mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-06-24 14:30:34 -04:00
style!: Make minor changes across recommendation pages for consistency (#2972)
- Grammar, Style, and Wording Changes - Remove commas where pauses or breaks in reading may not be needed - Reduce instances of comma splices by replacing commas with semicolons or em dashes where appropriate - Spell out abbreviations like E2EE for the first instance of the term on the page, then use the abbreviation for the subsequent instances - Add line breaks in card descriptions for a cleaner look, particularly for mentions of an accompanying blog review of a tool - Move more technical information from recommendation blurb to the description under the card - Format quotations from audits as block quotes - Standardize syntax for tooltips - Arrange download links according to the widely used order - Mobile app stores > alternative distribution methods (e.g., GitHub) > developer-owned or -operated F-Droid repositories >> desktop platforms > Flathub >> browsers >> web - Shorten Chrome extension links - Standardize icon for web download links - For "Repository" buttons, embed direct links to project's Readme to differentiate them from "Source Code" links - Other Changes - Add GitHub releases link for IVPN - Mention CryptPad's official public instance and add link to list of public instances - Replace current link to Miniflux docs with a direct link to the end user docs - Update version of Newsboat documentation link - Update and reword guidance on finding YouTube channel code for RSS feed - Remove F-Droid download link for Stingle since it is not owned by the developer or dev team Signed-off-by: Jonah Aragon <jonah@privacyguides.org> Signed-off-by: fria <fria@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
parent
353d1fed48
commit
06d2f0e3e1
32 changed files with 214 additions and 186 deletions
|
@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
|||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/){ .md-button }
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn){ .md-button }
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ Privacy is ultimately about human information, and this is important because we
|
|||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/){ .md-button }
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security){ .md-button }
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
|
@ -52,7 +52,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
|||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue