mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 06:36:40 +00:00
update title and add an explanation in the intro
This commit is contained in:
parent
00362f63b3
commit
606b3176d4
1 changed files with 3 additions and 1 deletions
|
@ -8,7 +8,7 @@
|
|||
<meta name="author" content="MulliganSecurity">
|
||||
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
|
||||
|
||||
<title>Deniability - Why is High Availability Important for Deniability</title>
|
||||
<title>Deniability - Why is High Availability Important for anonymity and operational security</title>
|
||||
|
||||
<!-- Bootstrap core CSS -->
|
||||
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
|
||||
|
@ -69,6 +69,8 @@ The concept of high availability is omnipresent in centralized services. One exp
|
|||
<b> High-availability, the ability to provide high-uptime infrastructure, also has far-reaching implications for OPSEC practitioners.</b> <br/><br/>
|
||||
When an adversary wants to collect information such as physical location behind a hidden service, depending on their power they will use downtime as an indicator in order to progressively narrow the pool of potential service location until they can act decisively against the remaining suspects.
|
||||
|
||||
<br> <br>
|
||||
Thus being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
|
||||
</p>
|
||||
|
||||
</div>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue