refactor(blog): Convert images to WebP (#2871)

This commit is contained in:
Justin Ehrenhofer 2025-01-29 16:53:43 -06:00 committed by Jonah Aragon
parent 546283662f
commit 5ce317abcc
No known key found for this signature in database
110 changed files with 47 additions and 45 deletions

View file

@ -16,7 +16,7 @@ schema_type: AnalysisNewsArticle
---
# Choosing the Right Messenger
!["Choosing The Right Messenger" cover image](../assets/images/choosing-the-right-messenger/cover.png)
!["Choosing The Right Messenger" cover image](../assets/images/choosing-the-right-messenger/cover.webp)
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>

View file

@ -15,7 +15,7 @@ schema_type: NewsArticle
---
# Delisting Startpage From Privacy Guides
!["Delisting Startpage" cover image](../assets/images/delisting-startpage/cover.png)
!["Delisting Startpage" cover image](../assets/images/delisting-startpage/cover.webp)
<small aria-hidden="true">Illustration: Privacy Guides | Photo: Unsplash</small>

View file

@ -15,7 +15,7 @@ schema_type: NewsArticle
---
# Delisting Wire From Privacy Guides
!["Delisting Wire" cover image](../assets/images/delisting-wire/cover.png)
!["Delisting Wire" cover image](../assets/images/delisting-wire/cover.avif)
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>

View file

@ -15,7 +15,7 @@ schema_type: AnalysisNewsArticle
---
# Firefox Privacy: 2021 Update
![Firefox Privacy cover](../assets/images/firefox-privacy/cover.png)
![Firefox Privacy cover](../assets/images/firefox-privacy/cover.webp)
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>

View file

@ -15,7 +15,7 @@ schema_type: AnalysisNewsArticle
---
# Firefox Privacy: Tips and Tricks for Better Browsing
!["Firefox Privacy" cover image](../assets/images/firefox-privacy/cover.png)
!["Firefox Privacy" cover image](../assets/images/firefox-privacy/cover.webp)
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>

View file

@ -146,7 +146,7 @@ Be very careful if you decide to use mobile phone connectivity, however. The dat
<div class="admonition tip" markdown>
<p class="admonition-title">Delete your traces afterward</p>
Depending on your situation, you might want to delete the traces of this installation after. See a To-Do list for this on [Step 9](#step-9-delete-the-installation-traces).
Depending on your situation, you might want to delete the traces of this installation after. See [a to-do list](#final-notes) for this at the end of this article.
</div>
@ -164,7 +164,7 @@ If you encounter any issues during the installation or running processes, you ca
Visit this website and select your installation computer's operating system: [https://tails.net/install/](https://tails.net/install/)
![Screenshot of a browser window showing Tails' installation page.](../assets/images/installing-and-using-tails/tails-installation-mac-1.png)
![Screenshot of a browser window showing Tails' installation page.](../assets/images/installing-and-using-tails/tails-installation-mac-1.webp)
Scroll down to the "**Download Tails**" section and click on the green download button. Make sure to save the installation file in a folder where you can find it back easily and not forget to **delete it afterwards**.
@ -182,7 +182,7 @@ The download link is not shared directly here because you should always make sur
</div>
![Screenshot of a browser window showing Tails' download step.](../assets/images/installing-and-using-tails/tails-installation-mac-2.png)
![Screenshot of a browser window showing Tails' download step.](../assets/images/installing-and-using-tails/tails-installation-mac-2.webp)
### Step 2: Verify the file you just downloaded
@ -195,11 +195,11 @@ This step is important to ensure the file you just downloaded has not been tampe
</div>
![Screenshot of a browser window showing Tails' verification step.](../assets/images/installing-and-using-tails/tails-installation-mac-3.png)
![Screenshot of a browser window showing Tails' verification step.](../assets/images/installing-and-using-tails/tails-installation-mac-3.webp)
Once the verification is completed (this might take a few minutes), you should see a green checkmark with "**Verification successful!**" followed by the file name. If you do not see this, delete the file and repeat [Step 1](#step-1-download-tails) and [Step 2](#step-2-verify-the-file-you-just-downloaded).
![Screenshot of a browser window showing Tails' successful verification with file name.](../assets/images/installing-and-using-tails/tails-installation-mac-4.png)
![Screenshot of a browser window showing Tails' successful verification with file name.](../assets/images/installing-and-using-tails/tails-installation-mac-4.webp)
### Step 3: Download and install balenaEtcher
@ -216,11 +216,11 @@ You can download *balenaEtcher* from this link: [https://tails.net/etcher/balena
Open the folder where you downloaded the *balenaEtcher* installation file (keep it open to delete this file after the installation is completed), and double-click on the "**balenaEtcher.dmg**" file. Drag the "**balenaEtcher.app**" icon over the "**Applications**" folder icon when prompted from the window below:
![Screenshot of a macOS application installation window for balenaEtcher.](../assets/images/installing-and-using-tails/tails-installation-mac-5.png)
![Screenshot of a macOS application installation window for balenaEtcher.](../assets/images/installing-and-using-tails/tails-installation-mac-5.webp)
Once the file is copied to you "**Applications**" folder, go on your computer's desktop and right-click on the "**balenaEtcher**" icon. Select '**Eject "balenaEtcher"**'
![Screenshot of a desktop showing the balenaEtcher installation icon and a macOS menu with the option to Eject balenaEtcher.](../assets/images/installing-and-using-tails/tails-installation-mac-6.png)
![Screenshot of a desktop showing the balenaEtcher installation icon and a macOS menu with the option to Eject balenaEtcher.](../assets/images/installing-and-using-tails/tails-installation-mac-6.webp)
### Step 4: Install Tails on your USB stick using balenaEtcher
@ -228,23 +228,23 @@ Once the file is copied to you "**Applications**" folder, go on your computer's
