From b2c465093951adb09e6e3e7d971e578ba4941791 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Thu, 11 Nov 2021 06:12:39 +0000 Subject: [PATCH] Fix some broken links (#280) --- _includes/legacy/sections/email-providers.html | 2 +- _includes/legacy/sections/instant-messenger.html | 2 +- _includes/legacy/sections/voice-video-messenger.html | 4 ++-- collections/_pages/providers/dns.md | 2 +- legacy_pages/providers/vpn.html | 6 +++--- 5 files changed, 8 insertions(+), 8 deletions(-) diff --git a/_includes/legacy/sections/email-providers.html b/_includes/legacy/sections/email-providers.html index 1626d0bf..d053c10e 100644 --- a/_includes/legacy/sections/email-providers.html +++ b/_includes/legacy/sections/email-providers.html @@ -1,7 +1,7 @@

Recommended Email Services

diff --git a/_includes/legacy/sections/instant-messenger.html b/_includes/legacy/sections/instant-messenger.html index a4fa8c70..bb938933 100644 --- a/_includes/legacy/sections/instant-messenger.html +++ b/_includes/legacy/sections/instant-messenger.html @@ -55,7 +55,7 @@
  • Being forbidden from connecting third-party clients to the centralized network that might provide for greater customization or better user experience. Often defined in Terms and Conditions of usage.
  • Poor or no documentation for third-party developers.
  • -
  • The ownership, privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
  • +
  • The ownership, privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
  • diff --git a/_includes/legacy/sections/voice-video-messenger.html b/_includes/legacy/sections/voice-video-messenger.html index aca609d9..598237ff 100644 --- a/_includes/legacy/sections/voice-video-messenger.html +++ b/_includes/legacy/sections/voice-video-messenger.html @@ -1,14 +1,14 @@

    Video/Voice Calling

    {% include legacy/cardv2.html title="Linphone" image="/assets/img/legacy_svg/3rd-party/linphone.svg" website="https://www.linphone.org/" - privacy-policy="https://www.linphone.org/terms-and-privacy" + privacy-policy="https://www.linphone.org/privacy-policy" description="Linphone is an open-source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication." github="https://github.com/BelledonneCommunications" windows="https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner" diff --git a/collections/_pages/providers/dns.md b/collections/_pages/providers/dns.md index 58b72ec3..ab6bf04f 100644 --- a/collections/_pages/providers/dns.md +++ b/collections/_pages/providers/dns.md @@ -79,7 +79,7 @@ breadcrumb: "DNS" include legacy/cardv2.html title="DNSCloak" image="/assets/img/legacy_png/3rd-party/dnscloak.png" - description='An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and dnscrypt-proxy options such as caching DNS responses, locally logging DNS queries, and custom block lists. Users can add custom resolvers by DNS stamp.' + description='An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and dnscrypt-proxy options such as caching DNS responses, locally logging DNS queries, and custom block lists. Users can add custom resolvers by DNS stamp.' website="https://github.com/s-s/dnscloak/blob/master/README.md" privacy-policy="https://drive.google.com/file/d/1050No_pU74CAWUS5-BwQWyO2x_aiMzWc/view" ios="https://apps.apple.com/app/id1452162351" diff --git a/legacy_pages/providers/vpn.html b/legacy_pages/providers/vpn.html index 68bdae38..e829a6ea 100644 --- a/legacy_pages/providers/vpn.html +++ b/legacy_pages/providers/vpn.html @@ -153,7 +153,7 @@ breadcrumb: "VPN"

    Best Case:

    Responsible marketing that is both educational and useful to the consumer could include:

    @@ -186,7 +186,7 @@ breadcrumb: "VPN"

    Should I use Tor and a VPN?

    -

    By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides zero additional benefit to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. Read more about Tor bridges and why using a VPN is not necessary.

    +

    By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides zero additional benefit to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. Read more about Tor bridges and why using a VPN is not necessary.

    What if I need anonymity?

    VPNs cannot provide anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data. Use Tor instead.

    What about VPN providers that provides Tor nodes?

    @@ -209,7 +209,7 @@ breadcrumb: "VPN"
  • VPN - a Very Precarious Narrative by Dennis Schubert
  • The self-contained networks recommended by Privacy Guides are able to replace a VPN that allows access to services on local area network
  • Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
  • -
  • Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
  • +
  • Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
  • IVPN Privacy Guides