mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
update relative links
This commit is contained in:
parent
6b6c6d7a95
commit
fef74823b5
1 changed files with 2 additions and 2 deletions
|
@ -80,7 +80,7 @@
|
|||
<br>
|
||||
<br>
|
||||
<p>
|
||||
When dealing with strangers on the internet you may not always want to reveal your real identity. Practising good OPSEC and maintaining your online anonymity can therefore be paramount in certain situations. But in an arena where anyone can be anonymous, how can you be sure people are truly who they claim to be and that you're talking to the same person across different situations? That is where Pretty Good Privacy (PGP), an encryption program that provides cryptographic privacy and authentication comes in to verify one's identity without actually revealing it. In this tutorial, we will build upon the PGP concepts <a href=http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/pgp/index.html target=_blank>previously covered</a>, and expand these concepts to verifying not just messages, but entire personas and even control over infrastructure in hostile environments.
|
||||
When dealing with strangers on the internet you may not always want to reveal your real identity. Practising good OPSEC and maintaining your online anonymity can therefore be paramount in certain situations. But in an arena where anyone can be anonymous, how can you be sure people are truly who they claim to be and that you're talking to the same person across different situations? That is where Pretty Good Privacy (PGP), an encryption program that provides cryptographic privacy and authentication comes in to verify one's identity without actually revealing it. In this tutorial, we will build upon the PGP concepts <a href=../pgp/index.html target=_blank>previously covered</a>, and expand these concepts to verifying not just messages, but entire personas and even control over infrastructure in hostile environments.
|
||||
</p>
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
|
@ -100,7 +100,7 @@ Bob has been busy working on his onion site. After putting the finishing touches
|
|||
</p>
|
||||
|
||||
<p>
|
||||
Having learned the basics of PGP from the <a href=http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/pgp/index.html target=_blank>previous tutorial</a>, Alice imports Bob's public key from an independent source (his site) then proceeds to verify if indeed Bob is who he says he is. In this case, the signature checks out and Alice can see the message contents confirming the onion site link.
|
||||
Having learned the basics of PGP from the <a href=../pgp/index.html target=_blank>previous tutorial</a>, Alice imports Bob's public key from an independent source (his site) then proceeds to verify if indeed Bob is who he says he is. In this case, the signature checks out and Alice can see the message contents confirming the onion site link.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue