Deniability-HA tutorial title and explanation fix

This commit is contained in:
urist 2024-12-21 17:13:59 +01:00
parent 606b3176d4
commit 5c585292de

View file

@ -8,7 +8,7 @@
<meta name="author" content="MulliganSecurity">
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
<title>Deniability - Why is High Availability Important for anonymity and operational security</title>
<title>Why is High Availability Important for Deniability</title>
<!-- Bootstrap core CSS -->
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
@ -70,7 +70,8 @@ The concept of high availability is omnipresent in centralized services. One exp
When an adversary wants to collect information such as physical location behind a hidden service, depending on their power they will use downtime as an indicator in order to progressively narrow the pool of potential service location until they can act decisively against the remaining suspects.
<br> <br>
Thus being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
<b>Anonymity IS a requirement for deniability</b><br>
Being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
</p>
</div>