diff --git a/how-to-create-encrypted-paper-backup/README.md b/how-to-create-encrypted-paper-backup/README.md index b82556e..cac6831 100644 --- a/how-to-create-encrypted-paper-backup/README.md +++ b/how-to-create-encrypted-paper-backup/README.md @@ -117,7 +117,7 @@ $ sudo apt install -y autopoint build-essential git libjpeg-dev libmagickwand-de #### Clone zbar repository -> Heads-up: replace `0.23.90` with [latest release](https://github.com/mchehab/zbar/releases/latest) semver. +Replace `0.23.90` with [latest release](https://github.com/mchehab/zbar/releases/latest) semver. ```console $ cd ~ @@ -196,7 +196,7 @@ imported: 1 #### Set Electrum release semver environment variable -> Heads-up: replace `4.1.2` with [latest release](https://electrum.org/#download) semver. +Replace `4.1.2` with [latest release](https://electrum.org/#download) semver. ```shell ELECTRUM_RELEASE_SEMVER=4.1.2 diff --git a/how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey/README.md b/how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey/README.md index 8444c8e..3ff39f6 100644 --- a/how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey/README.md +++ b/how-to-generate-and-air-gap-pgp-private-keys-using-gnupg-tails-and-yubikey/README.md @@ -201,7 +201,7 @@ uid John Doe ### Step 9: set master key ID environment variable -> Heads-up: replace `0xC2709D13BAB4763C` with master key ID. +Replace `0xC2709D13BAB4763C` with master key ID. ```shell KEY_ID=0xC2709D13BAB4763C @@ -211,7 +211,7 @@ KEY_ID=0xC2709D13BAB4763C #### Import signing master key (if necessary) -> Heads-up: replace `/path/to/signing/master.asc` with signing master key path. +Replace `/path/to/signing/master.asc` with signing master key path. ```console $ gpg --import /path/to/signing/master.asc @@ -225,7 +225,7 @@ gpg: secret keys imported: 1 #### Sign master key -> Heads-up: replace `0xDFCECB410CE8A745` with signing master key ID. +Replace `0xDFCECB410CE8A745` with signing master key ID. ```console $ gpg --ask-cert-level --default-key 0xDFCECB410CE8A745 --sign-key $KEY_ID @@ -529,7 +529,7 @@ Click “Applications”, then “Utilities”, then “Unlock VeraCrypt Volumes ### Step 16: rename VeraCrypt encrypted volume -> Heads-up: replace `tcrypt-1793` with directory found using `ls /dev/mapper` and ignore dirty bit is set error. +Replace `tcrypt-1793` with directory found using `ls /dev/mapper` and ignore dirty bit is set error. ```console $ ls /dev/mapper @@ -552,7 +552,7 @@ fatlabel: warning - lowercase labels might not work properly with DOS or Windows ### Step 17: set VeraCrypt encrypted volume name environment variable -> Heads-up: replace `3FDC-B4EB` with directory found using `ls /media/amnesia`. +Replace `3FDC-B4EB` with directory found using `ls /media/amnesia`. ```console $ ls /media/amnesia @@ -573,7 +573,7 @@ $ gpg --armor --export $KEY_ID > /media/amnesia/$ENCRYPTED_VOLUME_NAME/pub.asc ### Step 19: copy public key to backup volume -> Heads-up: replace `johndoe` with name associated to master key. +Replace `johndoe` with name associated to master key. ```shell cp /media/amnesia/$ENCRYPTED_VOLUME_NAME/pub.asc "/media/amnesia/$VOLUME_NAME/johndoe.asc" @@ -1001,7 +1001,7 @@ $ gpg --armor --export $KEY_ID > /media/amnesia/Tails/pub.asc #### Copy public key to backup volume -> Heads-up: replace `Samsung BAR` with backup volume name and `johndoe` with name associated to master key. +Replace `Samsung BAR` with backup volume name and `johndoe` with name associated to master key. ```shell cp /media/amnesia/Tails/pub.asc "/media/amnesia/Samsung BAR/johndoe.asc" @@ -1041,7 +1041,7 @@ brew install gnupg pinentry-mac ### Step 4: import public key -> Heads-up: replace `Samsung BAR` with backup volume name and `johndoe` with name associated to master key. +Replace `Samsung BAR` with backup volume name and `johndoe` with name associated to master key. ```console $ gpg --keyid-format 0xlong --import "/Volumes/Samsung BAR/johndoe.asc" @@ -1097,7 +1097,7 @@ ssb> ed25519/0x1E7B69B238FFA21B created: 2021-07-21 expires: 2022-07-21 ### Step 6: set master key ID environment variable -> Heads-up: replace `0xC2709D13BAB4763C` with master key ID. +Replace `0xC2709D13BAB4763C` with master key ID. ```shell KEY_ID=0xC2709D13BAB4763C @@ -1175,7 +1175,7 @@ source ~/.zshrc ### Step 9: generate SSH public key -> Heads-up: replace `john@example.net` with email and `johndoe` with name associated to master key. +Replace `john@example.net` with email and `johndoe` with name associated to master key. ```console $ mkdir -p ~/.ssh diff --git a/how-to-install-and-use-electrum-over-tor-on-macos/README.md b/how-to-install-and-use-electrum-over-tor-on-macos/README.md index 1c433e2..0809877 100644 --- a/how-to-install-and-use-electrum-over-tor-on-macos/README.md +++ b/how-to-install-and-use-electrum-over-tor-on-macos/README.md @@ -67,7 +67,7 @@ Go to https://electrum.org/#download and download latest release and associated #### Verify Electrum release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) -> Heads-up: replace `4.1.4` with [latest release](https://electrum.org/#download) semver. +Replace `4.1.4` with [latest release](https://electrum.org/#download) semver. ```console $ gpg --verify ~/Downloads/electrum-4.1.4.dmg.ThomasV.asc ~/Downloads/electrum-4.1.4.dmg @@ -110,7 +110,7 @@ Go to https://www.torproject.org/download/ and download latest release and assoc #### Verify “Tor Browser” release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) -> Heads-up: replace `10.0.17` with [latest release](https://www.torproject.org/download/) semver. +Replace `10.0.17` with [latest release](https://www.torproject.org/download/) semver. ```console $ gpg --verify ~/Downloads/TorBrowser-10.0.17-osx64_en-US.dmg.asc diff --git a/how-to-install-and-use-veracrypt-on-tails/README.md b/how-to-install-and-use-veracrypt-on-tails/README.md index 06a1cd4..be538fc 100644 --- a/how-to-install-and-use-veracrypt-on-tails/README.md +++ b/how-to-install-and-use-veracrypt-on-tails/README.md @@ -70,7 +70,7 @@ imported: 1 ### Step 7: set VeraCrypt release semver environment variable -> Heads-up: replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver. +Replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver. ```shell VERACRYPT_RELEASE_SEMVER=1.24-Update7 diff --git a/how-to-install-tails-on-usb-flash-drive-or-sd-card-on-macos/README.md b/how-to-install-tails-on-usb-flash-drive-or-sd-card-on-macos/README.md index 411f6c8..7dbeab2 100644 --- a/how-to-install-tails-on-usb-flash-drive-or-sd-card-on-macos/README.md +++ b/how-to-install-tails-on-usb-flash-drive-or-sd-card-on-macos/README.md @@ -71,7 +71,7 @@ Go to https://tails.boum.org/install/download/index.en.html and download latest ### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos)) -> Heads-up: replace `4.19` with [latest release](https://tails.boum.org/install/download/index.en.html) semver. +Replace `4.19` with [latest release](https://tails.boum.org/install/download/index.en.html) semver. ```console $ gpg --verify ~/Downloads/tails-amd64-4.19.img.sig diff --git a/how-to-manage-trezor-devices-using-trezorctl-on-macos-or-tails/README.md b/how-to-manage-trezor-devices-using-trezorctl-on-macos-or-tails/README.md index b84ea21..cb4f96a 100644 --- a/how-to-manage-trezor-devices-using-trezorctl-on-macos-or-tails/README.md +++ b/how-to-manage-trezor-devices-using-trezorctl-on-macos-or-tails/README.md @@ -61,7 +61,7 @@ pip3 install --user attrs trezor ### Step 6: source Python 3 `bin` directory -> Heads-up: replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`. +Replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`. ```shell echo 'export PATH=$PATH:$HOME/Library/Python/3.8/bin' >> ~/.zshrc @@ -94,7 +94,7 @@ Extracting embedded firmware image. ### Setup device -> Heads-up: replace `--strength 256` with `--strength 128` for 12-word mnemonic. +Replace `--strength 256` with `--strength 128` for 12-word mnemonic. ```console $ trezorctl device setup --strength 256 --passphrase-protection --pin-protection --label "My Trezor One" --backup-type single diff --git a/how-to-self-host-hardened-borg-server/README.md b/how-to-self-host-hardened-borg-server/README.md index e262b2d..22fd1e5 100644 --- a/how-to-self-host-hardened-borg-server/README.md +++ b/how-to-self-host-hardened-borg-server/README.md @@ -115,7 +115,7 @@ EOF ### Step 4: log in to server or Raspberry Pi -Replace `server-admin@185.112.147.115` with SSH destination of server and `~/.ssh/server` with path to associated private key. +Replace `server-admin@185.112.147.115` with server SSH URL and `~/.ssh/server` with path to associated private key. ```shell ssh server-admin@185.112.147.115 -i ~/.ssh/server diff --git a/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md index dd8cafa..4e63330 100644 --- a/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md +++ b/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md @@ -204,7 +204,7 @@ sudo defaults delete com.apple.loginwindow LogoutHook ### Step 3: set computer name, local hostname and hostname -> Heads-up: replace `John` with your name. +Replace `John` with your name. ```shell sudo scutil --set ComputerName "John’s MacBook Pro" diff --git a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md index 6b3b1e7..a6176b9 100644 --- a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md +++ b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md @@ -22,7 +22,7 @@ Listed: true ### Step 2: open “Script Editor” and paste following snippet -> Heads-up: replace `work` with profile name from [step 1](#step-1-create-firefox-profile). +Replace `work` with profile name from [step 1](#step-1-create-firefox-profile). ``` do shell script "nohup /Applications/Firefox.app/Contents/MacOS/firefox-bin -p \"work\" --no-remote > /dev/null 2>&1 &" @@ -38,7 +38,7 @@ Click “File”, then “Export…”, set “Export As” filename to “Firef ### Step 4: set Firefox app environment variable -> Heads-up: replace `Firefox work` with filename from [step 3](#step-3-export-script-as-application). +Replace `Firefox work` with filename from [step 3](#step-3-export-script-as-application). ```shell FIREFOX_APP="Firefox work.app" diff --git a/how-to-use-trezor-wallet-on-tails/README.md b/how-to-use-trezor-wallet-on-tails/README.md index 0b7030d..f1126e1 100644 --- a/how-to-use-trezor-wallet-on-tails/README.md +++ b/how-to-use-trezor-wallet-on-tails/README.md @@ -36,7 +36,7 @@ Connected to Tor successfully ### Step 3: set Trezor Bridge release year environment variable -> Heads-up: replace `2020` with [latest release](https://github.com/trezor/trezord-go/blob/master/CHANGELOG.md) year. +Replace `2020` with [latest release](https://github.com/trezor/trezord-go/blob/master/CHANGELOG.md) year. ```shell TREZOR_BRIDGE_RELEASE_YEAR=2020 @@ -62,7 +62,7 @@ imported: 1 ### Step 5: set [Trezor Bridge](https://wiki.trezor.io/Trezor_Bridge) release semver environment variable -> Heads-up: replace `2.0.30` with [latest release](https://github.com/trezor/trezord-go/blob/master/CHANGELOG.md) semver. +Replace `2.0.30` with [latest release](https://github.com/trezor/trezord-go/blob/master/CHANGELOG.md) semver. ```shell TREZOR_BRIDGE_RELEASE_SEMVER=2.0.30 diff --git a/how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md b/how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md index 0d5d8c4..207aed7 100644 --- a/how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md +++ b/how-to-verify-pgp-digital-signatures-using-gnupg-on-macos/README.md @@ -50,7 +50,7 @@ brew install gnupg ### Import signer’s public key using key server… -> Heads-up: replace `0xC1323A377DE14C8B` with signer’s public key ID. +Replace `0xC1323A377DE14C8B` with signer’s public key ID. ```console $ gpg --keyserver hkps://keys.openpgp.org --recv-keys 0xC1323A377DE14C8B @@ -65,7 +65,7 @@ imported: 1 ### …or using public key URL -> Heads-up: replace `https://sunknudsen.com/sunknudsen.asc` with signer’s public key URL. +Replace `https://sunknudsen.com/sunknudsen.asc` with signer’s public key URL. ```console $ curl https://sunknudsen.com/sunknudsen.asc | gpg --import @@ -83,7 +83,7 @@ imported: 1 ### Verify signer’s public key using fingerprint -> Heads-up: replace `hello@sunknudsen.com` with signer’s email and use published fingerprints or web of trust to verify signer’s fingerprint (see [example](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-its-fingerprint)). +Replace `hello@sunknudsen.com` with signer’s email and use published fingerprints or web of trust to verify signer’s fingerprint (see [example](../how-to-encrypt-sign-and-decrypt-messages-using-gnupg-on-macos#verify-suns-pgp-public-key-using-its-fingerprint)). ```console $ gpg --fingerprint hello@sunknudsen.com