From 08f0d0d744ca2bf13e1599f93b0ffaddd9db1e60 Mon Sep 17 00:00:00 2001 From: Shannon Appelcline Date: Wed, 15 Sep 2021 12:54:56 -1000 Subject: [PATCH] Update 14_3_Adding_SSH_Hidden_Services.md --- 14_3_Adding_SSH_Hidden_Services.md | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/14_3_Adding_SSH_Hidden_Services.md b/14_3_Adding_SSH_Hidden_Services.md index 8beaff5..b6477da 100644 --- a/14_3_Adding_SSH_Hidden_Services.md +++ b/14_3_Adding_SSH_Hidden_Services.md @@ -56,10 +56,4 @@ Now that you've got Tor installed and know how to use it, you can add other serv ## What's Next? -Move on to "Using i2p" with [Chapter Fifteen: Using i2p](15_0_Using_i2p.md). - -Or, if you prefer, there are two alternate paths: - -If you want to stay focused on Bitcoin, move on to "Programming with RPC" with [Chapter Sixteen: Talking to Bitcoind with C](16_0_Talking_to_Bitcoind.md). - -Or, if you want to stay focused on the command-line because you're not a programmer, you can skip to [Chapter Nineteen: Understanding Your Lightning Setup](19_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network. +For a different sort of privacy, move on to "Using i2p" with [Chapter Fifteen: Using i2p](15_0_Using_i2p.md).