mirror of
https://github.com/sunknudsen/privacy-guides.git
synced 2025-02-22 16:53:56 +00:00
Refactored links for custom CMS
This commit is contained in:
parent
898479321a
commit
b18fd40fbc
@ -1,7 +1,7 @@
|
||||
# Privacy guides reference material
|
||||
|
||||
Most privacy guides episodes published on [YouTube](https://www.youtube.com/sunknudsen) don’t need reference material, but when they do, it lands here.
|
||||
Most episodes published on [sunknudsen.com](https://sunknudsen.com) and [YouTube](https://www.youtube.com/sunknudsen) don’t need reference material but, when they do, it lands here.
|
||||
|
||||
Shout-out to [1984](https://www.1984hosting.com/), [Njalla](https://njal.la/), [rsync.net](https://rsync.net/), [SatoshiLabs](https://satoshilabs.com/) and [Shakepay](https://shakepay.com/) for [supporting](https://sunknudsen.com/donate) the privacy guides. 🙌
|
||||
|
||||
Wish to contribute or need help? Read the [docs](./docs/README.md).
|
||||
Wish to contribute or need help? Read the [docs](./docs).
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- Computer running macOS Big Sur or Monterey or disposable [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md)
|
||||
- Computer running macOS Big Sur or Monterey or disposable [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card)
|
||||
|
||||
## Caveats
|
||||
|
||||
|
@ -62,7 +62,7 @@ gpg: imported: 1
|
||||
|
||||
Go to https://www.veracrypt.fr/en/Downloads.html and download latest release and associated PGP signature to `~/Downloads` folder.
|
||||
|
||||
### Step 6: verify VeraCrypt release signature (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 6: verify VeraCrypt release signature (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
> Heads-up: replace `VeraCrypt_1.24-Update7` with current release.
|
||||
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- Borg server ([self-hosted](../how-to-self-host-hardened-borg-server/README.md) or cloud-based such as [BorgBase](https://www.borgbase.com/) or [rsync.net](https://rsync.net/products/attic.html))
|
||||
- Borg server ([self-hosted](../how-to-self-host-hardened-borg-server) or cloud-based such as [BorgBase](https://www.borgbase.com/) or [rsync.net](https://rsync.net/products/attic.html))
|
||||
- Computer running macOS Catalina or Big Sur
|
||||
|
||||
## Caveats
|
||||
@ -203,7 +203,7 @@ Write down the passphrase. Store both at safe place(s).
|
||||
|
||||
```
|
||||
|
||||
#### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md))
|
||||
#### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
||||
|
||||
> Heads-up: both key (stored in `~/.config/borg`) and passphrase (stored in `~/Library/Keychains`) are required to decrypt backup.
|
||||
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- Computer, virtual private server (VPS) or dedicated server running Debian 10 (buster) or Debian 11 (bullseye) (lean how to install Debian [here](./misc/how-to-install-luks-encrypted-debian-operating-system-using-bootable-installer/README.md))
|
||||
- Computer, virtual private server (VPS) or dedicated server running Debian 10 (buster) or Debian 11 (bullseye) (lean how to install Debian [here](./misc/how-to-install-luks-encrypted-debian-operating-system-using-bootable-installer))
|
||||
- Linux or macOS computer
|
||||
|
||||
## Caveats
|
||||
|
@ -13,7 +13,7 @@ Listed: true
|
||||
## Requirements
|
||||
|
||||
- Debian-compatible computer with [AES instruction set](https://en.wikipedia.org/wiki/AES_instruction_set)
|
||||
- Debian bootable installer (learn how to create one on Debian-based operating system [here](../how-to-create-debian-bootable-installer-on-debian-based-operating-system/README.md) or on macOS [there](../how-to-create-debian-bootable-installer-on-macos/README.md))
|
||||
- Debian bootable installer (learn how to create one on Debian-based operating system [here](../how-to-create-debian-bootable-installer-on-debian-based-operating-system) or on macOS [there](../how-to-create-debian-bootable-installer-on-macos))
|
||||
|
||||
## Guide
|
||||
|
||||
|
@ -78,7 +78,7 @@ EOF
|
||||
|
||||
### Step 3: download latest version of 64-bit [Raspberry Pi OS Lite](https://www.raspberrypi.com/software/operating-systems/#raspberry-pi-os-64-bit)
|
||||
|
||||
### Step 4: copy “Raspberry Pi OS Lite” to microSD card or external solid state drive (follow [these](./misc/how-to-copy-raspberry-pi-os-lite-to-microsd-card-or-external-solid-state-drive-on-linux/README.md) steps instead of step 4 if on Linux)
|
||||
### Step 4: copy “Raspberry Pi OS Lite” to microSD card or external solid state drive (follow [these](./misc/how-to-copy-raspberry-pi-os-lite-to-microsd-card-or-external-solid-state-drive-on-linux) steps instead of step 4 if on Linux)
|
||||
|
||||
> **WARNING: BE VERY CAREFUL WHEN RUNNING `DD` AS DATA CAN BE PERMANENTLY DESTROYED (BEGINNERS SHOULD CONSIDER USING [BALENAETCHER](https://www.balena.io/etcher/) INSTEAD).**
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!--
|
||||
Title: How to configure self-hosted VPN kill switch using PF firewall on macOS
|
||||
Title: How to configure self-hosted VPN kill switch using PF firewall on macOS (DEPRECATED: guide is no longer maintained)
|
||||
Description: Learn how to configure self-hosted VPN kill switch using PF firewall on macOS.
