mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2024-12-18 12:14:38 -05:00
101 lines
7.4 KiB
Markdown
101 lines
7.4 KiB
Markdown
|
||
## Contributors 🙌
|
||
|
||
Thanks goes to these wonderful people
|
||
|
||
<!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section -->
|
||
<!-- prettier-ignore-start -->
|
||
<!-- markdownlint-disable -->
|
||
<table>
|
||
<tr>
|
||
<td align="center"><a href="https://gitlab.com/W1nst0n"><img src="https://avatars3.githubusercontent.com/u/55300518?v=4" width="90px;" alt=""/><br /><sub><b>0x192</b></sub></a><br /><a href="#security-0x192" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://keybase.io/pipboy96"><img src="https://avatars1.githubusercontent.com/u/46632672?v=4" width="90px;" alt=""/><br /><sub><b>pipboy96</b></sub></a><br /><a href="#security-pipboy96" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://aliciasykes.com"><img src="https://avatars1.githubusercontent.com/u/1862727?v=4" width="90px;" alt=""/><br /><sub><b>Alicia Sykes</b></sub></a><br /><a href="#security-Lissy93" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://twitter.com/mwleeds"><img src="https://avatars2.githubusercontent.com/u/7833263?v=4" width="90px;" alt=""/><br /><sub><b>Matthew Leeds</b></sub></a><br /><a href="#security-mwleeds" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="http://jaiminpandya.com"><img src="https://avatars0.githubusercontent.com/u/20967911?v=4" width="90px;" alt=""/><br /><sub><b>Jaimin Pandya</b></sub></a><br /><a href="#security-pndyjack" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://twitter.com/ilesinge"><img src="https://avatars3.githubusercontent.com/u/501674?v=4" width="90px;" alt=""/><br /><sub><b>Alexandre G.-Raymond</b></sub></a><br /><a href="#security-ilesinge" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://github.com/guestx86"><img src="https://avatars2.githubusercontent.com/u/56132403?v=4" width="90px;" alt=""/><br /><sub><b>guestx86</b></sub></a><br /><a href="#security-guestx86" title="Security">🛡️</a></td>
|
||
</tr>
|
||
<tr>
|
||
<td align="center"><a href="https://www.baturin.org"><img src="https://avatars0.githubusercontent.com/u/482212?v=4" width="90px;" alt=""/><br /><sub><b>Daniil Baturin</b></sub></a><br /><a href="#security-dmbaturin" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://transitiontech.ca"><img src="https://avatars2.githubusercontent.com/u/1264398?v=4" width="90px;" alt=""/><br /><sub><b>ansuz</b></sub></a><br /><a href="#security-ansuz" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://github.com/8264"><img src="https://avatars0.githubusercontent.com/u/23311938?v=4" width="90px;" alt=""/><br /><sub><b>8264</b></sub></a><br /><a href="#security-8264" title="Security">🛡️</a></td>
|
||
<td align="center"><a href="https://github.com/101lols"><img src="https://avatars1.githubusercontent.com/u/29000894?v=4" width="90px;" alt=""/><br /><sub><b>101lols</b></sub></a><br /><a href="#security-101lols" title="Security">🛡️</a></td>
|
||
</tr>
|
||
</table>
|
||
|
||
<!-- markdownlint-enable -->
|
||
<!-- prettier-ignore-end -->
|
||
<!-- ALL-CONTRIBUTORS-LIST:END -->
|
||
|
||
<!-- To add yourself to the table, copy the row above and replace with your details. Max 7 <td> (columns) per <tr> (row). -->
|
||
|
||
|
||
This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification.
|
||
[Contributions](/CONTRIBUTING.md) of any kind welcome!
|
||
|
||
|
||
|
||
## References 📝
|
||
|
||
|
||
<blockquote>
|
||
[1]"2019 Data Breach Investigations Report - EMEA", Verizon Enterprise Solutions, 2020. [Online]. Available: https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report-emea.pdf. [Accessed: 25- Apr- 2020]
|
||
|
||
[13]"Web Browser Privacy: What Do Browsers Say When They Phone Home?", Feb 2020. [Online].
|
||
Available: https://www.scss.tcd.ie/Doug.Leith/pubs/browser_privacy.pdf. [Accessed: 27- Apr- 2020]
|
||
|
||
[14]"Comments on the Competition and Markets Authority’s interim report on online platforms and digital advertising", Privacyinternational.org, Jan 2020. [Online].
|
||
Available: https://privacyinternational.org/sites/default/files/2020-04/20.02.12_CMA_PI_Comments_Interim_Report_FINAL.pdf. [Accessed: 02- May- 2020]
|
||
|
||
[11]"Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design", 1998. [Online].
|
||
Available: https://dl.packetstormsecurity.net/cracked/des/cracking-des.htm. [Accessed: 25- Apr- 2020]
|
||
|
||
[2]"Digital Identity Guidelines", 2020. [Online].
|
||
Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf. [Accessed: 25- Apr- 2020]
|
||
|
||
[8]"DNS Security - Getting it Right", Open Rights Group, 2020. [Online].
|
||
Available: https://www.openrightsgroup.org/about/reports/dns-security-getting-it-right. [Accessed: 25- Apr- 2020]
|
||
|
||
[9]"DNS-over-HTTPS performance | SamKnows", Samknows.com, 2020. [Online].
|
||
Available: https://www.samknows.com/blog/dns-over-https-performance. [Accessed: 25- Apr- 2020]
|
||
|
||
[12]J. Eckenrode and S. Friedman, "The state of cybersecurity at financial institutions", 2018. [Online].
|
||
Available: https://www2.deloitte.com/us/en/insights/industry/financial-services/state-of-cybersecurity-at-financial-institutions.html. [Accessed: 25- Apr- 2020]
|
||
|
||
[10]E. Foundation, "Cracking DES", Shop.oreilly.com, 1998. [Online].
|
||
Available: http://shop.oreilly.com/product/9781565925205.do. [Accessed: 25- Apr- 2020]
|
||
|
||
[5]"Google data collection, research and findings", Digital Content Next, 2020. [Online].
|
||
Available: https://digitalcontentnext.org/blog/2018/08/21/google-data-collection-research/. [Accessed: 25- Apr- 2020]
|
||
|
||
[3]S. Lekies, B. Stock, M. Wentzel and M. Johns, "The Unexpected Dangers of Dynamic JavaScript", UseNix & SAP, 2020. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-lekies.pdf. [Accessed: 25- Apr- 2020]
|
||
|
||
[7]"Privacy concerns with social networking services", 2020. [Online]. Available: https://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services. [Accessed: 25- Apr- 2020]
|
||
|
||
[4]D. Tian, G. Hernandez, J. Choi, V. Frost, C. Ruales, P. Traynor, H. Vijayakumar, L. Harrison, A. Rahmati, M. Grace and K. Butler, "Vulnerability Analysis of AT Commands Within the Android Ecosystem", Cise.ufl.edu, 2020. [Online].
|
||
Available: https://www.cise.ufl.edu/~butler/pubs/usenix18-atcmd.pdf. [Accessed: 25- Apr- 2020]
|
||
|
||
[6]S. Topuzov, "Phone hacking through SS7 is frighteningly easy and effective", Blog.securegroup.com, 2020. [Online].
|
||
Available: https://blog.securegroup.com/phone-hacking-through-ss7-is-frighteningly-easy-and-effective. [Accessed: 25- Apr- 2020]
|
||
|
||
[15]J. Heidemann, Y. Pradkin, R. Govindan, C. Papadopoulos and J. Bannister, "Exploring Visible Internet Hosts through Census and Survey", Isi.edu, 2020. [Online].
|
||
Available: https://www.isi.edu/~johnh/PAPERS/Heidemann07c.pdf. [Accessed: 10- May- 2020]
|
||
|
||
</blockquote>
|
||
|
||
**Above References apply to the Content in the Following Files**:<br>
|
||
[TLDR](/2_TLDR_Short_List.md) | [Intro](/0_Why_It_Matters.md) | [The Personal Security Checklist](/README.md) | [Privacy-Respecting Software](/5_Privacy_Respecting_Software.md) | [Security Hardware](/6_Privacy_and-Security_Gadgets.md) | [Further Links](/4_Privacy_And_Security_Links.md)
|
||
|
||
## Stars 🌟
|
||
|
||
[![Stargazers over time](https://starchart.cc/Lissy93/personal-security-checklist.svg)](https://star-history.t9t.io/#Lissy93/personal-security-checklist)
|
||
|
||
Thank you [@caarlos0](https://github.com/caarlos0) for the above [Star Chart](https://github.com/caarlos0/starcharts) ☺️
|
||
|
||
|
||
---
|
||
|
||
Licensed under [Creative Commons, CC BY 4.0](/LICENSE.md), © [Alicia Sykes](https://aliciasykes.com) 2020
|
||
|