Compare commits

...

5 Commits

Author SHA1 Message Date
Peter Anderson 7a23ed57f2
Merge bb7db61d41 into 05229c6c83 2024-03-14 01:55:47 +00:00
Alicia Sykes 05229c6c83
Merge pull request #246 from Compr0mzd/patch-1
Update README.md
2024-03-13 15:56:15 +00:00
Compr0mzd 595e4d73cf
Update README.md
Fix missing step in the README to include the generation of the manifest with `yarn build` which generate the manifest
2024-03-13 16:28:29 +01:00
Peter Anderson bb7db61d41
Update personal-security-checklist.yml 2024-02-21 01:23:06 +00:00
Peter Anderson 1b94abd3bb
Update personal-security-checklist.yml 2024-02-20 11:48:52 +00:00
2 changed files with 5 additions and 5 deletions

2
.github/README.md vendored
View File

@ -56,7 +56,7 @@ To run the app locally, or to make code changes, you'll need Node and Git instal
Alternatively, just open this repo is Code Spaces, where everything is already configured and ready to go.
### Deploying
To deploy the app, follow the developing steps above, then run `yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
To deploy the app, follow the developing steps above, then run `yarn build`,`yarn build.static`. You can then deploy it by copying the `dist/` directory to any CDN, web server or static hosting provider of your choice.
Alternatively, fork the repo and import into your providers dashboard. Or use the link below for an easy 1-click deploy 😉

View File

@ -170,7 +170,7 @@
- point: Consider a Hardware Token
priority: Advanced
details: >-
A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in to
A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in order to
verify your identity, instead of entering a OTP from your authenticator. [SoloKey](https://solokeys.com) and
[NitroKey](https://www.nitrokey.com) are examples of such keys. They bring with them several security benefits,
since the browser communicates directly with the device and cannot be fooled as to which host is requesting
@ -353,9 +353,9 @@
- point: Block Third-Party Cookies
priority: Essential
details: >-
Third-party cookies placed on your device by a website other than the one youre visiting. This
Third-party cookies are placed on your device by a website other than the one youre visiting. This
poses a privacy risk, as a 3rd entity can collect data from your current session. This guide explains
how you can disable 3rd-party cookies, and you can check here ensure this worked.
how you can disable 3rd-party cookies, and you can check here to ensure this worked.
- point: Block Third-Party Trackers
priority: Essential
@ -756,7 +756,7 @@
priority: Essential
details: >-
There are several stages where your digital communications could be monitored or intercepted. This includes:
your or your participants' device, your ISP, national gateway or government logging, the messaging provider,
you or your participants' device, your ISP, national gateway or government logging, the messaging provider,
the servers.
- point: Agree on a Communication Plan