diff --git a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md
index 9e4e0a8..798a22b 100644
--- a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md
+++ b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md
@@ -14,37 +14,37 @@ Publication date: 2020-07-18T10:28:23.605Z
## iOS guide
-**Step 1 (macOS): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator)**
+#### Step 1 (macOS): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator)
-**Step 2 (macOS): create new profile using cmd + n**
+#### Step 2 (macOS): create new profile using cmd + n
-**Step 3 (macOS): configure "General" settings**
+#### Step 3 (macOS): configure "General" settings

-**Step 4 (iOS): find your APN settings**
+#### Step 4 (iOS): find your APN settings
Open "Settings", then "Cellular", then "Cellular Data Network".

-**Step 5 (macOS): configure "Cellular" settings**
+#### Step 5 (macOS): configure "Cellular" settings

-**Step 6 (macOS): save provisioning profile**
+#### Step 6 (macOS): save provisioning profile
-**Step 7 (macOS): connect iPhone to Mac**
+#### Step 7 (macOS): connect iPhone to Mac
-**Step 8 (macOS): double-click on iPhone**
+#### Step 8 (macOS): double-click on iPhone

-**Step 9 (macOS): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add"**
+#### Step 9 (macOS): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add"

-**Step 10 (iOS): review profile**
+#### Step 10 (iOS): review profile
Open "Settings", then "Profile Downloaded" and tap "Install"
@@ -52,13 +52,13 @@ Open "Settings", then "Profile Downloaded" and tap "Install"
## macOS guide
-**Step 1: list network interfaces**
+#### Step 1: list network interfaces
```shell
networksetup -listallnetworkservices
```
-**Step 2: disable IPv6**
+#### Step 2: disable IPv6
```shell
networksetup -setv6off "Wi-Fi"
@@ -69,13 +69,13 @@ networksetup -setv6off "Thunderbolt Ethernet"
## Want things back the way they were before following this guide? No problem!
-**Step 1 (iOS): remove provisioning profile from iPhone**
+#### Step 1 (iOS): remove provisioning profile from iPhone
Open "Settings", then "General", then "Profile", tap on your provisioning profile and tap "Remove Profile".

-**Step 2 (macOS): set network interfaces to automatic**
+#### Step 2 (macOS): set network interfaces to automatic
```shell
networksetup -setv6automatic "Wi-Fi"
diff --git a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md
index 65778d4..50e4142 100644
--- a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md
+++ b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md
@@ -14,25 +14,25 @@ Publication date: 2020-06-18T00:00:00.000Z
## Installation guide
-**Step 1: install [Homebrew](https://brew.sh/)**
+#### Step 1: install [Homebrew](https://brew.sh/)
```shell
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)"
```
-**Step 2: disable analytics**
+#### Step 2: disable analytics
```shell
brew analytics off
```
-**Step 3: install [GnuPG](https://gnupg.org/)**
+#### Step 3: install [GnuPG](https://gnupg.org/)
```shell
brew install gnupg
```
-**Step 4: generate PGP key pair**
+#### Step 4: generate PGP key pair
```shell
$ gpg --full-generate-key
@@ -91,7 +91,7 @@ uid John Doe
sub rsa4096 2020-06-16 [E]
```
-**Step 5: set default PGP key server to `hkps://keys.openpgp.org`**
+#### Step 5: set default PGP key server to `hkps://keys.openpgp.org`
```shell
echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf
@@ -101,13 +101,13 @@ echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf
## Usage guide
-**Export John’s PGP public key**
+#### Export John’s PGP public key
```shell
gpg --armor --export john@example.net > ~/Desktop/john.asc
```
-**Import Sun’s PGP public key**
+#### Import Sun’s PGP public key
```shell
gpg --keyserver hkps://keys.openpgp.org --recv-keys 0xC1323A377DE14C8B
@@ -119,7 +119,7 @@ or
curl https://sunknudsen.com/sunknudsen.asc | gpg --import
```
-**Confirm Sun’s PGP public key is legit using its fingerprint**
+#### Confirm Sun’s PGP public key is legit using its fingerprint
```shell
$ gpg --fingerprint hello@sunknudsen.com
@@ -138,7 +138,7 @@ See https://sunknudsen.com/, https://github.com/sunknudsen/pgp-public-key and ht
👍