Depending on your macOS version, your Mac might open a popup window saying '**Verifying "balenaEtcher.app"...**'. This is normal, let it complete its verification. Next, you will likely see another popup window with '**"balenaEtcher.app” is an app downloaded from the Internet. Are you sure you want to open it?**'. Click "**Open**".
![Screenshot of a macOS popup with a verifying loading bar.](../assets/images/installing-and-using-tails/tails-installation-mac-7.png)
![Screenshot of a macOS popup with a verifying loading bar.](../assets/images/installing-and-using-tails/tails-installation-mac-7.webp)
![Screenshot of a macOS popup with a warning message with the options to Cancel or Open.](../assets/images/installing-and-using-tails/tails-installation-mac-8.png)
4.2. Open *balenaEtcher* and click on the settings gear button on the upper-right. Disable the option "**Anonymously report errors and usage statistics to balena.io**", then click "**OK**".
![Screenshot of a balenaEtcher window showing a gear icon on the upper-right, and a disabled option to share anonymous error reports.](../assets/images/installing-and-using-tails/tails-installation-mac-9.png)
![Screenshot of a balenaEtcher window showing a gear icon on the upper-right, and a disabled option to share anonymous error reports.](../assets/images/installing-and-using-tails/tails-installation-mac-9.webp)
4.3. Eject and unplug any other external USB stick(s) or external USB drive(s) that might be plugged into your computer if possible, and plug in the USB stick you wish to erase and install Tails on.
4.4. Once it is plugged in, return to *balenaEtcher* and click on the "**Flash from file**" blue button on the left. You will be prompted to select a file. Select the Tails "**.img**" file you have downloaded and verified earlier.
![Screenshot of a balenaEtcher window showing 3 buttons. The button on the left is blue and labeled Flash from file.](../assets/images/installing-and-using-tails/tails-installation-mac-10.png)
![Screenshot of a balenaEtcher window showing 3 buttons. The button on the left is blue and labeled Flash from file.](../assets/images/installing-and-using-tails/tails-installation-mac-10.webp)
4.5. Click on the "**Select target**" blue button in the middle, and select your USB stick.
![Screenshot of a balenaEtcher window showing 3 buttons. The button in the middle is blue and labeled "Select target".](../assets/images/installing-and-using-tails/tails-installation-mac-11.png)
![Screenshot of a balenaEtcher window showing 3 buttons. The button in the middle is blue and labeled "Select target".](../assets/images/installing-and-using-tails/tails-installation-mac-11.webp)
<div class="admonition danger" markdown>
<p class="admonition-title">Caution! Select the correct USB stick!</p>
@ -253,19 +253,19 @@ Make sure you are not selecting a USB stick or drive different from the one you
</div>
![Screenshot of a balenaEtcher window inside a menu with one or more checkboxes. One checkbox is selected next to a USB stick name and description.](../assets/images/installing-and-using-tails/tails-installation-mac-12.png)
![Screenshot of a balenaEtcher window inside a menu with one or more checkboxes. One checkbox is selected next to a USB stick name and description.](../assets/images/installing-and-using-tails/tails-installation-mac-12.webp)
4.6. Once you have verified that all the information is correct, click on the "**Flash!**" blue button on the right.
![Screenshot of a balenaEtcher window showing 3 buttons. The button on the right is blue and labeled "Flash!".](../assets/images/installing-and-using-tails/tails-installation-mac-13.png)
![Screenshot of a balenaEtcher window showing 3 buttons. The button on the right is blue and labeled "Flash!".](../assets/images/installing-and-using-tails/tails-installation-mac-13.webp)
You will see a *balenaEtcher* popup window saying: "**balenaEtcher needs privileged access in order to flash disks. Type your password to allow this.**". Type your computer's password and click "**Ok**".
![Screenshot of a macOS popup warning with a password field.](../assets/images/installing-and-using-tails/tails-installation-mac-14.png)
