diff --git a/opsec/pgpcanary/index.html b/opsec/pgpcanary/index.html index e316237..ffe2aea 100644 --- a/opsec/pgpcanary/index.html +++ b/opsec/pgpcanary/index.html @@ -80,7 +80,7 @@

-When dealing with strangers on the internet you may not always want to reveal your real identity. Practising good OPSEC and maintaining your online anonymity can therefore be paramount in certain situations. But in an arena where anyone can be anonymous, how can you be sure people are truly who they claim to be and that you're talking to the same person across different situations? That is where Pretty Good Privacy (PGP), an encryption program that provides cryptographic privacy and authentication comes in to verify one's identity without actually revealing it. In this tutorial, we will build upon the PGP concepts previously covered, and expand these concepts to verifying not just messages, but entire personas and even control over infrastructure in hostile environments. +When dealing with strangers on the internet you may not always want to reveal your real identity. Practising good OPSEC and maintaining your online anonymity can therefore be paramount in certain situations. But in an arena where anyone can be anonymous, how can you be sure people are truly who they claim to be and that you're talking to the same person across different situations? That is where Pretty Good Privacy (PGP), an encryption program that provides cryptographic privacy and authentication comes in to verify one's identity without actually revealing it. In this tutorial, we will build upon the PGP concepts previously covered, and expand these concepts to verifying not just messages, but entire personas and even control over infrastructure in hostile environments.

@@ -100,7 +100,7 @@ Bob has been busy working on his onion site. After putting the finishing touches

-Having learned the basics of PGP from the previous tutorial, Alice imports Bob's public key from an independent source (his site) then proceeds to verify if indeed Bob is who he says he is. In this case, the signature checks out and Alice can see the message contents confirming the onion site link. +Having learned the basics of PGP from the previous tutorial, Alice imports Bob's public key from an independent source (his site) then proceeds to verify if indeed Bob is who he says he is. In this case, the signature checks out and Alice can see the message contents confirming the onion site link.