Refactored headings

This commit is contained in:
Sun Knudsen 2020-08-10 19:35:31 -04:00
parent 27491816c4
commit 10d3e770b3
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
7 changed files with 48 additions and 48 deletions

View File

@ -14,37 +14,37 @@ Publication date: 2020-07-18T10:28:23.605Z
## iOS guide
#### Step 1 (on Mac): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator)
### Step 1 (on Mac): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator)
#### Step 2 (on Mac): create new profile using <kbd>cmd + n</kbd>
### Step 2 (on Mac): create new profile using <kbd>cmd + n</kbd>
#### Step 3 (on Mac): configure "General" settings
### Step 3 (on Mac): configure "General" settings
![apple-configurator-general](./apple-configurator-general.png?shadow=1)
#### Step 4 (on iPhone): find APN settings
### Step 4 (on iPhone): find APN settings
Open "Settings", then "Cellular", then "Cellular Data Network".
![ios-cellular-data-network](./ios-cellular-data-network.png?shadow=1&width=240)
#### Step 5 (on Mac): configure "Cellular" settings
### Step 5 (on Mac): configure "Cellular" settings
![apple-configurator-cellular](./apple-configurator-cellular.png?shadow=1)
#### Step 6 (on Mac): save provisioning profile
### Step 6 (on Mac): save provisioning profile
#### Step 7 (on Mac): connect iPhone to Mac
### Step 7 (on Mac): connect iPhone to Mac
#### Step 8 (on Mac): double-click on iPhone
### Step 8 (on Mac): double-click on iPhone
![apple-configurator-iphone](./apple-configurator-iphone.png?shadow=1)
#### Step 9 (on Mac): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add"
### Step 9 (on Mac): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add"
![apple-configurator-add-profile](./apple-configurator-add-profile.png?shadow=1)
#### Step 10 (on iPhone): review profile
### Step 10 (on iPhone): review profile
Open "Settings", then "Profile Downloaded" and tap "Install"
@ -52,13 +52,13 @@ Open "Settings", then "Profile Downloaded" and tap "Install"
## macOS guide
#### Step 1: list network interfaces
### Step 1: list network interfaces
```shell
networksetup -listallnetworkservices
```
#### Step 2: disable IPv6
### Step 2: disable IPv6
```shell
networksetup -setv6off "Wi-Fi"
@ -69,13 +69,13 @@ networksetup -setv6off "Thunderbolt Ethernet"
## Want things back the way they were before following this guide? No problem!
#### Step 1 (on iPhone): remove provisioning profile
### Step 1 (on iPhone): remove provisioning profile
Open "Settings", then "General", then "Profile", and tap provisioning profile, then "Remove Profile".
![ios-remove-profile](./ios-remove-profile.png?shadow=1&width=240)
#### Step 2 (on Mac): set network interfaces to automatic
### Step 2 (on Mac): set network interfaces to automatic
```shell
networksetup -setv6automatic "Wi-Fi"

View File

@ -14,25 +14,25 @@ Publication date: 2020-06-18T00:00:00.000Z
## Installation guide
#### Step 1: install [Homebrew](https://brew.sh/)
### Step 1: install [Homebrew](https://brew.sh/)
```shell
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)"
```
#### Step 2: disable analytics
### Step 2: disable analytics
```shell
brew analytics off
```
#### Step 3: install [GnuPG](https://gnupg.org/)
### Step 3: install [GnuPG](https://gnupg.org/)
```shell
brew install gnupg
```
#### Step 4: generate PGP key pair
### Step 4: generate PGP key pair
```console
$ gpg --full-generate-key
@ -91,7 +91,7 @@ uid John Doe <john@example.net>
sub rsa4096 2020-06-16 [E]
```
#### Step 5: set default PGP key server to `hkps://keys.openpgp.org`
### Step 5: set default PGP key server to `hkps://keys.openpgp.org`
```shell
echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf
@ -101,13 +101,13 @@ echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf
## Usage guide
#### Export Johns PGP public key
### Export Johns PGP public key
```shell
gpg --armor --export john@example.net > ~/Desktop/john.asc
```
#### Import Suns PGP public key
### Import Suns PGP public key
```shell
gpg --keyserver hkps://keys.openpgp.org --recv-keys 0xC1323A377DE14C8B
@ -119,7 +119,7 @@ or
curl https://sunknudsen.com/sunknudsen.asc | gpg --import
```
#### Confirm Suns PGP public key is legit using its fingerprint
### Confirm Suns PGP public key is legit using its fingerprint
```console
$ gpg --fingerprint hello@sunknudsen.com
@ -138,7 +138,7 @@ See https://sunknudsen.com/, https://github.com/sunknudsen/pgp-public-key and ht
👍
#### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode)
### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode)
```console
$ gpg --encrypt --sign --armor --output ~/Desktop/encrypted.asc -r john@example.net -r hello@sunknudsen.com
@ -156,7 +156,7 @@ Use this key anyway? (y/N) y
This is a test!
```
#### Decrypt message to stdout and decode quoted-printable characters
### Decrypt message to stdout and decode quoted-printable characters
```console
$ gpg --decrypt /Users/johndoe/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)'
@ -170,7 +170,7 @@ gpg: Good signature from "John Doe <john@example.net>" [ultimate]
This is a test!
```
#### Clear passphrase from GnuPG cache
### Clear passphrase from GnuPG cache
```shell
gpg-connect-agent reloadagent /bye

View File

@ -10,13 +10,13 @@ Publication date: 2020-05-15T00:00:00.000Z
[![How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube](how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences.png)](https://www.youtube.com/watch?v=uYoJ7U0OMCY "How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube")
#### Step 1: make sure you are running the latest version of Firefox
### Step 1: make sure you are running the latest version of Firefox
#### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw)
### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw)
#### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection`
### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection`
#### Step 4: open `about:config` and set the following
### Step 4: open `about:config` and set the following
```
dom.event.clipboardevents.enabled = false

