mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-30 09:56:26 -05:00
Add more abbreviations (#1087)
Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
parent
c8bd1533d8
commit
fb8c62fc9c
@ -18,7 +18,7 @@ All these firewalls use the [Netfilter](https://en.wikipedia.org/wiki/Netfilter)
|
||||
|
||||
If you are using Flatpak packages, you can revoke their network socket access using Flatseal and prevent those applications from accessing your network. This permission is not bypassable.
|
||||
|
||||
If you are using non-classic [Snap](https://en.wikipedia.org/wiki/Snap_(package_manager)) packages on a system with proper snap confinement support (with both AppArmor and [CGroupsv1](https://en.wikipedia.org/wiki/Cgroups) present), you can use the Snap Store to revoke network permission as well. This is also not bypassable.
|
||||
If you are using non-classic [Snap](https://en.wikipedia.org/wiki/Snap_(package_manager)) packages on a system with proper snap confinement support (with both AppArmor and [cgroups](https://en.wikipedia.org/wiki/Cgroups) v1 present), you can use the Snap Store to revoke network permission as well. This is also not bypassable.
|
||||
|
||||
## Kernel hardening
|
||||
|
||||
@ -94,3 +94,5 @@ One of the problems with Secure Boot particularly on Linux is that only the [cha
|
||||
After setting up Secure Boot it is crucial that you set a “firmware password” (also called a “supervisor password, “BIOS password” or “UEFI password”), otherwise an adversary can simply disable Secure Boot.
|
||||
|
||||
These recommendations can make you a little more resistant to [evil maid](https://en.wikipedia.org/wiki/Evil_maid_attack) attacks, but they not good as a proper verified boot process such as that found on [Android](https://source.android.com/security/verifiedboot), [ChromeOS](https://support.google.com/chromebook/answer/3438631) or [Windows](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process).
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -74,3 +74,5 @@ For advanced users, we only recommend Arch Linux, not any of its derivatives. We
|
||||
## Linux-libre kernel and “Libre” distributions
|
||||
|
||||
We strongly recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/scan.php?page=news_item&px=GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode for ideological reasons.
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -62,3 +62,5 @@ Red Hat develops [Podman](https://docs.podman.io/en/latest/) and secures it with
|
||||
Another option is [Kata containers](https://katacontainers.io/), where virtual machines masquerade as containers. Each Kata container has its own Linux kernel and is isolated from the host.
|
||||
|
||||
These container technologies can be useful even for enthusiastic home users who may want to run certain web app software on their local area network (LAN) such as [Vaultwarden](https://github.com/dani-garcia/vaultwarden) or images provided by [linuxserver.io](https://www.linuxserver.io) to increase privacy by decreasing dependence on various web services.
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -36,7 +36,7 @@ These password managers store the password database locally.
|
||||
|
||||
!!! warning
|
||||
|
||||
KeePassXC stores its export data as [comma-separated values (CSV)](https://en.wikipedia.org/wiki/Comma-separated_values). This may mean data loss if you import this file into another password manager. We advise you check each record manually.
|
||||
KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually.
|
||||
|
||||
### KeePassDX
|
||||
|
||||
|
@ -1,49 +1,60 @@
|
||||
<!-- markdownlint-disable -->
|
||||
*[2FA]: 2-Factor Authentication
|
||||
*[AOSP]: Android Open Source Project
|
||||
*[AVB]: Android Verified Boot
|
||||
*[DNS]: Domain Name System
|
||||
*[CLI]: Command Line Interface
|
||||
*[CSV]: Comma-Separated Values
|
||||
*[DNSSEC]: Domain Name System Security Extensions
|
||||
*[DNS]: Domain Name System
|
||||
*[DoH]: DNS over HTTPS
|
||||
*[DoT]: DNS over TLS
|
||||
*[E2EE]: End-to-End Encryption/Encrypted
|
||||
*[ECS]: EDNS Client Subnet
|
||||
*[Exif]: Exchangeable image file format
|
||||
*[E2EE]: End-to-End Encryption/Encrypted
|
||||
*[FDE]: Full Disk Encryption
|
||||
*[FIDO]: Fast IDentity Online
|
||||
*[GnuPG]: GNU Privacy Guard (PGP implementation)
|
||||
*[GPG]: GNU Privacy Guard (PGP implementation)
|
||||
*[GPS]: Global Positioning System
|
||||
*[HTTP]: Hypertext Transfer Protocol
|
||||
*[GUI]: Graphical User Interface
|
||||
*[GnuPG]: GNU Privacy Guard (PGP implementation)
|
||||
*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password
|
||||
*[HTTPS]: Hypertext Transfer Protocol Secure
|
||||
*[HTTP]: Hypertext Transfer Protocol
|
||||
*[I2P]: Invisible Internet Project
|
||||
*[IMAP]: Internet Message Access Protocol
|
||||
*[IP]: Internet Protocol
|
||||
*[IPv4]: Internet Protocol version 4
|
||||
*[IPv6]: Internet Protocol version 6
|
||||
*[ISP]: Internet Service Provider
|
||||
*[ISPs]: Internet Service Providers
|
||||
*[I2P]: Invisible Internet Project
|
||||
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
|
||||
*[MAC]: Media Access Control
|
||||
*[MFA]: Multi-Factor Authentication
|
||||
*[OCSP]: Online Certificate Status Protocol
|
||||
*[OEM]: Original Equipment Manufacturer
|
||||
*[OEMs]: Original Equipment Manufacturers
|
||||
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
|
||||
*[OS]: Operating System
|
||||
*[OTP]: One-Time Password
|
||||
*[OTPs]: One-Time Passwords
|
||||
*[PGP]: Pretty Good Privacy (see OpenPGP)
|
||||
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
|
||||
*[P2P]: Peer-to-Peer
|
||||
*[PGP]: Pretty Good Privacy (see OpenPGP)
|
||||
*[QNAME]: Qualified Name
|
||||
*[SaaS]: Software as a Service (cloud software)
|
||||
*[RSS]: Really Simple Syndication
|
||||
*[SELinux]: Security-Enhanced Linux
|
||||
*[SMS]: Short Message Service (standard text messaging)
|
||||
*[SMTP]: Simple Mail Transfer Protocol
|
||||
*[SNI]: Server Name Indication
|
||||
*[SSH]: Secure Shell
|
||||
*[SaaS]: Software as a Service (cloud software)
|
||||
*[TCP]: Transmission Control Protocol
|
||||
*[TEE]: Trusted Execution Environment
|
||||
*[TLS]: Transport Layer Security
|
||||
*[TOTP]: Time-based One-Time Password
|
||||
*[UDP]: User Datagram Protocol
|
||||
*[U2F]: Universal 2nd Factor
|
||||
*[VoIP]: Voice over IP (Internet Protocol)
|
||||
*[UDP]: User Datagram Protocol
|
||||
*[VPN]: Virtual Private Network
|
||||
*[VoIP]: Voice over IP (Internet Protocol)
|
||||
*[W3C]: World Wide Web Consortium
|
||||
*[2FA]: 2-Factor Authentication
|
||||
*[XMPP]: Extensible Messaging and Presence Protocol
|
||||
*[cgroups]: Control Groups
|
||||
|
Loading…
Reference in New Issue
Block a user