Fixed inconsistencies and typos

This commit is contained in:
Sun Knudsen 2021-07-21 19:48:34 -04:00
parent 226da37e19
commit bd6d2d7764
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
19 changed files with 47 additions and 47 deletions

View File

@ -10,7 +10,7 @@ Listed: true
# How to back up and encrypt data using rsync and VeraCrypt on macOS # How to back up and encrypt data using rsync and VeraCrypt on macOS
[![How to backup and encrypt data using rsync and VeraCrypt on macOS (see change log)](how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos-see-change-log.png)](https://www.youtube.com/watch?v=1cz_ViFB6eE "How to backup and encrypt data using rsync and VeraCrypt on macOS (see change log)") [![How to back up and encrypt data using rsync and VeraCrypt on macOS (see change log)](how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos-see-change-log.png)](https://www.youtube.com/watch?v=1cz_ViFB6eE "How to back up and encrypt data using rsync and VeraCrypt on macOS (see change log)")
> Heads-up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)). > Heads-up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)).
@ -94,7 +94,7 @@ VeraCrypt 1.24-Update7
👍 👍
### Step 9: set temporary environment variable ### Step 9: set backup volume path environment variable
```shell ```shell
BACKUP_VOLUME_PATH="/Volumes/Samsung BAR/backup" BACKUP_VOLUME_PATH="/Volumes/Samsung BAR/backup"

View File

@ -120,7 +120,7 @@ Go to [Repositories](https://www.borgbase.com/account) and add repository.
### Step 4: generate and upload `authorized_keys` file (if using rsync.net) ### Step 4: generate and upload `authorized_keys` file (if using rsync.net)
#### Set temporary environment variables #### Set environment variables
```shell ```shell
BORG_USERNAME="18434" BORG_USERNAME="18434"
@ -201,11 +201,11 @@ Write down the passphrase. Store both at safe place(s).
``` ```
#### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos)) #### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
> Heads-up: both key (stored in `~/.config/borg`) and passphrase (stored in `~/Library/Keychains`) are required to decrypt backup. > Heads-up: both key (stored in `~/.config/borg`) and passphrase (stored in `~/Library/Keychains`) are required to decrypt backup.
### Step 9: set temporary environment variables ### Step 9: set environment variables
Replace `borg@185.112.147.115:backup` with self-hosted or cloud-based repo and set backup name. Replace `borg@185.112.147.115:backup` with self-hosted or cloud-based repo and set backup name.

View File

@ -151,7 +151,7 @@ For example, if subnet mask is `255.255.255.0`, bitmask is `/24` and subnet pref
| 255.255.255.254 | /31 | | 255.255.255.254 | /31 |
| 255.255.255.255 | /32 | | 255.255.255.255 | /32 |
### Step 5: set temporary environment variables ### Step 5: set environment variables
`KILLSWITCH_HARDWARE_INTERFACES` should include all used hardware network interfaces. `KILLSWITCH_HARDWARE_INTERFACES` should include all used hardware network interfaces.
@ -261,7 +261,7 @@ sudo chown ${USER}:admin /usr/local/sbin
### Step 11: source `/usr/local/sbin` directory ### Step 11: source `/usr/local/sbin` directory
> Heads-up: find which shell is configured using `echo $SHELL`. > Heads-up: run `echo $SHELL` to find default shell.
#### Bash (`/bin/bash`) #### Bash (`/bin/bash`)

View File

@ -216,7 +216,7 @@ imported: 1
ELECTRUM_RELEASE_SEMVER=4.1.2 ELECTRUM_RELEASE_SEMVER=4.1.2
``` ```
#### Download Electrum release and PGP signature #### Download Electrum release and associated PGP signature
```shell ```shell
$ cd ~ $ cd ~

View File

@ -12,7 +12,7 @@ Listed: true
[![How to encrypt, sign and decrypt messages using GnuPG on macOS](how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos.png)](https://www.youtube.com/watch?v=mE8fL5Fu8x8 "How to encrypt, sign and decrypt messages using GnuPG on macOS") [![How to encrypt, sign and decrypt messages using GnuPG on macOS](how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos.png)](https://www.youtube.com/watch?v=mE8fL5Fu8x8 "How to encrypt, sign and decrypt messages using GnuPG on macOS")
> WARNING: this is a “getting started” guide. For hardened guide, see https://github.com/drduh/YubiKey-Guide > Heads-up: this is a “getting started” guide which stores private keys on macOS. For sensitive use cases, one should store private keys on hardware devices such as [YubiKeys](https://www.yubico.com/) (learn how [here](../how-to-use-yubikey-to-store-pgp-private-keys)).
## Caveats ## Caveats
@ -97,9 +97,9 @@ uid John Doe <john@example.net>
sub rsa4096 2021-03-24 [E] sub rsa4096 2021-03-24 [E]
``` ```
### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos)) ### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
> Heads-up: files stored in `~/.gnupg` include private keys which, if lost, results in loosing ones cryptographic identity (safeguard backup carefully). > Heads-up: files stored in `~/.gnupg` include private keys which, if lost, results in loosing ones cryptographic identity (safeguard backup mindfully).
👍 👍
@ -110,7 +110,7 @@ sub rsa4096 2021-03-24 [E]
### Export Johns PGP public key ### Export Johns PGP public key
```shell ```shell
gpg --armor --export john@example.net > ~/Desktop/john.asc gpg --armor --export john@example.net > ~/Desktop/johndoe.asc
``` ```
### Import Suns public key using key server… ### Import Suns public key using key server…

View File

@ -55,7 +55,7 @@ imported: 1
👍 👍
#### Download Electrum #### Download Electrum release
Go to https://electrum.org/#download and download latest release and associated PGP signature to `~/Downloads` folder. Go to https://electrum.org/#download and download latest release and associated PGP signature to `~/Downloads` folder.
@ -98,7 +98,7 @@ imported: 1
👍 👍
#### Download “Tor Browser” #### Download “Tor Browser” release
Go to https://www.torproject.org/download/ and download latest release and associated PGP signature to `~/Downloads` folder. Go to https://www.torproject.org/download/ and download latest release and associated PGP signature to `~/Downloads` folder.

View File

@ -44,9 +44,9 @@ Click “Applications”, then “Favorites”, then “Configure persistent vol
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”. Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
### Step 5: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready. ### Step 5: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready
Tor is ready Connected to Tor successfully
👍 👍
@ -68,11 +68,7 @@ imported: 1
👍 👍
### Step 7: download latest release of [VeraCrypt](https://veracrypt.fr/en/Home.html) ### Step 7: set VeraCrypt release semver environment variable
Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr/en/Downloads.html and download latest release of “Linux Generic Installer” and associated PGP signature.
### Step 8: set VeraCrypt release semver environment variable
> Heads-up: replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver. > Heads-up: replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver.
@ -80,6 +76,10 @@ Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr
VERACRYPT_RELEASE_SEMVER=1.24-Update7 VERACRYPT_RELEASE_SEMVER=1.24-Update7
``` ```
### Step 8: download [VeraCrypt](https://veracrypt.fr/en/Home.html) release
Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr/en/Downloads.html and download latest release of “Linux Generic Installer” and associated PGP signature.
### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) ### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
```console ```console

View File

@ -63,9 +63,9 @@ imported: 1
👍 👍
### Step 5: download latest release of [Tails](https://tails.boum.org/) ### Step 5: download [Tails](https://tails.boum.org/) release
Go to https://tails.boum.org/install/download/index.en.html and download latest release and associated PGP signature (found under “Verify using OpenPGP (optional)”) to `~/Downloads` folder. Go to https://tails.boum.org/install/download/index.en.html and download latest release and associated PGP signature (found under “or download the OpenPGP signature”) to `~/Downloads` folder.
### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) ### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))

View File

@ -59,7 +59,7 @@ pip3 install --user attrs trezor
### Step 6: source Python 3 `bin` directory ### Step 6: source Python 3 `bin` directory
> Heads-up: find which shell is configured using `echo $SHELL`. > Heads-up: run `echo $SHELL` to find default shell.
> Heads-up: replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`. > Heads-up: replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`.

View File

@ -96,7 +96,7 @@ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC2cmGUEKwopEN0vpHl2yNoV/wvm21D1hOP/8V886iC
### Step 3: generate SSH authorized keys heredoc (on computer) ### Step 3: generate SSH authorized keys heredoc (on computer)
#### Set temporary environment variable #### Set Borg storage quota environment variable
```shell ```shell
BORG_STORAGE_QUOTA="10G" BORG_STORAGE_QUOTA="10G"

View File

@ -405,7 +405,7 @@ systemctl restart systemd-networkd
#### Install dnsmasq #### Install dnsmasq
> Heads-up: please ignore systemd address already in use error (if present). > Heads-up: ignore systemd address already in use error (if present).
```shell ```shell
apt install -y dnsmasq apt install -y dnsmasq

View File

@ -32,7 +32,7 @@ sudo chown ${USER}:admin /usr/local/sbin
### Step 2: add `/usr/local/sbin` directory to `PATH` environment variable ### Step 2: add `/usr/local/sbin` directory to `PATH` environment variable
> Heads-up: find which shell is configured using `echo $SHELL`. > Heads-up: run `echo $SHELL` to find default shell.
#### Bash (`/bin/bash`) #### Bash (`/bin/bash`)

View File

@ -10,7 +10,7 @@ Listed: true
# How to use Trezor Wallet on Tails # How to use Trezor Wallet on Tails
> Heads-up: guide is not persistent meaning steps have to be completed each time one wishes to use Trezor Wallet on Tails. > Heads-up: guide is not persistent meaning steps have to be completed each time one needs to use Trezor Wallet on Tails.
## Requirements ## Requirements
@ -28,9 +28,9 @@ Listed: true
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”. Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
### Step 2: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready. ### Step 2: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready
Tor is ready Connected to Tor successfully
👍 👍
@ -68,7 +68,7 @@ imported: 1
TREZOR_BRIDGE_RELEASE_SEMVER=2.0.30 TREZOR_BRIDGE_RELEASE_SEMVER=2.0.30
``` ```
### Step 6: download Trezor Bridge ### Step 6: download Trezor Bridge release
```shell ```shell
torsocks curl -O https://wallet.trezor.io/data/bridge/${TREZOR_BRIDGE_RELEASE_SEMVER}/trezor-bridge_${TREZOR_BRIDGE_RELEASE_SEMVER}_amd64.deb torsocks curl -O https://wallet.trezor.io/data/bridge/${TREZOR_BRIDGE_RELEASE_SEMVER}/trezor-bridge_${TREZOR_BRIDGE_RELEASE_SEMVER}_amd64.deb