This guide is provided on an 'as is' basis without any warranties of any kind. Only you are responsible if you break anything or get in any sort of trouble by following this guide. What are you trying to protect and from whom? Is your adversary a three letter agency (if so, you may want to consider using OpenBSD instead) a nosy eavesdropper on the network or a determined apt orchestrating a campaign against you?.To suggest an improvement, please send a pull request or open an issue. Recognize threats and how to reduce attack surface against them.
0 Comments
Leave a Reply. |