Skip to content

Commit 98d90b6

Browse files
authored
Merge pull request #437 from csralvall/patch-14_3
Update links in chapter 14.3
2 parents d34cb20 + 2f6dafe commit 98d90b6

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

14_3_Adding_SSH_Hidden_Services.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,12 @@ Now that you've got Tor installed and know how to use it, you can add other serv
5454

5555
> :fire: ***What's the power of Other Hidden Services?*** Every time you access a service on your server remotely, you leave footprints on the network. Even if the data is encrypted by something like SSH (or TLS), lurkers on the network can see where you're connecting from, where you're connecting to, and what service you're using. Does this matter? This is the question you have to ask. But if the answer is "Yes", you can protect the connection with a hidden service.
5656
57-
Move on to "Programming with RPC" with [Chapter Sixteen: Talking to Bitcoind with C](16_0_Talking_to_Bitcoind.md).
57+
## What's Next?
5858

59-
Or, if you're not a programmer, you can skip to [Chapter Nineteen: Understanding Your Lightning Setup](19_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network.
59+
Move on to "Using i2p" with [Chapter Fifteen: Using i2p](15_0_Using_i2p.md).
60+
61+
Or, if you prefer, there are two alternate paths:
62+
63+
If you want to stay focused on Bitcoin, move on to "Programming with RPC" with [Chapter Sixteen: Talking to Bitcoind with C](16_0_Talking_to_Bitcoind.md).
64+
65+
Or, if you want to stay focused on the command-line because you're not a programmer, you can skip to [Chapter Nineteen: Understanding Your Lightning Setup](19_0_Understanding_Your_Lightning_Setup.md) to continue your command-line education with the Lightning Network.

0 commit comments

Comments
 (0)