Skip to content

Commit

Permalink
Fix typo (#16)
Browse files Browse the repository at this point in the history
  • Loading branch information
raechelmaelstrom authored Aug 18, 2024
1 parent eaf560a commit b581fc4
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/chapter_3.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ In 2012, the FBI caught a hacker with the nickname w0rmer after he hacked severa

The electrical tape on your webcam and your Tor browser inside Whonix OS can't help you if you share too much about yourself, if you over time tend to expose your real identity piece by piece. Having good opsec often means having control and awareness of what you're sharing when talking to people or when posting online.

## Identify the sensetive data and information
## Identify the sensitive data and information

The first step in improving your OPSEC is identifying the data that is sensitive to you. To do this, you need to refer to your threat model. Assess what threats are common and which data would have the most severe consequences if it falls into the wrong hands. Then, prioritize the information based on the severity of the consequences.

Expand Down

0 comments on commit b581fc4

Please sign in to comment.