![Screenshot of a macOS popup warning with a password field.](../assets/images/installing-and-using-tails/tails-installation-mac-14.webp)
Depending on the version of macOS you use, you might see another popup window saying '**"balenaEtcher.app" would like to access files on a removable volume.**'. Click "**OK**" and wait for the installation to start.
![Screenshot of a macOS popup warning with the options to "Don't Allow" or "OK".](../assets/images/installing-and-using-tails/tails-installation-mac-15.png)
![Screenshot of a macOS popup warning with the options to "Don't Allow" or "OK".](../assets/images/installing-and-using-tails/tails-installation-mac-15.webp)
While Tails is getting installed, you should see a window that looks like this with "**Flashing...**". The operation might take a few minutes. Do not interrupt this process!
@ -423,7 +423,7 @@ If you decide to setup Persistent Storage:
2. After setting up Persistent Storage, you will see a window like this with additional options:
![Screenshot of a window within Tails titled "Persistent Storage" and showing various options.](../assets/images/installing-and-using-tails/tails-usage-persistentstorage.png)
![Screenshot of a window within Tails titled "Persistent Storage" and showing various options.](../assets/images/installing-and-using-tails/tails-usage-persistentstorage.webp)
### Connecting to the internet
@ -436,25 +436,25 @@ If using Tor is dangerous for you, read more about the other options before deci
</div>
![Screenshot of a window within Tails titled "Tor Connection" and showing various options.](../assets/images/installing-and-using-tails/tails-usage-torconnection.png)
![Screenshot of a window within Tails titled "Tor Connection" and showing various options.](../assets/images/installing-and-using-tails/tails-usage-torconnection.webp)
If the connection is successful, you should see this window and you will be ready to browse the internet anonymously:
![Screenshot of a window within Tails titled "Tor Connection" indicating the connection to Tor was successful. There is a button at the bottom labeled "Start Tor Browser".](../assets/images/installing-and-using-tails/tails-usage-torconnection-successful.png)
![Screenshot of a window within Tails titled "Tor Connection" indicating the connection to Tor was successful. There is a button at the bottom labeled "Start Tor Browser".](../assets/images/installing-and-using-tails/tails-usage-torconnection-successful.webp)
![Screenshot within Tails showing the Tor Browser application displaying the onion version of the Privacy Guides website.](../assets/images/installing-and-using-tails/tails-usage-privacyguides-onion.png)
![Screenshot within Tails showing the Tor Browser application displaying the onion version of the Privacy Guides website.](../assets/images/installing-and-using-tails/tails-usage-privacyguides-onion.webp)
### Sharing files with others
There is a lot of great applications already installed on Tails to help you! You will find them listed in the "**Applications**" drop-menu on the upper-left top bar. One of these applications is [OnionShare](https://onionshare.org/), which you can use to share files with others anonymously.
![Screenshot within Tails showing the application OnionShare open.](../assets/images/installing-and-using-tails/tails-usage-onionshare.png)
![Screenshot within Tails showing the application OnionShare open.](../assets/images/installing-and-using-tails/tails-usage-onionshare.webp)
### Storing passwords
If you are using the Persistent Storage with Tails, and need to store passwords, you can use the pre-installed [KeePassXC](https://keepassxc.org/) application. This application will store your passwords encrypted, locally-only, and protected by a main password (ideally, a **passphrase**). Be careful however if you store important passwords in there. Remember that if a bug occurs or if you forget your Persistent Storage's password, you could lose access to all of it.
![Screenshot within Tails showing the application KeePassXC open.](../assets/images/installing-and-using-tails/tails-usage-keepassxc.png)
![Screenshot within Tails showing the application KeePassXC open.](../assets/images/installing-and-using-tails/tails-usage-keepassxc.webp)
### Shutting down Tails