|
||||
Author: Sun Knudsen <https://github.com/sunknudsen>
|
||||
Contributors: Sun Knudsen <https://github.com/sunknudsen>
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!--
|
||||
Title: How to configure strongSwan client on headless Debian-based Linux computer
|
||||
Title: How to configure strongSwan client on headless Debian-based Linux computer (DEPRECATED: guide is no longer maintained)
|
||||
Description: Learn how to configure strongSwan client on headless Debian-based Linux computer.
|
||||
Author: Sun Knudsen <https://github.com/sunknudsen>
|
||||
Contributors: Sun Knudsen <https://github.com/sunknudsen>
|
||||
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Self-hosted hardened strongSwan IKEv2/IPsec VPN server](../how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md)
|
||||
- [Self-hosted hardened strongSwan IKEv2/IPsec VPN server](../how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos)
|
||||
- Linux or macOS computer (referred to as “certificate authority computer”)
|
||||
- Debian-based Linux computer (referred to as “client computer”)
|
||||
|
||||
@ -25,7 +25,7 @@ Listed: true
|
||||
|
||||
## Guide
|
||||
|
||||
### Step 1: create client key and cert using certificate authority from [How to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS](../how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md) (on certificate authority computer).
|
||||
### Step 1: create client key and cert using certificate authority from [How to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS](../how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos) (on certificate authority computer).
|
||||
|
||||
#### Navigate to `strongswan-certs` directory
|
||||
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi/README.md)
|
||||
- [Hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi)
|
||||
- [Adafruit PiTFT monitor](https://www.adafruit.com/product/2423) (optional)
|
||||
- [Compatible USB webcam](https://elinux.org/RPi_USB_Webcams) (720P or 1080P, powered directly by Raspberry Pi)
|
||||
- USB keyboard ([Raspberry Pi keyboard and hub](https://www.raspberrypi.org/products/raspberry-pi-keyboard-and-hub/) recommended)
|
||||
@ -144,7 +144,7 @@ imported: 1
|
||||
|
||||
👍
|
||||
|
||||
### Step 12: verify integrity of Sun’s PGP public key (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos/README.md#verify-suns-pgp-public-key-using-fingerprint))
|
||||
### Step 12: verify integrity of Sun’s PGP public key (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-fingerprint))
|
||||
|
||||
```console
|
||||
$ gpg --fingerprint hello@sunknudsen.com
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
[](https://www.youtube.com/watch?v=mE8fL5Fu8x8 "How to encrypt, sign and decrypt messages using GnuPG on macOS")
|
||||
|
||||
> Heads-up: this is a “getting started” guide. Learn how to harden GnuPG [here](../how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey/README.md).
|
||||
> Heads-up: this is a “getting started” guide. Learn how to harden GnuPG [here](../how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey).
|
||||
|
||||
## Requirements
|
||||
|
||||
@ -106,7 +106,7 @@ uid John Doe <john@example.net>
|
||||
sub cv25519 2021-12-29 [E]
|
||||
```
|
||||
|
||||
### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md))
|
||||
### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
||||
|
||||
> Heads-up: files stored in `~/.gnupg` include private keys which, if lost, results in loosing one’s cryptographic identity (safeguard backup mindfully).
|
||||
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md) with VeraCrypt [installed](../how-to-install-and-use-veracrypt-on-tails/README.md)
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card) with VeraCrypt [installed](../how-to-install-and-use-veracrypt-on-tails)
|
||||
- YubiKey with [OpenPGP](https://www.yubico.com/us/store/compare/) support (firmware version `5.2.3` or higher)
|
||||
- Computer running macOS Catalina or Big Sur
|
||||
|
||||
@ -81,7 +81,7 @@ $ torsocks curl -L -o ~/Downloads/yubikey-manager-qt.AppImage.sig https://develo
|
||||
100 310 100 310 0 0 262 0 0:00:01 0:00:01 --:--:-- 262
|
||||
```
|
||||
|
||||
### Step 5: verify “YubiKey Manager” AppImage release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md)) and make AppImage executable
|
||||
### Step 5: verify “YubiKey Manager” AppImage release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) and make AppImage executable
|
||||
|
||||
```console
|
||||
$ gpg --verify ~/Downloads/yubikey-manager-qt.AppImage.sig
|
||||
|
@ -65,7 +65,7 @@ imported: 1
|
||||
|
||||
Go to https://electrum.org/#download and download latest release and associated PGP signature to `~/Downloads` folder.
|
||||
|
||||
#### Verify Electrum release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
#### Verify Electrum release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
> Heads-up: replace `4.2.1` with [latest release](https://electrum.org/#download) semver.
|
||||
|
||||
@ -98,7 +98,7 @@ Double-click “electrum-4.2.1.dmg” and drag-and-drop “Electrum” into “A
|
||||
|
||||
### Step 5: install [Tor Browser](https://www.torproject.org/) (used to connect to Electrum public servers over Tor)
|
||||
|
||||
> Heads-up: using public servers can [compromised privacy of wallet](https://sunknudsen.com/self-hosting-bitcoin-full-node-on-raspberry-pi-updated/) (learn how to self-host Bitcoin node [here](../how-to-self-host-hardened-bitcoin-node/README.md)).
|
||||
> Heads-up: using public servers can [compromised privacy of wallet](https://sunknudsen.com/self-hosting-bitcoin-full-node-on-raspberry-pi-updated/) (learn how to self-host Bitcoin node [here](../how-to-self-host-hardened-bitcoin-node)).
|
||||
|
||||
#### Import “Tor Browser Developers (signing key)” PGP public key
|
||||
|
||||
@ -117,7 +117,7 @@ imported: 1
|
||||
|
||||
Go to https://www.torproject.org/download/ and download latest release and associated PGP signature to `~/Downloads` folder.
|
||||
|
||||
#### Verify “Tor Browser” release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
#### Verify “Tor Browser” release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
> Heads-up: replace `11.0.10` with [latest release](https://www.torproject.org/download/) semver.
|
||||
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md)
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card)
|
||||
|
||||
## Caveats
|
||||
|
||||
@ -94,7 +94,7 @@ $ torsocks curl --fail --output ~/Downloads/trezor-suite.AppImage.asc https://su
|
||||
100 833 100 833 0 0 933 0 --:--:-- --:--:-- --:--:-- 932
|
||||
```
|
||||
|
||||
### Step 10: verify “Trezor Suite” release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 10: verify “Trezor Suite” release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
```console
|
||||
$ gpg --verify ~/Downloads/trezor-suite.AppImage.asc
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md)
|
||||
- [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card)
|
||||
|
||||
## Caveats
|
||||
|
||||
@ -80,7 +80,7 @@ VERACRYPT_RELEASE_SEMVER=1.25.4
|
||||
|
||||
Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr/en/Downloads.html and download latest release of “Linux Generic Installer” and associated PGP signature.
|
||||
|
||||
### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
```console
|
||||
$ gpg --verify ~/Tor\ Browser/veracrypt-$VERACRYPT_RELEASE_SEMVER-setup.tar.bz2.sig
|
||||
|
@ -68,7 +68,7 @@ imported: 1
|
||||
|
||||
Go to https://tails.boum.org/install/download/index.en.html and download latest release and associated PGP signature (found under “or download the OpenPGP signature”) to `~/Downloads` folder.
|
||||
|
||||
### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
> Heads-up: replace `4.29` with [latest release](https://tails.boum.org/install/download/index.en.html) semver.
|
||||
|
||||
@ -183,7 +183,7 @@ $ curl --fail --location --remote-name https://mirrors.edge.kernel.org/tails/sta
|
||||
$ curl --fail --location --remote-name https://tails.boum.org/torrents/files/tails-amd64-${TAILS_RELEASE_SEMVER}.img.sig
|
||||
```
|
||||
|
||||
### Step 5: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 5: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
```console
|
||||
$ gpg --verify tails-amd64-${TAILS_RELEASE_SEMVER}.img.sig
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- Computer running macOS Big Sur or Monterey or [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md)
|
||||
- Computer running macOS Big Sur or Monterey or [Tails USB flash drive or SD card](../how-to-install-tails-on-usb-flash-drive-or-sd-card)
|
||||
- [Trezor](https://trezor.io/) device
|
||||
|
||||
## Caveats
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server/README.md) or [hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi/README.md) (with at least 4GB of RAM, 1TB of SSD storage and IPv6 disabled)
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server) or [hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi) (with at least 4GB of RAM, 1TB of SSD storage and IPv6 disabled)
|
||||
- Linux or macOS computer
|
||||
|
||||
## Caveats
|
||||
@ -294,7 +294,7 @@ imported: 1
|
||||
|
||||
👍
|
||||
|
||||
### Step 11: verify integrity of Sun’s PGP public key (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos/README.md#verify-suns-pgp-public-key-using-fingerprint))
|
||||
### Step 11: verify integrity of Sun’s PGP public key (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-fingerprint))
|
||||
|
||||
```console
|
||||
$ gpg --fingerprint hello@sunknudsen.com
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Bitcoin node](../../README.md)
|
||||
- [Hardened Bitcoin node](../..)
|
||||
- Computer running macOS Big Sur or Monterey (used to copy pi-electrs credentials from Bitcoin node and run [Electrum](https://electrum.org/#home))
|
||||
- FAT32-formatted USB flash drive
|
||||
|
||||
@ -97,9 +97,9 @@ $ sudo umount /dev/sdb1
|
||||
|
||||
### Step 4: remove FAT32-formatted USB flash drive from server or Raspberry Pi
|
||||
|
||||
### Step 5: download [Tor Browser](https://www.torproject.org/) (and optionally verify PGP signature, learn how [here](../../../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md))
|
||||
### Step 5: download [Tor Browser](https://www.torproject.org/) (and optionally verify PGP signature, learn how [here](../../../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||
|
||||
> Heads-up: check out “How to install and use Electrum over Tor on macOS” [guide](../../../how-to-install-and-use-electrum-over-tor-on-macos/README.md) for hardened Electrum and Tor Browser installation instructions.
|
||||
> Heads-up: check out “How to install and use Electrum over Tor on macOS” [guide](../../../how-to-install-and-use-electrum-over-tor-on-macos) for hardened Electrum and Tor Browser installation instructions.
|
||||
|
||||
### Step 6: install Tor Browser
|
||||
|
||||
@ -148,13 +148,13 @@ $ umask u=rwx,go=rx
|
||||
### Step 12: create tor alias
|
||||
|
||||
```console
|
||||
echo "alias tor=\"/Applications/Tor\ Browser.app/Contents/Resources/TorBrowser/Tor/tor -f $HOME/.local/etc/tor/torrc\"" >> ~/.zshrc
|
||||
$ echo "alias tor=\"/Applications/Tor\ Browser.app/Contents/Resources/TorBrowser/Tor/tor -f $HOME/.local/etc/tor/torrc\"" >> ~/.zshrc
|
||||
```
|
||||
|
||||
### Step 13: create electrum alias
|
||||
|
||||
```console
|
||||
echo "alias electrum=\"/Applications/Electrum.app/Contents/MacOS/run_electrum --oneserver --server $HOSTNAME:50001:t --proxy socks5:127.0.0.1:9050\"" >> ~/.zshrc
|
||||
$ echo "alias electrum=\"/Applications/Electrum.app/Contents/MacOS/run_electrum --oneserver --server $HOSTNAME:50001:t --proxy socks5:127.0.0.1:9050\"" >> ~/.zshrc
|
||||
```
|
||||
|
||||
### Step 14: source ~/.zshrc
|
||||
|
@ -12,8 +12,8 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Bitcoin node](../../README.md)
|
||||
- [Tails USB flash drive or SD card](../../../how-to-install-tails-on-usb-flash-drive-or-sd-card/README.md) (used to run [Electrum](https://electrum.org/#home))
|
||||
- [Hardened Bitcoin node](../..)
|
||||
- [Tails USB flash drive or SD card](../../../how-to-install-tails-on-usb-flash-drive-or-sd-card) (used to run [Electrum](https://electrum.org/#home))
|
||||
- Linux or macOS computer (used to copy pi-electrs credentials from Bitcoin node to Tails computer)
|
||||
- FAT32-formatted USB flash drive
|
||||
|
||||
@ -169,8 +169,6 @@ Click “+” under “Additional Settings”, then “Administration Password
|
||||
|
||||
### Step 2: run electrum.sh
|
||||
|
||||
> Heads-up: from now on, this is the only step required to start Electrum and connect to self-hosted node.
|
||||
|
||||
```console
|
||||
$ sudo /home/amnesia/Persistent/electrum.sh
|
||||
```
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Bitcoin node](../../README.md) (with at least 2TB of SSD storage)
|
||||
- [Hardened Bitcoin node](../..) (with at least 2TB of SSD storage)
|
||||
- Linux or macOS computer
|
||||
|
||||
## Caveats
|
||||
|
@ -23,7 +23,7 @@ Listed: true
|
||||
|
||||
### Step 1 (optional): create APFS snapshot
|
||||
|
||||
> Heads-up: snapshot can be used to restore filesystem clean-uninstalling Samsung software (see [guide](../../../how-to-use-time-machine-and-apfs-snapshots-on-macos/README.md)).
|
||||
> Heads-up: snapshot can be used to restore filesystem clean-uninstalling Samsung software (see [guide](../../../how-to-use-time-machine-and-apfs-snapshots-on-macos)).
|
||||
|
||||
```console
|
||||
$ tmutil localsnapshot
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Debian server](../../../how-to-configure-hardened-debian-server/README.md) (with at least 500GB of available SSD storage and unlimited bandwidth)
|
||||
- [Hardened Debian server](../../../how-to-configure-hardened-debian-server) (with at least 500GB of available SSD storage and unlimited bandwidth)
|
||||
- Transmission app SSD storage, IPv6 disabled and unlimited bandwidth)
|
||||
- Linux or macOS computer
|
||||
|
||||
@ -140,7 +140,7 @@ imported: 1
|
||||
|
||||
👍
|
||||
|
||||
### Step 6: verify integrity of Sun’s PGP public key (learn how [here](../../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos/README.md#verify-suns-pgp-public-key-using-fingerprint))
|
||||
### Step 6: verify integrity of Sun’s PGP public key (learn how [here](../../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-fingerprint))
|
||||
|
||||
```console
|
||||
$ gpg --fingerprint hello@sunknudsen.com
|
||||
|
@ -14,7 +14,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server/README.md) or [hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi/README.md)
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server) or [hardened Raspberry Pi](../how-to-configure-hardened-raspberry-pi)
|
||||
- Linux or macOS computer
|
||||
|
||||
## Caveats
|
||||
|
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server/README.md)
|
||||
- [Hardened Debian server](../how-to-configure-hardened-debian-server)
|
||||
- Linux or macOS computer
|
||||
|
||||
## Caveats
|
||||
|
@ -1,5 +1,5 @@
|
||||
<!--
|
||||
Title: How to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS
|
||||
Title: How to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS (DEPRECATED: guide is no longer maintained)
|
||||
Description: Learn how to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS.
|
||||
Author: Sun Knudsen <https://github.com/sunknudsen>
|
||||
Contributors: Sun Knudsen <https://github.com/sunknudsen>
|
||||
@ -12,7 +12,7 @@ Listed: true
|
||||
|
||||
[](https://www.youtube.com/watch?v=HY3F_vHuTFQ "How to self-host hardened strongSwan IKEv2/IPsec VPN server for iOS and macOS")
|
||||
|
||||
> Heads-up: when following this guide on servers with upstream IPv4-only networks (which is totally fine if one knows what one is doing), it’s likely IPv6 traffic will leak on iOS when clients are connected to carriers or ISPs running dual stack (IPv4 + IPv6) networks. Leaks can be mitigated on iOS (cellular-only) and on macOS by following this [guide](../how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md).
|
||||
> Heads-up: when following this guide on servers with upstream IPv4-only networks (which is totally fine if one knows what one is doing), it’s likely IPv6 traffic will leak on iOS when clients are connected to carriers or ISPs running dual stack (IPv4 + IPv6) networks. Leaks can be mitigated on iOS (cellular-only) and on macOS by following this [guide](../how-to-disable-ipv6-on-ios-cellular-only-and-macos).
|
||||
|
||||
## Requirements
|
||||
|
||||
|
@ -86,7 +86,7 @@ imported: 1
|
||||
|
||||
### Verify signer’s PGP public key using fingerprint
|
||||
|
||||
> Heads-up: replace `hello@sunknudsen.com` with signer’s email and use published fingerprints to verify signer’s cryptographic identity (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos/README.md#verify-suns-pgp-public-key-using-fingerprint)).
|
||||
> Heads-up: replace `hello@sunknudsen.com` with signer’s email and use published fingerprints to verify signer’s cryptographic identity (learn how [here](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-fingerprint)).
|
||||
|
||||
```console
|
||||
$ gpg --fingerprint hello@sunknudsen.com
|
||||
|
Loading…
x
Reference in New Issue
Block a user