Massive Chinese Police Database [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2021/01/29/china-uyghur-muslim-surveillance-police/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/) [^212]: Wikipedia, Sandbox [[Wikiless]](https://wikiless.org/wiki/Sandbox_(computer_security)) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Sandbox_(computer_security)) @@ -13470,7 +13470,7 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [^529]: ZDnet, FBI recommends passphrases over password complexity [[Archive.org]](https://web.archive.org/web/https://www.zdnet.com/article/fbi-recommends-passphrases-over-password-complexity/) -[^530]: The Intercept, Passphrases That You Can Memorize --- But That Even the NSA Can't Guess [[Tor Mirror]](https://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) +[^530]: The Intercept, Passphrases That You Can Memorize --- But That Even the NSA Can't Guess [[Tor Mirror]](http://27m3p2uv7igmj6kvd4ql3cct5h3sdwrsajovkkndeufumzyfhlfev4qd.onion/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) [[Archive.org]](https://web.archive.org/web/https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) [^531]: Proton Blog, Let's settle the password vs. passphrase debate once and for all [[Archive.org]](https://web.archive.org/web/https://proton.me/blog/protonmail-com-blog-password-vs-passphrase) @@ -13853,4 +13853,4 @@ Model-specific registers (MSRs) and their configuration bits can also be detecte [690]: media/image57.png [698]: media/image58.jpeg [1389]: media/image59.png - \ No newline at end of file +