diff --git a/Appendix-C:-Test-Sites.md b/Appendix-C:-Test-Sites.md
index 791f3fe..e37b496 100644
--- a/Appendix-C:-Test-Sites.md
+++ b/Appendix-C:-Test-Sites.md
@@ -46,8 +46,8 @@ If you would like to submit a test page to be added to this list, please post th
### :small_orange_diamond: Other
- [AudioContext](https://audiofingerprint.openwpm.com/) - **h**ttps://audiofingerprint.openwpm.com/
-- [1] [Battery](https://pstadler.sh/battery.js/) - **h**ttps://pstadler.sh/battery.js/
-- [2] [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) - **h**ttp://lcamtuf.coredump.cx/yahh/
+- [Battery](https://pstadler.sh/battery.js/) 1 - **h**ttps://pstadler.sh/battery.js/
+- [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) 2 - **h**ttp://lcamtuf.coredump.cx/yahh/
- [DNS Leak](https://www.dnsleaktest.com/) - **h**ttps://www.dnsleaktest.com/
- [DNS Spoofability](https://www.grc.com/dns/dns.htm) - **h**ttps://www.grc.com/dns/dns.htm
- [Evercookie](https://samy.pl/evercookie/) - **h**ttps://samy.pl/evercookie/
@@ -66,9 +66,9 @@ If you would like to submit a test page to be added to this list, please post th
- [Resource://URI](https://www.browserleaks.com/firefox) - **h**ttps://www.browserleaks.com/firefox
- [WebRTC IP Leak](https://www.privacytools.io/webrtc.html) - **h**ttps://www.privacytools.io/webrtc.html
-[1] Since Firefox 52, the Battery Status API is now chrome/privileged access and is not accessible by web pages.
+1 Since Firefox 52, the Battery Status API is now chrome/privileged access and is not accessible by web pages.
-[2] This test is a PoC (proof of concept). You will need `layout.css.visited_links_enabled` set as `true`. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites, and many of those will not "leak" as the code is checking HTTP and the site has moved to HTTPS - i.e the full URL has changed. For best results:
+2 This test is a PoC (proof of concept). You will need `layout.css.visited_links_enabled` set as `true`. You will also need a normal window (not a Private Browsing one). The PoC only covers a handful of sites, and many of those will not "leak" as the code is checking HTTP and the site has moved to HTTPS - i.e the full URL has changed. For best results:
* Open a normal window in a vanilla Firefox. Clear everything (Ctrl-Shift-Del).
* Go to http://www.cnn.com/ and http://www.foxnews.com/
* Go to the [test page](http://lcamtuf.coredump.cx/yahh/) and play a game (takes 30 seconds or so)