update title and add an explanation in the intro

This commit is contained in:
urist 2024-12-20 14:37:23 +01:00
parent 00362f63b3
commit 606b3176d4

View file

@ -8,7 +8,7 @@
<meta name="author" content="MulliganSecurity"> <meta name="author" content="MulliganSecurity">
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png"> <link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
<title>Deniability - Why is High Availability Important for Deniability</title> <title>Deniability - Why is High Availability Important for anonymity and operational security</title>
<!-- Bootstrap core CSS --> <!-- Bootstrap core CSS -->
<link href="../../assets/css/bootstrap.css" rel="stylesheet"> <link href="../../assets/css/bootstrap.css" rel="stylesheet">
@ -69,6 +69,8 @@ The concept of high availability is omnipresent in centralized services. One exp
<b> High-availability, the ability to provide high-uptime infrastructure, also has far-reaching implications for OPSEC practitioners.</b> <br/><br/> <b> High-availability, the ability to provide high-uptime infrastructure, also has far-reaching implications for OPSEC practitioners.</b> <br/><br/>
When an adversary wants to collect information such as physical location behind a hidden service, depending on their power they will use downtime as an indicator in order to progressively narrow the pool of potential service location until they can act decisively against the remaining suspects. When an adversary wants to collect information such as physical location behind a hidden service, depending on their power they will use downtime as an indicator in order to progressively narrow the pool of potential service location until they can act decisively against the remaining suspects.
<br> <br>
Thus being able to plausibly deny being the operator of, or a downstream service supplier to a hidden service is a significant boon to personal protection.
</p> </p>
</div> </div>