chore: remove space & duplicate sections

This commit is contained in:
dextermallo 2024-08-03 13:27:09 +08:00
parent 170089fa9c
commit 24fe70f0bd
2 changed files with 8 additions and 21 deletions

19
.github/README.md vendored
View File

@ -34,7 +34,7 @@ You can read the full checklist in [`CHECKLIST.md`](https://github.com/Lissy93/p
## The Website ## The Website
The easiest method for consuming the checklist is via our website, at: **[digital-defense.io](https://digital-defense.io/)** The easiest method for consuming the checklist is via our website: **[digital-defense.io](https://digital-defense.io/)**
Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress ☺️). Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress ☺️).
@ -49,8 +49,8 @@ The site is built with Qwik, using TypeScript and some components from DaisyUI.
### Developing ### Developing
To run the app locally, or to make code changes, you'll need Node and Git installed. To run the app locally, or to make code changes, you'll need Node and Git installed.
1. Grab the code: `git@github.com:Lissy93/personal-security-checklist.git` 1. Grab the code: `git clone git@github.com:Lissy93/personal-security-checklist.git`
2. Navigate into source: `cd personal-security-checklist/web` 2. Navigate into the source: `cd personal-security-checklist/web`
3. Install dependencies: `yarn` 3. Install dependencies: `yarn`
4. Start the development server: `yarn dev` 4. Start the development server: `yarn dev`
@ -59,7 +59,7 @@ Alternatively, just open this repo in Code Spaces, where everything is already c
### Deploying ### Deploying
To deploy the app, follow the developing steps above, then run `yarn build`, `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice. To deploy the app, follow the developing steps above, then run `yarn build`, `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
Alternatively, fork the repo and import into your providers dashboard. Or use the link below for an easy 1-click deploy 😉 Alternatively, fork the repo and import it into your providers' dashboard. Or use the link below for an easy 1-click deployment 😉
--- ---
@ -77,15 +77,8 @@ Base: digital-defense.io/api
/api/checklists/[name]/[point-index] /api/checklists/[name]/[point-index]
/api/search/[searchterm] /api/search/[searchterm]
### Developing
### Deploying
---
## Contributing ## Contributing
All checklist data is stored in [`personal-security-checklist.yml`](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/personal-security-checklist.yml). This is pulled in the website at build-time, and referenced by the API, and is also dynamically inserted into the markdown [Checklist page](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/CHECKLIST.md). All checklist data is stored in [`personal-security-checklist.yml`](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/personal-security-checklist.yml). This is pulled in the website at build-time and referenced by the API, and is also dynamically inserted into the markdown [Checklist page](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/CHECKLIST.md).
So if you only wish to make changes to the data, this is the only file you need to edit. So if you only wish to make changes to the data, this is the only file you need to edit.
@ -93,7 +86,7 @@ Important: When submitting your pull request, provide references backing up any
For modifying the website or API source, see the developing sections above for instructions on running locally. For modifying the website or API source, see the developing sections above for instructions on running locally.
Prior to submitting an issue or PR, please ensure you've followed the [community guidelines](https://github.com/Lissy93/personal-security-checklist/blob/master/.github/CONTRIBUTING.md) and followed the [Code of Conduct](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/.github/CODE_OF_CONDUCT.md). Before submitting an issue or PR, please ensure you've followed the [community guidelines](https://github.com/Lissy93/personal-security-checklist/blob/master/.github/CONTRIBUTING.md) and followed the [Code of Conduct](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/.github/CODE_OF_CONDUCT.md).
--- ---

View File

@ -850,7 +850,6 @@
url: https://github.com/Lissy93/awesome-privacy#p2p-messaging url: https://github.com/Lissy93/awesome-privacy#p2p-messaging
color: cyan color: cyan
- title: Social Media - title: Social Media
slug: social-media slug: social-media
description: Minimizing the risks associated with using online communities description: Minimizing the risks associated with using online communities
@ -972,7 +971,6 @@
url: https://github.com/Lissy93/awesome-privacy#news-readers-and-aggregation url: https://github.com/Lissy93/awesome-privacy#news-readers-and-aggregation
color: blue color: blue
- title: Networks - title: Networks
slug: networks slug: networks
description: Safeguarding your network traffic description: Safeguarding your network traffic
@ -1148,7 +1146,6 @@
- title: Self-Hosted Network Security Tools - title: Self-Hosted Network Security Tools
url: https://github.com/Lissy93/awesome-privacy#self-hosted-network-security url: https://github.com/Lissy93/awesome-privacy#self-hosted-network-security
- title: Mobile Devices - title: Mobile Devices
slug: mobile-devices slug: mobile-devices
description: Reduce invasive tracking for cells, smartphones and tablets description: Reduce invasive tracking for cells, smartphones and tablets
@ -1330,7 +1327,6 @@
- title: Mobile Operation Systems - title: Mobile Operation Systems
url: https://github.com/Lissy93/awesome-privacy#mobile-operating-systems url: https://github.com/Lissy93/awesome-privacy#mobile-operating-systems
- title: Personal Computers - title: Personal Computers
slug: personal-computers slug: personal-computers
description: Securing your PC's operating system, data & activity description: Securing your PC's operating system, data & activity
@ -1562,8 +1558,6 @@
- title: File Encryption - title: File Encryption
url: https://github.com/Lissy93/awesome-privacy#file-encryption url: https://github.com/Lissy93/awesome-privacy#file-encryption
- title: Smart Home - title: Smart Home
slug: smart-home slug: smart-home
description: Using IoT devices without compromising your privacy description: Using IoT devices without compromising your privacy
@ -1664,7 +1658,6 @@
- title: AI Voice Assistants - title: AI Voice Assistants
url: https://github.com/Lissy93/awesome-privacy#ai-voice-assistants url: https://github.com/Lissy93/awesome-privacy#ai-voice-assistants
- title: Personal Finance - title: Personal Finance
slug: personal-finance slug: personal-finance
description: Protecting your funds, financial accounts and transactions description: Protecting your funds, financial accounts and transactions
@ -1872,6 +1865,7 @@
Opt for anonymous payment methods like cryptocurrencies to avoid entering identifiable information online. Opt for anonymous payment methods like cryptocurrencies to avoid entering identifiable information online.
color: indigo color: indigo
- title: Physical Security - title: Physical Security
slug: physical-security slug: physical-security
description: Taking measures to prevent IRL security incidents description: Taking measures to prevent IRL security incidents