mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-29 17:36:28 -05:00
Remove legacy /software and /providers URLs (#625)
Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
parent
48a786a702
commit
e8d1e74b39
@ -4,7 +4,7 @@ items:
|
||||
- type: link
|
||||
title: Cloud Storage
|
||||
icon: fad fa-cloud
|
||||
file: _pages/providers/cloud.md
|
||||
file: _evergreen/cloud.md
|
||||
- type: link
|
||||
title: DNS Servers
|
||||
icon: fad fa-map-signs
|
||||
@ -16,7 +16,7 @@ items:
|
||||
- type: link
|
||||
title: Search Engines
|
||||
icon: fad fa-search-location
|
||||
file: _pages/providers/search-engines.md
|
||||
file: _evergreen/search-engines.md
|
||||
- type: link
|
||||
title: Social Networks
|
||||
icon: fad fa-thumbs-up
|
||||
|
@ -45,7 +45,7 @@ items:
|
||||
- type: link
|
||||
title: Real-Time Communication
|
||||
icon: fad fa-comments-alt
|
||||
file: _pages/software/real-time-communication.md
|
||||
file: _evergreen/real-time-communication.md
|
||||
- type: link
|
||||
title: Self-Contained Networks
|
||||
icon: fad fa-chart-network
|
||||
@ -53,4 +53,4 @@ items:
|
||||
- type: link
|
||||
title: Video Streaming
|
||||
icon: fad fa-video
|
||||
file: _pages/software/video-streaming.md
|
||||
file: _evergreen/video-streaming.md
|
||||
|
@ -5,6 +5,6 @@
|
||||
<p class="card-text text-danger">When using end-to-end encryption (E2EE) technology like <a href="https://en.wikipedia.org/wiki/Pretty_Good_Privacy">OpenPGP</a>, email will still have some metadata that is not encrypted in the header of the email. <a href="/providers/email/#metadata">Read more about email metadata.</a></p>
|
||||
<p class="card-text text-danger">OpenPGP also does not support <a href="https://en.wikipedia.org/wiki/Forward_secrecy">Forward secrecy</a>, which means if either your or the recipient's private key is ever stolen, <strong>all</strong> previous messages encrypted with it will be exposed. <a href="/providers/email/#email-encryption">How do I protect my private keys?</a></p>
|
||||
<p class="card-text text-info">Rather than use email for prolonged conversations, consider using a medium that does support Forward secrecy.</p>
|
||||
<a href="/software/real-time-communication/" class="btn btn-outline-info">Recommended Instant Messengers</a>
|
||||
<a href="/real-time-communication/" class="btn btn-outline-info">Recommended Instant Messengers</a>
|
||||
</div>
|
||||
</div>
|
||||
|
@ -152,7 +152,7 @@ MicroG is a reimplementation of Google Play Services. This means it needs to be
|
||||
|
||||
Android 12 comes with special support for seamless app updates with [third party app stores](https://android-developers.googleblog.com/2020/09/listening-to-developer-feedback-to.html). The popular Free and Open Source Software (FOSS) repository [F-Droid](https://f-droid.org) doesn't implement this feature and requires a [privileged extension](https://f-droid.org/en/packages/org.fdroid.fdroid.privileged) to be included with the Android distribution in order to have unattended app installation.
|
||||
|
||||
GrapheneOS doesn't compromise on security, therefore they do not include the F-Droid extension therefore, users have to confirm all updates manually if they want to use F-Droid. GrapheneOS officially recommends [Sandboxed Play Services](https://grapheneos.org/usage#sandboxed-play-services) instead. Many FOSS Android apps are also in Google Play but sometimes they are not (like [NewPipe](/software/video-streaming/)).
|
||||
GrapheneOS doesn't compromise on security, therefore they do not include the F-Droid extension therefore, users have to confirm all updates manually if they want to use F-Droid. GrapheneOS officially recommends [Sandboxed Play Services](https://grapheneos.org/usage#sandboxed-play-services) instead. Many FOSS Android apps are also in Google Play but sometimes they are not (like [NewPipe]({% link _evergreen/video-streaming.md %})).
|
||||
|
||||
CalyxOS includes the [privileged extension](https://f-droid.org/en/packages/org.fdroid.fdroid.privileged), which may lower device security. Seamless app updates should be possible with [Aurora Store](https://auroraoss.com) in Android 12.
|
||||
|
||||
|
@ -74,6 +74,6 @@ Once you add your server, that’s it! In the Outline clients it’s just a matt
|
||||
|
||||
### Conclusion
|
||||
|
||||
That should be all you need to get your very own VPN up and running! **Do not share your access key with anyone**, this is the key starting with `ss://`. If you want to grant other users access to your server, click “Add a new key” in Outline Manager and give them a new, unique key. If you share a key, anyone with knowledge of that key will be able to see all the traffic of anyone else using the key. It should go without saying, but don’t send people keys over unencrypted channels: No Facebook Messenger, no emails. Stick with [Signal, Wire, or Briar]({% link _pages/software/real-time-communication.md %}) if you don’t have a secure app already.
|
||||
That should be all you need to get your very own VPN up and running! **Do not share your access key with anyone**, this is the key starting with `ss://`. If you want to grant other users access to your server, click “Add a new key” in Outline Manager and give them a new, unique key. If you share a key, anyone with knowledge of that key will be able to see all the traffic of anyone else using the key. It should go without saying, but don’t send people keys over unencrypted channels: No Facebook Messenger, no emails. Stick with [Signal, Wire, or Briar]({% link _evergreen/real-time-communication.md %}) if you don’t have a secure app already.
|
||||
|
||||
With Outline, there is no need to worry about the security of your server. Everything is set to automatically update with no intervention required! Another thing to note: The port on your Outline server is randomly generated. This is so the port can’t be easily blocked by nation/ISP level censors, however, this VPN may not function on some networks that only allow access to port 80/443, or on servers that only allow traffic on certain ports. These are edge-cases, but something to keep in mind, and if they apply you may need to look for more technical options.
|
||||
|
Loading…
Reference in New Issue
Block a user