mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-07-02 00:16:40 +00:00
rebranding from nihilism opsec blog to opsec bible
This commit is contained in:
parent
d2f56a8128
commit
a6f190336a
7 changed files with 14 additions and 14 deletions
|
@ -86,7 +86,7 @@ Don't just contradict what we say, bring reasoning, arguments, logic, data and l
|
|||
|
||||

|
||||
|
||||
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec blog like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
|
||||
In this case it's an absolutely valid criticism which definitely makes sense, since it simplifies the previous setup by removing the use of that wipe.sh script, and by not even requiring to install the veracrypt software. In that case i scheduled the changes for multiple tutorials, and came up with the following 4 updated tutorials to take this criticism into account: [[0]](../linux/index.md)[[1]](../livemode/index.md) [[2]](../veracrypt/index.md) [[3]](../sensitivevm/index.md). **One valid criticism can have an effect on the entire Opsec Bible like this one, since there are alot of blogposts that are inter-dependant.** In this case, since the Host OS had to change, i rewrote the Host OS tutorial, the hypervisor tutorial, the veracrypt tutorial and ultimately the sensitive VMs tutorial accordingly to be able to match the criticism that was sent to me.
|
||||
|
||||

|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue