1
0
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2025-07-02 09:42:35 +00:00

Add privacy section to homepage

This commit is contained in:
2020-05-12 01:16:05 -05:00
parent d91e27ce61
commit 985a9ec84e
3 changed files with 49 additions and 19 deletions

View File

@ -5,11 +5,11 @@ layout: default
<div class="p-5 mb-3 bg-primary">
<div class="container">
<div class="row">
<div class="col-lg-8 col-12 mt-5">
<h2 class="display-4 mt-4">The guide to restoring your online privacy.</h2>
<div class="col-lg-8 col-12 mt-4">
<h2 class="display-4 pt-1 mt-5">The guide to restoring your online privacy.</h2>
<h5 class="mt-5">Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.</h5>
</div>
<div class="col-4 p-5 d-none d-lg-block">
<div class="col-4 p-3 d-none d-lg-block">
<img src="/assets/img/layout/surveillance-eye-colorbg.svg" width="100%">
</div>
</div>
@ -19,6 +19,19 @@ layout: default
<div class="container my-5 p-5">
<div class="row">
<div class="col-lg-10 col-12 text-right">
<h2 class="mt-4">Why should I care?</h2>
<h5 class="mt-2">“I have nothing to hide. Why should I care about my privacy?”</h5>
<p class="mt-2">Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, we didn't always have the right to privacy. In several dictatorships, many still don't. Generations before ours fought for our right to privacy. <mark>Privacy is a human right inherent to all of us</mark>, that we are entitled to without discrimination.</p>
<p>You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. <strong>Everyone</strong> has something to hide, privacy is something that makes you human.</p>
<a href="/privacy/" class="btn btn-primary mt-2">Learn More About Privacy</a>
</div>
<div class="col-2 d-none d-lg-block">
<img src="/assets/img/layout/phone-like-icon.svg" width="100%">
</div>
</div>
<div class="row mt-5">
<div class="col-2 d-none d-lg-block">
<img src="/assets/img/layout/plan-icon.svg" width="100%">
</div>
@ -26,25 +39,23 @@ layout: default
<h2 class="mt-4">What should I do?</h2>
<h5 class="mt-2">First, you need to make a plan.</h5>
<p class="mt-2">Trying to protect <strong>all</strong> your data from <strong>everyone</strong> all the time is impractical, expensive, and exhausting. But, don't worry! Security is a process, and by thinking ahead you can put together a plan that's right for <strong>you</strong>. Security isn't just about the tools you use or the software you download. Rather, it begins with understanding the unique threats you face, and how you can counter them.</p>
<p>This process of identifying threats and defining countermeasures is called <strong>threat modeling</strong>, and it forms the basis of every good security and privacy plan.</p>
<a href="/threat-modeling/" class="btn btn-primary mt-2">Learn More About Threat Modeling <i class="far fa-fw fa-arrow-circle-right"></i></a>
<p><mark>This process of identifying threats and defining countermeasures is called <strong>threat modeling</strong></mark>, and it forms the basis of every good security and privacy plan.</p>
<a href="/threat-modeling/" class="btn btn-primary mt-2">Learn More About Threat Modeling</a>
</div>
</div>
</div>
<div class="p-5 bg-secondary text-light">
<div class="container">
<div class="row m-3">
<div class="row mt-3">
<div class="col text-center">
<h2>Privacy Tools &amp; Services</h2>
<p>The devices, software, and services that will protect your privacy highly depend on your use case, workflow, and threat model. But, if you don't know where to get started, we've chosen some recommended tools to get you going :)</p>
</div>
</div>
<div class="row">
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="row mb-5">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/devices/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -54,7 +65,7 @@ layout: default
</div>
</a>
</div>
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/browsers/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -64,7 +75,7 @@ layout: default
</div>
</a>
</div>
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/software/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -74,7 +85,7 @@ layout: default
</div>
</a>
</div>
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/os/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -84,7 +95,7 @@ layout: default
</div>
</a>
</div>
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/providers/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -94,7 +105,7 @@ layout: default
</div>
</a>
</div>
<div class="col-6 col-sm-4 col-md-3 col-xl-2">
<div class="col-6 col-sm-4 col-md-3 col-xl-2 mt-3">
<a href="/services/" class="text-secondary">
<div class="card text-center mx-auto" style="width: 160px;">
<div class="card-body">
@ -104,7 +115,25 @@ layout: default
</div>
</a>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row mt-5">
<div class="col-2 d-none d-lg-block">
<img src="/assets/img/layout/plan-icon.svg" width="100%">
</div>
<div class="col-lg-10 col-12">
<h2 class="mt-4">What should I do?</h2>
<h5 class="mt-2">First, you need to make a plan.</h5>
<p class="mt-2">Trying to protect <strong>all</strong> your data from <strong>everyone</strong> all the time is impractical, expensive, and exhausting. But, don't worry! Security is a process, and by thinking ahead you can put together a plan that's right for <strong>you</strong>. Security isn't just about the tools you use or the software you download. Rather, it begins with understanding the unique threats you face, and how you can counter them.</p>
<p><mark>This process of identifying threats and defining countermeasures is called <strong>threat modeling</strong></mark>, and it forms the basis of every good security and privacy plan.</p>
<a href="/threat-modeling/" class="btn btn-primary mt-2">Learn More About Threat Modeling</a>
</div>
</div>
</div>
<div class="container mb-5">
{% include footer.html %}
</div>