In this behind-the-scenes episode, I explain the thought process that lead to a major update of the VeraCrypt guide addressing many additional threat models. I also introduce the privacy guides docs and a system put in place to welcome peer review and establish a web of trust.
Command to remove legacy version of backup.sh π rm /usr/local/sbin/backup.sh