diff --git a/how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md b/how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md index a9f8270..de4b39c 100644 --- a/how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md +++ b/how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md @@ -168,9 +168,9 @@ Error: mount_macfuse: the file system is not available (1) > Heads-up: given “FUSE for macOS” is a third-party extension, macOS prevents using the extension without explicit user consent (granted by clicking “Allow” in “System Preferences” / “Privacy & Security”). -![Allow extension 1](./allow-extension-1.png?shadow=1&width=420) +![Allow extension 1](./allow-extension-1.png) -![Allow extension 2](./allow-extension-2.png?shadow=1&width=668) +![Allow extension 2](./allow-extension-2.png) ```console $ veracrypt --text --create "$BACKUP_VOLUME_PATH" diff --git a/how-to-configure-borg-client-on-macos-using-command-line/README.md b/how-to-configure-borg-client-on-macos-using-command-line/README.md index 2f07fe0..50fd491 100644 --- a/how-to-configure-borg-client-on-macos-using-command-line/README.md +++ b/how-to-configure-borg-client-on-macos-using-command-line/README.md @@ -107,17 +107,17 @@ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC2cmGUEKwopEN0vpHl2yNoV/wvm21D1hOP/8V886iC Go to [SSH Keys](https://www.borgbase.com/account) and add `borg.pub` and `borg-append-only.pub` keys. -![Add SSH key](./borgbase-add-ssh-key.png?shadow=1) +![Add SSH key](./borgbase-add-ssh-key.png) -![SSH keys](./borgbase-ssh-keys.png?shadow=1) +![SSH keys](./borgbase-ssh-keys.png) #### Create repo Go to [Repositories](https://www.borgbase.com/account) and add repository. -![Add repository](./borgbase-add-repository.png?shadow=1) +![Add repository](./borgbase-add-repository.png) -![Repositories](./borgbase-repositories.png?shadow=1) +![Repositories](./borgbase-repositories.png) ### Step 4: generate and upload `authorized_keys` file (if using rsync.net) @@ -369,11 +369,11 @@ open /Applications/Borg\ Wrapper.app > Heads-up: given “Borg Wrapper” is developed outside the [Apple Developer Program](https://developer.apple.com/programs/), macOS prevents opening the app without explicit user consent (granted by clicking “Open Anyway” in “System Preferences” / “Privacy & Security”). -![Allow app 1](./allow-app-1.png?shadow=1&width=420) +![Allow app 1](./allow-app-1.png) -![Allow app 2](./allow-app-2.png?shadow=1&width=668) +![Allow app 2](./allow-app-2.png) -![Allow app 3](./allow-app-3.png?shadow=1&width=475) +![Allow app 3](./allow-app-3.png) Backup completed @@ -482,9 +482,9 @@ umount: /var/folders/dl/mbmsd2m51nb8dvhmtz114j8w0000gn/T/borg: not currently mou > Heads-up: given “FUSE for macOS” is a third-party extension, macOS prevents using the extension without explicit user consent (granted by clicking “Allow” in “System Preferences” / “Privacy & Security”). -![Allow extension 1](./allow-extension-1.png?shadow=1&width=420) +![Allow extension 1](./allow-extension-1.png) -![Allow extension 2](./allow-extension-2.png?shadow=1&width=668) +![Allow extension 2](./allow-extension-2.png) ```console $ borg-restore.sh diff --git a/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md b/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md index 2d9ccec..2d833cf 100644 --- a/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md +++ b/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md @@ -31,11 +31,11 @@ Pinned: Open “System Preferences”, click “Security & Privacy”, then “Firewall” and enable “Turn On Firewall”. -![firewall](firewall.png?shadow=1&width=668) +![firewall](./firewall.png) Then, click “Firewall Options…”, disable all options except “Enable stealth mode”. -![firewall-options](firewall-options.png?shadow=1&width=668) +![firewall-options](./firewall-options.png) ### Step 2: confirm PF is enabled diff --git a/how-to-create-encrypted-paper-backup/README.md b/how-to-create-encrypted-paper-backup/README.md index a2479dd..8a8a52e 100644 --- a/how-to-create-encrypted-paper-backup/README.md +++ b/how-to-create-encrypted-paper-backup/README.md @@ -681,7 +681,7 @@ Done The following image is now available on USB flash drive. -![0ed162fe](./0ed162fe.jpg?shadow=1) +![0ed162fe](./0ed162fe.jpg) ### Restore encrypted paper backup @@ -778,7 +778,7 @@ Done The following image is now available on USB flash drive. -![305ca16c](./305ca16c.jpg?shadow=1) +![305ca16c](./305ca16c.jpg) ### Secure erase flash drive diff --git a/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md b/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md index edd5329..1db252c 100644 --- a/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md +++ b/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md @@ -23,17 +23,17 @@ Pinned: ### Step 3 (on Mac): configure “General” settings -![apple-configurator-general](./apple-configurator-general.png?shadow=1) +![apple-configurator-general](./apple-configurator-general.png) ### Step 4 (on iPhone): find APN settings Open “Settings“, then “Cellular“, then “Cellular Data Network“. -![ios-cellular-data-network](./ios-cellular-data-network.png?shadow=1&width=375) +![ios-cellular-data-network](./ios-cellular-data-network.png) ### Step 5 (on Mac): configure “Cellular” settings -![apple-configurator-cellular](./apple-configurator-cellular.png?shadow=1) +![apple-configurator-cellular](./apple-configurator-cellular.png) ### Step 6 (on Mac): save provisioning profile @@ -41,17 +41,17 @@ Open “Settings“, then “Cellular“, then “Cellular Data Network“. ### Step 8 (on Mac): double-click on iPhone -![apple-configurator-iphone](./apple-configurator-iphone.png?shadow=1) +![apple-configurator-iphone](./apple-configurator-iphone.png) ### Step 9 (on Mac): click on “Profile” tab, then “Add Profiles…”, select saved provisioning profile and click “Add” -![apple-configurator-add-profile](./apple-configurator-add-profile.png?shadow=1) +![apple-configurator-add-profile](./apple-configurator-add-profile.png) ### Step 10 (on iPhone): review profile Open “Settings”, then “Profile Downloaded” and tap “Install” -![ios-install-profile](./ios-install-profile.png?shadow=1&width=375) +![ios-install-profile](./ios-install-profile.png) 👍 @@ -85,7 +85,7 @@ networksetup -setv6off "Thunderbolt Ethernet" Open “Settings”, then “General”, then “Profile”, and tap provisioning profile, then “Remove Profile”. -![ios-remove-profile](./ios-remove-profile.png?shadow=1&width=375) +![ios-remove-profile](./ios-remove-profile.png) ### Step 2 (on Mac): set network interfaces to automatic diff --git a/how-to-make-sure-app-is-not-running-in-the-background-on-macos/README.md b/how-to-make-sure-app-is-not-running-in-the-background-on-macos/README.md index 9b78b26..ab0a13a 100644 --- a/how-to-make-sure-app-is-not-running-in-the-background-on-macos/README.md +++ b/how-to-make-sure-app-is-not-running-in-the-background-on-macos/README.md @@ -76,7 +76,7 @@ launchctl unload -w {,~}/Library/LaunchAgents/$BUNDLE_IDENTIFIER_PREFIX*.plist Open “System Preferences”, click “Extensions” and disable app extensions (if any). -![core-sync](./core-sync.png?shadow=1) +![core-sync](./core-sync.png) ### Step 4: add `kill-apps` helper to `.zshrc` diff --git a/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md b/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md index bff9905..7739c68 100644 --- a/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md +++ b/how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md @@ -932,17 +932,17 @@ Open “Apple Configurator 2”, then click “File”, then “New Profile”. In “General”, enter “Self-hosted strongSwan VPN” in “Name”. -![apple-configurator-general](apple-configurator-general.png?shadow=1) +![apple-configurator-general](apple-configurator-general.png) In “Certificates”, click “Configure” and select “ca.crt”. Then click “+” and select “alice.p12”. The password is the one from [step 29](#step-29-generate-client-key-csr-cert-and-pkcs12). -![apple-configurator-certificates](apple-configurator-certificates.png?shadow=1) +![apple-configurator-certificates](apple-configurator-certificates.png) In “VPN”, click “Configure” and enter the settings from the following screenshot (replace `185.193.126.203` with IP of server). The “Child SA Params” are the same as “IKE SA Params”. -![apple-configurator-vpn](apple-configurator-vpn.png?shadow=1) +![apple-configurator-vpn](apple-configurator-vpn.png) Finally, click “File”, then “Save”, and save file as “alice.mobileconfig”. diff --git a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md index f507b44..911bc42 100644 --- a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md +++ b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md @@ -36,7 +36,7 @@ Open “Settings”, click “Profile Downloaded” and, finally, click “Insta Go to [https://mullvad.net/en/check](https://mullvad.net/en/check). -![Connection check](connection-check-ios.png?width=375) +![Connection check](connection-check-ios.png) No DNS leaks diff --git a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md index 0f0269a..0ef2383 100644 --- a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md +++ b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md @@ -29,13 +29,13 @@ Pinned: do shell script "nohup /Applications/Firefox.app/Contents/MacOS/firefox-bin -p \"work\" --no-remote > /dev/null 2>&1 &" ``` -![script-editor-step-1](./script-editor-step-1.png?shadow=1) +![script-editor-step-1](./script-editor-step-1.png) ### Step 3: export script as application Click “File”, then “Export…”, set “Export As” filename to “Firefox work” (or any other filename), select “Applications” folder (in “Favorites”), select “Application” file format and click “Save”. -![script-editor-step-2](./script-editor-step-2.png?shadow=1) +![script-editor-step-2](./script-editor-step-2.png) ### Step 4: set Firefox app environment variable diff --git a/how-to-use-time-machine-and-apfs-snapshots-on-macos/README.md b/how-to-use-time-machine-and-apfs-snapshots-on-macos/README.md index 7818ca3..ae95e7e 100644 --- a/how-to-use-time-machine-and-apfs-snapshots-on-macos/README.md +++ b/how-to-use-time-machine-and-apfs-snapshots-on-macos/README.md @@ -19,21 +19,21 @@ Pinned: > Heads-up: excluded folders vary depending on use case. -![Format Time Machine drive](./exclude.png?shadow=1) +![Format Time Machine drive](./exclude.png) ### Step 2: format Time Machine disk as “Mac OS Extended (Journaled, Encrypted)” using “Disk Utility” > WARNING: DATA ON TIME MACHINE DISK WILL BE PERMANENTLY DELETED. -![Format Time Machine drive](./format.png?shadow=1) +![Format Time Machine drive](./format.png) ### Step 3: enable “Encrypt Backup Disk” and click “Use as Backup Disk” -![Format Time Machine drive](./enable-time-machine.png?shadow=1&width=568) +![Format Time Machine drive](./enable-time-machine.png) ### Step 4: confirm encryption is enabled and enable “Show Time Machine in menu bar” -![Format Time Machine drive](./confirm-encryption.png?shadow=1) +![Format Time Machine drive](./confirm-encryption.png) Encrypted