mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2024-10-01 01:35:37 -04:00
chore: remove space & duplicate sections
This commit is contained in:
parent
170089fa9c
commit
24fe70f0bd
19
.github/README.md
vendored
19
.github/README.md
vendored
@ -34,7 +34,7 @@ You can read the full checklist in [`CHECKLIST.md`](https://github.com/Lissy93/p
|
|||||||
|
|
||||||
## The Website
|
## The Website
|
||||||
|
|
||||||
The easiest method for consuming the checklist is via our website, at: **[digital-defense.io](https://digital-defense.io/)**
|
The easiest method for consuming the checklist is via our website: **[digital-defense.io](https://digital-defense.io/)**
|
||||||
|
|
||||||
Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress ☺️).
|
Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress ☺️).
|
||||||
|
|
||||||
@ -49,8 +49,8 @@ The site is built with Qwik, using TypeScript and some components from DaisyUI.
|
|||||||
### Developing
|
### Developing
|
||||||
To run the app locally, or to make code changes, you'll need Node and Git installed.
|
To run the app locally, or to make code changes, you'll need Node and Git installed.
|
||||||
|
|
||||||
1. Grab the code: `git@github.com:Lissy93/personal-security-checklist.git`
|
1. Grab the code: `git clone git@github.com:Lissy93/personal-security-checklist.git`
|
||||||
2. Navigate into source: `cd personal-security-checklist/web`
|
2. Navigate into the source: `cd personal-security-checklist/web`
|
||||||
3. Install dependencies: `yarn`
|
3. Install dependencies: `yarn`
|
||||||
4. Start the development server: `yarn dev`
|
4. Start the development server: `yarn dev`
|
||||||
|
|
||||||
@ -59,7 +59,7 @@ Alternatively, just open this repo in Code Spaces, where everything is already c
|
|||||||
### Deploying
|
### Deploying
|
||||||
To deploy the app, follow the developing steps above, then run `yarn build`, `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
|
To deploy the app, follow the developing steps above, then run `yarn build`, `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
|
||||||
|
|
||||||
Alternatively, fork the repo and import into your providers dashboard. Or use the link below for an easy 1-click deploy 😉
|
Alternatively, fork the repo and import it into your providers' dashboard. Or use the link below for an easy 1-click deployment 😉
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -77,15 +77,8 @@ Base: digital-defense.io/api
|
|||||||
/api/checklists/[name]/[point-index]
|
/api/checklists/[name]/[point-index]
|
||||||
/api/search/[searchterm]
|
/api/search/[searchterm]
|
||||||
|
|
||||||
|
|
||||||
### Developing
|
|
||||||
|
|
||||||
### Deploying
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Contributing
|
## Contributing
|
||||||
All checklist data is stored in [`personal-security-checklist.yml`](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/personal-security-checklist.yml). This is pulled in the website at build-time, and referenced by the API, and is also dynamically inserted into the markdown [Checklist page](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/CHECKLIST.md).
|
All checklist data is stored in [`personal-security-checklist.yml`](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/personal-security-checklist.yml). This is pulled in the website at build-time and referenced by the API, and is also dynamically inserted into the markdown [Checklist page](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/CHECKLIST.md).
|
||||||
|
|
||||||
So if you only wish to make changes to the data, this is the only file you need to edit.
|
So if you only wish to make changes to the data, this is the only file you need to edit.
|
||||||
|
|
||||||
@ -93,7 +86,7 @@ Important: When submitting your pull request, provide references backing up any
|
|||||||
|
|
||||||
For modifying the website or API source, see the developing sections above for instructions on running locally.
|
For modifying the website or API source, see the developing sections above for instructions on running locally.
|
||||||
|
|
||||||
Prior to submitting an issue or PR, please ensure you've followed the [community guidelines](https://github.com/Lissy93/personal-security-checklist/blob/master/.github/CONTRIBUTING.md) and followed the [Code of Conduct](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/.github/CODE_OF_CONDUCT.md).
|
Before submitting an issue or PR, please ensure you've followed the [community guidelines](https://github.com/Lissy93/personal-security-checklist/blob/master/.github/CONTRIBUTING.md) and followed the [Code of Conduct](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/.github/CODE_OF_CONDUCT.md).
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -850,7 +850,6 @@
|
|||||||
url: https://github.com/Lissy93/awesome-privacy#p2p-messaging
|
url: https://github.com/Lissy93/awesome-privacy#p2p-messaging
|
||||||
color: cyan
|
color: cyan
|
||||||
|
|
||||||
|
|
||||||
- title: Social Media
|
- title: Social Media
|
||||||
slug: social-media
|
slug: social-media
|
||||||
description: Minimizing the risks associated with using online communities
|
description: Minimizing the risks associated with using online communities
|
||||||
@ -972,7 +971,6 @@
|
|||||||
url: https://github.com/Lissy93/awesome-privacy#news-readers-and-aggregation
|
url: https://github.com/Lissy93/awesome-privacy#news-readers-and-aggregation
|
||||||
color: blue
|
color: blue
|
||||||
|
|
||||||
|
|
||||||
- title: Networks
|
- title: Networks
|
||||||
slug: networks
|
slug: networks
|
||||||
description: Safeguarding your network traffic
|
description: Safeguarding your network traffic
|
||||||
@ -1148,7 +1146,6 @@
|
|||||||
- title: Self-Hosted Network Security Tools
|
- title: Self-Hosted Network Security Tools
|
||||||
url: https://github.com/Lissy93/awesome-privacy#self-hosted-network-security
|
url: https://github.com/Lissy93/awesome-privacy#self-hosted-network-security
|
||||||
|
|
||||||
|
|
||||||
- title: Mobile Devices
|
- title: Mobile Devices
|
||||||
slug: mobile-devices
|
slug: mobile-devices
|
||||||
description: Reduce invasive tracking for cells, smartphones and tablets
|
description: Reduce invasive tracking for cells, smartphones and tablets
|
||||||
@ -1330,7 +1327,6 @@
|
|||||||
- title: Mobile Operation Systems
|
- title: Mobile Operation Systems
|
||||||
url: https://github.com/Lissy93/awesome-privacy#mobile-operating-systems
|
url: https://github.com/Lissy93/awesome-privacy#mobile-operating-systems
|
||||||
|
|
||||||
|
|
||||||
- title: Personal Computers
|
- title: Personal Computers
|
||||||
slug: personal-computers
|
slug: personal-computers
|
||||||
description: Securing your PC's operating system, data & activity
|
description: Securing your PC's operating system, data & activity
|
||||||
@ -1562,8 +1558,6 @@
|
|||||||
- title: File Encryption
|
- title: File Encryption
|
||||||
url: https://github.com/Lissy93/awesome-privacy#file-encryption
|
url: https://github.com/Lissy93/awesome-privacy#file-encryption
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
- title: Smart Home
|
- title: Smart Home
|
||||||
slug: smart-home
|
slug: smart-home
|
||||||
description: Using IoT devices without compromising your privacy
|
description: Using IoT devices without compromising your privacy
|
||||||
@ -1664,7 +1658,6 @@
|
|||||||
- title: AI Voice Assistants
|
- title: AI Voice Assistants
|
||||||
url: https://github.com/Lissy93/awesome-privacy#ai-voice-assistants
|
url: https://github.com/Lissy93/awesome-privacy#ai-voice-assistants
|
||||||
|
|
||||||
|
|
||||||
- title: Personal Finance
|
- title: Personal Finance
|
||||||
slug: personal-finance
|
slug: personal-finance
|
||||||
description: Protecting your funds, financial accounts and transactions
|
description: Protecting your funds, financial accounts and transactions
|
||||||
@ -1872,6 +1865,7 @@
|
|||||||
Opt for anonymous payment methods like cryptocurrencies to avoid entering identifiable information online.
|
Opt for anonymous payment methods like cryptocurrencies to avoid entering identifiable information online.
|
||||||
|
|
||||||
color: indigo
|
color: indigo
|
||||||
|
|
||||||
- title: Physical Security
|
- title: Physical Security
|
||||||
slug: physical-security
|
slug: physical-security
|
||||||
description: Taking measures to prevent IRL security incidents
|
description: Taking measures to prevent IRL security incidents
|
||||||
|
Loading…
Reference in New Issue
Block a user