Use WebP for cover images (#2301)

This commit is contained in:
Jonah Aragon 2023-10-09 22:44:16 -05:00
parent aa54b66a03
commit 42bce85c7f
No known key found for this signature in database
75 changed files with 25 additions and 25 deletions

View File

@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android" title: "Android"
icon: 'simple/android' icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
cover: android.png cover: android.webp
schema: schema:
- -
"@context": http://schema.org "@context": http://schema.org

View File

@ -2,7 +2,7 @@
title: "Calendar Sync" title: "Calendar Sync"
icon: material/calendar icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
cover: calendar.png cover: calendar.webp
--- ---
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.

View File

@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide
title: "Cloud Storage" title: "Cloud Storage"
icon: material/file-cloud icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
cover: cloud.png cover: cloud.webp
--- ---
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.

View File

@ -2,7 +2,7 @@
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency title: Cryptocurrency
icon: material/bank-circle icon: material/bank-circle
cover: cryptocurrency.png cover: cryptocurrency.webp
--- ---
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva
title: "Data and Metadata Redaction" title: "Data and Metadata Redaction"
icon: material/tag-remove icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
cover: data-redaction.png cover: data-redaction.webp
--- ---
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.

View File

@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers" title: "Desktop Browsers"
icon: material/laptop icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome. description: These web browsers provide stronger privacy protections than Google Chrome.
cover: desktop-browsers.png cover: desktop-browsers.webp
schema: schema:
- -
"@context": http://schema.org "@context": http://schema.org

View File

@ -2,7 +2,7 @@
title: "Desktop/PC" title: "Desktop/PC"
icon: simple/linux icon: simple/linux
description: Linux distributions are commonly recommended for privacy protection and software freedom. description: Linux distributions are commonly recommended for privacy protection and software freedom.
cover: desktop.png cover: desktop.webp
--- ---
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.

View File

@ -2,7 +2,7 @@
title: "DNS Resolvers" title: "DNS Resolvers"
icon: material/dns icon: material/dns
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
cover: dns.png cover: dns.webp
--- ---
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.

View File

@ -2,7 +2,7 @@
title: "Email Clients" title: "Email Clients"
icon: material/email-open icon: material/email-open
description: These email clients are privacy-respecting and support OpenPGP email encryption. description: These email clients are privacy-respecting and support OpenPGP email encryption.
cover: email-clients.png cover: email-clients.webp
--- ---
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.

View File

@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services" title: "Email Services"
icon: material/email icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
cover: email.png cover: email.webp
--- ---
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.

View File

@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt,
title: "Encryption Software" title: "Encryption Software"
icon: material/file-lock icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
cover: encryption.png cover: encryption.webp
--- ---
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.

View File

@ -2,7 +2,7 @@
title: "File Sharing and Sync" title: "File Sharing and Sync"
icon: material/share-variant icon: material/share-variant
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
cover: file-sharing.png cover: file-sharing.webp
--- ---
Discover how to privately share your files between your devices, with your friends and family, or anonymously online. Discover how to privately share your files between your devices, with your friends and family, or anonymously online.

View File

@ -1,7 +1,7 @@
--- ---
title: Financial Services title: Financial Services
icon: material/bank icon: material/bank
cover: financial-services.png cover: financial-services.webp
--- ---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -2,7 +2,7 @@
title: "Frontends" title: "Frontends"
icon: material/flip-to-front icon: material/flip-to-front
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
cover: frontends.png cover: frontends.webp
--- ---
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.

View File

@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac
title: "Mobile Browsers" title: "Mobile Browsers"
icon: material/cellphone-information icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
cover: mobile-browsers.png cover: mobile-browsers.webp
schema: schema:
- -
"@context": http://schema.org "@context": http://schema.org

View File

@ -2,7 +2,7 @@
title: "Multi-Factor Authenticators" title: "Multi-Factor Authenticators"
icon: 'material/two-factor-authentication' icon: 'material/two-factor-authentication'
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.png cover: multi-factor-authentication.webp
--- ---
## Hardware Security Keys ## Hardware Security Keys

View File

@ -2,7 +2,7 @@
title: "News Aggregators" title: "News Aggregators"
icon: material/rss icon: material/rss
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
cover: news-aggregators.png cover: news-aggregators.webp
--- ---
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.

View File

@ -2,7 +2,7 @@
title: "Notebooks" title: "Notebooks"
icon: material/notebook-edit-outline icon: material/notebook-edit-outline
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
cover: notebooks.png cover: notebooks.webp
--- ---
Keep track of your notes and journalings without giving them to a third-party. Keep track of your notes and journalings without giving them to a third-party.

View File

@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P
title: "Password Managers" title: "Password Managers"
icon: material/form-textbox-password icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials. description: Password managers allow you to securely store and manage passwords and other credentials.
cover: passwords.png cover: passwords.webp
schema: schema:
- -
"@context": http://schema.org "@context": http://schema.org

View File

@ -2,7 +2,7 @@
title: "Productivity Tools" title: "Productivity Tools"
icon: material/file-sign icon: material/file-sign
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
cover: productivity.png cover: productivity.webp
--- ---
Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints.

View File

@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication" title: "Real-Time Communication"
icon: material/chat-processing icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them. description: Other instant messengers make all of your private conversations available to the company that runs them.
cover: real-time-communication.png cover: real-time-communication.webp
--- ---
These are our recommendations for encrypted real-time communication. These are our recommendations for encrypted real-time communication.

View File

@ -2,7 +2,7 @@
title: "Router Firmware" title: "Router Firmware"
icon: material/router-wireless icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point. description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
cover: router.png cover: router.webp
--- ---
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc.

View File

@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy
title: "Search Engines" title: "Search Engines"
icon: material/search-web icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches. description: These privacy-respecting search engines don't build an advertising profile based on your searches.
cover: search-engines.png cover: search-engines.webp
--- ---
Use a search engine that doesn't build an advertising profile based on your searches. Use a search engine that doesn't build an advertising profile based on your searches.

View File

@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network" title: "Tor Network"
icon: simple/torproject icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
cover: tor.png cover: tor.webp
schema: schema:
- -
"@context": http://schema.org "@context": http://schema.org

View File

@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or
title: "VPN Services" title: "VPN Services"
icon: material/vpn icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you. description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.png cover: vpn.webp
--- ---
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest:

Binary file not shown.

Before

Width:  |  Height:  |  Size: 556 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 40 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 417 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 717 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 92 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 639 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 92 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 918 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 84 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 945 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 305 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 526 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 39 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.0 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 793 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 442 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 8.6 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 929 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 34 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 794 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 54 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 735 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 37 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 627 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 63 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 425 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 133 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 200 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 706 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 39 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 532 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 38 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 616 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 755 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 25 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 713 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 436 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 660 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 652 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB