diff --git a/1.1-To-Arkenfox-or-Not.md b/1.1-To-Arkenfox-or-Not.md
index d5bc7af..b100ff6 100644
--- a/1.1-To-Arkenfox-or-Not.md
+++ b/1.1-To-Arkenfox-or-Not.md
@@ -1,12 +1,12 @@
-🟩 FOREWORD
+🟩 **FOREWORD**
Arkenfox is a resource, feel free to use any, all or none of it - just **HEED** the warnings, notes and documentation.
-🟪 TOR BROWSER
+🟪 **TOR BROWSER**
If your threat model calls for anonymity and advanced fingerprinting protection, **[USE TOR BROWSER](https://www.torproject.org/)**. You can also use Tor Browser for [everyday browsing](https://2019.www.torproject.org/about/torusers.html) as another secondary browser. However, you're going to want a non-Tor Browser browser too, which is Firefox, so carry on reading :).
-🟪 A FEW SETTINGS & EXTENSIONS
+🟪 **A FEW SETTINGS & EXTENSIONS**
**For most people, this is all you really need.**
@@ -28,7 +28,7 @@ After that, the benefits get incrementally smaller, but they do add up: your mil
1 Sanitizing refers to clearing site and other data such as caches and histories.
-🟪 FINGERPRINTING
+🟪 **FINGERPRINTING**
Most of the above deals with [state](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) 1 and other cross-origin linkability mechanisms such as navigational tracking.
@@ -36,7 +36,7 @@ Stateless tracking, or fingerprinting, is a little more complex. If your threat
1 State refers to stored (disk/memory) client-side data such as those listed [here](https://privacycg.github.io/storage-partitioning/).
-🟪 EXPECTATIONS
+🟪 **EXPECTATIONS**
If you're going to use arkenfox's user.js, then don't expect to just start using it as is. You **WILL NEED TO CREATE OVERRIDES**, and **FULLY** read this wiki.