View file

@ -27,7 +27,7 @@ This guide uses the [Shortcuts](https://support.apple.com/guide/shortcuts-mac/in
Shortcuts is quite intuitive to work with, so if you don't like the behavior demoed here then experiment with your own solution. For example, you could set the shortcut to take a clipboard input instead. The sky's the limit.
![ExifTool Quick Action](../assets/images/metadata-removal/preview-macos.png)
![ExifTool Quick Action](../assets/images/metadata-removal/preview-macos.webp)
### Prerequisites
@ -74,7 +74,7 @@ Shortcuts is quite intuitive to work with, so if you don't like the behavior dem
done
```
![macOS metadata removal shortcut](../assets/images/metadata-removal/shortcut-macos.png)
![macOS metadata removal shortcut](../assets/images/metadata-removal/shortcut-macos.webp)
!!! tip "Worth Mentioning"
The open-source [ImageOptim](https://imageoptim.com/mac) app integrates into Finder's *Services* context menu by default. While it is primarily an image optimization app, it also removes metadata.
@ -95,7 +95,7 @@ Shortcuts is quite intuitive to work with, so if you don't like the behavior dem
The lack of *good* metadata removal apps on the App Store is what makes this solution worthwhile.
![Don't preserve metadata shortcut](../assets/images/metadata-removal/preview-ios.png)
![Don't preserve metadata shortcut](../assets/images/metadata-removal/preview-ios.webp)
### Prerequisites
@ -123,7 +123,7 @@ The lack of *good* metadata removal apps on the App Store is what makes this sol
10. Make sure that you uncheck **preserve metadata**
![iOS/iPadOS metadata removal shortcut](../assets/images/metadata-removal/shortcut-ios.png)
![iOS/iPadOS metadata removal shortcut](../assets/images/metadata-removal/shortcut-ios.webp)
### Enabling & using the Shortcut

View file

@ -14,7 +14,7 @@ schema_type: AnalysisNewsArticle
# "Privacy-Preserving" Attribution: Mozilla Disappoints Us Yet Again
![](../assets/images/mozilla-disappoints-us-yet-again-2/cover.jpeg)
![](../assets/images/mozilla-disappoints-us-yet-again-2/cover.webp)
<small aria-hidden="true">Image: Unsplash</small>

View file

@ -55,7 +55,7 @@ Of course installing Onion Browser is as easy as any other app on iOS, Apple ID
When you open Onion Browser for the first time you're given the option to connect to Tor via [Orbot](https://www.privacyguides.org/en/tor/#orbot), or with a built-in Tor network proxy. Using the built-in option is the easiest, it connects very quickly and doesn't require a separate app. It also allows you to [use Tor alongside another VPN app](https://www.privacyguides.org/en/advanced/tor-overview/#safely-connecting-to-tor), which may be helpful in certain circumstances. The Orbot app acts as its own "VPN connection" in iOS preventing the possibility of combining it with another VPN, but it is more flexible and it extends Tor network protections to every app on your device.
<figure markdown="span">
![A screenshot asking whether you want to use Orbot or built-in Tor to connect, noting the built-in Tor has security problems.](../assets/images/onion-browser-review/757A93D0-CCCB-4743-8AF2-17B001EC774A_1_102_o.jpeg){ width="200" }
![A screenshot asking whether you want to use Orbot or built-in Tor to connect, noting the built-in Tor has security problems.](../assets/images/onion-browser-review/757A93D0-CCCB-4743-8AF2-17B001EC774A_1_102_o.webp){ width="200" }
<figcaption>You're presented with a choice at startup</figcaption>
</figure>
@ -64,7 +64,7 @@ Using the dedicated Orbot app also provides more robust protections against IP a
I confirmed the built-in option works perfectly fine, in fact I occasionally had trouble connecting Orbot to Onion Browser, where it would re-prompt me to start Orbot even though it was already running until I restarted the Onion Browser app. The built-in proxy generally worked seamlessly. However, for most people using Onion Browser alongside Orbot probably still makes more sense. It's the official recommendation from Tor Project and the browser's developer themselves, so that's what I'll be sticking with for the rest of this review.
<figure markdown="span">
![A screenshot of check.torproject.org that says congratulations, this browser is configured to use Tor. It shows the IP address of the exit node, then states: however, it does not appear to be Tor Browser.](../assets/images/onion-browser-review/2774018C-C4DD-419C-9D77-9BE8E5A51A19_1_102_o.jpeg){ width="200" }
![A screenshot of check.torproject.org that says congratulations, this browser is configured to use Tor. It shows the IP address of the exit node, then states: however, it does not appear to be Tor Browser.](../assets/images/onion-browser-review/2774018C-C4DD-419C-9D77-9BE8E5A51A19_1_102_o.webp){ width="200" }
<figcaption>You can check your connection at check.torproject.org, but you'll be warned you're not using Tor Browser</figcaption>
</figure>
@ -81,8 +81,8 @@ I ran into trouble with DuckDuckGo not being able to display results, however. S
<figure markdown="span">
<div markdown="span" style="display: flex; gap: 1em; justify-content: center;">
![A screenshot of DuckDuckGo saying sorry, we ran into an issue displaying these results, and asking to try again](../assets/images/onion-browser-review/8A3E82E7-128E-4B3B-B8BB-276063226D41_1_102_o.jpeg){ width="200" }
![A screenshot of DuckDuckGo results loading normally when using the HTML version of the search engine](../assets/images/onion-browser-review/C3252F74-C6C1-4616-B3CD-17EA1183BE0C_1_102_o.jpeg){ width="200" }
![A screenshot of DuckDuckGo saying sorry, we ran into an issue displaying these results, and asking to try again](../assets/images/onion-browser-review/8A3E82E7-128E-4B3B-B8BB-276063226D41_1_102_o.webp){ width="200" }
![A screenshot of DuckDuckGo results loading normally when using the HTML version of the search engine](../assets/images/onion-browser-review/C3252F74-C6C1-4616-B3CD-17EA1183BE0C_1_102_o.webp){ width="200" }
</div>
<figcaption>DuckDuckGo wouldn't work until I used their HTML-only version</figcaption>
</figure>
@ -92,7 +92,7 @@ I ran into trouble with DuckDuckGo not being able to display results, however. S
There are three configurable security levels in Onion Browser: Bronze, Silver (the default), and Gold. These levels roughly correlate to the *Safe, Safer, Safest* [security levels](https://tb-manual.torproject.org/security-settings/) in regular Tor Browser.
<figure markdown="span">
![A screenshot showing the security level for this site settings and three options, Gold, Silver, and Bronze](../assets/images/onion-browser-review/51B33FA1-D9B4-4EF4-82C6-259568C845EC_1_102_o.jpeg){ width="200" }
![A screenshot showing the security level for this site settings and three options, Gold, Silver, and Bronze](../assets/images/onion-browser-review/51B33FA1-D9B4-4EF4-82C6-259568C845EC_1_102_o.webp){ width="200" }
<figcaption>You can toggle security levels on a per-site basis with two taps</figcaption>
</figure>
@ -159,7 +159,7 @@ There is one more way to improve Onion Browser security, but we have to look out
Because Onion Browser is built on Apple's WebKit, these security improvements extend to Onion Browser as well. Most notably, external web fonts *are* blocked in Onion Browser with Lockdown Mode enabled, just as they are in Safari. These are disabled in desktop Tor Browser's Safest mode due to both privacy concerns, and security concerns related to the font rendering engine on your device, so having the option to disable them here on iOS is very useful for those looking to maximize their security.
<figure markdown="span">
![A screenshot of the Privacy Guides homepage with external fonts disabled](../assets/images/onion-browser-review/87651D0E-EFE0-4C0F-98E7-9898EBA74334_1_102_o.jpeg){ width="200" }
![A screenshot of the Privacy Guides homepage with external fonts disabled](../assets/images/onion-browser-review/87651D0E-EFE0-4C0F-98E7-9898EBA74334_1_102_o.webp){ width="200" }
<figcaption>External fonts and JavaScript disabled with Gold + Lockdown Mode</figcaption>
</figure>

View file

@ -58,17 +58,17 @@ Had Proton Wallet added support for Monero or a similarly private cryptocurrency
Proton Wallet *is* in beta, like many of Proton's products are when newly released, and available via the web, an Android app, and an iOS [TestFlight](https://testflight.apple.com/join/6OIcXtQN).
![Proton wallet registration page](../assets/images/proton-wallet-review/1.png)
![Proton wallet registration page](../assets/images/proton-wallet-review/1.webp)
Creating your wallet is a simple process, after registering you'll be asked to choose a name for your wallet and a default currency. You can also optionally set a passphrase to secure your account. Note that this isn't merely a passphrase securing your account on Proton's servers beyond your usual account credentials, it's a [BIP39 extension word](https://en.bitcoin.it/wiki/Seed_phrase#Two-factor_seed_phrases), meaning that if you lose it your wallet will be completely unrecoverable, **even if** you back up your 12 word seed phrase.
![Proton wallet setup page](../assets/images/proton-wallet-review/2.png)
![Proton wallet setup page](../assets/images/proton-wallet-review/2.webp)
The default currency here isn't the currency being *stored* in Proton Wallet. It is just used to show you the current conversion rate between Bitcoin and your local currency.
Once you're in, Proton Wallet is fairly straightforward. In fact, there's not much to explore beyond finding your wallet address and buying Bitcoin. Clicking the **Recieve** button brings up a panel which shows your address and allows you to generate a new one on the fly. When you generate a new address, all of your previous addresses will continue to work, but are no longer displayed anywhere.
![Proton wallet address QR code and text displayed in sidebar](../assets/images/proton-wallet-review/3.png)
![Proton wallet address QR code and text displayed in sidebar](../assets/images/proton-wallet-review/3.webp)
Buying Bitcoin is simple as well. Proton is working with two providers, Banxa and Ramp, and if you're in the United States like I am both are available, so you can choose the one with the best exchange rate to go with. Before you purchase, Proton Wallet asks you for your current country, so that will determine which providers it's possible to use.
