Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
diff --git a/_includes/head.html b/_includes/head.html index 82e8e63c..4576d7c7 100644 --- a/_includes/head.html +++ b/_includes/head.html @@ -34,7 +34,7 @@ - + - + diff --git a/_includes/legacy/card.html b/_includes/legacy/card.html index 9a294a60..40e15352 100644 --- a/_includes/legacy/card.html +++ b/_includes/legacy/card.html @@ -17,7 +17,7 @@ {% assign text = label_data[1] %} {% assign tooltip = label_data[2] | default: "" %} {% assign help_icon = '' %} - {{text}} {{ help_icon + {{text}} {{ help_icon }} {% else %} >{{text}} @@ -56,11 +56,11 @@ {% endif %} {% if include.tor %} - + {% endif %} {% if include.git %} - + {% endif %} {% if include.extra_button %} diff --git a/_includes/legacy/cardv2.html b/_includes/legacy/cardv2.html index c7e593f6..f5d03ef0 100644 --- a/_includes/legacy/cardv2.html +++ b/_includes/legacy/cardv2.html @@ -2,7 +2,7 @@The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
@@ -9,11 +9,11 @@ title="Five Eyes" body='We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
-Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
@@ -40,14 +40,14 @@Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
@@ -90,7 +90,7 @@Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.
@@ -157,14 +157,14 @@Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
diff --git a/_includes/legacy/sections/metadata-removal-tools.html b/_includes/legacy/sections/metadata-removal-tools.html index 1e1448b1..2d829a20 100644 --- a/_includes/legacy/sections/metadata-removal-tools.html +++ b/_includes/legacy/sections/metadata-removal-tools.html @@ -1,8 +1,8 @@ --Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
@@ -32,7 +32,7 @@- 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (Daniel J. Solove - San Diego Law Review)
-Quotes
+Quotes
Ultimately, saying that you don't care about privacy because you have nothing to hide is no different from saying you don't care about freedom of speech because you have nothing to say. Or that you don't care about freedom of the press because you don't like to read. Or that you don't care about freedom of religion because you don't believe in God. Or that you don't care about the freedom to peacably assemble because you're a lazy, antisocial agoraphobe.
diff --git a/_includes/legacy/sections/resources.html b/_includes/legacy/sections/resources.html index 8cfb6705..2c1e31cd 100644 --- a/_includes/legacy/sections/resources.html +++ b/_includes/legacy/sections/resources.html @@ -1,4 +1,4 @@ -Privacy Tools
+Privacy Tools
Prefer the classic site? View a single-page layout.
diff --git a/_includes/legacy/sections/router-firmware.html b/_includes/legacy/sections/router-firmware.html index c198bc5e..b39b8440 100644 --- a/_includes/legacy/sections/router-firmware.html +++ b/_includes/legacy/sections/router-firmware.html @@ -1,4 +1,4 @@ -Open Source Router Firmware
+Open Source Router Firmware
{% include legacy/cardv2.html title="OpenWrt" diff --git a/_includes/legacy/sections/search-engines.html b/_includes/legacy/sections/search-engines.html index 325c1366..e50612dc 100644 --- a/_includes/legacy/sections/search-engines.html +++ b/_includes/legacy/sections/search-engines.html @@ -1,4 +1,4 @@ -Privacy Respecting Search Engines
+Privacy Respecting Search Engines
If you are currently using search engines like Google, Bing, or Yahoo, you should pick an alternative here. diff --git a/_includes/legacy/sections/self-contained-networks.html b/_includes/legacy/sections/self-contained-networks.html index 3795d6eb..037412f8 100644 --- a/_includes/legacy/sections/self-contained-networks.html +++ b/_includes/legacy/sections/self-contained-networks.html @@ -1,4 +1,4 @@ -Self-contained Networks
+Self-contained Networks
If you are currently browsing clearnet and want to access the dark web, this section is for you. diff --git a/_includes/legacy/sections/selfhosted-cloud.html b/_includes/legacy/sections/selfhosted-cloud.html index 20f1ff51..47da8f4b 100644 --- a/_includes/legacy/sections/selfhosted-cloud.html +++ b/_includes/legacy/sections/selfhosted-cloud.html @@ -1,4 +1,4 @@ -Self-Hosted Cloud Server Software
+Self-Hosted Cloud Server Software
