Missing comma, grammar, fix onion link (#1941)

This commit is contained in:
Daniel Gray 2023-01-11 13:41:40 +00:00
parent bd1ff328a7
commit 27fe6a4c41
No known key found for this signature in database
GPG Key ID: 41911F722B0F9AE3
2 changed files with 3 additions and 3 deletions

View File

@ -17,7 +17,7 @@ The Privacy Policy is how the service says they will use your data and it is wor
We recommend looking for particular terms such as "data collection", "data analysis", "cookies", "ads" or "3rd-party" services. Sometimes you will be able to opt-out from data collection or from sharing your data, but it is best to choose a service that respects your privacy from the start.
You also also placing your trust in the company or organization to actually comply with their own privacy policy.
Keep in mind you're also placing your trust in the company or organization and that they will comply with their own privacy policy.
## Authentication methods

View File

@ -58,7 +58,7 @@ Find a no-logging VPN operator who isnt out to sell or read your web traffic.
??? check "Independently Audited"
As of January 2020 Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf).
As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf).
??? check "Open-Source Clients"
@ -314,7 +314,7 @@ Must not have any marketing which is irresponsible:
Responsible marketing that is both educational and useful to the consumer could include:
- An accurate comparison to when [Tor](tor.md) should be used instead.
- Availability of the VPN provider's website over a .onion [Onion Service](https://en.wikipedia.org/wiki/.onion)
- Availability of the VPN provider's website over a [.onion service](https://en.wikipedia.org/wiki/.onion)
### Additional Functionality