@ -78,7 +78,7 @@ There's no private payment methods though, you're stuck with credit card, Google
The flagship feature of Proton Wallet is something they call **Bitcoin via Email**, which integrates with Proton Mail to allow you to send Bitcoin to any email address. Opening your wallet settings lets you enable Proton's *Receive Bitcoin via Email* feature, which allows other Proton Wallet users to send Bitcoin to your account with just your Proton Mail address.
![Proton wallet receive Bitcoin via email settings page](../assets/images/proton-wallet-review/4.png)
![Proton wallet receive Bitcoin via email settings page](../assets/images/proton-wallet-review/4.webp)
If you have multiple addresses on your Proton account, such as aliases or addresses on a custom domain, only one address can be linked to your wallet. This can be a bit annoying for people who have given out different Proton addresses to others in the past, like if you gave out your @protonmail.com address to some people, before later migrating to @proton.me when that domain became available.

View file

@ -30,7 +30,7 @@ Isolated Web Apps (IWAs) build on the work done on PWAs and [Web Packaging](http
Google [distinguishes](https://chromeos.dev/en/web/isolated-web-apps) between the drive by web, PWAs, and IWAs. The drive by web requires more conservative access to the system as the most accessible and is therefore least trusted. PWAs are a bit more trusted and can integrate a bit more deeply into the system as a result. IWAs are the most trusted and, as such, can have deeper access into the system and more powerful capabilities.
<figure markdown>
![Diagram showing the drive by web, a PWA, and then a dotted line separating them from IWAs](../assets/images/pwa-vs-iwa/iwa-diagram.png)
![Diagram showing the drive by web, a PWA, and then a dotted line separating them from IWAs](../assets/images/pwa-vs-iwa/iwa-diagram.webp)
<figcaption>source: <a href="https://chromeos.dev/en/web/isolated-web-apps">chromeos.dev</a></figcaption>
</figure>

View file

@ -14,7 +14,7 @@ schema_type: NewsArticle
---
# Relisting Startpage.com
!["Relisting Startpage" cover image](../assets/images/relisting-startpage/cover.png)
!["Relisting Startpage" cover image](../assets/images/relisting-startpage/cover.webp)
<small aria-hidden="true">Illustration: Privacy Guides</small>

View file

@ -17,7 +17,7 @@ schema_type: AnalysisNewsArticle
---
# The Trouble With VPN and Privacy Review Sites
!["Unbiased Reviews" cover image](../assets/images/the-trouble-with-vpn-and-privacy-review-sites/cover.png)
!["Unbiased Reviews" cover image](../assets/images/the-trouble-with-vpn-and-privacy-review-sites/cover.webp)
<small aria-hidden="true">Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash</small>
@ -65,7 +65,7 @@ If these sites truly wanted to be helpful, they would consolidate all the releva
But that isnt to say they should just throw all the providers in a big table and call it a day. Almost worse than the ranking scheme above is when sites provide out of context lists of providers, often just with pricing and a link. Sometimes they will link you to a full review (more on that in a bit), but for the most part these sites just expect you to follow their recommendations blindly.
![Image of a review site with mostly affiliated recommendations](../assets/images/the-trouble-with-vpn-and-privacy-review-sites/image1.png "Affiliate links and discounts galore! This is a different site than before, but look at the familiar faces were seeing…")
![Image of a review site with mostly affiliated recommendations](../assets/images/the-trouble-with-vpn-and-privacy-review-sites/image1.webp "Affiliate links and discounts galore! This is a different site than before, but look at the familiar faces were seeing…")
These read like advertisements, because they usually are. Once again we see the usual suspects — NordVPN, ExpressVPN… — paraded as the gold standard in the VPN space, not out of any inherent value, but based on the value of their affiliate programs. To further this point, lets take a look at how much each of the five providers above will pay you for a referral (on a one-month plan).

View file

@ -17,6 +17,8 @@ schema_type: OpinionNewsArticle
---
# Threads Is the Perfect Twitter Alternative, Just Not for You
!["Threads Cover Image" cover image](../assets/images/threads-launch-twitter/cover.webp)
Silicon Valley could well be built on the principle of scrapping principles. Now Elon Musk, perhaps the ultimate tech bro, is shredding another well-regarded convention with an *original business strategy*.<!-- more -->
Generally, in business, it is sensible to provide your customers with what they want. With Twitter, the meme-makers' favourite billionaire is doing the opposite. The cyber-trucker is trying his best to [cull](https://jottings.lol/2022/12/bravo-elon) his customer base. Instead of finding gaps in the market, Musk is helping to create them. Ever the [copycat](https://blog.privacyguides.org/2022/04/04/move-fast-and-break-things/), Mark Zuckerberg wants to give these innovative tactics a try. Enter the-company formerly-known-as-Facebook's rival to the birdsite: Threads.