diff --git a/opsec/high_availability/attack_diagram.png b/opsec/high_availability/attack_diagram.png
new file mode 100644
index 0000000..df215b5
Binary files /dev/null and b/opsec/high_availability/attack_diagram.png differ
diff --git a/opsec/high_availability/attack_diagram.svg b/opsec/high_availability/attack_diagram.svg
deleted file mode 100644
index c1a3b7a..0000000
--- a/opsec/high_availability/attack_diagram.svg
+++ /dev/null
@@ -1,653 +0,0 @@
-
-
diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html
index d86e132..18e8c73 100644
--- a/opsec/high_availability/index.html
+++ b/opsec/high_availability/index.html
@@ -178,7 +178,7 @@ Both of those are trival to obtain for LEOs (law enforcement officers).
-
+
This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service.
@@ -217,7 +217,10 @@ This Diagram shows where the attack takes place and how a redundant setup preven