mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-09-21 05:24:46 -04:00
refactor(blog): Convert images to WebP (#2871)
This commit is contained in:
parent
546283662f
commit
5ce317abcc
110 changed files with 47 additions and 45 deletions
|
@ -16,7 +16,7 @@ schema_type: AnalysisNewsArticle
|
|||
---
|
||||
# Choosing the Right Messenger
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ schema_type: NewsArticle
|
|||
---
|
||||
# Delisting Startpage From Privacy Guides
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ schema_type: NewsArticle
|
|||
---
|
||||
# Delisting Wire From Privacy Guides
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ schema_type: AnalysisNewsArticle
|
|||
---
|
||||
# Firefox Privacy: 2021 Update
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ schema_type: AnalysisNewsArticle
|
|||
---
|
||||
# Firefox Privacy: Tips and Tricks for Better Browsing
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
|
|
@ -146,7 +146,7 @@ Be very careful if you decide to use mobile phone connectivity, however. The dat
|
|||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Delete your traces afterward</p>
|
||||
|
||||
Depending on your situation, you might want to delete the traces of this installation after. See a To-Do list for this on [Step 9](#step-9-delete-the-installation-traces).
|
||||
Depending on your situation, you might want to delete the traces of this installation after. See [a to-do list](#final-notes) for this at the end of this article.
|
||||
|
||||
</div>
|
||||
|
||||
|
@ -164,7 +164,7 @@ If you encounter any issues during the installation or running processes, you ca
|
|||
|
||||
Visit this website and select your installation computer's operating system: [https://tails.net/install/](https://tails.net/install/)
|
||||
|
||||

|
||||

|
||||
|
||||
Scroll down to the "**Download Tails**" section and click on the green download button. Make sure to save the installation file in a folder where you can find it back easily and not forget to **delete it afterwards**.
|
||||
|
||||
|
@ -182,7 +182,7 @@ The download link is not shared directly here because you should always make sur
|
|||
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||
### Step 2: Verify the file you just downloaded
|
||||
|
||||
|
@ -195,11 +195,11 @@ This step is important to ensure the file you just downloaded has not been tampe
|
|||
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||
Once the verification is completed (this might take a few minutes), you should see a green checkmark with "**Verification successful!**" followed by the file name. If you do not see this, delete the file and repeat [Step 1](#step-1-download-tails) and [Step 2](#step-2-verify-the-file-you-just-downloaded).
|
||||
|
||||

|
||||

|
||||
|
||||
### Step 3: Download and install balenaEtcher
|
||||
|
||||
|
@ -216,11 +216,11 @@ You can download *balenaEtcher* from this link: [https://tails.net/etcher/balena
|
|||
|
||||
Open the folder where you downloaded the *balenaEtcher* installation file (keep it open to delete this file after the installation is completed), and double-click on the "**balenaEtcher.dmg**" file. Drag the "**balenaEtcher.app**" icon over the "**Applications**" folder icon when prompted from the window below:
|
||||
|
||||

|
||||

|
||||
|
||||
Once the file is copied to you "**Applications**" folder, go on your computer's desktop and right-click on the "**balenaEtcher**" icon. Select '**Eject "balenaEtcher"**'
|
||||
|
||||

|
||||

|
||||
|
||||
### Step 4: Install Tails on your USB stick using balenaEtcher
|
||||
|
||||
|
@ -228,23 +228,23 @@ Once the file is copied to you "**Applications**" folder, go on your computer's
|
|||
|
||||
Depending on your macOS version, your Mac might open a popup window saying '**Verifying "balenaEtcher.app"...**'. This is normal, let it complete its verification. Next, you will likely see another popup window with '**"balenaEtcher.app” is an app downloaded from the Internet. Are you sure you want to open it?**'. Click "**Open**".
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||
|
||||
4.2. Open *balenaEtcher* and click on the settings gear button on the upper-right. Disable the option "**Anonymously report errors and usage statistics to balena.io**", then click "**OK**".
|
||||
|
||||

|
||||

|
||||
|
||||
4.3. Eject and unplug any other external USB stick(s) or external USB drive(s) that might be plugged into your computer if possible, and plug in the USB stick you wish to erase and install Tails on.
|
||||
|
||||
4.4. Once it is plugged in, return to *balenaEtcher* and click on the "**Flash from file**" blue button on the left. You will be prompted to select a file. Select the Tails "**.img**" file you have downloaded and verified earlier.
|
||||
|
||||

|
||||

|
||||
|
||||
4.5. Click on the "**Select target**" blue button in the middle, and select your USB stick.
|
||||
|
||||

|
||||

|
||||
|
||||
<div class="admonition danger" markdown>
|
||||
<p class="admonition-title">Caution! Select the correct USB stick!</p>
|
||||
|
@ -253,19 +253,19 @@ Make sure you are not selecting a USB stick or drive different from the one you
|
|||
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||
4.6. Once you have verified that all the information is correct, click on the "**Flash!**" blue button on the right.
|
||||
|
||||

|
||||

|
||||
|
||||
You will see a *balenaEtcher* popup window saying: "**balenaEtcher needs privileged access in order to flash disks. Type your password to allow this.**". Type your computer's password and click "**Ok**".
|
||||
|
||||

|
||||

|
||||
|
||||
Depending on the version of macOS you use, you might see another popup window saying '**"balenaEtcher.app" would like to access files on a removable volume.**'. Click "**OK**" and wait for the installation to start.
|
||||
|
||||

|
||||

|
||||
|
||||
While Tails is getting installed, you should see a window that looks like this with "**Flashing...**". The operation might take a few minutes. Do not interrupt this process!
|
||||
|
||||
|
@ -423,7 +423,7 @@ If you decide to setup Persistent Storage:
|
|||
|
||||
2. After setting up Persistent Storage, you will see a window like this with additional options:
|
||||
|
||||

|
||||

|
||||
|
||||
### Connecting to the internet
|
||||
|
||||
|
@ -436,25 +436,25 @@ If using Tor is dangerous for you, read more about the other options before deci
|
|||
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||
If the connection is successful, you should see this window and you will be ready to browse the internet anonymously:
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
### Sharing files with others
|
||||
|
||||
There is a lot of great applications already installed on Tails to help you! You will find them listed in the "**Applications**" drop-menu on the upper-left top bar. One of these applications is [OnionShare](https://onionshare.org/), which you can use to share files with others anonymously.
|
||||
|
||||

|
||||

|
||||
|
||||
### Storing passwords
|
||||
|
||||
If you are using the Persistent Storage with Tails, and need to store passwords, you can use the pre-installed [KeePassXC](https://keepassxc.org/) application. This application will store your passwords encrypted, locally-only, and protected by a main password (ideally, a **passphrase**). Be careful however if you store important passwords in there. Remember that if a bug occurs or if you forget your Persistent Storage's password, you could lose access to all of it.
|
||||
|
||||

|
||||

|
||||
|
||||
### Shutting down Tails
|
||||
|
||||
|
|
|
@ -27,7 +27,7 @@ This guide uses the [Shortcuts](https://support.apple.com/guide/shortcuts-mac/in
|
|||
|
||||
Shortcuts is quite intuitive to work with, so if you don't like the behavior demoed here then experiment with your own solution. For example, you could set the shortcut to take a clipboard input instead. The sky's the limit.
|
||||
|
||||

|
||||

|
||||
|
||||
### Prerequisites
|
||||
|
||||
|
@ -74,7 +74,7 @@ Shortcuts is quite intuitive to work with, so if you don't like the behavior dem
|
|||
done
|
||||
```
|
||||
|
||||

|
||||

|
||||
|
||||
!!! tip "Worth Mentioning"
|
||||
The open-source [ImageOptim](https://imageoptim.com/mac) app integrates into Finder's *Services* context menu by default. While it is primarily an image optimization app, it also removes metadata.
|
||||
|
@ -95,7 +95,7 @@ Shortcuts is quite intuitive to work with, so if you don't like the behavior dem
|
|||
|
||||
The lack of *good* metadata removal apps on the App Store is what makes this solution worthwhile.
|
||||
|
||||

|
||||

|
||||
|
||||
### Prerequisites
|
||||
|
||||
|
@ -123,7 +123,7 @@ The lack of *good* metadata removal apps on the App Store is what makes this sol
|
|||
|
||||
10. Make sure that you uncheck **preserve metadata**
|
||||
|
||||

|
||||

|
||||
|
||||
### Enabling & using the Shortcut
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ schema_type: AnalysisNewsArticle
|
|||
|
||||
# "Privacy-Preserving" Attribution: Mozilla Disappoints Us Yet Again
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Image: Unsplash</small>
|
||||
|
||||
|
|
|
@ -55,7 +55,7 @@ Of course installing Onion Browser is as easy as any other app on iOS, Apple ID
|
|||
When you open Onion Browser for the first time you're given the option to connect to Tor via [Orbot](https://www.privacyguides.org/en/tor/#orbot), or with a built-in Tor network proxy. Using the built-in option is the easiest, it connects very quickly and doesn't require a separate app. It also allows you to [use Tor alongside another VPN app](https://www.privacyguides.org/en/advanced/tor-overview/#safely-connecting-to-tor), which may be helpful in certain circumstances. The Orbot app acts as its own "VPN connection" in iOS preventing the possibility of combining it with another VPN, but it is more flexible and it extends Tor network protections to every app on your device.
|
||||
|
||||
<figure markdown="span">
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
<figcaption>You're presented with a choice at startup</figcaption>
|
||||
</figure>
|
||||
|
||||
|
@ -64,7 +64,7 @@ Using the dedicated Orbot app also provides more robust protections against IP a
|
|||
I confirmed the built-in option works perfectly fine, in fact I occasionally had trouble connecting Orbot to Onion Browser, where it would re-prompt me to start Orbot even though it was already running until I restarted the Onion Browser app. The built-in proxy generally worked seamlessly. However, for most people using Onion Browser alongside Orbot probably still makes more sense. It's the official recommendation from Tor Project and the browser's developer themselves, so that's what I'll be sticking with for the rest of this review.
|
||||
|
||||
<figure markdown="span">
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
<figcaption>You can check your connection at check.torproject.org, but you'll be warned you're not using Tor Browser</figcaption>
|
||||
</figure>
|
||||
|
||||
|
@ -81,8 +81,8 @@ I ran into trouble with DuckDuckGo not being able to display results, however. S
|
|||
|
||||
<figure markdown="span">
|
||||
<div markdown="span" style="display: flex; gap: 1em; justify-content: center;">
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
</div>
|
||||
<figcaption>DuckDuckGo wouldn't work until I used their HTML-only version</figcaption>
|
||||
</figure>
|
||||
|
@ -92,7 +92,7 @@ I ran into trouble with DuckDuckGo not being able to display results, however. S
|
|||
There are three configurable security levels in Onion Browser: Bronze, Silver (the default), and Gold. These levels roughly correlate to the *Safe, Safer, Safest* [security levels](https://tb-manual.torproject.org/security-settings/) in regular Tor Browser.
|
||||
|
||||
<figure markdown="span">
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
<figcaption>You can toggle security levels on a per-site basis with two taps</figcaption>
|
||||
</figure>
|
||||
|
||||
|
@ -159,7 +159,7 @@ There is one more way to improve Onion Browser security, but we have to look out
|
|||
Because Onion Browser is built on Apple's WebKit, these security improvements extend to Onion Browser as well. Most notably, external web fonts *are* blocked in Onion Browser with Lockdown Mode enabled, just as they are in Safari. These are disabled in desktop Tor Browser's Safest mode due to both privacy concerns, and security concerns related to the font rendering engine on your device, so having the option to disable them here on iOS is very useful for those looking to maximize their security.
|
||||
|
||||
<figure markdown="span">
|
||||
{ width="200" }
|
||||
{ width="200" }
|
||||
<figcaption>External fonts and JavaScript disabled with Gold + Lockdown Mode</figcaption>
|
||||
</figure>
|
||||
|
||||
|
|
|
@ -58,17 +58,17 @@ Had Proton Wallet added support for Monero or a similarly private cryptocurrency
|
|||
|
||||
Proton Wallet *is* in beta, like many of Proton's products are when newly released, and available via the web, an Android app, and an iOS [TestFlight](https://testflight.apple.com/join/6OIcXtQN).
|
||||
|
||||

|
||||

|
||||
|
||||
Creating your wallet is a simple process, after registering you'll be asked to choose a name for your wallet and a default currency. You can also optionally set a passphrase to secure your account. Note that this isn't merely a passphrase securing your account on Proton's servers beyond your usual account credentials, it's a [BIP39 extension word](https://en.bitcoin.it/wiki/Seed_phrase#Two-factor_seed_phrases), meaning that if you lose it your wallet will be completely unrecoverable, **even if** you back up your 12 word seed phrase.
|
||||
|
||||

|
||||

|
||||
|
||||
The default currency here isn't the currency being *stored* in Proton Wallet. It is just used to show you the current conversion rate between Bitcoin and your local currency.
|
||||
|
||||
Once you're in, Proton Wallet is fairly straightforward. In fact, there's not much to explore beyond finding your wallet address and buying Bitcoin. Clicking the **Recieve** button brings up a panel which shows your address and allows you to generate a new one on the fly. When you generate a new address, all of your previous addresses will continue to work, but are no longer displayed anywhere.
|
||||
|
||||

|
||||

|
||||
|
||||
Buying Bitcoin is simple as well. Proton is working with two providers, Banxa and Ramp, and if you're in the United States like I am both are available, so you can choose the one with the best exchange rate to go with. Before you purchase, Proton Wallet asks you for your current country, so that will determine which providers it's possible to use.
|
||||
|
||||
|
@ -78,7 +78,7 @@ There's no private payment methods though, you're stuck with credit card, Google
|
|||
|
||||
The flagship feature of Proton Wallet is something they call **Bitcoin via Email**, which integrates with Proton Mail to allow you to send Bitcoin to any email address. Opening your wallet settings lets you enable Proton's *Receive Bitcoin via Email* feature, which allows other Proton Wallet users to send Bitcoin to your account with just your Proton Mail address.
|
||||
|
||||

|
||||

|
||||
|
||||
If you have multiple addresses on your Proton account, such as aliases or addresses on a custom domain, only one address can be linked to your wallet. This can be a bit annoying for people who have given out different Proton addresses to others in the past, like if you gave out your @protonmail.com address to some people, before later migrating to @proton.me when that domain became available.
|
||||
|
||||
|
|
|
@ -30,7 +30,7 @@ Isolated Web Apps (IWAs) build on the work done on PWAs and [Web Packaging](http
|
|||
Google [distinguishes](https://chromeos.dev/en/web/isolated-web-apps) between the drive by web, PWAs, and IWAs. The drive by web requires more conservative access to the system as the most accessible and is therefore least trusted. PWAs are a bit more trusted and can integrate a bit more deeply into the system as a result. IWAs are the most trusted and, as such, can have deeper access into the system and more powerful capabilities.
|
||||
|
||||
<figure markdown>
|
||||

|
||||

|
||||
<figcaption>source: <a href="https://chromeos.dev/en/web/isolated-web-apps">chromeos.dev</a></figcaption>
|
||||
</figure>
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ schema_type: NewsArticle
|
|||
---
|
||||
# Relisting Startpage.com
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Privacy Guides</small>
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ schema_type: AnalysisNewsArticle
|
|||
---
|
||||
# The Trouble With VPN and Privacy Review Sites
|
||||
|
||||

|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
|
||||
|
||||
|
@ -65,7 +65,7 @@ If these sites truly wanted to be helpful, they would consolidate all the releva
|
|||
|
||||
But that isn’t to say they should just throw all the providers in a big table and call it a day. Almost worse than the ranking scheme above is when sites provide out of context lists of providers, often just with pricing and a link. Sometimes they will link you to a full review (more on that in a bit), but for the most part these sites just expect you to follow their recommendations blindly.
|
||||
|
||||

|
||||

|
||||
|
||||
These read like advertisements, because they usually are. Once again we see the usual suspects — NordVPN, ExpressVPN… — paraded as the gold standard in the VPN space, not out of any inherent value, but based on the value of their affiliate programs. To further this point, let’s take a look at how much each of the five providers above will pay you for a referral (on a one-month plan).
|
||||
|
||||
|
|
|
@ -17,6 +17,8 @@ schema_type: OpinionNewsArticle
|
|||
---
|
||||
# Threads Is the Perfect Twitter Alternative, Just Not for You
|
||||
|
||||

|
||||
|
||||
Silicon Valley could well be built on the principle of scrapping principles. Now Elon Musk, perhaps the ultimate tech bro, is shredding another well-regarded convention with an *original business strategy*.<!-- more -->
|
||||
|
||||
Generally, in business, it is sensible to provide your customers with what they want. With Twitter, the meme-makers' favourite billionaire is doing the opposite. The cyber-trucker is trying his best to [cull](https://jottings.lol/2022/12/bravo-elon) his customer base. Instead of finding gaps in the market, Musk is helping to create them. Ever the [copycat](https://blog.privacyguides.org/2022/04/04/move-fast-and-break-things/), Mark Zuckerberg wants to give these innovative tactics a try. Enter the-company formerly-known-as-Facebook's rival to the birdsite: Threads.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue