diff --git a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md index e3cb508..e60647a 100644 --- a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md +++ b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md @@ -14,37 +14,37 @@ Publication date: 2020-07-18T10:28:23.605Z ## iOS guide -#### Step 1 (on Mac): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator) +### Step 1 (on Mac): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator) -#### Step 2 (on Mac): create new profile using cmd + n +### Step 2 (on Mac): create new profile using cmd + n -#### Step 3 (on Mac): configure "General" settings +### Step 3 (on Mac): configure "General" settings ![apple-configurator-general](./apple-configurator-general.png?shadow=1) -#### Step 4 (on iPhone): find APN settings +### Step 4 (on iPhone): find APN settings Open "Settings", then "Cellular", then "Cellular Data Network". ![ios-cellular-data-network](./ios-cellular-data-network.png?shadow=1&width=240) -#### Step 5 (on Mac): configure "Cellular" settings +### Step 5 (on Mac): configure "Cellular" settings ![apple-configurator-cellular](./apple-configurator-cellular.png?shadow=1) -#### Step 6 (on Mac): save provisioning profile +### Step 6 (on Mac): save provisioning profile -#### Step 7 (on Mac): connect iPhone to Mac +### Step 7 (on Mac): connect iPhone to Mac -#### Step 8 (on Mac): double-click on iPhone +### Step 8 (on Mac): double-click on iPhone ![apple-configurator-iphone](./apple-configurator-iphone.png?shadow=1) -#### Step 9 (on Mac): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add" +### Step 9 (on Mac): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add" ![apple-configurator-add-profile](./apple-configurator-add-profile.png?shadow=1) -#### Step 10 (on iPhone): review profile +### Step 10 (on iPhone): review profile Open "Settings", then "Profile Downloaded" and tap "Install" @@ -52,13 +52,13 @@ Open "Settings", then "Profile Downloaded" and tap "Install" ## macOS guide -#### Step 1: list network interfaces +### Step 1: list network interfaces ```shell networksetup -listallnetworkservices ``` -#### Step 2: disable IPv6 +### Step 2: disable IPv6 ```shell networksetup -setv6off "Wi-Fi" @@ -69,13 +69,13 @@ networksetup -setv6off "Thunderbolt Ethernet" ## Want things back the way they were before following this guide? No problem! -#### Step 1 (on iPhone): remove provisioning profile +### Step 1 (on iPhone): remove provisioning profile Open "Settings", then "General", then "Profile", and tap provisioning profile, then "Remove Profile". ![ios-remove-profile](./ios-remove-profile.png?shadow=1&width=240) -#### Step 2 (on Mac): set network interfaces to automatic +### Step 2 (on Mac): set network interfaces to automatic ```shell networksetup -setv6automatic "Wi-Fi" diff --git a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md index 4950e8f..0459a32 100644 --- a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md +++ b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md @@ -14,25 +14,25 @@ Publication date: 2020-06-18T00:00:00.000Z ## Installation guide -#### Step 1: install [Homebrew](https://brew.sh/) +### Step 1: install [Homebrew](https://brew.sh/) ```shell /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" ``` -#### Step 2: disable analytics +### Step 2: disable analytics ```shell brew analytics off ``` -#### Step 3: install [GnuPG](https://gnupg.org/) +### Step 3: install [GnuPG](https://gnupg.org/) ```shell brew install gnupg ``` -#### Step 4: generate PGP key pair +### Step 4: generate PGP key pair ```console $ gpg --full-generate-key @@ -91,7 +91,7 @@ uid John Doe sub rsa4096 2020-06-16 [E] ``` -#### Step 5: set default PGP key server to `hkps://keys.openpgp.org` +### Step 5: set default PGP key server to `hkps://keys.openpgp.org` ```shell echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf @@ -101,13 +101,13 @@ echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf ## Usage guide -#### Export John’s PGP public key +### Export John’s PGP public key ```shell gpg --armor --export john@example.net > ~/Desktop/john.asc ``` -#### Import Sun’s PGP public key +### Import Sun’s PGP public key ```shell gpg --keyserver hkps://keys.openpgp.org --recv-keys 0xC1323A377DE14C8B @@ -119,7 +119,7 @@ or curl https://sunknudsen.com/sunknudsen.asc | gpg --import ``` -#### Confirm Sun’s PGP public key is legit using its fingerprint +### Confirm Sun’s PGP public key is legit using its fingerprint ```console $ gpg --fingerprint hello@sunknudsen.com @@ -138,7 +138,7 @@ See https://sunknudsen.com/, https://github.com/sunknudsen/pgp-public-key and ht 👍 -#### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode) +### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode) ```console $ gpg --encrypt --sign --armor --output ~/Desktop/encrypted.asc -r john@example.net -r hello@sunknudsen.com @@ -156,7 +156,7 @@ Use this key anyway? (y/N) y This is a test! ``` -#### Decrypt message to stdout and decode quoted-printable characters +### Decrypt message to stdout and decode quoted-printable characters ```console $ gpg --decrypt /Users/johndoe/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)' @@ -170,7 +170,7 @@ gpg: Good signature from "John Doe " [ultimate] This is a test! ``` -#### Clear passphrase from GnuPG cache +### Clear passphrase from GnuPG cache ```shell gpg-connect-agent reloadagent /bye diff --git a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md index f2c645a..a57485e 100644 --- a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md +++ b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md @@ -10,13 +10,13 @@ Publication date: 2020-05-15T00:00:00.000Z [![How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube](how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences.png)](https://www.youtube.com/watch?v=uYoJ7U0OMCY "How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube") -#### Step 1: make sure you are running the latest version of Firefox +### Step 1: make sure you are running the latest version of Firefox -#### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw) +### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw) -#### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection` +### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection` -#### Step 4: open `about:config` and set the following +### Step 4: open `about:config` and set the following ``` dom.event.clipboardevents.enabled = false diff --git a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md index 0661c2d..cf19294 100644 --- a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md +++ b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md @@ -10,7 +10,7 @@ Publication date: 2020-06-05T00:00:00.000Z [![How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube]()](https://www.youtube.com/watch?v=d_M18sq0TIQ "How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube") -#### Run the following `pmset` command using the Terminal. +### Run the following `pmset` command using the Terminal. ```shell sudo pmset -a destroyfvkeyonstandby 1 hibernatemode 25 standbydelaylow 0 standbydelayhigh 0 @@ -30,7 +30,7 @@ See `man pmset` for more information. ## Want things back the way they were before following this guide? No problem! -#### Run the following `pmset` command using the Terminal. +### Run the following `pmset` command using the Terminal. ```shell sudo pmset -a destroyfvkeyonstandby 0 hibernatemode 3 standbydelaylow 10800 standbydelayhigh 86400 diff --git a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md index 29c7a0e..23c3fd2 100644 --- a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md +++ b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md @@ -12,19 +12,19 @@ Publication date: 2020-06-25T00:00:00.000Z ## Installation guide -#### Step 1: install [Homebrew](https://brew.sh/) +### Step 1: install [Homebrew](https://brew.sh/) ```shell /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" ``` -#### Step 2: disable analytics +### Step 2: disable analytics ```shell brew analytics off ``` -#### Step 3: install [ExifTool](https://exiftool.org/) +### Step 3: install [ExifTool](https://exiftool.org/) ```shell brew install exiftool @@ -34,13 +34,13 @@ brew install exiftool ## Usage guide -#### View EXIF metadata +### View EXIF metadata ```shell exiftool -n /path/to/image.jpg ``` -#### Remove EXIF metadata +### Remove EXIF metadata ```shell exiftool -all= /path/to/image.jpg diff --git a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md index b4c0167..94412a0 100644 --- a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md +++ b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md @@ -12,14 +12,14 @@ Publication date: 2020-05-19T00:00:00.000Z > Heads up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If that’s your case, please consider upgrading to Catalina. -#### Step 1: create `/usr/local/sbin` folder +### Step 1: create `/usr/local/sbin` folder ```shell sudo mkdir /usr/local/sbin sudo chown $(whoami):admin /usr/local/sbin/ ``` -#### Step 2: create `spoof.sh` script +### Step 2: create `spoof.sh` script > When copy/pasting commands that start with `cat << "EOF"`, select all lines (from `cat << "EOF"` to `EOF`) at once as they are part of the same (single) command @@ -125,13 +125,13 @@ echo "Spoofed MAC address of en0 interface to $mac_address" Set spoofed MAC address using `ifconfig` and echo spoofed MAC address -#### Step 3: make `spoof.sh` executable +### Step 3: make `spoof.sh` executable ```shell chmod +x /usr/local/sbin/spoof.sh ``` -#### Step 4: download [first_names.txt](first_names.txt) +### Step 4: download [first_names.txt](first_names.txt) This list includes the top 2048 most popular baby names from the [USA Social Security Administration](https://www.ssa.gov/oact/babynames/limits.html). @@ -139,7 +139,7 @@ This list includes the top 2048 most popular baby names from the [USA Social Sec curl -o /usr/local/sbin/first_names.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/first_names.txt ``` -#### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt) +### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt) This list includes 768 Apple MAC address prefixes. @@ -147,7 +147,7 @@ This list includes 768 Apple MAC address prefixes. curl -o /usr/local/sbin/mac_address_prefixes.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/mac_address_prefixes.txt ``` -#### Step 6: create `local.spoof.plist` launch daemon +### Step 6: create `local.spoof.plist` launch daemon This step is responsible for running `spoof.sh` every time your Mac boots. @@ -172,7 +172,7 @@ cat << "EOF" | sudo tee /Library/LaunchDaemons/local.spoof.plist > /dev/null EOF ``` -#### Step 7: reboot and confirm hostname and MAC address have been spoofed +### Step 7: reboot and confirm hostname and MAC address have been spoofed ```shell # Spoofed hostname @@ -193,7 +193,7 @@ networksetup -listallhardwareports | awk -v RS= '/en0/{print $NF}' ## Want things back the way they were before following this guide? No problem! -#### Step 1: set computer name, local hostname and hostname +### Step 1: set computer name, local hostname and hostname Replace `John Doe` with a value to your liking. Don’t forget to replace empty spaces by `-` for `LocalHostName` and `HostName`. @@ -203,7 +203,7 @@ sudo scutil --set LocalHostName "John-Doe" sudo scutil --set HostName "John-Doe" ``` -#### Step 2: set MAC address to factory value +### Step 2: set MAC address to factory value Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/local.spoof.plist` launch daemon and rebooting will reset your MAC address to its factory value. @@ -211,7 +211,7 @@ Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/lo sudo rm /Library/LaunchDaemons/local.spoof.plist ``` -#### Step 3 (optional): delete script and datasets +### Step 3 (optional): delete script and datasets ```shell rm /usr/local/sbin/spoof.sh diff --git a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md index 676c35f..3db293b 100644 --- a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md +++ b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md @@ -10,13 +10,13 @@ Publication date: 2020-05-13T00:00:00.000Z [![How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube](how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles.png)](https://www.youtube.com/watch?v=Upib_vq_EB8 "How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube") -#### Step 1: create Firefox profile +### Step 1: create Firefox profile ```shell /Applications/Firefox.app/Contents/MacOS/firefox-bin -p ``` -#### Step 2: open Firefox profile +### Step 2: open Firefox profile > Heads-up: in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`).