mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-11-03 21:07:55 +00:00 
			
		
		
		
	Add more abbreviations (#1087)
Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
		@@ -18,7 +18,7 @@ All these firewalls use the [Netfilter](https://en.wikipedia.org/wiki/Netfilter)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
If you are using Flatpak packages, you can revoke their network socket access using Flatseal and prevent those applications from accessing your network. This permission is not bypassable.
 | 
					If you are using Flatpak packages, you can revoke their network socket access using Flatseal and prevent those applications from accessing your network. This permission is not bypassable.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
If you are using non-classic [Snap](https://en.wikipedia.org/wiki/Snap_(package_manager)) packages on a system with proper snap confinement support (with both AppArmor and [CGroupsv1](https://en.wikipedia.org/wiki/Cgroups) present), you can use the Snap Store to revoke network permission as well. This is also not bypassable.
 | 
					If you are using non-classic [Snap](https://en.wikipedia.org/wiki/Snap_(package_manager)) packages on a system with proper snap confinement support (with both AppArmor and [cgroups](https://en.wikipedia.org/wiki/Cgroups) v1 present), you can use the Snap Store to revoke network permission as well. This is also not bypassable.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Kernel hardening
 | 
					## Kernel hardening
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -94,3 +94,5 @@ One of the problems with Secure Boot particularly on Linux is that only the [cha
 | 
				
			|||||||
After setting up Secure Boot it is crucial that you set a “firmware password” (also called a “supervisor password, “BIOS password” or “UEFI password”), otherwise an adversary can simply disable Secure Boot.
 | 
					After setting up Secure Boot it is crucial that you set a “firmware password” (also called a “supervisor password, “BIOS password” or “UEFI password”), otherwise an adversary can simply disable Secure Boot.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
These recommendations can make you a little more resistant to [evil maid](https://en.wikipedia.org/wiki/Evil_maid_attack) attacks, but they not good as a proper verified boot process such as that found on [Android](https://source.android.com/security/verifiedboot), [ChromeOS](https://support.google.com/chromebook/answer/3438631) or [Windows](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process).
 | 
					These recommendations can make you a little more resistant to [evil maid](https://en.wikipedia.org/wiki/Evil_maid_attack) attacks, but they not good as a proper verified boot process such as that found on [Android](https://source.android.com/security/verifiedboot), [ChromeOS](https://support.google.com/chromebook/answer/3438631) or [Windows](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--8<-- "includes/abbreviations.en.md"
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -74,3 +74,5 @@ For advanced users, we only recommend Arch Linux, not any of its derivatives. We
 | 
				
			|||||||
## Linux-libre kernel and “Libre” distributions
 | 
					## Linux-libre kernel and “Libre” distributions
 | 
				
			||||||
 | 
					
 | 
				
			||||||
We strongly recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/scan.php?page=news_item&px=GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode for ideological reasons.
 | 
					We strongly recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/scan.php?page=news_item&px=GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode for ideological reasons.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--8<-- "includes/abbreviations.en.md"
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -62,3 +62,5 @@ Red Hat develops [Podman](https://docs.podman.io/en/latest/) and secures it with
 | 
				
			|||||||
Another option is [Kata containers](https://katacontainers.io/), where virtual machines masquerade as containers. Each Kata container has its own Linux kernel and is isolated from the host.
 | 
					Another option is [Kata containers](https://katacontainers.io/), where virtual machines masquerade as containers. Each Kata container has its own Linux kernel and is isolated from the host.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
These container technologies can be useful even for enthusiastic home users who may want to run certain web app software on their local area network (LAN) such as [Vaultwarden](https://github.com/dani-garcia/vaultwarden) or images provided by [linuxserver.io](https://www.linuxserver.io) to increase privacy by decreasing dependence on various web services.
 | 
					These container technologies can be useful even for enthusiastic home users who may want to run certain web app software on their local area network (LAN) such as [Vaultwarden](https://github.com/dani-garcia/vaultwarden) or images provided by [linuxserver.io](https://www.linuxserver.io) to increase privacy by decreasing dependence on various web services.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--8<-- "includes/abbreviations.en.md"
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -36,7 +36,7 @@ These password managers store the password database locally.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
!!! warning
 | 
					!!! warning
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    KeePassXC stores its export data as [comma-separated values (CSV)](https://en.wikipedia.org/wiki/Comma-separated_values). This may mean data loss if you import this file into another password manager. We advise you check each record manually.
 | 
					    KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### KeePassDX
 | 
					### KeePassDX
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,49 +1,60 @@
 | 
				
			|||||||
<!-- markdownlint-disable -->
 | 
					<!-- markdownlint-disable -->
 | 
				
			||||||
 | 
					*[2FA]: 2-Factor Authentication
 | 
				
			||||||
*[AOSP]: Android Open Source Project
 | 
					*[AOSP]: Android Open Source Project
 | 
				
			||||||
*[AVB]: Android Verified Boot
 | 
					*[AVB]: Android Verified Boot
 | 
				
			||||||
*[DNS]: Domain Name System
 | 
					*[CLI]: Command Line Interface
 | 
				
			||||||
 | 
					*[CSV]: Comma-Separated Values
 | 
				
			||||||
*[DNSSEC]: Domain Name System Security Extensions
 | 
					*[DNSSEC]: Domain Name System Security Extensions
 | 
				
			||||||
 | 
					*[DNS]: Domain Name System
 | 
				
			||||||
*[DoH]: DNS over HTTPS
 | 
					*[DoH]: DNS over HTTPS
 | 
				
			||||||
*[DoT]: DNS over TLS
 | 
					*[DoT]: DNS over TLS
 | 
				
			||||||
 | 
					*[E2EE]: End-to-End Encryption/Encrypted
 | 
				
			||||||
*[ECS]: EDNS Client Subnet
 | 
					*[ECS]: EDNS Client Subnet
 | 
				
			||||||
*[Exif]: Exchangeable image file format
 | 
					*[Exif]: Exchangeable image file format
 | 
				
			||||||
*[E2EE]: End-to-End Encryption/Encrypted
 | 
					 | 
				
			||||||
*[FDE]: Full Disk Encryption
 | 
					*[FDE]: Full Disk Encryption
 | 
				
			||||||
*[FIDO]: Fast IDentity Online
 | 
					*[FIDO]: Fast IDentity Online
 | 
				
			||||||
*[GnuPG]: GNU Privacy Guard (PGP implementation)
 | 
					 | 
				
			||||||
*[GPG]: GNU Privacy Guard (PGP implementation)
 | 
					*[GPG]: GNU Privacy Guard (PGP implementation)
 | 
				
			||||||
*[GPS]: Global Positioning System
 | 
					*[GPS]: Global Positioning System
 | 
				
			||||||
*[HTTP]: Hypertext Transfer Protocol
 | 
					*[GUI]: Graphical User Interface
 | 
				
			||||||
 | 
					*[GnuPG]: GNU Privacy Guard (PGP implementation)
 | 
				
			||||||
 | 
					*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password
 | 
				
			||||||
*[HTTPS]: Hypertext Transfer Protocol Secure
 | 
					*[HTTPS]: Hypertext Transfer Protocol Secure
 | 
				
			||||||
 | 
					*[HTTP]: Hypertext Transfer Protocol
 | 
				
			||||||
 | 
					*[I2P]: Invisible Internet Project
 | 
				
			||||||
*[IMAP]: Internet Message Access Protocol
 | 
					*[IMAP]: Internet Message Access Protocol
 | 
				
			||||||
*[IP]: Internet Protocol
 | 
					*[IP]: Internet Protocol
 | 
				
			||||||
 | 
					*[IPv4]: Internet Protocol version 4
 | 
				
			||||||
 | 
					*[IPv6]: Internet Protocol version 6
 | 
				
			||||||
*[ISP]: Internet Service Provider
 | 
					*[ISP]: Internet Service Provider
 | 
				
			||||||
*[ISPs]: Internet Service Providers
 | 
					*[ISPs]: Internet Service Providers
 | 
				
			||||||
*[I2P]: Invisible Internet Project
 | 
					 | 
				
			||||||
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
 | 
					*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
 | 
				
			||||||
 | 
					*[MAC]: Media Access Control
 | 
				
			||||||
*[MFA]: Multi-Factor Authentication
 | 
					*[MFA]: Multi-Factor Authentication
 | 
				
			||||||
*[OCSP]: Online Certificate Status Protocol
 | 
					*[OCSP]: Online Certificate Status Protocol
 | 
				
			||||||
*[OEM]: Original Equipment Manufacturer
 | 
					*[OEM]: Original Equipment Manufacturer
 | 
				
			||||||
*[OEMs]: Original Equipment Manufacturers
 | 
					*[OEMs]: Original Equipment Manufacturers
 | 
				
			||||||
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
 | 
					 | 
				
			||||||
*[OS]: Operating System
 | 
					*[OS]: Operating System
 | 
				
			||||||
*[OTP]: One-Time Password
 | 
					*[OTP]: One-Time Password
 | 
				
			||||||
*[OTPs]: One-Time Passwords
 | 
					*[OTPs]: One-Time Passwords
 | 
				
			||||||
*[PGP]: Pretty Good Privacy (see OpenPGP)
 | 
					*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
 | 
				
			||||||
*[P2P]: Peer-to-Peer
 | 
					*[P2P]: Peer-to-Peer
 | 
				
			||||||
 | 
					*[PGP]: Pretty Good Privacy (see OpenPGP)
 | 
				
			||||||
*[QNAME]: Qualified Name
 | 
					*[QNAME]: Qualified Name
 | 
				
			||||||
*[SaaS]: Software as a Service (cloud software)
 | 
					*[RSS]: Really Simple Syndication
 | 
				
			||||||
*[SELinux]: Security-Enhanced Linux
 | 
					*[SELinux]: Security-Enhanced Linux
 | 
				
			||||||
*[SMS]: Short Message Service (standard text messaging)
 | 
					*[SMS]: Short Message Service (standard text messaging)
 | 
				
			||||||
*[SMTP]: Simple Mail Transfer Protocol
 | 
					*[SMTP]: Simple Mail Transfer Protocol
 | 
				
			||||||
*[SNI]: Server Name Indication
 | 
					*[SNI]: Server Name Indication
 | 
				
			||||||
 | 
					*[SSH]: Secure Shell
 | 
				
			||||||
 | 
					*[SaaS]: Software as a Service (cloud software)
 | 
				
			||||||
*[TCP]: Transmission Control Protocol
 | 
					*[TCP]: Transmission Control Protocol
 | 
				
			||||||
*[TEE]: Trusted Execution Environment
 | 
					*[TEE]: Trusted Execution Environment
 | 
				
			||||||
*[TLS]: Transport Layer Security
 | 
					*[TLS]: Transport Layer Security
 | 
				
			||||||
*[TOTP]: Time-based One-Time Password
 | 
					*[TOTP]: Time-based One-Time Password
 | 
				
			||||||
*[UDP]: User Datagram Protocol
 | 
					 | 
				
			||||||
*[U2F]: Universal 2nd Factor
 | 
					*[U2F]: Universal 2nd Factor
 | 
				
			||||||
*[VoIP]: Voice over IP (Internet Protocol)
 | 
					*[UDP]: User Datagram Protocol
 | 
				
			||||||
*[VPN]: Virtual Private Network
 | 
					*[VPN]: Virtual Private Network
 | 
				
			||||||
 | 
					*[VoIP]: Voice over IP (Internet Protocol)
 | 
				
			||||||
*[W3C]: World Wide Web Consortium
 | 
					*[W3C]: World Wide Web Consortium
 | 
				
			||||||
*[2FA]: 2-Factor Authentication
 | 
					*[XMPP]: Extensible Messaging and Presence Protocol
 | 
				
			||||||
 | 
					*[cgroups]: Control Groups
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user