If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should think about hosting it on your own. diff --git a/_includes/legacy/sections/social-networks.html b/_includes/legacy/sections/social-networks.html index c012259c..a2dbb3fb 100644 --- a/_includes/legacy/sections/social-networks.html +++ b/_includes/legacy/sections/social-networks.html @@ -1,4 +1,4 @@ -Decentralized Social Networks
+Decentralized Social Networks
If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here. diff --git a/_includes/legacy/sections/social-news-aggregator.html b/_includes/legacy/sections/social-news-aggregator.html index 2558b4bd..f77207e8 100644 --- a/_includes/legacy/sections/social-news-aggregator.html +++ b/_includes/legacy/sections/social-news-aggregator.html @@ -1,4 +1,4 @@ -Social News Aggregators
+Social News Aggregators
If you are currently using a online bulletin board like Reddit, you should pick an alternative here. diff --git a/_includes/legacy/sections/teamchat.html b/_includes/legacy/sections/teamchat.html index eb348864..f27cdf2d 100644 --- a/_includes/legacy/sections/teamchat.html +++ b/_includes/legacy/sections/teamchat.html @@ -1,8 +1,8 @@ -+
+Team Chat Platforms -
If your project or organization currently uses a platform like Discord or Slack you should pick an alternative here. diff --git a/_includes/legacy/sections/tor-operating-systems.html b/_includes/legacy/sections/tor-operating-systems.html index b7249f37..23c6ad7f 100644 --- a/_includes/legacy/sections/tor-operating-systems.html +++ b/_includes/legacy/sections/tor-operating-systems.html @@ -1,4 +1,4 @@ -Tor-Focused Distributions
+Tor-Focused Distributions
These Linux distributions are developed with the purpose of directing all network traffic through Tor. diff --git a/_includes/legacy/sections/video-frontends.html b/_includes/legacy/sections/video-frontends.html index 7609534f..19d5fa7d 100644 --- a/_includes/legacy/sections/video-frontends.html +++ b/_includes/legacy/sections/video-frontends.html @@ -1,4 +1,4 @@ -Frontends and Proxies
+Frontends and Proxies
If you are currently using a platform like YouTube, you can keep watching videos without sharing your IP. diff --git a/_includes/legacy/sections/voice-video-messenger.html b/_includes/legacy/sections/voice-video-messenger.html index 05c292cb..aca609d9 100644 --- a/_includes/legacy/sections/voice-video-messenger.html +++ b/_includes/legacy/sections/voice-video-messenger.html @@ -1,4 +1,4 @@ -Video/Voice Calling
+Video/Voice Calling
If you are currently using a Video/Voice Calling app like Google Hangouts, Skype, Viber or Zoom, you should pick an alternative here. Please note that many of the above instant messengers also support {% include badge.html color="info" text="VoIP" %}. The software listed below are primarily Voice/Video focused. diff --git a/_includes/legacy/sections/vpn.html b/_includes/legacy/sections/vpn.html index e26b1623..27564bfa 100644 --- a/_includes/legacy/sections/vpn.html +++ b/_includes/legacy/sections/vpn.html @@ -1,4 +1,4 @@ -Recommended VPN Services
+Recommended VPN Services
Our recommended providers are outside the US, use encryption, accept Bitcoin, support OpenVPN, and have a no logging policy. Read our full list of criteria for more information. @@ -13,7 +13,7 @@ data-theme-src="/assets/img/legacy_svg/3rd-party/mullvad-dark.svg" height="70" width="200" - class="img-fluid d-block mr-auto ml-auto align-middle" + class="img-fluid d-block me-auto ms-auto align-middle" alt="Mullvad">@@ -53,7 +53,7 @@- +@@ -82,7 +82,7 @@
- +diff --git a/_includes/legacy/sections/warrant-canary.html b/_includes/legacy/sections/warrant-canary.html index 6293ecde..17b8973d 100644 --- a/_includes/legacy/sections/warrant-canary.html +++ b/_includes/legacy/sections/warrant-canary.html @@ -1,4 +1,4 @@ -
What is a warrant canary?
+What is a warrant canary?
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
diff --git a/_includes/legacy/sections/windows10.html b/_includes/legacy/sections/windows10.html index 739ce6aa..032467b3 100644 --- a/_includes/legacy/sections/windows10.html +++ b/_includes/legacy/sections/windows10.html @@ -1,10 +1,10 @@ -Don't use Windows 10 - It's a privacy nightmare
+Don't use Windows 10 - It's a privacy nightmare
Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.- +
- Data syncing is by default enabled. diff --git a/_includes/nav.html b/_includes/nav.html index 4b4f4600..cb0aa41f 100644 --- a/_includes/nav.html +++ b/_includes/nav.html @@ -3,11 +3,11 @@
{% include svg/privacy-guides-logo.svg %}
-