mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-05-16 19:27:06 +00:00
fix typos
This commit is contained in:
parent
9f05f656f1
commit
e142601b4d
6 changed files with 9 additions and 9 deletions
|
@ -62,7 +62,7 @@ So now you have zuluCrypt on your system. **However before you start to use it,
|
|||
|
||||

|
||||
|
||||
By default, your host OS directly writes into the system drive all sorts of potential forensic evidence that an adversary may use against you, such as system logs, kernel logs, non-standard logs, etc, and unless if you remove each of those manually, you're never sure of wether or not the Host OS saved proof of the existence of the hidden volume onto the system drive. **That's why when you use zulucrypt to handle veracrypt hidden volumes (creating them or opening them) you absolutely need to use the Host OS in[live mode](../livemode/index.md) ONLY! **
|
||||
By default, your host OS directly writes into the system drive all sorts of potential forensic evidence that an adversary may use against you, such as system logs, kernel logs, non-standard logs, etc, and unless if you remove each of those manually, you're never sure of whether or not the Host OS saved proof of the existence of the hidden volume onto the system drive. **That's why when you use zulucrypt to handle veracrypt hidden volumes (creating them or opening them) you absolutely need to use the Host OS in[live mode](../livemode/index.md) ONLY! **
|
||||
|
||||

|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue