From 5bad28ff6d93ceb7ae8eb812cf5318b29c847e4a Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Tue, 7 Mar 2023 08:52:30 -0600 Subject: [PATCH] Add page descriptions to docs (#2075) Co-authored-by: mfwmyfacewhen <94880365+mfwmyfacewhen@users.noreply.github.com> Signed-off-by: Jonah Aragon Signed-off-by: Daniel Gray --- docs/advanced/communication-network-types.md | 1 + docs/advanced/dns-overview.md | 1 + docs/advanced/tor-overview.md | 1 + docs/android.md | 1 + docs/basics/account-creation.md | 1 + docs/basics/account-deletion.md | 1 + docs/basics/common-misconceptions.md | 1 + docs/basics/common-threats.md | 1 + docs/basics/email-security.md | 1 + docs/basics/multi-factor-authentication.md | 1 + docs/basics/passwords-overview.md | 1 + docs/basics/threat-modeling.md | 1 + docs/basics/vpn-overview.md | 3 ++- docs/calendar.md | 1 + docs/cloud.md | 1 + docs/data-redaction.md | 1 + docs/desktop-browsers.md | 1 + docs/desktop.md | 1 + docs/dns.md | 1 + docs/email-clients.md | 1 + docs/email.md | 1 + docs/encryption.md | 1 + docs/file-sharing.md | 1 + docs/frontends.md | 1 + docs/kb-archive.md | 1 + docs/mobile-browsers.md | 1 + docs/multi-factor-authentication.md | 1 + docs/news-aggregators.md | 3 ++- docs/notebooks.md | 1 + docs/os/android-overview.md | 1 + docs/os/linux-overview.md | 3 ++- docs/os/qubes-overview.md | 1 + docs/passwords.md | 1 + docs/productivity.md | 1 + docs/real-time-communication.md | 1 + docs/router.md | 1 + docs/search-engines.md | 1 + docs/tools.md | 1 + docs/tor.md | 1 + docs/video-streaming.md | 1 + docs/vpn.md | 1 + 41 files changed, 44 insertions(+), 3 deletions(-) diff --git a/docs/advanced/communication-network-types.md b/docs/advanced/communication-network-types.md index a41ff542..b9d3867d 100644 --- a/docs/advanced/communication-network-types.md +++ b/docs/advanced/communication-network-types.md @@ -1,6 +1,7 @@ --- title: "Types of Communication Networks" icon: 'material/transit-connection-variant' +description: An overview of several network architectures commonly used by instant messaging applications. --- There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. diff --git a/docs/advanced/dns-overview.md b/docs/advanced/dns-overview.md index ea6dee14..771de594 100644 --- a/docs/advanced/dns-overview.md +++ b/docs/advanced/dns-overview.md @@ -1,6 +1,7 @@ --- title: "DNS Overview" icon: material/dns +description: The Domain Name System is the "phonebook of the internet," helping your browser find the website it's looking for. --- The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers. diff --git a/docs/advanced/tor-overview.md b/docs/advanced/tor-overview.md index 4658729a..c3376e73 100644 --- a/docs/advanced/tor-overview.md +++ b/docs/advanced/tor-overview.md @@ -1,6 +1,7 @@ --- title: "Tor Overview" icon: 'simple/torproject' +description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. diff --git a/docs/android.md b/docs/android.md index f9a59151..40a46aae 100644 --- a/docs/android.md +++ b/docs/android.md @@ -1,6 +1,7 @@ --- title: "Android" icon: 'simple/android' +description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. --- ![Android logo](assets/img/android/android.svg){ align=right } diff --git a/docs/basics/account-creation.md b/docs/basics/account-creation.md index 275a8e0f..b39fefeb 100644 --- a/docs/basics/account-creation.md +++ b/docs/basics/account-creation.md @@ -1,6 +1,7 @@ --- title: "Account Creation" icon: 'material/account-plus' +description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private. --- Often people sign up for services without thinking. Maybe it's a streaming service so you can watch that new show everyone's talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line. diff --git a/docs/basics/account-deletion.md b/docs/basics/account-deletion.md index b9b3bf57..e6d4b3e8 100644 --- a/docs/basics/account-deletion.md +++ b/docs/basics/account-deletion.md @@ -1,6 +1,7 @@ --- title: "Account Deletion" icon: 'material/account-remove' +description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. diff --git a/docs/basics/common-misconceptions.md b/docs/basics/common-misconceptions.md index 8dee95f4..ed70fa3d 100644 --- a/docs/basics/common-misconceptions.md +++ b/docs/basics/common-misconceptions.md @@ -1,6 +1,7 @@ --- title: "Common Misconceptions" icon: 'material/robot-confused' +description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation. --- ## "Open-source software is always secure" or "Proprietary software is more secure" diff --git a/docs/basics/common-threats.md b/docs/basics/common-threats.md index 332f7e6d..760b19d9 100644 --- a/docs/basics/common-threats.md +++ b/docs/basics/common-threats.md @@ -1,6 +1,7 @@ --- title: "Common Threats" icon: 'material/eye-outline' +description: Your threat model is personal to you, but these are some of the things many visitors to this site care about. --- Broadly speaking, we categorize our recommendations into the [threats](threat-modeling.md) or goals that apply to most people. ==You may be concerned with none, one, a few, or all of these possibilities==, and the tools and services you use depend on what your goals are. You may have specific threats outside of these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat. diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index f2a99a3d..f0c2fb57 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -1,6 +1,7 @@ --- title: Email Security icon: material/email +description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications. --- Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add End-to-End Encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed. diff --git a/docs/basics/multi-factor-authentication.md b/docs/basics/multi-factor-authentication.md index 690cfcf0..d82c23b9 100644 --- a/docs/basics/multi-factor-authentication.md +++ b/docs/basics/multi-factor-authentication.md @@ -1,6 +1,7 @@ --- title: "Multi-Factor Authentication" icon: 'material/two-factor-authentication' +description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others. --- **Multi-Factor Authentication** (**MFA**) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method is time limited codes you might receive from SMS or an app. diff --git a/docs/basics/passwords-overview.md b/docs/basics/passwords-overview.md index eb587265..9b33d731 100644 --- a/docs/basics/passwords-overview.md +++ b/docs/basics/passwords-overview.md @@ -1,6 +1,7 @@ --- title: "Introduction to Passwords" icon: 'material/form-textbox-password' +description: These are some tips and tricks on how to create the strongest passwords and keep your accounts secure. --- Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. diff --git a/docs/basics/threat-modeling.md b/docs/basics/threat-modeling.md index cdcdec91..93a2de2e 100644 --- a/docs/basics/threat-modeling.md +++ b/docs/basics/threat-modeling.md @@ -1,6 +1,7 @@ --- title: "Threat Modeling" icon: 'material/target-account' +description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. --- Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! diff --git a/docs/basics/vpn-overview.md b/docs/basics/vpn-overview.md index f0744ca1..a1a007f5 100644 --- a/docs/basics/vpn-overview.md +++ b/docs/basics/vpn-overview.md @@ -1,11 +1,12 @@ --- title: VPN Overview icon: material/vpn +description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind. --- Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. An ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). -Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). +Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it. diff --git a/docs/calendar.md b/docs/calendar.md index c0dedcf2..458ddc62 100644 --- a/docs/calendar.md +++ b/docs/calendar.md @@ -1,6 +1,7 @@ --- title: "Calendar Sync" icon: material/calendar +description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/docs/cloud.md b/docs/cloud.md index 1b4e49f2..163a73ee 100644 --- a/docs/cloud.md +++ b/docs/cloud.md @@ -1,6 +1,7 @@ --- title: "Cloud Storage" icon: material/file-cloud +description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by either putting you in control of your data or by implementing E2EE. diff --git a/docs/data-redaction.md b/docs/data-redaction.md index b905a349..561d9201 100644 --- a/docs/data-redaction.md +++ b/docs/data-redaction.md @@ -1,6 +1,7 @@ --- title: "Data and Metadata Redaction" icon: material/tag-remove +description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/docs/desktop-browsers.md b/docs/desktop-browsers.md index 87035443..de331cd1 100644 --- a/docs/desktop-browsers.md +++ b/docs/desktop-browsers.md @@ -1,6 +1,7 @@ --- title: "Desktop Browsers" icon: material/laptop +description: Firefox and Brave are our recommendations for standard/non-anonymous browsing. --- These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping your browser extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. diff --git a/docs/desktop.md b/docs/desktop.md index fbc73f94..a4c16976 100644 --- a/docs/desktop.md +++ b/docs/desktop.md @@ -1,6 +1,7 @@ --- title: "Desktop/PC" icon: simple/linux +description: Linux distributions are commonly recommended for privacy protection and software freedom. --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/docs/dns.md b/docs/dns.md index 6c2e76bb..9c5d5041 100644 --- a/docs/dns.md +++ b/docs/dns.md @@ -1,6 +1,7 @@ --- title: "DNS Resolvers" icon: material/dns +description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/docs/email-clients.md b/docs/email-clients.md index bdc839ba..6c8b482c 100644 --- a/docs/email-clients.md +++ b/docs/email-clients.md @@ -1,6 +1,7 @@ --- title: "Email Clients" icon: material/email-open +description: These email clients are privacy-respecting and support OpenPGP email encryption. --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/docs/email.md b/docs/email.md index 633390c9..c112a01c 100644 --- a/docs/email.md +++ b/docs/email.md @@ -1,6 +1,7 @@ --- title: "Email Services" icon: material/email +description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/docs/encryption.md b/docs/encryption.md index f130a214..39e91775 100644 --- a/docs/encryption.md +++ b/docs/encryption.md @@ -1,6 +1,7 @@ --- title: "Encryption Software" icon: material/file-lock +description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/docs/file-sharing.md b/docs/file-sharing.md index 57c0c16a..21f48c98 100644 --- a/docs/file-sharing.md +++ b/docs/file-sharing.md @@ -1,6 +1,7 @@ --- title: "File Sharing and Sync" icon: material/share-variant +description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/docs/frontends.md b/docs/frontends.md index 5f4d7c28..33238f53 100644 --- a/docs/frontends.md +++ b/docs/frontends.md @@ -1,6 +1,7 @@ --- title: "Frontends" icon: material/flip-to-front +description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/docs/kb-archive.md b/docs/kb-archive.md index 483f3ef3..a825f1d8 100644 --- a/docs/kb-archive.md +++ b/docs/kb-archive.md @@ -1,6 +1,7 @@ --- title: KB Archive icon: material/archive +description: Some pages that used to be in our knowledge base can now be found on our blog. --- # Pages Moved to Blog diff --git a/docs/mobile-browsers.md b/docs/mobile-browsers.md index b4c1193e..76dfeb3e 100644 --- a/docs/mobile-browsers.md +++ b/docs/mobile-browsers.md @@ -1,6 +1,7 @@ --- title: "Mobile Browsers" icon: material/cellphone-information +description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. --- These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. diff --git a/docs/multi-factor-authentication.md b/docs/multi-factor-authentication.md index c0ea71c5..626f20db 100644 --- a/docs/multi-factor-authentication.md +++ b/docs/multi-factor-authentication.md @@ -1,6 +1,7 @@ --- title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' +description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. --- ## Hardware Security Keys diff --git a/docs/news-aggregators.md b/docs/news-aggregators.md index 39c4b614..193cedac 100644 --- a/docs/news-aggregators.md +++ b/docs/news-aggregators.md @@ -1,9 +1,10 @@ --- title: "News Aggregators" icon: material/rss +description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. --- -A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favourite blogs and news sites. +A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. ## Aggregator clients diff --git a/docs/notebooks.md b/docs/notebooks.md index 7977f35a..a705b1a7 100644 --- a/docs/notebooks.md +++ b/docs/notebooks.md @@ -1,6 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/docs/os/android-overview.md b/docs/os/android-overview.md index 5a2f4295..4d242b56 100644 --- a/docs/os/android-overview.md +++ b/docs/os/android-overview.md @@ -1,6 +1,7 @@ --- title: Android Overview icon: simple/android +description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones. --- Android is a secure operating system that has strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system. diff --git a/docs/os/linux-overview.md b/docs/os/linux-overview.md index dd2119c7..5a2e3a13 100644 --- a/docs/os/linux-overview.md +++ b/docs/os/linux-overview.md @@ -1,8 +1,9 @@ --- title: Linux Overview icon: simple/linux +description: Linux is an open-source, privacy-focused desktop operating system alternative, but not all distribitions are created equal. --- -It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigour applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years. +It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigor applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years. At the moment, desktop Linux does have some areas that could be better improved when compared to their proprietary counterparts, e.g.: diff --git a/docs/os/qubes-overview.md b/docs/os/qubes-overview.md index c3d568c8..bc2008e5 100644 --- a/docs/os/qubes-overview.md +++ b/docs/os/qubes-overview.md @@ -1,6 +1,7 @@ --- title: "Qubes Overview" icon: simple/qubesos +description: Qubes is an operating system built around isolating apps within virtual machines for heightened security. --- [**Qubes OS**](../desktop.md#qubes-os) is an operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated virtual machines. Each VM is called a *Qube* and you can assign each Qube a level of trust based on its purpose. As Qubes OS provides security by using isolation, and only permitting actions on a per case basis, it is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). diff --git a/docs/passwords.md b/docs/passwords.md index ecd60ecc..e6b72371 100644 --- a/docs/passwords.md +++ b/docs/passwords.md @@ -1,6 +1,7 @@ --- title: "Password Managers" icon: material/form-textbox-password +description: Password managers allow you to securely store and manage passwords and other credentials. --- Password managers allow you to securely store and manage passwords and other credentials with the use of a master password. diff --git a/docs/productivity.md b/docs/productivity.md index 1a830833..03889af4 100644 --- a/docs/productivity.md +++ b/docs/productivity.md @@ -1,6 +1,7 @@ --- title: "Productivity Tools" icon: material/file-sign +description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/docs/real-time-communication.md b/docs/real-time-communication.md index bd48d685..27ece963 100644 --- a/docs/real-time-communication.md +++ b/docs/real-time-communication.md @@ -1,6 +1,7 @@ --- title: "Real-Time Communication" icon: material/chat-processing +description: Other instant messengers make all of your private conversations available to the company that runs them. --- These are our recommendations for encrypted real-time communication. diff --git a/docs/router.md b/docs/router.md index 06019eba..1b1de773 100644 --- a/docs/router.md +++ b/docs/router.md @@ -1,6 +1,7 @@ --- title: "Router Firmware" icon: material/router-wireless +description: These alternative operating systems can be used to secure your router or Wi-Fi access point. --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/docs/search-engines.md b/docs/search-engines.md index c60d7e67..9a3b0788 100644 --- a/docs/search-engines.md +++ b/docs/search-engines.md @@ -1,6 +1,7 @@ --- title: "Search Engines" icon: material/search-web +description: These privacy-respecting search engines don't build an advertising profile based on your searches. --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/docs/tools.md b/docs/tools.md index 7fc1c9c6..7cfe7b9a 100644 --- a/docs/tools.md +++ b/docs/tools.md @@ -3,6 +3,7 @@ title: "Privacy Tools" icon: material/tools hide: - toc +description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats. --- If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. diff --git a/docs/tor.md b/docs/tor.md index c2ab0be7..428b108b 100644 --- a/docs/tor.md +++ b/docs/tor.md @@ -1,6 +1,7 @@ --- title: "Tor Network" icon: simple/torproject +description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. --- ![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } diff --git a/docs/video-streaming.md b/docs/video-streaming.md index a4a12a9b..bd3bb8be 100644 --- a/docs/video-streaming.md +++ b/docs/video-streaming.md @@ -1,6 +1,7 @@ --- title: "Video Streaming" icon: material/video-wireless +description: These networks allow you to stream internet content without building an advertising profile based on your interests. --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/docs/vpn.md b/docs/vpn.md index 6ef37fc5..b826f3ec 100644 --- a/docs/vpn.md +++ b/docs/vpn.md @@ -1,6 +1,7 @@ --- title: "VPN Services" icon: material/vpn +description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: