Compare commits

...

5 Commits

Author SHA1 Message Date
Ikko Eltociear Ashimine 5ad934028c
Merge 1b63f934cb into cb1d45cab6 2024-03-26 17:35:32 +01:00
Alicia Sykes cb1d45cab6 Adds contributing section in about page 2024-03-24 13:21:28 +00:00
Alicia Sykes 2d98d8bf98 Adds link to awesome-privacy.xyz 2024-03-24 13:21:04 +00:00
liss-bot 5e439fe680 docs: Updates contributors list 2024-03-24 02:02:28 +00:00
Ikko Eltociear Ashimine 1b63f934cb
Update CHECKLIST.md
a OTP -> an OTP
2024-02-16 08:50:52 +09:00
5 changed files with 45 additions and 34 deletions

46
.github/README.md vendored
View File

@ -241,13 +241,6 @@ Thank you to all who have contributed to, or sponsored this project!
<sub><b>Brent</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/hernanpopper">
<img src="https://avatars.githubusercontent.com/u/104868017?v=4" width="80;" alt="hernanpopper"/>
<br />
<sub><b>Hernanpopper</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/terminaltrove">
<img src="https://avatars.githubusercontent.com/u/121595180?v=4" width="80;" alt="terminaltrove"/>
@ -437,10 +430,10 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
</a>
</td>
<td align="center">
<a href="https://github.com/101lols">
<img src="https://avatars.githubusercontent.com/u/29000894?v=4" width="80;" alt="101lols"/>
<a href="https://github.com/leon-costa">
<img src="https://avatars.githubusercontent.com/u/83498565?v=4" width="80;" alt="leon-costa"/>
<br />
<sub><b>101lols</b></sub>
<sub><b>Leon Costa</b></sub>
</a>
</td>
<td align="center">
@ -544,13 +537,6 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
</a>
</td></tr>
<tr>
<td align="center">
<a href="https://github.com/apraile">
<img src="https://avatars.githubusercontent.com/u/9890538?v=4" width="80;" alt="apraile"/>
<br />
<sub><b>Apraile</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/elesiuta">
<img src="https://avatars.githubusercontent.com/u/8146662?v=4" width="80;" alt="elesiuta"/>
@ -585,15 +571,15 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
<br />
<sub><b>Axel</b></sub>
</a>
</td></tr>
<tr>
</td>
<td align="center">
<a href="https://github.com/ogoregen">
<img src="https://avatars.githubusercontent.com/u/37447279?v=4" width="80;" alt="ogoregen"/>
<br />
<sub><b>Oğuzhan</b></sub>
</a>
</td>
</td></tr>
<tr>
<td align="center">
<a href="https://github.com/omahs">
<img src="https://avatars.githubusercontent.com/u/73983677?v=4" width="80;" alt="omahs"/>
@ -628,15 +614,15 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
<br />
<sub><b>Theblackmallard</b></sub>
</a>
</td></tr>
<tr>
</td>
<td align="center">
<a href="https://github.com/titanism">
<img src="https://avatars.githubusercontent.com/u/101466223?v=4" width="80;" alt="titanism"/>
<br />
<sub><b>Titanism</b></sub>
</a>
</td>
</td></tr>
<tr>
<td align="center">
<a href="https://github.com/0x192">
<img src="https://avatars.githubusercontent.com/u/55300518?v=4" width="80;" alt="0x192"/>
@ -644,6 +630,13 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
<sub><b>W1nst0n</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/101lols">
<img src="https://avatars.githubusercontent.com/u/29000894?v=4" width="80;" alt="101lols"/>
<br />
<sub><b>101lols</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/boushley">
<img src="https://avatars.githubusercontent.com/u/101239?v=4" width="80;" alt="boushley"/>
@ -851,13 +844,6 @@ If you've found this repository helpful, consider sponsoring me on GitHub if you
<br />
<sub><b>Dominik Piątkowski</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/leon-costa">
<img src="https://avatars.githubusercontent.com/u/83498565?v=4" width="80;" alt="leon-costa"/>
<br />
<sub><b>Leon Costa</b></sub>
</a>
</td></tr>
</table>
<!-- readme: contributors -end -->

View File

@ -56,7 +56,7 @@ Most reported data breaches are caused by the use of weak, default or stolen pas
**Avoid using your PM to Generate OTPs** | Advanced | Many password managers are also able to generate 2FA codes. It is best not to use your primary password manager as your 2FA authenticator as well, since it would become a single point of failure if compromised. Instead use a dedicated [authenticator app](https://github.com/Lissy93/awesome-privacy#2-factor-authentication) on your phone or laptop
**Avoid Face Unlock** | Advanced | Most phones and laptops offer a facial recognition authentication feature, using the camera to compare a snapshot of your face with a stored hash. It may be very convenient, but there are numerous ways to [fool it](https://www.forbes.com/sites/jvchamary/2017/09/18/security-apple-face-id-iphone-x/) and gain access to the device, through digital photos and reconstructions from CCTV footage. Unlike your password- there are likely photos of your face on the internet, and videos recorded by surveillance cameras
**Watch out for Keyloggers** | Advanced | A hardware [keylogger](https://en.wikipedia.org/wiki/Hardware_keylogger) is a physical device planted between your keyboard and the USB port, which intercepts all key strokes, and sometimes relays data to a remote server. It gives a hacker access to everything typed, including passwords. The best way to stay protected, is just by checking your USB connection after your PC has been unattended. It is also possible for keyloggers to be planted inside the keyboard housing, so look for any signs that the case has been tampered with, and consider bringing your own keyboard to work. Data typed on a virtual keyboard, pasted from the clipboard or auto-filled by a password manager can not be intercepted by a hardware keylogger.
**Consider a Hardware Token** | Advanced | A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in to verify your identity, instead of entering a OTP from your authenticator. [SoloKey](https://solokeys.com) and [NitroKey](https://www.nitrokey.com) are examples of such keys. They bring with them several security benefits, since the browser communicates directly with the device and cannot be fooled as to which host is requesting authentication, because the TLS certificate is checked. [This post](https://security.stackexchange.com/a/71704) is a good explanation of the security of using FIDO U2F tokens. Of course it is important to store the physical key somewhere safe, or keep it on your person. Some online accounts allow for several methods of 2FA to be enabled
**Consider a Hardware Token** | Advanced | A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in to verify your identity, instead of entering an OTP from your authenticator. [SoloKey](https://solokeys.com) and [NitroKey](https://www.nitrokey.com) are examples of such keys. They bring with them several security benefits, since the browser communicates directly with the device and cannot be fooled as to which host is requesting authentication, because the TLS certificate is checked. [This post](https://security.stackexchange.com/a/71704) is a good explanation of the security of using FIDO U2F tokens. Of course it is important to store the physical key somewhere safe, or keep it on your person. Some online accounts allow for several methods of 2FA to be enabled
**Consider Offline Password Manager** | Advanced | For increased security, an encrypted offline password manager will give you full control over your data. [KeePass](https://keepass.info) is a popular choice, with lots of [plugins](https://keepass.info/plugins.html) and community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org) (desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731) (iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up, and store it securely
**Consider Unique Usernames** | Advanced | Having different passwords for each account is a good first step, but if you also use a unique username, email or phone number to log in, then it will be significantly harder for anyone trying to gain unauthorised access. The easiest method for multiple emails, is using auto-generated aliases for anonymous mail forwarding. This is where [anything]@yourdomain.com will arrive in your inbox, allowing you to use a different email for each account (see [Mail Alias Providers](https://github.com/Lissy93/awesome-privacy#anonymous-mail-forwarding)). Usernames are easier, since you can use your password manager to generate, store and auto-fill these. Virtual phone numbers can be generated through your VOIP provider

View File

@ -325,7 +325,14 @@ export default component$(() => {
</div>
{/* Something ??? */}
<div class="p-4 rounded-box bg-front shadow-md w-96 flex-grow">
<p>Coming Soon!</p>
<p class="text-sm opacity-80 mb-2">
Next up, consider switching to more secure and
privacy-respecting apps and services.
</p>
<p class="text-lg">
View our directory of recommended software,
at <a class="link link-secondary font-bold" href="https://awesome-privacy.xyz">awesome-privacy.xyz</a>
</p>
</div>
</div>

View File

@ -7,6 +7,12 @@ export const intro = [
All edits are then reviewed by maintainers before being merged and going live.
`];
export const contributing = [
`This project is only possible thanks to contributors like you!`,
`You can make changes to any of the checklist content, by editing `
+ `[\`personal-security-checklist.yml\`](https://github.com/Lissy93/personal-security-checklist/blob/master/personal-security-checklist.yml)`,
];
export const projects = [
{
title: 'Web-Check',

View File

@ -2,7 +2,8 @@ import { component$, useResource$, Resource } from "@builder.io/qwik";
import type { DocumentHead } from "@builder.io/qwik-city";
import Icon from "~/components/core/icon";
import { projects, socials, intro, license } from './about-content';
import { projects, socials, intro, contributing, license } from './about-content';
import { marked } from "marked";
export default component$(() => {
@ -15,6 +16,9 @@ export default component$(() => {
name: string;
}
const parseMarkdown = (text: string | undefined): string => {
return marked.parse(text || '', { async: false }) as string || '';
};
const contributorsResource = useResource$<Contributor[]>(async () => {
const url = 'https://api.github.com/repos/lissy93/personal-security-checklist/contributors?per_page=100';
@ -46,7 +50,15 @@ export default component$(() => {
<div class="divider"></div>
<article class="bg-back p-8 mx-auto max-w-[1200px] m-8 rounded-lg shadow-md">
<h2 class="text-3xl mb-2">Credits</h2>
<h2 class="text-3xl mb-2">Contributing</h2>
{contributing.map((paragraph, index) => (
<p class="mb-2" key={index} dangerouslySetInnerHTML={parseMarkdown(paragraph)}></p>
))}
</article>
<div class="divider"></div>
<article class="bg-back p-8 mx-auto max-w-[1200px] m-8 rounded-lg shadow-md">
<h2 class="text-3xl mb-2">Acknowledgments</h2>
<h3 class="text-2xl mb-2">Sponsors</h3>