From 56678b3567143dd9985827cc13ab951d72ae6af0 Mon Sep 17 00:00:00 2001 From: nopeitsnothing Date: Sun, 21 Dec 2025 23:57:18 -0500 Subject: [PATCH] Persistent plausible deniability Signed-off-by: nopeitsnothing --- docs/guide/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/guide/index.md b/docs/guide/index.md index 33cf1f5..31ff5fe 100644 --- a/docs/guide/index.md +++ b/docs/guide/index.md @@ -1456,7 +1456,7 @@ Now that you know what is possible, you should also consider threats and adversa - If your main concerns are remote adversaries that might uncover your online identity on various platforms, you should consider the Tails, Whonix, or Qubes OS routes (listed in order of difficulty). -- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider the Tails route, including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix within Tails][Persistent Plausible Deniability using Whonix within Tails:]).** +- If you want system-wide plausible deniability[^311]'[^294] despite the risks[^295]'[^314], consider the Tails route, including the persistent plausible deniability section (see [Persistent Plausible Deniability using Whonix & Tails](#persistent-plausible-deniability-using-whonix-tails)).** - If you are in a hostile environment where Tor/VPN usage alone is impossible/dangerous/suspicious, consider the Tails route (without actually using Tor), or more advanced routes like Whonix or Qubes OS.