-**Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode)**
+#### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode)
```shell
$ gpg --encrypt --sign --armor --output ~/Desktop/encrypted.asc -r john@example.net -r hello@sunknudsen.com
@@ -156,7 +156,7 @@ Use this key anyway? (y/N) y
This is a test!
```
-**Decrypt message to stdout and decode quoted-printable characters**
+#### Decrypt message to stdout and decode quoted-printable characters
```shell
$ gpg --decrypt /Users/johndoe/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)'
@@ -170,7 +170,7 @@ gpg: Good signature from "John Doe " [ultimate]
This is a test!
```
-**Clear passphrase from GnuPG cache**
+#### Clear passphrase from GnuPG cache
```shell
gpg-connect-agent reloadagent /bye
diff --git a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md
index 37dc554..f2c645a 100644
--- a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md
+++ b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md
@@ -10,13 +10,13 @@ Publication date: 2020-05-15T00:00:00.000Z
[](https://www.youtube.com/watch?v=uYoJ7U0OMCY "How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube")
-**Step 1: make sure you are running the latest version of Firefox**
+#### Step 1: make sure you are running the latest version of Firefox
-**Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw)**
+#### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw)
-**Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection`**
+#### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection`
-**Step 4: open `about:config` and set the following**
+#### Step 4: open `about:config` and set the following
```
dom.event.clipboardevents.enabled = false
diff --git a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md
index 42c2530..d3a9cb6 100644
--- a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md
+++ b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md
@@ -10,7 +10,7 @@ Publication date: 2020-06-05T00:00:00.000Z
[![How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube]()](https://www.youtube.com/watch?v=d_M18sq0TIQ "How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube")
-**Run the following `pmset` command using the Terminal.**
+#### Run the following `pmset` command using the Terminal.
```shell
sudo pmset -a destroyfvkeyonstandby 1 hibernatemode 25 standbydelaylow 0 standbydelayhigh 0
@@ -30,7 +30,7 @@ See `man pmset` for more information.
## Want things back the way they were before following this guide? No problem!
-**Run the following `pmset` command using the Terminal.**
+#### Run the following `pmset` command using the Terminal.
```shell
sudo pmset -a destroyfvkeyonstandby 0 hibernatemode 3 standbydelaylow 10800 standbydelayhigh 86400
diff --git a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md
index 7e69110..29c7a0e 100644
--- a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md
+++ b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md
@@ -12,19 +12,19 @@ Publication date: 2020-06-25T00:00:00.000Z
## Installation guide
-**Step 1: install [Homebrew](https://brew.sh/)**
+#### Step 1: install [Homebrew](https://brew.sh/)
```shell
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)"
```
-**Step 2: disable analytics**
+#### Step 2: disable analytics
```shell
brew analytics off
```
-**Step 3: install [ExifTool](https://exiftool.org/)**
+#### Step 3: install [ExifTool](https://exiftool.org/)
```shell
brew install exiftool
@@ -34,13 +34,13 @@ brew install exiftool
## Usage guide
-**View EXIF metadata**
+#### View EXIF metadata
```shell
exiftool -n /path/to/image.jpg
```
-**Remove EXIF metadata**
+#### Remove EXIF metadata
```shell
exiftool -all= /path/to/image.jpg
diff --git a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md
index 8974991..74a7feb 100644
--- a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md
+++ b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md
@@ -8,18 +8,18 @@ Publication date: 2020-05-19T00:00:00.000Z
# How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS
-[](https://www.youtube.com/watch?v=ASXANpr_zX8 "How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube")
+[](https://www.youtube.com/watch?v=ASXANpr_zX8 "How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube")
> Heads up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If that’s your case, please consider upgrading to Catalina.
-**Step 1: create `/usr/local/sbin` folder**
+#### Step 1: create `/usr/local/sbin` folder
```shell
sudo mkdir /usr/local/sbin
sudo chown $(whoami):admin /usr/local/sbin/
```
-**Step 2: create `spoof.sh` script**
+#### Step 2: create `spoof.sh` script
**Pro tip 1: when copy/pasting commands that start with `cat << "EOF"`, select all lines (from `cat << "EOF"` to `EOF`) at once as they are part of the same (single) command**
@@ -125,13 +125,13 @@ echo "Spoofed MAC address of en0 interface to $mac_address"
Set spoofed MAC address using [ifconfig](https://en.wikipedia.org/wiki/Ifconfig) and echo spoofed MAC address
-**Step 3: make `spoof.sh` executable**
+#### Step 3: make `spoof.sh` executable
```shell
chmod +x /usr/local/sbin/spoof.sh
```
-**Step 4: download [first_names.txt](first_names.txt)**
+#### Step 4: download [first_names.txt](first_names.txt)
This list includes the top 2048 most popular baby names from the [USA Social Security Administration](https://www.ssa.gov/oact/babynames/limits.html).
@@ -139,7 +139,7 @@ This list includes the top 2048 most popular baby names from the [USA Social Sec
curl -o /usr/local/sbin/first_names.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/first_names.txt
```
-**Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt)**
+#### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt)
This list includes 768 Apple MAC address prefixes.
@@ -147,7 +147,7 @@ This list includes 768 Apple MAC address prefixes.
curl -o /usr/local/sbin/mac_address_prefixes.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/mac_address_prefixes.txt
```
-**Step 6: create `local.spoof.plist` launch daemon**
+#### Step 6: create `local.spoof.plist` launch daemon
This step is responsible for running `spoof.sh` every time your Mac boots.
@@ -172,7 +172,7 @@ cat << "EOF" | sudo tee /Library/LaunchDaemons/local.spoof.plist > /dev/null
EOF
```
-**Step 7: reboot and confirm hostname and MAC address have been spoofed**
+#### Step 7: reboot and confirm hostname and MAC address have been spoofed
```shell
# Spoofed hostname
@@ -193,7 +193,7 @@ networksetup -listallhardwareports | awk -v RS= '/en0/{print $NF}'
## Want things back the way they were before following this guide? No problem!
-**Step 1: set computer name, local hostname and hostname**
+#### Step 1: set computer name, local hostname and hostname
Replace `John Doe` with a value to your liking. Don’t forget to replace empty spaces by `-` for `LocalHostName` and `HostName`.
@@ -203,7 +203,7 @@ sudo scutil --set LocalHostName "John-Doe"
sudo scutil --set HostName "John-Doe"
```
-**Step 2: set MAC address to factory value**
+#### Step 2: set MAC address to factory value
Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/local.spoof.plist` launch daemon and rebooting will reset your MAC address to its factory value.
@@ -211,7 +211,7 @@ Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/lo
sudo rm /Library/LaunchDaemons/local.spoof.plist
```
-**Step 3 (optional): delete script and datasets**
+#### Step 3 (optional): delete script and datasets
```shell
rm /usr/local/sbin/spoof.sh
diff --git a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md
index dc46d35..676c35f 100644
--- a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md
+++ b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md
@@ -10,15 +10,15 @@ Publication date: 2020-05-13T00:00:00.000Z
[](https://www.youtube.com/watch?v=Upib_vq_EB8 "How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube")
-**Step 1: create Firefox profile**
+#### Step 1: create Firefox profile
```shell
/Applications/Firefox.app/Contents/MacOS/firefox-bin -p
```
-**Step 2: open Firefox profile**
+#### Step 2: open Firefox profile
-**Heads-up:** in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`).
+> Heads-up: in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`).
```shell
nohup /Applications/Firefox.app/Contents/MacOS/firefox-bin -p work --no-remote > /dev/null 2>&1 &