mirror of
https://github.com/Anon-Planet/thgtoa.git
synced 2026-03-25 06:03:27 +01:00
Merge branch 'master' into transparency-reports
This commit is contained in:
111
guide.md
111
guide.md
@@ -312,7 +312,7 @@ Finally note that this guide does mention and even recommends various commercial
|
||||
- [Socks Proxy VPS:]
|
||||
- [Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option]
|
||||
- [Appendix Q: Using long-range Antenna to connect to Public Wi-Fis from a safe distance:]
|
||||
- [Appendix R: Installing a VPN on your VM or Host OS.]
|
||||
- [Appendix R: Installing a VPN on your VM or Host OS]
|
||||
- [Appendix S: Check your network for surveillance/censorship using OONI]
|
||||
- [Appendix T: Checking files for malware]
|
||||
- [Integrity (if available):]
|
||||
@@ -383,6 +383,8 @@ Finally note that this guide does mention and even recommends various commercial
|
||||
- [Appendix B1: Checklist of things to verify before sharing information:]
|
||||
- [Appendix B2: Monero Disclaimer]
|
||||
- [Appendix B3: Threat modeling resources]
|
||||
- [Appendix B4: Important notes about evil-maid and tampering]
|
||||
- [Appendix B5: Types of CPU attacks:]
|
||||
- [References:]
|
||||
|
||||
# Pre-requisites and limitations:
|
||||
@@ -861,21 +863,23 @@ These have already been affected by several security vulnerabilities in the past
|
||||
|
||||
There are some not so straightforward ways[^107] to disable the Intel IME on some CPUs and you should do so if you can. For some AMD laptops, you can disable it within the BIOS settings by disabling PSP.
|
||||
|
||||
Note that to AMD's defense, so far and AFAIK, there were no security vulnerabilities found for ASP and no backdoors either: See <https://www.youtube.com/watch?v=bKH5nGLgi08&t=2834s> <sup>[[Invidious]][77]</sup>. In addition, AMD PSP does not provide any remote management capabilities contrary to Intel IME.
|
||||
Note that, to AMD's defense, there were no security vulnerabilities found for ASP and no backdoors either. See <https://www.youtube.com/watch?v=bKH5nGLgi08&t=2834s> <sup>[[Invidious]][77]</sup>. In addition, AMD PSP does not provide any remote management capabilities contrary to Intel IME.
|
||||
|
||||
If you are feeling a bit more adventurous, you could install your own BIOS using Libreboot or Coreboot [^108] if your laptop supports it (be aware that Coreboot does contain some propriety code unlike its fork Libreboot).
|
||||
|
||||
In addition, some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]][78]</sup> <sup>[[Archive.org]][79]</sup>
|
||||
|
||||
Check yourself:
|
||||
|
||||
- If you are using Linux you can check the vulnerability status of your CPU to Spectre/Meltdown attacks by using <https://github.com/speed47/spectre-meltdown-checker> <sup>[[Archive.org]][80]</sup> which is available as a package for most Linux distros including Whonix.
|
||||
- If you are using Linux you can check the vulnerability status of your CPU to Spectre/Meltdown attacks by using <https://github.com/speed47/spectre-meltdown-checker> <sup>[[Archive.org]][80]</sup> which is available as a package for most Linux distros including Whonix. Spectre is a transient execution attack. There is also PoC code for Spectre v1 and v2 on iPhone devices here: <https://github.com/cispa/BranchDifferent> <sup>[[Archive.org]](https://web.archive.org/web/20220814122148/https://github.com/cispa/BranchDifferent)</sup> and here <https://misc0110.net/files/applespectre_dimva22.pdf> <sup>[[Archive.org]](https://web.archive.org/web/20220814122652/https://misc0110.net/files/applespectre_dimva22.pdf)</sup>
|
||||
|
||||
- If you are using Windows, you can check the vulnerability status of your CPU using inSpectre <https://www.grc.com/inspectre.htm> <sup>[[Archive.org]][81]</sup>
|
||||
|
||||
Some CPUs have unfixable flaws (especially Intel CPUs) that could be exploited by various malware. Here is a good current list of such vulnerabilities affecting recent widespread CPUs: <https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability> <sup>[[Wikiless]](https://wikiless.org/wiki/Transient_execution_CPU_vulnerability)</sup> <sup>[[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability)</sup>
|
||||
|
||||
Some of these can be avoided using Virtualization Software settings that can mitigate such exploits. See this guide for more information <https://www.whonix.org/wiki/Spectre_Meltdown> <sup>[[Archive.org]][82]</sup> (warning: these can severely impact the performance of your VMs).
|
||||
|
||||
We will therefore mitigate some of these issues in this guide by recommending the use of virtual machines on a dedicated anonymous laptop for your sensitive activities that will only be used from an anonymous public network.
|
||||
This guide won't go too deep into side-channel and microarchitecture attacks but we will highlight some issues with both Intel and AMD CPU architectures that will be mitigated throughout. It's important to recognize hardware is just as susceptible to bugs, and therefore exploitation, regardless of manufacturer.
|
||||
|
||||
We will mitigate some of these issues in this guide by recommending the use of virtual machines on a dedicated anonymous laptop for your sensitive activities that will only be used from an anonymous public network.
|
||||
|
||||
**In addition, we recommend the use of AMD CPUs instead of Intel CPUs.**
|
||||
|
||||
@@ -1063,6 +1067,8 @@ A real use and well-documented case of this was the arrest of the hacker Jeremy
|
||||
|
||||
There are also a few cases involving OSINT at Bellingcat[^154]. Have a look at their very informative (but slightly outdated) toolkit here: <https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607> <sup>[[Archive.org]][100]</sup>
|
||||
|
||||
**We have an OSINT discussion room in our Matrix community. Feel free to join at ```#OSINT:matrix.org```.**
|
||||
|
||||
You can also view some convenient lists of some available OSINT tools here if you want to try them on yourself for example:
|
||||
|
||||
- <https://github.com/jivoi/awesome-osint> <sup>[[Archive.org]][101]</sup>
|
||||
@@ -1411,12 +1417,28 @@ This guide will mitigate these issues by mitigating, obfuscating, and randomizin
|
||||
|
||||
There was an attack published that can deanonymize users if they have a known alias. For example, an attacker trying to track the activities of a journalist can use that journalist's public Twitter handle to link their anonymous identities with their public one. This breaks compartmentalization of identities and can lead to complete deanonymization, even of users who practice proper OPSEC.
|
||||
|
||||
The attack, published at <https://leakuidatorplusteam.github.io/> <sup>[[Archive.org]][1386]</sup>, can be mitigated using a browser extension:
|
||||
The attack, published at <https://leakuidatorplusteam.github.io/> <sup>[[Archive.org]][1386]</sup>, can be mitigated using the well-known [NoScript](https://noscript.net/) extension and will be our preferred recommendation.
|
||||
|
||||
- <https://chrome.google.com/webstore/detail/leakuidator%2B/hhfpajcjkikoocmmhcimllpinjnbedll> (Chrome, Edge, and other Chrome-based browsers)
|
||||
- <https://addons.mozilla.org/en-US/firefox/addon/leakuidatorplus/> (Firefox, Tor Browser, and other Firefox-based browsers)
|
||||
## Tor Browser:
|
||||
|
||||
It's generally not recommended to install extensions into Tor Browser, because the fact that you have an extension installed can be an extra data point for browser fingerprinting. As such, this extension is only a temporary solution until the fix can be implemented by the browsers' own developers.
|
||||
This attack is now prevented by default by an update of [NoScript](https://noscript.net/) (11.4.8 and above) on all security levels.
|
||||
|
||||
## All others:
|
||||
|
||||
Installing the [NoScript](https://noscript.net/) extension will prevent the attack **by default only in private Windows** using their new "TabGuard feature". But can be enabled in the NoScript options to work on all Windows. See:
|
||||
|
||||
- Release tweet: <https://twitter.com/ma1/status/1557751019945299969> <sup>[[Archive.org]](https://web.archive.org/web/https://twitter.com/ma1/status/1557751019945299969)</sup>
|
||||
- User explanation: <https://noscript.net/usage/#crosstab-identity-leak-protection> <sup>[[Archive.org]](https://web.archive.org/web/https://noscript.net/usage/#crosstab-identity-leak-protection)</sup>
|
||||
- Tor Project Forum Post: <https://forum.torproject.net/t/tor-browser-can-leak-your-identity-through-side-channel-attack/4005/2> <sup>[[Archive.org]](https://web.archive.org/web/https://forum.torproject.net/t/tor-browser-can-leak-your-identity-through-side-channel-attack/4005/2)</sup>
|
||||
- NoScript extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser): https://addons.mozilla.org/en-US/firefox/addon/noscript/
|
||||
- NoScript extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers): https://chrome.google.com/webstore/detail/noscript/doojmbjmlfjjnbmnoijecmcbfeoakpjm?hl=en
|
||||
|
||||
### Alternative to NoScript for all other browsers:
|
||||
|
||||
The researches who disclosed the issue also made an extension available below. Again, **nothing is required in Tor Browser**. This path is not our preferred path but is still available if you do not want to use NoScript.
|
||||
|
||||
- Lekuidator+ extension for Chromium based browsers (Brave, Chrome, Edge, and other Chromium-based browsers): <https://chrome.google.com/webstore/detail/leakuidator%2B/hhfpajcjkikoocmmhcimllpinjnbedll>
|
||||
- Lekuidator+ extension for Firefox (Firefox, and other Firefox-based browsers except Tor Browser): <https://addons.mozilla.org/en-US/firefox/addon/leakuidatorplus/>
|
||||
|
||||
Separating identities via separate browsers or even with VMs is not enough to avoid this attack. However, another solution is to make sure that when you start working with an anonymous identity, you entirely close all activities linked to other identities. The vulnerability only works if you're actively logged into a non-anonymous identity. The issue with this is that it can hinder effective workflow, as multitasking across multiple identities becomes impossible.
|
||||
|
||||
@@ -2285,8 +2307,6 @@ When using Tor Browser, you should click the little shield Icon (upper right, ne
|
||||
|
||||
We would recommend the "Safer" level for most cases. The Safest level should be enabled if you think you are accessing suspicious or dangerous websites or if you are extra paranoid. The Safest mode will also most likely break many websites that rely actively on JavaScript.
|
||||
|
||||
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks][Microarchitectural Side-channel Deanonymization Attacks:].**
|
||||
|
||||
If you are extra paranoid, use the "Safest" level by default and consider downgrading to Safer is the website is unusable because of Javascript blocking.
|
||||
|
||||
Lastly, while using Tor Browser on Tails on the "Safer" level, please consider [Appendix A5: Additional browser precautions with JavaScript enabled]
|
||||
@@ -3815,7 +3835,7 @@ Remember that in this case, we recommend having two VPN accounts. Both paid with
|
||||
|
||||
If you intend to only use Tor over VPN, you only need one VPN account.
|
||||
|
||||
See [Appendix R: Installing a VPN on your VM or Host OS][Appendix R: Installing a VPN on your VM or Host OS.] for instructions.
|
||||
See [Appendix R: Installing a VPN on your VM or Host OS][Appendix R: Installing a VPN on your VM or Host OS] for instructions.
|
||||
|
||||
### Whonix Virtual Machines:
|
||||
|
||||
@@ -4209,7 +4229,7 @@ Test that KeePassXC is working before going to the next step.
|
||||
|
||||
**If you cannot use a VPN at all in a hostile environment, skip this step.**
|
||||
|
||||
Otherwise, see [Appendix R: Installing a VPN on your VM or Host OS][Appendix R: Installing a VPN on your VM or Host OS.] to install a VPN client on your client VM.
|
||||
Otherwise, see [Appendix R: Installing a VPN on your VM or Host OS][Appendix R: Installing a VPN on your VM or Host OS] to install a VPN client on your client VM.
|
||||
|
||||
This should conclude the Route and you should now be ready.
|
||||
|
||||
@@ -10390,8 +10410,8 @@ There are three VPN companies recommended by PrivacyGuides.org (<https://www.pri
|
||||
Here are their logging policies:
|
||||
|
||||
- Mullvad: <https://mullvad.net/en/help/no-logging-data-policy/> <sup>[[Archive.org]](https://web.archive.org/web/https://mullvad.net/en/help/no-logging-data-policy/)</sup>
|
||||
- iVPN: <https://www.ivpn.net/privacy/> <sup>[[Archive.org]](https://web.archive.org/web/https://mullvad.net/en/help/no-logging-data-policy/](https://www.ivpn.net/privacy/)</sup>
|
||||
- ProtonVPN: <https://protonvpn.com/support/no-logs-vpn/> <sup>[[Archive.org]](https://web.archive.org/web/https://mullvad.net/en/help/no-logging-data-policy/](https://www.ivpn.net/privacy/)</sup>
|
||||
- iVPN: <https://www.ivpn.net/privacy/> <sup>[[Archive.org]](https://web.archive.org/web/https://www.ivpn.net/privacy/)</sup>
|
||||
- ProtonVPN: <https://protonvpn.com/support/no-logs-vpn/> <sup>[[Archive.org]](https://web.archive.org/web/https://protonvpn.com/support/no-logs-vpn/)</sup>
|
||||
|
||||
In addition, we will also mention a newcomer to watch: Safing SPN <https://safing.io/> <sup>[[Archive.org]][621]</sup>) which (while still in the alpha stage at the time of this writing) which also accepts cash and has a very distinct new concept for a VPN which provides benefits similar to Tor Stream isolation with their "SPN"). Note that Safing SPN is not available on macOS at the moment. This possibility is "provisional" and at your own risk, but we think was worth mentioning.
|
||||
|
||||
@@ -10585,7 +10605,7 @@ The process is simple:
|
||||
|
||||
Ideally, this should "not be an issue" since this guide provides multiple ways of hiding your origin IP using VPNs and Tor. But if you are in a situation where VPN and Tor are not an option, then this could be your only security.
|
||||
|
||||
# Appendix R: Installing a VPN on your VM or Host OS.
|
||||
# Appendix R: Installing a VPN on your VM or Host OS
|
||||
|
||||
Download the VPN client installer of your cash paid VPN service and install it on Host OS (Tor over VPN, VPN over Tor over VPN) or the VM of your choice (VPN over Tor):
|
||||
|
||||
@@ -10979,7 +10999,7 @@ If you are to resort to this, you should never do so from a monitored/known netw
|
||||
|
||||
# Appendix V: What browser to use in your Guest VM/Disposable VM
|
||||
|
||||
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks:].**
|
||||
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks:] for all browsers except Tor Browser.**
|
||||
|
||||
There are 6 possibilities of browser to use on your guest/disposable VM:
|
||||
|
||||
@@ -11717,8 +11737,6 @@ Hopefully, these bridges should be enough to get you connected even in a hostile
|
||||
If not, consider [Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option]
|
||||
|
||||
# Appendix Y: Installing and using desktop Tor Browser
|
||||
|
||||
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks:].**
|
||||
|
||||
## Installation:
|
||||
|
||||
@@ -12325,26 +12343,28 @@ Also please consider reading: **<https://github.com/monero-project/monero/blob/m
|
||||
|
||||
Here are various threat modeling resources if you want to go deeper in threat modeling.
|
||||
|
||||
- (My personal favorite) LINDDUN <https://www.linddun.org/> <sup>[[Archive.org]][739]</sup>
|
||||
- The one we recommend: LINDDUN (Linkability, Identifiability, Non-repudiation, Detectability, Disclosure of information, Unawareness, and Non-compliance) <https://www.linddun.org/> <sup>[[Archive.org]][739]</sup>.
|
||||
- Researchers created an online tool to help make your threat model at <https://www.linddun.org/go><sup>[[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go)</sup>.
|
||||
- It is synergistic with STRIDE below.
|
||||
- It is focused on privacy but is clearly perfectly suitable for anonymity.
|
||||
- It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers.
|
||||
- It is used in the making of the Threat Modeling Manifesto: <https://www.threatmodelingmanifesto.org/> <sup>[[Archive.org]][745]</sup>
|
||||
|
||||
![][1389]
|
||||
(Illustration from [LINDDUN2015])
|
||||
|
||||
Here are alternative resources and models if LINDDUN doesn't suit you:
|
||||
|
||||
- Online Operations Security: [https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]
|
||||
|
||||
- STRIDE <https://en.wikipedia.org/wiki/STRIDE_%28security%29> <sup>[[Wikiless]][740]</sup> <sup>[[Archive.org]][741]</sup>
|
||||
|
||||
- PASTA <https://versprite.com/tag/pasta-threat-modeling/> <sup>[[Archive.org]][742]</sup>
|
||||
|
||||
And there are quite a few others too, see:
|
||||
|
||||
|
||||
- <https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/> <sup>[[Archive.org]][743]</sup>
|
||||
|
||||
- <https://www.geeksforgeeks.org/threat-modelling/> <sup>[[Archive.org]][744]</sup>
|
||||
|
||||
You can find some introduction on these on these projects:
|
||||
|
||||
- Threat Modeling Manifesto: <https://www.threatmodelingmanifesto.org/> <sup>[[Archive.org]][745]</sup>
|
||||
|
||||
- OWASP: <https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html> <sup>[[Archive.org]][746]</sup>
|
||||
|
||||
- Online Operations Security: [https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]
|
||||
|
||||
# Appendix B4: Important notes about evil-maid and tampering
|
||||
|
||||
Your context needs to be taken into account.
|
||||
@@ -12355,6 +12375,24 @@ On the other hand, allowing the attack but detecting it will not let your advers
|
||||
|
||||
See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some tips.
|
||||
|
||||
# Appendix B5: Types of CPU attacks:
|
||||
|
||||
Select security issues plague many Intel CPUs, such as transient execution attacks (formerly called speculative execution side channel methods). Here you can check your CPU against affected micro-processors with known bugs <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> <sup>[[Archive.org]](https://web.archive.org/web/20220814123250/https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html)</sup>.
|
||||
|
||||
The Advanced Programmable Interrupt Controller (APIC) is an integrated CPU component responsible for accepting, prioritizing, and dispatching interrupts to logical processors (LPs). The APIC can operate in xAPIC mode, also known as legacy mode, in which APIC configuration registers are exposed through a memory-mapped I/O (MMIO) page.
|
||||
|
||||
Enter AEPIC (stylized ÆPIC), the first architectural CPU bug that leaks stale data from the microarchitecture without using a side channel. It architecturally leaks stale data incorrectly returned by reading undefined APIC-register ranges. This novel method was revealed in the paper *ÆPIC Leak: Architecturally Leaking Uninitialized Data from the
|
||||
Microarchitecture* which you can read here: [Borrello2022AEPIC](https://aepicleak.com/aepicleak.pdf) <sup>[[Archive.org]](https://web.archive.org/web/20220812101719/https://aepicleak.com/aepicleak.pdf)</sup>
|
||||
|
||||
Model-specific registers (MSRs) and their configuration bits can also be detected automatically on Intel and AMD CPUs: [Kogler2022](https://github.com/IAIK/msrevelio) <sup>[[Archive.org]](https://web.archive.org/web/20220814125349/https://andreaskogler.com/papers/msrtemplating.pdf)</sup>. This allows an attacker (with heavy knowledge of CPU functionality) to view information about the MSRs, which are essentially special CPU registers allowing interaction with low-level CPU features and advanced configuration of the CPU's behavior. Modern x86 CPUs have hundreds of these, which are usually documented very little and in increasingly less verbosity over the past few years.
|
||||
|
||||
#### Some other microarchitecture bugs:
|
||||
|
||||
- [PLATYPUS](https://platypusattack.com/) <sup>[[Archive.org]](https://web.archive.org/web/20220814132343/https://platypusattack.com/)</sup> - Software-based Power Side-Channel Attacks on x86, which shows how an unprivileged attacker can leak AES-NI keys from Intel SGX and the Linux kernel and break kernel address-space layout randomization (KASLR).
|
||||
- [SQUIP](https://www.nextplatform.com/2022/08/11/squip-side-channel-attack-rattles-amds-zen-cores/) <sup>[[Archive.org]](https://web.archive.org/web/20220812082548/https://www.nextplatform.com/2022/08/11/squip-side-channel-attack-rattles-amds-zen-cores/)</sup> - Scheduler Queue Usage via Interface Probing. All of AMD's Zen CPUs are vulnerable to a medium-severity flaw which can allow threat actors to run side-channel attacks.
|
||||
- [Hertzbleed](https://www.schneier.com/blog/archives/2022/06/hertzbleed-a-new-side-channel-attack.html) <sup>[[Archive.org]](https://web.archive.org/web/20220712000058/https://www.schneier.com/blog/archives/2022/06/hertzbleed-a-new-side-channel-attack.html)</sup> - Deducing cryptographic keys by analyzing power consumption has long been an attack, but it’s not generally viable because measuring power consumption is often hard. This new attack measures power consumption by measuring time, making it easier to exploit.
|
||||
- [Retbleed](https://www.bleepingcomputer.com/news/security/new-retbleed-speculative-execution-cpu-attack-bypasses-retpoline-fixes/) <sup>[[Archive.org]](https://web.archive.org/web/20220804151557/https://www.bleepingcomputer.com/news/security/new-retbleed-speculative-execution-cpu-attack-bypasses-retpoline-fixes/)</sup> - Retbleed focuses on return instructions, which are part of the retpoline software mitigation against the speculative execution class of attacks that became known starting early 2018, with Spectre.
|
||||
|
||||
---
|
||||
|
||||
# References:
|
||||
@@ -13650,7 +13688,7 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
||||
[Socks Proxy VPS:]: #socks-proxy-vps
|
||||
[Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option]: #appendix-p-accessing-the-internet-as-safely-as-possible-when-tor-and-vpns-are-not-an-option
|
||||
[Appendix Q: Using long-range Antenna to connect to Public Wi-Fis from a safe distance:]: #appendix-q-using-long-range-antenna-to-connect-to-public-wi-fis-from-a-safe-distance
|
||||
[Appendix R: Installing a VPN on your VM or Host OS.]: #appendix-r-installing-a-vpn-on-your-vm-or-host-os.
|
||||
[Appendix R: Installing a VPN on your VM or Host OS]: #appendix-r-installing-a-vpn-on-your-vm-or-host-os
|
||||
[Appendix S: Check your network for surveillance/censorship using OONI]: #appendix-s-check-your-network-for-surveillancecensorship-using-ooni
|
||||
[Appendix T: Checking files for malware]: #appendix-t-checking-files-for-malware
|
||||
[Integrity (if available):]: #integrity-if-available
|
||||
@@ -13722,8 +13760,10 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
||||
[Appendix B2: Monero Disclaimer]: #appendix-b2-monero-disclaimer
|
||||
[Appendix B3: Threat modeling resources]: #appendix-b3-threat-modeling-resources
|
||||
[Appendix B4: Important notes about evil-maid and tampering]: #appendix-b4-important-notes-about-evil-maid-and-tampering
|
||||
[Appendix B5: Types of CPU attacks:]: #appendix-b5-types-of-cpu-attacks
|
||||
[References:]: #references
|
||||
[cc-by-nc-4.0]: https://creativecommons.org/licenses/by-nc/4.0/
|
||||
[LINDDUN2015]: https://lirias.kuleuven.be/retrieve/295669
|
||||
[27]: https://web.archive.org/web/https://creativecommons.org/licenses/by-nc/4.0/
|
||||
[https://matrix.to/#/#anonymity:matrix.org]: https://matrix.to/#/
|
||||
[28]: https://nitter.net/AnonyPla
|
||||
@@ -13776,8 +13816,6 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
||||
[75]: https://yewtu.be/watch?v=siCk4pGGcqA
|
||||
[76]: https://yewtu.be/watch?v=mYsTBPqbya8
|
||||
[77]: https://yewtu.be/watch?v=bKH5nGLgi08&t=2834s
|
||||
[78]: https://wikiless.org/wiki/Transient_execution_CPU_vulnerability
|
||||
[79]: https://web.archive.org/web/https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability
|
||||
[80]: https://web.archive.org/web/https://github.com/speed47/spectre-meltdown-checker
|
||||
[81]: https://web.archive.org/web/https://www.grc.com/inspectre.htm
|
||||
[82]: https://web.archive.org/web/https://www.whonix.org/wiki/Spectre_Meltdown
|
||||
@@ -14449,7 +14487,6 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
||||
[743]: https://web.archive.org/web/https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/
|
||||
[744]: https://web.archive.org/web/https://www.geeksforgeeks.org/threat-modelling/
|
||||
[745]: https://web.archive.org/web/https://www.threatmodelingmanifesto.org/
|
||||
[746]: https://web.archive.org/web/https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
|
||||
[https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]: https://web.archive.org/web/20210711215728/https://github.com/devbret/online-opsec
|
||||
[747]: https://web.archive.org/web/https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2016/02/Telemedia_Act__TMA_.pdf
|
||||
[748]: https://wikiless.org/wiki/Don%27t_be_evil
|
||||
@@ -15089,3 +15126,5 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
|
||||
[1385]: https://web.archive.org/web/20220516000616/https://officercia.mirror.xyz/WeAilwJ9V4GIVUkYa7WwBwV2II9dYwpdPTp3fNsPFjo
|
||||
[1386]: https://web.archive.org/web/20220720023429/https://leakuidatorplusteam.github.io/
|
||||
[1387]: https://web.archive.org/web/20220801151048/https://support.torproject.org/glossary/moat/
|
||||
[1389]: media/image59.png
|
||||
|
||||
|
||||
Reference in New Issue
Block a user