fix typos

This commit is contained in:
nihilist 2025-05-15 08:40:31 +02:00
parent 9f05f656f1
commit e142601b4d
6 changed files with 9 additions and 9 deletions

View file

@ -4,7 +4,7 @@ date: 2001-01-30
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/260"
xmr: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8
---
# What is On topic ?
# What is on topic ?
The Nihilism Blog's Operational Security tutorial category is on purpose restricted to a few topics to avoid the subject from being too vast and to remain fully explorable.
@ -38,7 +38,7 @@ And Lastly, the holy grail of Operational Security being deniability, where we c
![](../deniability/4.png)
This is where we showcase how to implement host OS livemode, and Veracrypt hidden volumes into one's setup, to make sure that there are no proofs left behind that could prove that the individual is behind said sensitive operations once his .
This is where we showcase how to implement host OS livemode, and Veracrypt hidden volumes into one's setup, to make sure that there are no proofs left behind that could prove that the individual is behind said sensitive operations upon being forced to unlock his devices.
![](../veracrypt/20.png)
On the clientside, the core scenario is to explore how to ensure that the individual's operations can survive a police raid, and the order from the judge where he's forced to type his own password.