mirror of
https://github.com/privacyguides/blog.privacyguides.org.git
synced 2025-07-14 07:22:36 +00:00
Fix various dead links
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
@ -100,7 +100,7 @@ Out of the box, these add-ons only complement the settings we've described in th
|
||||
|
||||
HTTPS is the secure, encrypted version of HTTP. When you see an address starting with `https://` along with the padlock in your browser's address bar, you know that your connection to the website is completely secure. This is of course important when you're logging into websites and sending your passwords and emails in a form. But it also prevents people on your network and your ISP from snooping in on what you're reading, or changing the contents of an unencrypted webpage to whatever they want.
|
||||
|
||||
Therefore, [**HTTPS Everywhere**](https://addons.mozilla.org/en-US/firefox/addon/https-everywhere) is a must-have extension, all it does is upgrade your HTTP connections to HTTPS wherever possible. And because it works silently in the background, you probably will never notice it! We trust HTTPS Everywhere because it is completely open-source, and is developed by the Electronic Frontier Foundation, a non-profit dedicated to private and secure technologies.
|
||||
Therefore, [**HTTPS Everywhere**](https://www.eff.org/https-everywhere) is a must-have extension, all it does is upgrade your HTTP connections to HTTPS wherever possible. And because it works silently in the background, you probably will never notice it! We trust HTTPS Everywhere because it is completely open-source, and is developed by the Electronic Frontier Foundation, a non-profit dedicated to private and secure technologies.
|
||||
|
||||
Of course, it only works with sites that support HTTPS on the server's side, so you'll still need to keep an eye on your address bar to make sure you're securely connected. But fortunately more and more websites have implemented HTTPS thanks to the advent of free certificates from organizations like Let's Encrypt.
|
||||
|
||||
|
@ -38,7 +38,7 @@ Local RF location backends like DejaVu require that the phone has a working GPS
|
||||
|
||||
If your [threat model](https://www.privacyguides.org/basics/threat-modeling/) requires protecting your location or the MAC addresses of nearby devices, rerouting location requests to the OS location API is probably the best option. The benefit brought by microG's custom location backend is minimal at best when compared to Sandboxed Google Play.
|
||||
|
||||
In terms of application compatibility, ==Sandboxed Google Play on GrapheneOS is always going to be more compatible== as it is the same code as what is released by Google. microG is a reimplementation of these services. As a result, it only supports the various parts that have been reimplemented, meaning some things such as [Google Play Games](https://play.google.com/googleplaygames) and [In-app Billing API](https://android-doc.github.io/google/play/billing/api.html) are not yet supported.
|
||||
In terms of application compatibility, ==Sandboxed Google Play on GrapheneOS is always going to be more compatible== as it is the same code as what is released by Google. microG is a reimplementation of these services. As a result, it only supports the various parts that have been reimplemented, meaning some things such as [Google Play Games](https://play.google.com/googleplaygames) and [In-app Billing API](https://developer.android.com/google/play/billing) are not yet supported.
|
||||
|
||||
Larger apps, especially games, require [Play Asset Delivery](https://android-developers.googleblog.com/2020/06/introducing-google-play-asset-delivery.html) to be installed, which is currently not implemented in microG. Authentication using [FIDO](https://www.privacyguides.org/basics/multi-factor-authentication#fido-fast-identity-online) with online services on Android also relies on Play Services, and does not currently work with microG.
|
||||
|
||||
|
@ -6,7 +6,6 @@ authors:
|
||||
- freddy-m
|
||||
links:
|
||||
- posts/virtual-insanity.md
|
||||
- posts/us-government-continues-encryption-war.md
|
||||
tags:
|
||||
- Facebook
|
||||
license: BY-SA
|
||||
|
@ -7,7 +7,6 @@ authors:
|
||||
links:
|
||||
- posts/move-fast-and-break-things.md
|
||||
- posts/why-i-run-a-tor-relay.md
|
||||
- posts/us-government-wages-war-on-encryption.md
|
||||
tags:
|
||||
- Facebook
|
||||
license: BY-SA
|
||||
|
Reference in New Issue
Block a user