Compare commits
5 Commits
5ebabc1404
...
7a23ed57f2
Author | SHA1 | Date |
---|---|---|
Peter Anderson | 7a23ed57f2 | |
Alicia Sykes | 05229c6c83 | |
Compr0mzd | 595e4d73cf | |
Peter Anderson | bb7db61d41 | |
Peter Anderson | 1b94abd3bb |
|
@ -56,7 +56,7 @@ To run the app locally, or to make code changes, you'll need Node and Git instal
|
|||
Alternatively, just open this repo is Code Spaces, where everything is already configured and ready to go.
|
||||
|
||||
### Deploying
|
||||
To deploy the app, follow the developing steps above, then run `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
|
||||
To deploy the app, follow the developing steps above, then run `yarn build`,`yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
|
||||
|
||||
Alternatively, fork the repo and import into your providers dashboard. Or use the link below for an easy 1-click deploy 😉
|
||||
|
||||
|
|
|
@ -170,7 +170,7 @@
|
|||
- point: Consider a Hardware Token
|
||||
priority: Advanced
|
||||
details: >-
|
||||
A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in to
|
||||
A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in order to
|
||||
verify your identity, instead of entering a OTP from your authenticator. [SoloKey](https://solokeys.com) and
|
||||
[NitroKey](https://www.nitrokey.com) are examples of such keys. They bring with them several security benefits,
|
||||
since the browser communicates directly with the device and cannot be fooled as to which host is requesting
|
||||
|
@ -353,9 +353,9 @@
|
|||
- point: Block Third-Party Cookies
|
||||
priority: Essential
|
||||
details: >-
|
||||
Third-party cookies placed on your device by a website other than the one you’re visiting. This
|
||||
Third-party cookies are placed on your device by a website other than the one you’re visiting. This
|
||||
poses a privacy risk, as a 3rd entity can collect data from your current session. This guide explains
|
||||
how you can disable 3rd-party cookies, and you can check here ensure this worked.
|
||||
how you can disable 3rd-party cookies, and you can check here to ensure this worked.
|
||||
|
||||
- point: Block Third-Party Trackers
|
||||
priority: Essential
|
||||
|
@ -756,7 +756,7 @@
|
|||
priority: Essential
|
||||
details: >-
|
||||
There are several stages where your digital communications could be monitored or intercepted. This includes:
|
||||
your or your participants' device, your ISP, national gateway or government logging, the messaging provider,
|
||||
you or your participants' device, your ISP, national gateway or government logging, the messaging provider,
|
||||
the servers.
|
||||
|
||||
- point: Agree on a Communication Plan
|
||||
|
|
Loading…
Reference in New Issue