mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 10:46:40 +00:00
Deniability-HA tutorial title and explanation fix
This commit is contained in:
parent
606b3176d4
commit
5c585292de
1 changed files with 3 additions and 2 deletions
|
@ -8,7 +8,7 @@
|
|||
<meta name="author" content="MulliganSecurity">
|
||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||
|
||||
<title>Deniability - Why is High Availability Important for anonymity and operational security</title>
|
||||
<title>Why is High Availability Important for Deniability</title>
|
||||
|
||||
<!-- Bootstrap core CSS -->
|
||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||
|
@ -70,7 +70,8 @@ The concept of high availability is omnipresent in centralized services. One exp
|
|||
When an adversary wants to collect information such as physical location behind a hidden service, depending on their power they will use downtime as an indicator in order to progressively narrow the pool of potential service location until they can act decisively against the remaining suspects.
|
||||
|
||||
<br> <br>
|
||||
Thus being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
|
||||
<b>Anonymity IS a requirement for deniability</b><br>
|
||||
Being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
|
||||
</p>
|
||||
|
||||
</div>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue