2020-03-31 16:37:45 +01:00
## Contributors 🙌
Thanks goes to these wonderful people
<!-- ALL - CONTRIBUTORS - LIST:START - Do not remove or modify this section -->
<!-- prettier - ignore - start -->
<!-- markdownlint - disable -->
< table >
< tr >
< td align = "center" >< a href = "https://gitlab.com/W1nst0n" >< img src = "https://avatars3.githubusercontent.com/u/55300518?v=4" width = "90px;" alt = "" />< br />< sub >< b > 0x192</ b ></ sub ></ a >< br />< a href = " #security -0x192" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://keybase.io/pipboy96" >< img src = "https://avatars1.githubusercontent.com/u/46632672?v=4" width = "90px;" alt = "" />< br />< sub >< b > pipboy96</ b ></ sub ></ a >< br />< a href = " #security -pipboy96" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://aliciasykes.com" >< img src = "https://avatars1.githubusercontent.com/u/1862727?v=4" width = "90px;" alt = "" />< br />< sub >< b > Alicia Sykes</ b ></ sub ></ a >< br />< a href = " #security -Lissy93" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://twitter.com/mwleeds" >< img src = "https://avatars2.githubusercontent.com/u/7833263?v=4" width = "90px;" alt = "" />< br />< sub >< b > Matthew Leeds</ b ></ sub ></ a >< br />< a href = " #security -mwleeds" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "http://jaiminpandya.com" >< img src = "https://avatars0.githubusercontent.com/u/20967911?v=4" width = "90px;" alt = "" />< br />< sub >< b > Jaimin Pandya</ b ></ sub ></ a >< br />< a href = " #security -pndyjack" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://twitter.com/ilesinge" >< img src = "https://avatars3.githubusercontent.com/u/501674?v=4" width = "90px;" alt = "" />< br />< sub >< b > Alexandre G.-Raymond</ b ></ sub ></ a >< br />< a href = " #security -ilesinge" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://github.com/guestx86" >< img src = "https://avatars2.githubusercontent.com/u/56132403?v=4" width = "90px;" alt = "" />< br />< sub >< b > guestx86</ b ></ sub ></ a >< br />< a href = " #security -guestx86" title = "Security" > 🛡️</ a ></ td >
< / tr >
< tr >
< td align = "center" >< a href = "https://www.baturin.org" >< img src = "https://avatars0.githubusercontent.com/u/482212?v=4" width = "90px;" alt = "" />< br />< sub >< b > Daniil Baturin</ b ></ sub ></ a >< br />< a href = " #security -dmbaturin" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://transitiontech.ca" >< img src = "https://avatars2.githubusercontent.com/u/1264398?v=4" width = "90px;" alt = "" />< br />< sub >< b > ansuz</ b ></ sub ></ a >< br />< a href = " #security -ansuz" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://github.com/8264" >< img src = "https://avatars0.githubusercontent.com/u/23311938?v=4" width = "90px;" alt = "" />< br />< sub >< b > 8264</ b ></ sub ></ a >< br />< a href = " #security -8264" title = "Security" > 🛡️</ a ></ td >
< td align = "center" >< a href = "https://github.com/101lols" >< img src = "https://avatars1.githubusercontent.com/u/29000894?v=4" width = "90px;" alt = "" />< br />< sub >< b > 101lols</ b ></ sub ></ a >< br />< a href = " #security -101lols" title = "Security" > 🛡️</ a ></ td >
< / tr >
< / table >
<!-- markdownlint - enable -->
<!-- prettier - ignore - end -->
<!-- ALL - CONTRIBUTORS - LIST:END -->
<!-- To add yourself to the table, copy the row above and replace with your details. Max 7 <td> (columns) per <tr> (row). -->
2020-05-28 15:24:07 +01:00
*This project follows the [all-contributors ](https://github.com/all-contributors/all-contributors ) specification.*
2020-04-26 00:58:28 +01:00
[Contributions ](/CONTRIBUTING.md ) of any kind welcome!
2020-03-31 16:37:45 +01:00
2020-05-28 15:24:07 +01:00
Special Thanks to [Stefan Keim ](https://github.com/indus ) and [Matt (IPv4) Cowley ](https://github.com/MattIPv4 ) from [JS.org ](https://js.org ), for providing the domain used for our GitHub Page ([security-list.js.org ](https://security-list.js.org )).
And of course, and huge thank you to the awesome developers behind the projects listed in the [Privacy-Respecting Software list ](/5_Privacy_Respecting_Software.md ). The effort, time and love they've put into each one of those applications is immediately apparent, they've done an amazing job 💞
2020-04-05 22:19:38 +01:00
## References 📝
2020-04-26 00:47:22 +01:00
< blockquote >
2020-05-03 19:15:26 +01:00
[1]"2019 Data Breach Investigations Report - EMEA", Verizon Enterprise Solutions, 2020. [Online]. Available: https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report-emea.pdf. [Accessed: 25- Apr- 2020]
[13]"Web Browser Privacy: What Do Browsers Say When They Phone Home?", Feb 2020. [Online].
Available: https://www.scss.tcd.ie/Doug.Leith/pubs/browser_privacy.pdf. [Accessed: 27- Apr- 2020]
[14]"Comments on the Competition and Markets Authority’ s interim report on online platforms and digital advertising", Privacyinternational.org, Jan 2020. [Online].
Available: https://privacyinternational.org/sites/default/files/2020-04/20.02.12_CMA_PI_Comments_Interim_Report_FINAL.pdf. [Accessed: 02- May- 2020]
2020-04-26 00:58:28 +01:00
2020-05-11 19:55:21 +01:00
[11]"Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design", 1998. [Online].
Available: https://dl.packetstormsecurity.net/cracked/des/cracking-des.htm. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[2]"Digital Identity Guidelines", 2020. [Online].
Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[8]"DNS Security - Getting it Right", Open Rights Group, 2020. [Online].
Available: https://www.openrightsgroup.org/about/reports/dns-security-getting-it-right. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[9]"DNS-over-HTTPS performance | SamKnows", Samknows.com, 2020. [Online].
Available: https://www.samknows.com/blog/dns-over-https-performance. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[12]J. Eckenrode and S. Friedman, "The state of cybersecurity at financial institutions", 2018. [Online].
Available: https://www2.deloitte.com/us/en/insights/industry/financial-services/state-of-cybersecurity-at-financial-institutions.html. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[10]E. Foundation, "Cracking DES", Shop.oreilly.com, 1998. [Online].
Available: http://shop.oreilly.com/product/9781565925205.do. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
2020-05-11 19:55:21 +01:00
[5]"Google data collection, research and findings", Digital Content Next, 2020. [Online].
Available: https://digitalcontentnext.org/blog/2018/08/21/google-data-collection-research/. [Accessed: 25- Apr- 2020]
2020-04-26 00:47:22 +01:00
[3]S. Lekies, B. Stock, M. Wentzel and M. Johns, "The Unexpected Dangers of Dynamic JavaScript", UseNix & SAP, 2020. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-lekies.pdf. [Accessed: 25- Apr- 2020]
[7]"Privacy concerns with social networking services", 2020. [Online]. Available: https://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services. [Accessed: 25- Apr- 2020]
2020-05-11 19:55:21 +01:00
[4]D. Tian, G. Hernandez, J. Choi, V. Frost, C. Ruales, P. Traynor, H. Vijayakumar, L. Harrison, A. Rahmati, M. Grace and K. Butler, "Vulnerability Analysis of AT Commands Within the Android Ecosystem", Cise.ufl.edu, 2020. [Online].
Available: https://www.cise.ufl.edu/~butler/pubs/usenix18-atcmd.pdf. [Accessed: 25- Apr- 2020]
[6]S. Topuzov, "Phone hacking through SS7 is frighteningly easy and effective", Blog.securegroup.com, 2020. [Online].
Available: https://blog.securegroup.com/phone-hacking-through-ss7-is-frighteningly-easy-and-effective. [Accessed: 25- Apr- 2020]
[15]J. Heidemann, Y. Pradkin, R. Govindan, C. Papadopoulos and J. Bannister, "Exploring Visible Internet Hosts through Census and Survey", Isi.edu, 2020. [Online].
Available: https://www.isi.edu/~johnh/PAPERS/Heidemann07c.pdf. [Accessed: 10- May- 2020]
2020-04-26 00:47:22 +01:00
2020-05-28 15:24:07 +01:00
[16] Michalevsky, Y., Boneh, D. and Nakibly, G., 2014. Recognizing Speech From Gyroscope Signals. [online] Usenix.org. Available at: < https: / / www . usenix . org / system / files / conference / usenixsecurity14 / sec14-paper-michalevsky . pdf > [Accessed 26 May 2020].
[17] Favaretto, M., Clercq, E. and Simone Elger, B., 2019. Big Data And Discrimination: Perils, Promises And Solutions. A Systematic Review. [online] springeropen. Available at: < https: / / journalofbigdata . springeropen . com / articles / 10 . 1186 / s40537-019-0177-4 > [Accessed 26 May 2020].
2020-04-26 00:47:22 +01:00
< / blockquote >
2020-04-26 00:58:28 +01:00
**Above References apply to the Content in the Following Files**:< br >
[TLDR ](/2_TLDR_Short_List.md ) | [Intro ](/0_Why_It_Matters.md ) | [The Personal Security Checklist ](/README.md ) | [Privacy-Respecting Software ](/5_Privacy_Respecting_Software.md ) | [Security Hardware ](/6_Privacy_and-Security_Gadgets.md ) | [Further Links ](/4_Privacy_And_Security_Links.md )
2020-04-05 22:19:38 +01:00
## Stars 🌟
2020-04-06 15:09:28 +01:00
[![Stargazers over time ](https://starchart.cc/Lissy93/personal-security-checklist.svg )](https://star-history.t9t.io/#Lissy93/personal -security-checklist)
2020-04-05 22:19:38 +01:00
Thank you [@caarlos0 ](https://github.com/caarlos0 ) for the above [Star Chart ](https://github.com/caarlos0/starcharts ) ☺️
2020-04-26 00:58:28 +01:00
---
Licensed under [Creative Commons, CC BY 4.0 ](/LICENSE.md ), © [Alicia Sykes ](https://aliciasykes.com ) 2020