mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2026-05-15 08:01:22 +00:00
update: Organize Wiki section indexes
This commit is contained in:
@@ -7,7 +7,7 @@ description: Linux distributions are commonly recommended for privacy protection
|
||||
|
||||
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
||||
|
||||
- [General Linux Overview](../linux-overview.md)
|
||||
- [General Linux Overview](../../../wiki/os/linux/_index.md)
|
||||
|
||||
<div class="pg-card-logos">
|
||||
{{< cards >}}
|
||||
|
||||
@@ -6,3 +6,32 @@ cascade:
|
||||
type: docs
|
||||
contextMenu: true
|
||||
---
|
||||
|
||||
Welcome to our **Privacy Wiki**!
|
||||
|
||||
Here, the Privacy Guides community is building *the* comprehensive resource for understanding digital privacy, the threats we face, and the tools we can use to protect ourselves. This wiki is a living document, and we encourage you to contribute if you have something to add.
|
||||
|
||||
This is a selection of featured pages, but you can browse the sidebar for more topics, or use the search bar to find something specific. If you're looking for somewhere to start, start [here](basics/why-privacy-matters.md) to learn about why privacy is important, and then check out our [threat modeling guide](basics/threat-modeling.md) to learn how to make informed decisions about the software and services you use.
|
||||
|
||||
## Getting Started
|
||||
|
||||
{{< cards >}}
|
||||
{{< card link="basics/why-privacy-matters" title="Why Privacy Matters" subtitle="In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. Your privacy is up for grabs, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands." >}}
|
||||
{{< card link="basics/threat-modeling" title="Threat Modeling" subtitle="Balancing security, privacy, and usability is one of the first and most difficult tasks you’ll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they’re just too hard to start using!" >}}
|
||||
{{< /cards >}}
|
||||
|
||||
## Technology Tips
|
||||
|
||||
{{< cards >}}
|
||||
{{< card link="basics/passwords-overview" title="Intro to Passwords" subtitle="Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices, and our secrets. Despite often being the only thing between us and an adversary who’s after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced." >}}
|
||||
{{< card link="basics/vpn-overview" title="VPN Overview" subtitle="Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you’re posting or reading, but they can get an idea of the domains you request." >}}
|
||||
{{< card link="basics/creating-accounts" title="Creating Accounts" subtitle="Often people sign up for services without thinking. Maybe it’s a streaming service to watch that new show everyone’s talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line." >}}
|
||||
{{< card link="basics/common-threats" title="Common Threats" subtitle="Broadly speaking, we categorize our recommendations into the threats or goals that apply to most people. You may be concerned with none, one, a few, or all of these possibilities, and the tools and services you use depend on what your goals are. You may have specific threats outside these categories as well, which is perfectly fine!" >}}
|
||||
{{< /cards >}}
|
||||
|
||||
## Moving On Up
|
||||
|
||||
{{< cards >}}
|
||||
{{< card link="advanced/tor-overview" title="Tor Overview" subtitle="Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool." >}}
|
||||
{{< card link="advanced/payments" title="Private Payments" subtitle="Data about your buying habits is considered the holy grail of ad targeting: Your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately." >}}
|
||||
{{< /cards >}}
|
||||
|
||||
@@ -2,3 +2,14 @@
|
||||
title: Advanced Topics
|
||||
weight: 20
|
||||
---
|
||||
|
||||
We're moving on to more advanced topics! We have a few recommended pages below, or you can browse the left sidebar for the information you're looking for. If you have any questions, feel free to ask in our [community forum](https://discuss.privacyguides.net/).
|
||||
|
||||
{{< cards >}}
|
||||
{{< card link="advanced/tor-overview" title="Tor Overview" subtitle="Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool." >}}
|
||||
{{< card link="advanced/payments" title="Private Payments" subtitle="Data about your buying habits is considered the holy grail of ad targeting: Your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately." >}}
|
||||
{{< /cards >}}
|
||||
|
||||
## Recently Updated
|
||||
|
||||
{{< last-edited "/wiki/advanced/" >}}
|
||||
|
||||
@@ -2,3 +2,14 @@
|
||||
title: The Basics
|
||||
weight: 10
|
||||
---
|
||||
|
||||
These are the basics of digital privacy. If you're new to the topic, this is a good place to start. We have a few recommended pages below, or you can browse the left sidebar for the information you're looking for. If you have any questions, feel free to ask in our [community forum](https://discuss.privacyguides.net/).
|
||||
|
||||
{{< cards >}}
|
||||
{{< card link="basics/why-privacy-matters" title="Why Privacy Matters" subtitle="In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. Your privacy is up for grabs, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands." >}}
|
||||
{{< card link="basics/threat-modeling" title="Threat Modeling" subtitle="Balancing security, privacy, and usability is one of the first and most difficult tasks you’ll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they’re just too hard to start using!" >}}
|
||||
{{< /cards >}}
|
||||
|
||||
## Recently Updated
|
||||
|
||||
{{< last-edited "/wiki/basics/" >}}
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
---
|
||||
title: "Why Privacy Matters"
|
||||
weight: 10
|
||||
prev: ../_index.md
|
||||
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
|
||||
---
|
||||
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. <mark>Your privacy is up for grabs</mark>, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
|
||||
|
||||
+12
-10
@@ -4,19 +4,21 @@ description: An overview of our operating system-related recommendations for all
|
||||
---
|
||||
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.
|
||||
|
||||
- [Recommended Linux Distros :material-arrow-right-drop-circle:](../desktop.md)
|
||||
- [Recommended Android Distros :material-arrow-right-drop-circle:](../android/distributions.md)
|
||||
|
||||
The articles marked with a :material-star: are our more mature articles.
|
||||
> [!TIP]
|
||||
> You may also wish to explore our [recommended linux distros](../../tools/os/desktop/_index.md) and [recommended Android distros](../../tools/os/android/distributions/_index.md).
|
||||
|
||||
## Mobile Operating Systems
|
||||
|
||||
- [Android Overview](android-overview.md) :material-star:
|
||||
- [iOS Overview](ios-overview.md)
|
||||
{{< cards >}}
|
||||
{{< card link="advanced/android-overview" title="Android Overview" subtitle="The Android Open Source Project is a secure mobile operating system featuring strong app sandboxing, Verified Boot (AVB), and a robust permission control system." tag="featured" >}}
|
||||
{{< card link="advanced/ios-overview" title="iOS Overview" subtitle="iOS and iPadOS are proprietary mobile operating systems developed by Apple for their iPhone and iPad products, respectively. If you have an Apple mobile device, you can increase your privacy by disabling some built-in telemetry features, and hardening some privacy and security settings which are built in to the system." >}}
|
||||
{{< /cards >}}
|
||||
|
||||
## Desktop Operating Systems
|
||||
|
||||
- [Linux Overview](linux-overview.md) :material-star:
|
||||
- [macOS Overview](macos-overview.md)
|
||||
- [Qubes Overview](qubes-overview.md) :material-star:
|
||||
- [Windows Overview](windows/index.md)
|
||||
{{< cards >}}
|
||||
{{< card link="advanced/linux" title="Linux Overview" subtitle="Linux is an open-source, privacy-focused desktop operating system alternative. In the face of pervasive telemetry and other privacy-encroaching technologies in mainstream operating systems, desktop Linux has remained the clear choice for people looking for total control over their computers from the ground up." tag="featured" >}}
|
||||
{{< card link="advanced/qubes" title="Qubes Overview" subtitle="Qubes OS is an open-source operating system which uses the Xen hypervisor to provide strong security for desktop computing through isolated qubes, (which are Virtual Machines). You can assign each qube a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of badness enumeration." >}}
|
||||
{{< card link="advanced/macos" title="macOS Overview" subtitle="macOS is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings." >}}
|
||||
{{< card link="advanced/windows" title="Windows Overview" subtitle="Microsoft Windows is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of optional data that is sometimes sent to remote servers for processing." >}}
|
||||
{{< /cards >}}
|
||||
|
||||
@@ -0,0 +1,11 @@
|
||||
<ul>
|
||||
{{ $path := .Get 0 | default "/wiki/advanced" }}
|
||||
{{ with site.GetPage $path }}
|
||||
{{ range (.RegularPages.ByLastmod.Reverse | first 6) }}
|
||||
<li>
|
||||
<a href="{{ .Permalink }}">{{ .Title }}</a>
|
||||
<small> {{ .Lastmod.Format "Jan 2, 2006" }}</small>
|
||||
</li>
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
</ul>
|
||||
Reference in New Issue
Block a user