View File

@ -10,7 +10,7 @@ Publication date: 2020-06-05T00:00:00.000Z
[![How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube](<how-to-protect-mac-computers-from-cold-boot-attacks-(also-known-as-an-evil-maid-attack).png>)](https://www.youtube.com/watch?v=d_M18sq0TIQ "How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube")
#### Run the following `pmset` command using the Terminal.
### Run the following `pmset` command using the Terminal.
```shell
sudo pmset -a destroyfvkeyonstandby 1 hibernatemode 25 standbydelaylow 0 standbydelayhigh 0
@ -30,7 +30,7 @@ See `man pmset` for more information.
## Want things back the way they were before following this guide? No problem!
#### Run the following `pmset` command using the Terminal.
### Run the following `pmset` command using the Terminal.
```shell
sudo pmset -a destroyfvkeyonstandby 0 hibernatemode 3 standbydelaylow 10800 standbydelayhigh 86400

View File

@ -12,19 +12,19 @@ Publication date: 2020-06-25T00:00:00.000Z
## Installation guide
#### Step 1: install [Homebrew](https://brew.sh/)
### Step 1: install [Homebrew](https://brew.sh/)
```shell
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)"
```
#### Step 2: disable analytics
### Step 2: disable analytics
```shell
brew analytics off
```
#### Step 3: install [ExifTool](https://exiftool.org/)
### Step 3: install [ExifTool](https://exiftool.org/)
```shell
brew install exiftool
@ -34,13 +34,13 @@ brew install exiftool
## Usage guide
#### View EXIF metadata
### View EXIF metadata
```shell
exiftool -n /path/to/image.jpg
```
#### Remove EXIF metadata
### Remove EXIF metadata
```shell
exiftool -all= /path/to/image.jpg

View File

@ -12,14 +12,14 @@ Publication date: 2020-05-19T00:00:00.000Z
> Heads up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If thats your case, please consider upgrading to Catalina.
#### Step 1: create `/usr/local/sbin` folder
### Step 1: create `/usr/local/sbin` folder
```shell
sudo mkdir /usr/local/sbin
sudo chown $(whoami):admin /usr/local/sbin/
```
#### Step 2: create `spoof.sh` script
### Step 2: create `spoof.sh` script
> When copy/pasting commands that start with `cat << "EOF"`, select all lines (from `cat << "EOF"` to `EOF`) at once as they are part of the same (single) command
@ -125,13 +125,13 @@ echo "Spoofed MAC address of en0 interface to $mac_address"
Set spoofed MAC address using `ifconfig` and echo spoofed MAC address
#### Step 3: make `spoof.sh` executable
### Step 3: make `spoof.sh` executable
```shell
chmod +x /usr/local/sbin/spoof.sh
```
#### Step 4: download [first_names.txt](first_names.txt)
### Step 4: download [first_names.txt](first_names.txt)
This list includes the top 2048 most popular baby names from the [USA Social Security Administration](https://www.ssa.gov/oact/babynames/limits.html).
@ -139,7 +139,7 @@ This list includes the top 2048 most popular baby names from the [USA Social Sec
curl -o /usr/local/sbin/first_names.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/first_names.txt
```
#### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt)
### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt)
This list includes 768 Apple MAC address prefixes.
@ -147,7 +147,7 @@ This list includes 768 Apple MAC address prefixes.
curl -o /usr/local/sbin/mac_address_prefixes.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/mac_address_prefixes.txt
```
#### Step 6: create `local.spoof.plist` launch daemon
### Step 6: create `local.spoof.plist` launch daemon
This step is responsible for running `spoof.sh` every time your Mac boots.
@ -172,7 +172,7 @@ cat << "EOF" | sudo tee /Library/LaunchDaemons/local.spoof.plist > /dev/null
EOF
```
#### Step 7: reboot and confirm hostname and MAC address have been spoofed
### Step 7: reboot and confirm hostname and MAC address have been spoofed
```shell
# Spoofed hostname
@ -193,7 +193,7 @@ networksetup -listallhardwareports | awk -v RS= '/en0/{print $NF}'
## Want things back the way they were before following this guide? No problem!
#### Step 1: set computer name, local hostname and hostname
### Step 1: set computer name, local hostname and hostname
Replace `John Doe` with a value to your liking. Dont forget to replace empty spaces by `-` for `LocalHostName` and `HostName`.
@ -203,7 +203,7 @@ sudo scutil --set LocalHostName "John-Doe"
sudo scutil --set HostName "John-Doe"
```
#### Step 2: set MAC address to factory value
### Step 2: set MAC address to factory value
Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/local.spoof.plist` launch daemon and rebooting will reset your MAC address to its factory value.
@ -211,7 +211,7 @@ Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/lo
sudo rm /Library/LaunchDaemons/local.spoof.plist
```
#### Step 3 (optional): delete script and datasets
### Step 3 (optional): delete script and datasets
```shell
rm /usr/local/sbin/spoof.sh

View File

@ -10,13 +10,13 @@ Publication date: 2020-05-13T00:00:00.000Z
[![How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube](how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles.png)](https://www.youtube.com/watch?v=Upib_vq_EB8 "How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube")
#### Step 1: create Firefox profile
### Step 1: create Firefox profile
```shell
/Applications/Firefox.app/Contents/MacOS/firefox-bin -p
```
#### Step 2: open Firefox profile
### Step 2: open Firefox profile
> Heads-up: in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`).