Skip to content

Commit

Permalink
update priority markers
Browse files Browse the repository at this point in the history
  • Loading branch information
glenn-sorrentino committed Oct 1, 2023
1 parent 22dc484 commit 614dec7
Show file tree
Hide file tree
Showing 5 changed files with 11 additions and 11 deletions.
6 changes: 3 additions & 3 deletions book/prereqs/threat-modeling.html
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ <h2 id="introduction"><a class="header" href="#introduction">Introduction</a></h
<p>The deployment of an anonymous tip line, like Hush Line, requires an understanding of the environment in which it will be used. Different organizations and individuals face unique threats, and the purpose of this guide is to help you navigate these challenges. By understanding your threat landscape, you can choose the appropriate deployment method that balances accessibility and security for your needs.</p>
<h2 id="understanding-the-threats"><a class="header" href="#understanding-the-threats">Understanding the Threats</a></h2>
<p>To select the right Hush Line deployment, consider the potential risks and consequences you or your tipsters might face:</p>
<h3 id="-low-threats"><a class="header" href="#-low-threats">Low Threats</a></h3>
<h3 id="low-threats-"><a class="header" href="#low-threats-">Low Threats</a></h3>
<p>These scenarios typically involve situations where the primary risk is non-targeted threats or generic cyber threats. The fallout from a security breach is minimal. </p>
<p>We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: <code>tips.acme.com</code>.</p>
<h4 id="example-use-cases"><a class="header" href="#example-use-cases">Example Use Cases</a></h4>
Expand All @@ -185,7 +185,7 @@ <h4 id="example-use-cases"><a class="header" href="#example-use-cases">Example U
<li>🏫 Schoolhouses</li>
<li>🎈 Conference organizers</li>
</ul>
<h3 id="-medium-threats"><a class="header" href="#-medium-threats">❗️ Medium Threats</a></h3>
<h3 id="medium-threats-"><a class="header" href="#medium-threats-">Medium Threats ❗️</a></h3>
<p>Here, the risks escalate. They include targeted threats but might not require advanced defense measures. </p>
<p>We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: <code>tips.acme.com</code>. When sharing your Hush Line address, include the onion address for people that require higher levels of anonymity.</p>
<h4 id="example-use-cases-1"><a class="header" href="#example-use-cases-1">Example Use Cases</a></h4>
Expand All @@ -194,7 +194,7 @@ <h4 id="example-use-cases-1"><a class="header" href="#example-use-cases-1">Examp
<li>🩺 Law or doctor's offices</li>
<li>🚨 Domestic abuse hotlines</li>
</ul>
<h3 id="-high-threats"><a class="header" href="#-high-threats">‼️ High Threats</a></h3>
<h3 id="high-threats-"><a class="header" href="#high-threats-">High Threats ‼️</a></h3>
<p>These are scenarios where targeted threats are likely, and consequences can be severe, like endangering someone's physical safety.</p>
<p>Depending on risks to your physical location, we recommend either using a VPS or local device like a Raspberry Pi and choosing an onion-only deployment. This will provide the greatest protection for your community and your tip line.</p>
<h4 id="example-use-cases-2"><a class="header" href="#example-use-cases-2">Example Use Cases</a></h4>
Expand Down
6 changes: 3 additions & 3 deletions book/print.html
Original file line number Diff line number Diff line change
Expand Up @@ -319,7 +319,7 @@ <h2 id="introduction"><a class="header" href="#introduction">Introduction</a></h
<p>The deployment of an anonymous tip line, like Hush Line, requires an understanding of the environment in which it will be used. Different organizations and individuals face unique threats, and the purpose of this guide is to help you navigate these challenges. By understanding your threat landscape, you can choose the appropriate deployment method that balances accessibility and security for your needs.</p>
<h2 id="understanding-the-threats"><a class="header" href="#understanding-the-threats">Understanding the Threats</a></h2>
<p>To select the right Hush Line deployment, consider the potential risks and consequences you or your tipsters might face:</p>
<h3 id="-low-threats"><a class="header" href="#-low-threats">Low Threats</a></h3>
<h3 id="low-threats-"><a class="header" href="#low-threats-">Low Threats</a></h3>
<p>These scenarios typically involve situations where the primary risk is non-targeted threats or generic cyber threats. The fallout from a security breach is minimal. </p>
<p>We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: <code>tips.acme.com</code>.</p>
<h4 id="example-use-cases"><a class="header" href="#example-use-cases">Example Use Cases</a></h4>
Expand All @@ -328,7 +328,7 @@ <h4 id="example-use-cases"><a class="header" href="#example-use-cases">Example U
<li>🏫 Schoolhouses</li>
<li>🎈 Conference organizers</li>
</ul>
<h3 id="-medium-threats"><a class="header" href="#-medium-threats">❗️ Medium Threats</a></h3>
<h3 id="medium-threats-"><a class="header" href="#medium-threats-">Medium Threats ❗️</a></h3>
<p>Here, the risks escalate. They include targeted threats but might not require advanced defense measures. </p>
<p>We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: <code>tips.acme.com</code>. When sharing your Hush Line address, include the onion address for people that require higher levels of anonymity.</p>
<h4 id="example-use-cases-1"><a class="header" href="#example-use-cases-1">Example Use Cases</a></h4>
Expand All @@ -337,7 +337,7 @@ <h4 id="example-use-cases-1"><a class="header" href="#example-use-cases-1">Examp
<li>🩺 Law or doctor's offices</li>
<li>🚨 Domestic abuse hotlines</li>
</ul>
<h3 id="-high-threats"><a class="header" href="#-high-threats">‼️ High Threats</a></h3>
<h3 id="high-threats-"><a class="header" href="#high-threats-">High Threats ‼️</a></h3>
<p>These are scenarios where targeted threats are likely, and consequences can be severe, like endangering someone's physical safety.</p>
<p>Depending on risks to your physical location, we recommend either using a VPS or local device like a Raspberry Pi and choosing an onion-only deployment. This will provide the greatest protection for your community and your tip line.</p>
<h4 id="example-use-cases-2"><a class="header" href="#example-use-cases-2">Example Use Cases</a></h4>
Expand Down
2 changes: 1 addition & 1 deletion book/searchindex.js

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion book/searchindex.json

Large diffs are not rendered by default.

6 changes: 3 additions & 3 deletions src/prereqs/threat-modeling.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ The deployment of an anonymous tip line, like Hush Line, requires an understandi
## Understanding the Threats
To select the right Hush Line deployment, consider the potential risks and consequences you or your tipsters might face:

### Low Threats
### Low Threats
These scenarios typically involve situations where the primary risk is non-targeted threats or generic cyber threats. The fallout from a security breach is minimal.

We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: `tips.acme.com`.
Expand All @@ -16,7 +16,7 @@ We recommend using a VPS and deploying Hush Line as a public domain to a URL lik
- 🏫 Schoolhouses
- 🎈 Conference organizers

### ❗️ Medium Threats
### Medium Threats ❗️
Here, the risks escalate. They include targeted threats but might not require advanced defense measures.

We recommend using a VPS and deploying Hush Line as a public domain to a URL like this: `tips.acme.com`. When sharing your Hush Line address, include the onion address for people that require higher levels of anonymity.
Expand All @@ -26,7 +26,7 @@ We recommend using a VPS and deploying Hush Line as a public domain to a URL lik
- 🩺 Law or doctor's offices
- 🚨 Domestic abuse hotlines

### ‼️ High Threats
### High Threats ‼️
These are scenarios where targeted threats are likely, and consequences can be severe, like endangering someone's physical safety.

Depending on risks to your physical location, we recommend either using a VPS or local device like a Raspberry Pi and choosing an onion-only deployment. This will provide the greatest protection for your community and your tip line.
Expand Down

0 comments on commit 614dec7

Please sign in to comment.