Fixed heads-up typo

This commit is contained in:
Sun Knudsen 2020-09-10 15:27:28 -04:00
parent 214fcec7e6
commit 521e156676
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
7 changed files with 12 additions and 11 deletions

View File

@ -30,6 +30,7 @@ Please use comments on [YouTube](https://www.youtube.com/sunknudsen) or [PeerTub
## How to peer review and sign a guide
> Heads up: in order to establish a web of trust, peer reviewers must have public-facing track records and will be background checked.
> Heads-up: in order to establish a web of trust, peer reviewers must have public-facing track records and will be background checked.
### Step 1: clone [repo](https://github.com/sunknudsen/privacy-guides)

View File

@ -11,7 +11,7 @@ Publication date: 2020-08-26T14:07:36.767Z
[![How to backup and encrypt data privately and securely using rsync and VeraCrypt on macOS - YouTube](how-to-backup-and-encrypt-data-privately-and-securely-using-rsync-and-veracrypt-on-macos.png)](https://www.youtube.com/watch?v=1cz_ViFB6eE "How to backup and encrypt data privately and securely using rsync and VeraCrypt on macOS - YouTube")
> Heads up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)).
> Heads-up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)).
## Requirements
@ -96,7 +96,7 @@ VeraCrypt 1.24-Update7
### Step 10: set temporary environment variable
> Heads up: using `b` as encrypted volume file name to make things inconspicuous.
> Heads-up: using `b` as encrypted volume file name to make things inconspicuous.
`BACKUP_VOLUME_PATH` path to VeraCrypt volume
@ -106,9 +106,9 @@ BACKUP_VOLUME_PATH="/Volumes/Samsung BAR/b"
### Step 11: create encrypted volume
> Heads up: volume size cannot be increased later.
> Heads-up: volume size cannot be increased later.
> Heads up: Mac OS Extended filesystem required on macOS.
> Heads-up: Mac OS Extended filesystem required on macOS.
```console
$ veracrypt --text --create "$BACKUP_VOLUME_PATH"

View File

@ -11,7 +11,7 @@ Publication date: 2020-07-31T12:39:56.670Z
[![How to benchmark CPU, memory, disk and network performance of server using Speedtest and SysBench - YouTube](how-to-benchmark-cpu-memory-disk-and-network-performance-of-server-using-speedtest-and-sysbench.png)](https://www.youtube.com/watch?v=zcq2iZUcQQY "How to benchmark CPU, memory, disk and network performance of server using Speedtest and SysBench - YouTube")
> Heads up: Speedtest is known for tracking users therefore it is recommended to run the following benchmark tests on disposable servers.
> Heads-up: Speedtest is known for tracking users therefore it is recommended to run the following benchmark tests on disposable servers.
## Requirements

View File

@ -11,7 +11,7 @@ Publication date: 2020-08-21T15:42:23.029Z
[![How to configure self-hosted VPN kill switch using PF firewall on macOS - YouTube](how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos.png)](https://www.youtube.com/watch?v=wsYYGrEXWnk "How to configure self-hosted VPN kill switch using PF firewall on macOS - YouTube")
> Heads up: when following this guide, IKEv2/IPsec VPNs will likely be unresponsive for about 60 seconds at boot and wake. Not sure what causes this issue. Please submit a [PR](https://github.com/sunknudsen/privacy-guides/pulls) if you know how to fix it!
> Heads-up: when following this guide, IKEv2/IPsec VPNs will likely be unresponsive for about 60 seconds at boot and wake. Not sure what causes this issue. Please submit a [PR](https://github.com/sunknudsen/privacy-guides/pulls) if you know how to fix it!
## Requirements
@ -50,7 +50,7 @@ Status: Enabled
### Step 3: backup and override `/etc/pf.conf`
> Heads up: software updates will likely restore `/etc/pf.conf` to default. Remember to check `/etc/pf.conf` using `cat /etc/pf.conf` after updates and test kill switch.
> Heads-up: software updates will likely restore `/etc/pf.conf` to default. Remember to check `/etc/pf.conf` using `cat /etc/pf.conf` after updates and test kill switch.
```shell
sudo cp /etc/pf.conf /etc/pf.conf.backup

View File

@ -11,7 +11,7 @@ Publication date: 2020-07-18T10:28:23.605Z
[![How to disable IPv6 on iOS (cellular only) and macOS and why its a big deal for privacy - YouTube](how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy.png)](https://www.youtube.com/watch?v=Nzx9T7GtmT4 "How to disable IPv6 on iOS (cellular only) and macOS and why its a big deal for privacy - YouTube")
> Heads up: unfortunately this guide will not work on carriers or ISPs that have migrated their networks to IPv6-only.
> Heads-up: unfortunately this guide will not work on carriers or ISPs that have migrated their networks to IPv6-only.
## iOS guide
@ -65,7 +65,7 @@ Thunderbolt Ethernet
### Step 2: disable IPv6
> Heads up: use network interfaces found in [step 1](#step-1-list-network-interfaces) (most computers only have `Wi-Fi` interface)
> Heads-up: use network interfaces found in [step 1](#step-1-list-network-interfaces) (most computers only have `Wi-Fi` interface)
```shell
networksetup -setv6off "Wi-Fi"

View File

@ -11,7 +11,7 @@ Publication date: 2020-07-31T12:39:56.680Z
[![How to self-host a hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS - YouTube](how-to-self-host-a-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos.png)](https://www.youtube.com/watch?v=HY3F_vHuTFQ "How to self-host a hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS - YouTube")
> Heads up: when following this guide on IPv4-only servers (which is totally fine if one knows what one is doing), its likely IPv6 traffic will leak on iOS when clients are connected to carriers or ISPs running dual stack (IPv4 + IPv6) infrastructure. Leaks can be mitigated on iOS (cellular-only) and on macOS by following this [guide](../how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy).
> Heads-up: when following this guide on IPv4-only servers (which is totally fine if one knows what one is doing), its likely IPv6 traffic will leak on iOS when clients are connected to carriers or ISPs running dual stack (IPv4 + IPv6) infrastructure. Leaks can be mitigated on iOS (cellular-only) and on macOS by following this [guide](../how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy).
## Requirements

View File

@ -11,7 +11,7 @@ Publication date: 2020-05-19T00:00:00.000Z
[![How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube](how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos.png)](https://www.youtube.com/watch?v=ASXANpr_zX8 "How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube")
> Heads up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If thats your case, please consider upgrading to Catalina.
> Heads-up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If thats your case, please consider upgrading to Catalina.
## Caveats