diff --git a/docs/posts/firefox-privacy.md b/docs/posts/firefox-privacy.md index 1e9cb69..7fac82c 100644 --- a/docs/posts/firefox-privacy.md +++ b/docs/posts/firefox-privacy.md @@ -100,7 +100,7 @@ Out of the box, these add-ons only complement the settings we've described in th HTTPS is the secure, encrypted version of HTTP. When you see an address starting with `https://` along with the padlock in your browser's address bar, you know that your connection to the website is completely secure. This is of course important when you're logging into websites and sending your passwords and emails in a form. But it also prevents people on your network and your ISP from snooping in on what you're reading, or changing the contents of an unencrypted webpage to whatever they want. -Therefore, [**HTTPS Everywhere**](https://addons.mozilla.org/en-US/firefox/addon/https-everywhere) is a must-have extension, all it does is upgrade your HTTP connections to HTTPS wherever possible. And because it works silently in the background, you probably will never notice it! We trust HTTPS Everywhere because it is completely open-source, and is developed by the Electronic Frontier Foundation, a non-profit dedicated to private and secure technologies. +Therefore, [**HTTPS Everywhere**](https://www.eff.org/https-everywhere) is a must-have extension, all it does is upgrade your HTTP connections to HTTPS wherever possible. And because it works silently in the background, you probably will never notice it! We trust HTTPS Everywhere because it is completely open-source, and is developed by the Electronic Frontier Foundation, a non-profit dedicated to private and secure technologies. Of course, it only works with sites that support HTTPS on the server's side, so you'll still need to keep an eye on your address bar to make sure you're securely connected. But fortunately more and more websites have implemented HTTPS thanks to the advent of free certificates from organizations like Let's Encrypt. diff --git a/docs/posts/grapheneos-or-calyxos.md b/docs/posts/grapheneos-or-calyxos.md index a622d78..e922e70 100644 --- a/docs/posts/grapheneos-or-calyxos.md +++ b/docs/posts/grapheneos-or-calyxos.md @@ -38,7 +38,7 @@ Local RF location backends like DejaVu require that the phone has a working GPS If your [threat model](https://www.privacyguides.org/basics/threat-modeling/) requires protecting your location or the MAC addresses of nearby devices, rerouting location requests to the OS location API is probably the best option. The benefit brought by microG's custom location backend is minimal at best when compared to Sandboxed Google Play. -In terms of application compatibility, ==Sandboxed Google Play on GrapheneOS is always going to be more compatible== as it is the same code as what is released by Google. microG is a reimplementation of these services. As a result, it only supports the various parts that have been reimplemented, meaning some things such as [Google Play Games](https://play.google.com/googleplaygames) and [In-app Billing API](https://android-doc.github.io/google/play/billing/api.html) are not yet supported. +In terms of application compatibility, ==Sandboxed Google Play on GrapheneOS is always going to be more compatible== as it is the same code as what is released by Google. microG is a reimplementation of these services. As a result, it only supports the various parts that have been reimplemented, meaning some things such as [Google Play Games](https://play.google.com/googleplaygames) and [In-app Billing API](https://developer.android.com/google/play/billing) are not yet supported. Larger apps, especially games, require [Play Asset Delivery](https://android-developers.googleblog.com/2020/06/introducing-google-play-asset-delivery.html) to be installed, which is currently not implemented in microG. Authentication using [FIDO](https://www.privacyguides.org/basics/multi-factor-authentication#fido-fast-identity-online) with online services on Android also relies on Play Services, and does not currently work with microG. diff --git a/docs/posts/move-fast-and-break-things.md b/docs/posts/move-fast-and-break-things.md index 855ad22..96a0e6f 100644 --- a/docs/posts/move-fast-and-break-things.md +++ b/docs/posts/move-fast-and-break-things.md @@ -6,7 +6,6 @@ authors: - freddy-m links: - posts/virtual-insanity.md - - posts/us-government-continues-encryption-war.md tags: - Facebook license: BY-SA diff --git a/docs/posts/virtual-insanity.md b/docs/posts/virtual-insanity.md index 70e9a5e..1230d4f 100644 --- a/docs/posts/virtual-insanity.md +++ b/docs/posts/virtual-insanity.md @@ -7,7 +7,6 @@ authors: links: - posts/move-fast-and-break-things.md - posts/why-i-run-a-tor-relay.md - - posts/us-government-wages-war-on-encryption.md tags: - Facebook license: BY-SA