From 28d9eb75b1e04169f599a843b2116e5a832e03fa Mon Sep 17 00:00:00 2001 From: Javier Vargas Date: Tue, 10 Aug 2021 13:45:34 +0200 Subject: [PATCH] Update 14_3_Adding_SSH_Hidden_Services.md --- 14_3_Adding_SSH_Hidden_Services.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/14_3_Adding_SSH_Hidden_Services.md b/14_3_Adding_SSH_Hidden_Services.md index 12ac8ae..1fbb5be 100644 --- a/14_3_Adding_SSH_Hidden_Services.md +++ b/14_3_Adding_SSH_Hidden_Services.md @@ -54,6 +54,6 @@ Now that you've got Tor installed and know how to use it, you can add other serv > :fire: ***What's the power of Other Hidden Services?*** Every time you access a service on your server remotely, you leave footprints on the network. Even if the data is encrypted by something like SSH (or TLS), lurkers on the network can see where you're connecting from, where you're connecting to, and what service you're using. Does this matter? This is the question you have to ask. But if the answer is "Yes", you can protect the connection with a hidden service. -Move on to "Programming with RPC" with [Chapter Fifteen: Talking to Bitcoind with C](15_0_Talking_to_Bitcoind.md). +Move on to "Programming with RPC" with [Chapter Sixteen: Talking to Bitcoind with C](16_0_Talking_to_Bitcoind.md). -Or, if you're not a programmer, you can skip to [Chapter Eighteen: Understanding Your Lightning Seutp](https://github.com/BlockchainCommons/Learning-Bitcoin-from-the-Command-Line/blob/master/18_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network. +Or, if you're not a programmer, you can skip to [Chapter Nineteen: Understanding Your Lightning Setup](19_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network.