From ff2b880fc0e412f13a29df5368cab26c09fe7a53 Mon Sep 17 00:00:00 2001 From: Sun Knudsen Date: Sun, 2 Aug 2020 06:55:08 -0400 Subject: [PATCH] Implemented heading anchors --- .../README.md | 28 +++++++++---------- .../README.md | 22 +++++++-------- .../README.md | 8 +++--- .../README.md | 4 +-- .../README.md | 10 +++---- .../README.md | 22 +++++++-------- .../README.md | 6 ++-- 7 files changed, 50 insertions(+), 50 deletions(-) diff --git a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md index 9e4e0a8..798a22b 100644 --- a/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md +++ b/how-to-disable-ipv6-on-ios-cellular-only-and-macos-and-why-it-s-a-big-deal-for-privacy/README.md @@ -14,37 +14,37 @@ Publication date: 2020-07-18T10:28:23.605Z ## iOS guide -**Step 1 (macOS): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator)** +#### Step 1 (macOS): download and open [Apple Configurator 2](https://support.apple.com/apple-configurator) -**Step 2 (macOS): create new profile using cmd + n** +#### Step 2 (macOS): create new profile using cmd + n -**Step 3 (macOS): configure "General" settings** +#### Step 3 (macOS): configure "General" settings ![apple-configurator-general](./apple-configurator-general.png?shadow=1) -**Step 4 (iOS): find your APN settings** +#### Step 4 (iOS): find your APN settings Open "Settings", then "Cellular", then "Cellular Data Network". ![ios-cellular-data-network](./ios-cellular-data-network.png?shadow=1&width=240) -**Step 5 (macOS): configure "Cellular" settings** +#### Step 5 (macOS): configure "Cellular" settings ![apple-configurator-cellular](./apple-configurator-cellular.png?shadow=1) -**Step 6 (macOS): save provisioning profile** +#### Step 6 (macOS): save provisioning profile -**Step 7 (macOS): connect iPhone to Mac** +#### Step 7 (macOS): connect iPhone to Mac -**Step 8 (macOS): double-click on iPhone** +#### Step 8 (macOS): double-click on iPhone ![apple-configurator-iphone](./apple-configurator-iphone.png?shadow=1) -**Step 9 (macOS): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add"** +#### Step 9 (macOS): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add" ![apple-configurator-add-profile](./apple-configurator-add-profile.png?shadow=1) -**Step 10 (iOS): review profile** +#### Step 10 (iOS): review profile Open "Settings", then "Profile Downloaded" and tap "Install" @@ -52,13 +52,13 @@ Open "Settings", then "Profile Downloaded" and tap "Install" ## macOS guide -**Step 1: list network interfaces** +#### Step 1: list network interfaces ```shell networksetup -listallnetworkservices ``` -**Step 2: disable IPv6** +#### Step 2: disable IPv6 ```shell networksetup -setv6off "Wi-Fi" @@ -69,13 +69,13 @@ networksetup -setv6off "Thunderbolt Ethernet" ## Want things back the way they were before following this guide? No problem! -**Step 1 (iOS): remove provisioning profile from iPhone** +#### Step 1 (iOS): remove provisioning profile from iPhone Open "Settings", then "General", then "Profile", tap on your provisioning profile and tap "Remove Profile". ![ios-remove-profile](./ios-remove-profile.png?shadow=1&width=240) -**Step 2 (macOS): set network interfaces to automatic** +#### Step 2 (macOS): set network interfaces to automatic ```shell networksetup -setv6automatic "Wi-Fi" diff --git a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md index 65778d4..50e4142 100644 --- a/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md +++ b/how-to-encrypt-sign-and-decrypt-messages-using-pgp-on-macos-adding-privacy-to-email/README.md @@ -14,25 +14,25 @@ Publication date: 2020-06-18T00:00:00.000Z ## Installation guide -**Step 1: install [Homebrew](https://brew.sh/)** +#### Step 1: install [Homebrew](https://brew.sh/) ```shell /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" ``` -**Step 2: disable analytics** +#### Step 2: disable analytics ```shell brew analytics off ``` -**Step 3: install [GnuPG](https://gnupg.org/)** +#### Step 3: install [GnuPG](https://gnupg.org/) ```shell brew install gnupg ``` -**Step 4: generate PGP key pair** +#### Step 4: generate PGP key pair ```shell $ gpg --full-generate-key @@ -91,7 +91,7 @@ uid John Doe sub rsa4096 2020-06-16 [E] ``` -**Step 5: set default PGP key server to `hkps://keys.openpgp.org`** +#### Step 5: set default PGP key server to `hkps://keys.openpgp.org` ```shell echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf @@ -101,13 +101,13 @@ echo "keyserver hkps://keys.openpgp.org" >> ~/.gnupg/dirmngr.conf ## Usage guide -**Export John’s PGP public key** +#### Export John’s PGP public key ```shell gpg --armor --export john@example.net > ~/Desktop/john.asc ``` -**Import Sun’s PGP public key** +#### Import Sun’s PGP public key ```shell gpg --keyserver hkps://keys.openpgp.org --recv-keys 0xC1323A377DE14C8B @@ -119,7 +119,7 @@ or curl https://sunknudsen.com/sunknudsen.asc | gpg --import ``` -**Confirm Sun’s PGP public key is legit using its fingerprint** +#### Confirm Sun’s PGP public key is legit using its fingerprint ```shell $ gpg --fingerprint hello@sunknudsen.com @@ -138,7 +138,7 @@ See https://sunknudsen.com/, https://github.com/sunknudsen/pgp-public-key and ht 👍 -**Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode)** +#### Paste, encrypt and sign message (enter line break and use command `ctrl+d` to quit edit mode) ```shell $ gpg --encrypt --sign --armor --output ~/Desktop/encrypted.asc -r john@example.net -r hello@sunknudsen.com @@ -156,7 +156,7 @@ Use this key anyway? (y/N) y This is a test! ``` -**Decrypt message to stdout and decode quoted-printable characters** +#### Decrypt message to stdout and decode quoted-printable characters ```‌shell $ gpg --decrypt /Users/johndoe/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)' @@ -170,7 +170,7 @@ gpg: Good signature from "John Doe " [ultimate] This is a test! ``` -**Clear passphrase from GnuPG cache** +#### Clear passphrase from GnuPG cache ```shell gpg-connect-agent reloadagent /bye diff --git a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md index 37dc554..f2c645a 100644 --- a/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md +++ b/how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences/README.md @@ -10,13 +10,13 @@ Publication date: 2020-05-15T00:00:00.000Z [![How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube](how-to-mitigate-fingerprinting-and-ip-leaks-using-firefox-advanced-preferences.png)](https://www.youtube.com/watch?v=uYoJ7U0OMCY "How to mitigate fingerprinting and IP leaks using Firefox advanced preferences - YouTube") -**Step 1: make sure you are running the latest version of Firefox** +#### Step 1: make sure you are running the latest version of Firefox -**Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw)** +#### Step 2: make sure you configured Firefox for privacy using [https://www.youtube.com/watch?v=NH4DdXC0RFw](https://www.youtube.com/watch?v=NH4DdXC0RFw) -**Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection`** +#### Step 3: in `Privacy & Security`, disable `Deceptive Content and Dangerous Software Protection` -**Step 4: open `about:config` and set the following** +#### Step 4: open `about:config` and set the following ``` dom.event.clipboardevents.enabled = false diff --git a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md index 42c2530..d3a9cb6 100644 --- a/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md +++ b/how-to-protect-mac-computers-from-cold-boot-attacks-also-known-as-an-evil-maid-attack/README.md @@ -10,7 +10,7 @@ Publication date: 2020-06-05T00:00:00.000Z [![How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube]()](https://www.youtube.com/watch?v=d_M18sq0TIQ "How to protect Mac computers from cold boot attacks (also known as an evil maid attack) - YouTube") -**Run the following `pmset` command using the Terminal.** +#### Run the following `pmset` command using the Terminal. ```shell sudo pmset -a destroyfvkeyonstandby 1 hibernatemode 25 standbydelaylow 0 standbydelayhigh 0 @@ -30,7 +30,7 @@ See `man pmset` for more information. ## Want things back the way they were before following this guide? No problem! -**Run the following `pmset` command using the Terminal.** +#### Run the following `pmset` command using the Terminal. ```shell sudo pmset -a destroyfvkeyonstandby 0 hibernatemode 3 standbydelaylow 10800 standbydelayhigh 86400 diff --git a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md index 7e69110..29c7a0e 100644 --- a/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md +++ b/how-to-remove-exif-metadata-from-images-on-macos-to-prevent-geolocation-and-hardware-leaks/README.md @@ -12,19 +12,19 @@ Publication date: 2020-06-25T00:00:00.000Z ## Installation guide -**Step 1: install [Homebrew](https://brew.sh/)** +#### Step 1: install [Homebrew](https://brew.sh/) ```shell /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" ``` -**Step 2: disable analytics** +#### Step 2: disable analytics ```shell brew analytics off ``` -**Step 3: install [ExifTool](https://exiftool.org/)** +#### Step 3: install [ExifTool](https://exiftool.org/) ```shell brew install exiftool @@ -34,13 +34,13 @@ brew install exiftool ## Usage guide -**View EXIF metadata** +#### View EXIF metadata ```shell exiftool -n /path/to/image.jpg ``` -**Remove EXIF metadata** +#### Remove EXIF metadata ```shell exiftool -all= /path/to/image.jpg diff --git a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md index 8974991..74a7feb 100644 --- a/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md +++ b/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md @@ -8,18 +8,18 @@ Publication date: 2020-05-19T00:00:00.000Z # How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS -[![How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube](how-to-how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos.png)](https://www.youtube.com/watch?v=ASXANpr_zX8 "How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube") +[![How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube](how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos.png)](https://www.youtube.com/watch?v=ASXANpr_zX8 "How to spoof (anonymize) your MAC address and hostname automatically at boot on macOS - YouTube") > Heads up: unfortunately this guide does not work on Macs equipped with the new T2 chip running macOS Mojave. If that’s your case, please consider upgrading to Catalina. -**Step 1: create `/usr/local/sbin` folder** +#### Step 1: create `/usr/local/sbin` folder ```shell sudo mkdir /usr/local/sbin sudo chown $(whoami):admin /usr/local/sbin/ ``` -**Step 2: create `spoof.sh` script** +#### Step 2: create `spoof.sh` script **Pro tip 1: when copy/pasting commands that start with `cat << "EOF"`, select all lines (from `cat << "EOF"` to `EOF`) at once as they are part of the same (single) command** @@ -125,13 +125,13 @@ echo "Spoofed MAC address of en0 interface to $mac_address" Set spoofed MAC address using [ifconfig](https://en.wikipedia.org/wiki/Ifconfig) and echo spoofed MAC address -**Step 3: make `spoof.sh` executable** +#### Step 3: make `spoof.sh` executable ```shell chmod +x /usr/local/sbin/spoof.sh ``` -**Step 4: download [first_names.txt](first_names.txt)** +#### Step 4: download [first_names.txt](first_names.txt) This list includes the top 2048 most popular baby names from the [USA Social Security Administration](https://www.ssa.gov/oact/babynames/limits.html). @@ -139,7 +139,7 @@ This list includes the top 2048 most popular baby names from the [USA Social Sec curl -o /usr/local/sbin/first_names.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/first_names.txt ``` -**Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt)** +#### Step 5: download [mac_address_prefixes.txt](mac_address_prefixes.txt) This list includes 768 Apple MAC address prefixes. @@ -147,7 +147,7 @@ This list includes 768 Apple MAC address prefixes. curl -o /usr/local/sbin/mac_address_prefixes.txt https://sunknudsen.com/static/media/privacy-guides/how-to-spoof-anonymize-your-mac-address-and-hostname-automatically-at-boot-on-macos/mac_address_prefixes.txt ``` -**Step 6: create `local.spoof.plist` launch daemon** +#### Step 6: create `local.spoof.plist` launch daemon This step is responsible for running `spoof.sh` every time your Mac boots. @@ -172,7 +172,7 @@ cat << "EOF" | sudo tee /Library/LaunchDaemons/local.spoof.plist > /dev/null EOF ``` -**Step 7: reboot and confirm hostname and MAC address have been spoofed** +#### Step 7: reboot and confirm hostname and MAC address have been spoofed ```shell # Spoofed hostname @@ -193,7 +193,7 @@ networksetup -listallhardwareports | awk -v RS= '/en0/{print $NF}' ## Want things back the way they were before following this guide? No problem! -**Step 1: set computer name, local hostname and hostname** +#### Step 1: set computer name, local hostname and hostname Replace `John Doe` with a value to your liking. Don’t forget to replace empty spaces by `-` for `LocalHostName` and `HostName`. @@ -203,7 +203,7 @@ sudo scutil --set LocalHostName "John-Doe" sudo scutil --set HostName "John-Doe" ``` -**Step 2: set MAC address to factory value** +#### Step 2: set MAC address to factory value Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/local.spoof.plist` launch daemon and rebooting will reset your MAC address to its factory value. @@ -211,7 +211,7 @@ Given MAC address spoofing is ephemeral, deleting the `/Library/LaunchDaemons/lo sudo rm /Library/LaunchDaemons/local.spoof.plist ``` -**Step 3 (optional): delete script and datasets** +#### Step 3 (optional): delete script and datasets ```shell rm /usr/local/sbin/spoof.sh diff --git a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md index dc46d35..676c35f 100644 --- a/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md +++ b/how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles/README.md @@ -10,15 +10,15 @@ Publication date: 2020-05-13T00:00:00.000Z [![How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube](how-to-use-multiple-compartmentalized-firefox-instances-simultaneously-using-profiles.png)](https://www.youtube.com/watch?v=Upib_vq_EB8 "How to use multiple compartmentalized Firefox instances simultaneously using profiles - YouTube") -**Step 1: create Firefox profile** +#### Step 1: create Firefox profile ```shell /Applications/Firefox.app/Contents/MacOS/firefox-bin -p ``` -**Step 2: open Firefox profile** +#### Step 2: open Firefox profile -**Heads-up:** in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`). +> Heads-up: in the following command, make sure you replace `work` by the name of your profile. If the name includes spaces, please use quotes (example: `-p "Work Profile"`). ```shell nohup /Applications/Firefox.app/Contents/MacOS/firefox-bin -p work --no-remote > /dev/null 2>&1 &