mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-21 21:55:26 -05:00
Remove nerd term "use case", fix typos (#2029)
This commit is contained in:
parent
74928bb4c7
commit
d03f91b1c0
@ -2,13 +2,13 @@
|
|||||||
title: Supporting Us
|
title: Supporting Us
|
||||||
---
|
---
|
||||||
<!-- markdownlint-disable MD036 -->
|
<!-- markdownlint-disable MD036 -->
|
||||||
It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) and [work](https://github.com/privacyguides/privacyguides.org/pulse/monthly) to keep Privacy Guides up to date and spreading the word about privacy and mass surveillance. If you like what we do, the best way to help out is by getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
|
It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) and [work](https://github.com/privacyguides/privacyguides.org/pulse/monthly) to keep Privacy Guides up to date and spreading the word about privacy and mass surveillance. If you like what we do, consider getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
|
||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ .md-button .md-button--primary }
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ .md-button .md-button--primary }
|
||||||
|
|
||||||
Donations made directly to us Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
If you already make use of GitHub sponsorships, you can also sponsor our organization there.
|
If you already make use of GitHub sponsorships, you can also sponsor our organization there.
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ Privacy Guides is a community project operated by a number of active volunteer c
|
|||||||
The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website:
|
The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website:
|
||||||
|
|
||||||
- No personal information is collected
|
- No personal information is collected
|
||||||
- No information such as cookies is stored in the browser
|
- No information such as cookies are stored in the browser
|
||||||
- No information is shared with, sent to or sold to third-parties
|
- No information is shared with, sent to or sold to third-parties
|
||||||
- No information is shared with advertising companies
|
- No information is shared with advertising companies
|
||||||
- No information is mined and harvested for personal and behavioral trends
|
- No information is mined and harvested for personal and behavioral trends
|
||||||
|
@ -59,7 +59,7 @@ A VPN may still be useful to you in a variety of scenarios, such as:
|
|||||||
1. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
|
1. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
|
||||||
1. Hiding your IP from third-party websites and services, preventing IP based tracking.
|
1. Hiding your IP from third-party websites and services, preventing IP based tracking.
|
||||||
|
|
||||||
For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're *trusting* the provider. In pretty much any other scenario you should be using a secure**-by-design** tool such as Tor.
|
For situations like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're *trusting* the provider. In pretty much any other scenario you should be using a secure**-by-design** tool such as Tor.
|
||||||
|
|
||||||
## Sources and Further Reading
|
## Sources and Further Reading
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ hide:
|
|||||||
|
|
||||||
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
|
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
|
||||||
|
|
||||||
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes you human.
|
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
||||||
</div>
|
</div>
|
||||||
@ -22,7 +22,7 @@ You shouldn't confuse privacy with secrecy. We know what happens in the bathroom
|
|||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
||||||
## What should I do?
|
## What should I do?
|
||||||
|
|
||||||
##### First, you need to make a plan.
|
##### First, you need to make a plan
|
||||||
|
|
||||||
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
|
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@ Each Qubes application has a [colored border](https://www.qubes-os.org/screensho
|
|||||||
|
|
||||||
## Why Should I use Qubes?
|
## Why Should I use Qubes?
|
||||||
|
|
||||||
Qubes OS is useful if your [threat model](../basics/threat-modeling.md) requires strong compartmentalization and security, such as if you think you'll be opening untrusted files from untrusted sources. A typical use-case for Qubes OS is for opening documents from an unknown source.
|
Qubes OS is useful if your [threat model](../basics/threat-modeling.md) requires strong compartmentalization and security, such as if you think you'll be opening untrusted files from untrusted sources. A typical reason for using Qubes OS is to open documents from unknown sources.
|
||||||
|
|
||||||
Qubes OS utilizes [Dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM (i.e., an "AdminVM") for controlling other guest VMs or Qubes on the host OS. Other VMs display individual application windows within Dom0's desktop environment. It allows you to color code windows based on trust levels and run apps that can interact with each other with very granular control.
|
Qubes OS utilizes [Dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM (i.e., an "AdminVM") for controlling other guest VMs or Qubes on the host OS. Other VMs display individual application windows within Dom0's desktop environment. It allows you to color code windows based on trust levels and run apps that can interact with each other with very granular control.
|
||||||
|
|
||||||
|
@ -129,7 +129,7 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
In general, we define office suites as applications which could reasonably act as a replacement for Microsoft Word for most use-cases.
|
In general, we define office suites as applications which could reasonably act as a replacement for Microsoft Word for most needs.
|
||||||
|
|
||||||
- Must be cross-platform.
|
- Must be cross-platform.
|
||||||
- Must be open-source.
|
- Must be open-source.
|
||||||
|
@ -102,7 +102,7 @@ Briar supports perfect forward secrecy by using the Bramble [Handshake](https://
|
|||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
These messengers do not have Perfect [Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS), and while they fulfill certain use-cases that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
|
These messengers do not have Perfect [Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS), and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
|
||||||
|
|
||||||
### Element
|
### Element
|
||||||
|
|
||||||
|
@ -5,9 +5,9 @@ hide:
|
|||||||
- toc
|
- toc
|
||||||
---
|
---
|
||||||
|
|
||||||
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your use case.
|
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.
|
||||||
|
|
||||||
If you want assistance figuring out the best privacy tools and alternative programs for your workload/use-case, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community!
|
If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community!
|
||||||
|
|
||||||
For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.
|
For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user