1
0
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2025-09-11 12:38:57 +00:00

Compare commits

..

1 Commits

Author SHA1 Message Date
815eb65d10 refactor: Move videos to Ghost (#3115) 2025-09-10 02:21:13 -05:00
31 changed files with 21 additions and 910 deletions

View File

@@ -1,6 +1,5 @@
:1337 { :1337 {
reverse_proxy /articles/* http://127.0.0.1:8001 reverse_proxy /articles/* http://127.0.0.1:8001
reverse_proxy /videos/* http://127.0.0.1:8002
reverse_proxy /en/* http://127.0.0.1:8000 reverse_proxy /en/* http://127.0.0.1:8000
redir / /en/ redir / /en/
} }

View File

@@ -19,10 +19,6 @@
"8001": { "8001": {
"label": "Articles", "label": "Articles",
"onAutoForward": "silent" "onAutoForward": "silent"
},
"8002": {
"label": "Videos",
"onAutoForward": "silent"
} }
}, },
"otherPortsAttributes": { "otherPortsAttributes": {
@@ -52,20 +48,6 @@
"group": "Live server" "group": "Live server"
} }
}, },
{
"label": "Videos",
"type": "shell",
"command": "mkdocs serve --config-file=mkdocs.videos.yml --dev-addr=localhost:8002",
"group": "test",
"runOptions": {
"runOn": "folderOpen"
},
"presentation": {
"reveal": "always",
"panel": "dedicated",
"group": "Live server"
}
},
{ {
"label": "Main", "label": "Main",
"type": "shell", "type": "shell",

View File

@@ -101,24 +101,13 @@ jobs:
continue-on-error: true continue-on-error: true
privileged: ${{ fromJSON(needs.metadata.outputs.privileged) }} privileged: ${{ fromJSON(needs.metadata.outputs.privileged) }}
build_videos:
if: ${{ contains(github.event.pull_request.labels.*.name, 'ci:build videos') }}
needs: [submodule, metadata]
uses: ./.github/workflows/build-videos.yml
with:
ref: ${{github.event.pull_request.head.ref}}
repo: ${{github.event.pull_request.head.repo.full_name}}
continue-on-error: true
privileged: ${{ fromJSON(needs.metadata.outputs.privileged) }}
combine_build: combine_build:
needs: [build_english, build_i18n, build_blog, build_videos] needs: [build_english, build_i18n, build_blog]
if: | if: |
(always() && !cancelled() && !failure()) && (always() && !cancelled() && !failure()) &&
needs.build_english.result == 'success' && needs.build_english.result == 'success' &&
(needs.build_i18n.result == 'success' || needs.build_i18n.result == 'skipped') && (needs.build_i18n.result == 'success' || needs.build_i18n.result == 'skipped') &&
(needs.build_blog.result == 'success' || needs.build_blog.result == 'skipped') && (needs.build_blog.result == 'success' || needs.build_blog.result == 'skipped')
(needs.build_videos.result == 'success' || needs.build_videos.result == 'skipped')
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
@@ -140,5 +129,5 @@ jobs:
cleanup: cleanup:
if: ${{ always() }} if: ${{ always() }}
needs: [build_english, build_i18n, build_blog, build_videos] needs: [build_english, build_i18n, build_blog]
uses: privacyguides/.github/.github/workflows/cleanup.yml@main uses: privacyguides/.github/.github/workflows/cleanup.yml@main

View File

@@ -1,116 +0,0 @@
name: 🛠️ Build Videos
on:
workflow_call:
inputs:
ref:
required: true
type: string
repo:
required: true
type: string
context:
type: string
default: deploy-preview
continue-on-error:
type: boolean
default: true
privileged:
type: boolean
default: true
permissions:
contents: read
jobs:
build:
runs-on: ubuntu-latest
continue-on-error: ${{ inputs.continue-on-error }}
permissions:
contents: read
steps:
- name: Add GitHub Token to Environment
run: |
echo "GH_TOKEN=${{ secrets.GITHUB_TOKEN }}" >> "$GITHUB_ENV"
- name: Download Repository
uses: actions/checkout@v4
with:
repository: ${{ inputs.repo }}
ref: ${{ inputs.ref }}
persist-credentials: "false"
fetch-depth: 0
- name: Download Submodules
uses: actions/download-artifact@v4
with:
pattern: repo-*
path: modules
- name: Move mkdocs-material-insiders to mkdocs-material
if: inputs.privileged
run: |
rmdir modules/mkdocs-material
mv modules/repo-mkdocs-material-insiders modules/mkdocs-material
- name: Move brand submodule to theme/assets/brand
run: |
rmdir theme/assets/brand
mv modules/repo-brand theme/assets/brand
- name: Install Python (pipenv)
if: inputs.privileged
uses: actions/setup-python@v5
with:
cache: "pipenv"
- name: Install Python (no pipenv)
if: ${{ !inputs.privileged }}
uses: actions/setup-python@v5
- name: Install Python Dependencies
if: inputs.privileged
run: |
pip install pipenv
pipenv install
sudo apt install pngquant
- name: Install Python Dependencies (Unprivileged)
if: ${{ !inputs.privileged }}
run: |
pip install mkdocs-material mkdocs-rss-plugin mkdocs-glightbox mkdocs-macros-plugin
sudo apt install pngquant
- name: Set base navigation URLs for production build
if: inputs.context == 'production'
run: |
{
echo "MAIN_SITE_BASE_URL=https://www.privacyguides.org/en/"
echo "MAIN_SITE_ABOUT_URL=https://www.privacyguides.org/en/about/"
echo "MAIN_SITE_RECOMMENDATIONS_URL=https://www.privacyguides.org/en/tools/"
echo "MAIN_SITE_KNOWLEDGE_BASE_URL=https://www.privacyguides.org/en/basics/why-privacy-matters/"
echo "ARTICLES_SITE_BASE_URL=https://www.privacyguides.org/articles/"
echo "VIDEOS_SITE_BASE_URL=https://www.privacyguides.org/videos/"
} >> "$GITHUB_ENV"
- name: Build Website (Privileged)
if: inputs.privileged
run: |
pipenv run mkdocs build --config-file mkdocs.videos.yml
- name: Build Website (Unprivileged)
if: ${{ !inputs.privileged }}
run: |
BUILD_INSIDERS=false mkdocs build --config-file mkdocs.videos.yml
- name: Package Website
run: |
tar -czf site-build-videos.tar.gz site
- name: Upload Site
uses: actions/upload-artifact@v4
with:
name: site-build-videos.tar.gz
path: site-build-videos.tar.gz
retention-days: 1

View File

@@ -27,7 +27,6 @@ on:
- "main" - "main"
paths: paths:
- "blog/**" - "blog/**"
- "videos/**"
concurrency: concurrency:
group: release-deployment group: release-deployment
@@ -61,19 +60,8 @@ jobs:
continue-on-error: false continue-on-error: false
context: production context: production
build_videos:
needs: submodule
permissions:
contents: read
uses: ./.github/workflows/build-videos.yml
with:
repo: ${{ github.repository }}
ref: ${{ github.ref }}
continue-on-error: false
context: production
deploy: deploy:
needs: [build_blog, build_videos] needs: [build_blog]
uses: privacyguides/webserver/.github/workflows/deploy-garage.yml@main uses: privacyguides/webserver/.github/workflows/deploy-garage.yml@main
with: with:
environment: production environment: production
@@ -83,5 +71,5 @@ jobs:
cleanup: cleanup:
if: ${{ always() }} if: ${{ always() }}
needs: [build_blog, build_videos] needs: [build_blog]
uses: privacyguides/.github/.github/workflows/cleanup.yml@main uses: privacyguides/.github/.github/workflows/cleanup.yml@main

View File

@@ -77,17 +77,6 @@ jobs:
continue-on-error: false continue-on-error: false
context: production context: production
build_videos:
needs: submodule
permissions:
contents: read
uses: ./.github/workflows/build-videos.yml
with:
repo: ${{ github.repository }}
ref: ${{ github.ref }}
continue-on-error: false
context: production
release: release:
name: Create release notes name: Create release notes
needs: build needs: build
@@ -109,7 +98,7 @@ jobs:
makeLatest: true makeLatest: true
deploy: deploy:
needs: [build, build_blog, build_videos] needs: [build, build_blog]
uses: privacyguides/webserver/.github/workflows/deploy-all.yml@main uses: privacyguides/webserver/.github/workflows/deploy-all.yml@main
secrets: secrets:
NETLIFY_TOKEN: ${{ secrets.NETLIFY_TOKEN }} NETLIFY_TOKEN: ${{ secrets.NETLIFY_TOKEN }}
@@ -126,5 +115,5 @@ jobs:
cleanup: cleanup:
if: ${{ always() }} if: ${{ always() }}
needs: [build, build_blog, build_videos] needs: [build, build_blog]
uses: privacyguides/.github/.github/workflows/cleanup.yml@main uses: privacyguides/.github/.github/workflows/cleanup.yml@main

View File

@@ -3,7 +3,7 @@ title: Private Payments
icon: material/hand-coin icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately. description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
--- ---
Data about your buying habits is considered the holy grail of ad targeting: Your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately. Data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
## Cash ## Cash
@@ -17,7 +17,7 @@ Despite the above, cash is typically the best option when available.
You can easily purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually dont have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout in an effort to reduce fraud. You can easily purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually dont have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout in an effort to reduce fraud.
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (e.g. from Visa or Mastercard) usually have limits of up to $1,000 per card. Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (e.g.: from Visa or Mastercard) usually have limits of up to $1,000 per card.
Gift cards have the downside of being subject to merchant policies, which can have terrible terms and restrictions. For example, some merchants dont accept payment in gift cards exclusively, or they may cancel the value of the card if they consider you to be a high-risk user. Once you have merchant credit, the merchant has a strong degree of control over this credit. Gift cards have the downside of being subject to merchant policies, which can have terrible terms and restrictions. For example, some merchants dont accept payment in gift cards exclusively, or they may cancel the value of the card if they consider you to be a high-risk user. Once you have merchant credit, the merchant has a strong degree of control over this credit.
@@ -43,7 +43,7 @@ These tend to be good options for recurring/subscription payments online, while
## Cryptocurrency ## Cryptocurrency
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a transparent blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only purchase amounts which would not be disastrous to lose. Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a transparent blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
<div class="admonition danger" markdown> <div class="admonition danger" markdown>
<p class="admonition-title">Danger</p> <p class="admonition-title">Danger</p>
@@ -72,7 +72,7 @@ Anonymous transactions on a transparent blockchain are *theoretically* possible,
### Wallet Custody ### Wallet Custody
With cryptocurrency there are two forms of wallets: custodial wallets and self-custody wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Self-custody wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, self-custody wallets provide greater security and censorship resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies. With cryptocurrency there are two forms of wallets: custodial wallets and self-custody wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Self-custody wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, self-custody wallets provide greater security and censorship-resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
### Acquisition ### Acquisition
@@ -84,7 +84,7 @@ If you go this route, make sure to purchase Monero at different times and in dif
## Additional Considerations ## Additional Considerations
When you're making a payment in person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Dont sign up for rewards programs or provide any other information about yourself. When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Dont sign up for rewards programs or provide any other information about yourself.
When purchasing online, ideally you should do so over [Tor](tor-overview.md). However, many merchants dont allow purchases with Tor. You can consider using a [recommended VPN](../vpn.md) (paid for with cash, gift card, or Monero), or making the purchase from a coffee shop or library with free Wi-Fi. If you are ordering a physical item that needs to be delivered, you will need to provide a delivery address. You should consider using a PO box, private mailbox, or work address. When purchasing online, ideally you should do so over [Tor](tor-overview.md). However, many merchants dont allow purchases with Tor. You can consider using a [recommended VPN](../vpn.md) (paid for with cash, gift card, or Monero), or making the purchase from a coffee shop or library with free Wi-Fi. If you are ordering a physical item that needs to be delivered, you will need to provide a delivery address. You should consider using a PO box, private mailbox, or work address.

View File

@@ -25,14 +25,14 @@ Features include cycling routes, hiking trails and walking paths, turn-by-turn n
[:octicons-home-16: Homepage](https://organicmaps.app){ .md-button .md-button--primary } [:octicons-home-16: Homepage](https://organicmaps.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://organicmaps.app/privacy){ .card-link title="Privacy Policy" } [:octicons-eye-16:](https://organicmaps.app/privacy){ .card-link title="Privacy Policy" }
[:octicons-code-16:](https://github.com/organicmaps/organicmaps){ .card-link title="Source Code" } [:octicons-code-16:](https://git.omaps.dev/organicmaps/organicmaps){ .card-link title="Source Code" }
<details class="downloads" markdown> <details class="downloads" markdown>
<summary>Downloads</summary> <summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.organicmaps) - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.organicmaps)
- [:simple-appstore: App Store](https://apps.apple.com/app/organic-maps/id1567437057) - [:simple-appstore: App Store](https://apps.apple.com/app/organic-maps/id1567437057)
- [:simple-github: GitHub](https://github.com/organicmaps/organicmaps/releases) - [:simple-forgejo: Forgejo](https://git.omaps.dev/organicmaps/organicmaps/releases)
- [:simple-linux: Linux](https://flathub.org/apps/app.organicmaps.desktop) - [:simple-linux: Linux](https://flathub.org/apps/app.organicmaps.desktop)
</details> </details>

View File

@@ -340,6 +340,7 @@ A VPN is pointless if it can't even provide adequate security. We require all ou
- Strongest Encryption: RSA-4096. - Strongest Encryption: RSA-4096.
- Optional quantum-resistant encryption. - Optional quantum-resistant encryption.
- Forward Secrecy.
- Comprehensive published security audits from a reputable third-party firm. - Comprehensive published security audits from a reputable third-party firm.
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
- RAM-only VPN servers. - RAM-only VPN servers.

View File

@@ -27,6 +27,7 @@ site_description: "Privacy Guides is the most popular & trustworthy non-profit p
edit_uri_template: blob/main/blog/{path}?plain=1 edit_uri_template: blob/main/blog/{path}?plain=1
extra: extra:
scope: /
privacy_guides: privacy_guides:
footer: footer:
intro: intro:

View File

@@ -1,221 +0,0 @@
# Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to
# deal in the Software without restriction, including without limitation the
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
# sell copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
# IN THE SOFTWARE.
docs_dir: "videos"
site_url: "https://www.privacyguides.org/videos/"
site_dir: "site/videos"
site_name: Privacy Guides
site_description: "This is our home for the latest video content from the Privacy Guides team. Privacy Guides is the most popular & trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life."
edit_uri_template: blob/main/videos/{path}?plain=1
extra:
privacy_guides:
footer:
intro:
!ENV [
FOOTER_INTRO,
"Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.",
]
note:
!ENV [
FOOTER_NOTE,
"We do not make money from recommending certain products, and we do not use affiliate links.",
]
copyright:
author:
!ENV [FOOTER_COPYRIGHT_AUTHOR, "Privacy Guides and contributors."]
date: !ENV [FOOTER_COPYRIGHT_DATE, "2019-2025"]
license:
- fontawesome/brands/creative-commons
- fontawesome/brands/creative-commons-by
- fontawesome/brands/creative-commons-sa
homepage: !ENV [MAIN_SITE_BASE_URL, "https://www.privacyguides.org/en/"]
generator: false
context: !ENV [BUILD_CONTEXT, "production"]
offline: !ENV [BUILD_OFFLINE, false]
deploy: !ENV DEPLOY_ID
social:
- icon: simple/mastodon
link: https://mastodon.neat.computer/@privacyguides
name: !ENV [SOCIAL_MASTODON, "Mastodon"]
- icon: simple/peertube
link: https://neat.tube/c/privacyguides
name: !ENV [SOCIAL_PEERTUBE, "PeerTube"]
- icon: simple/matrix
link: https://matrix.to/#/#privacyguides:matrix.org
name: !ENV [SOCIAL_MATRIX, "Matrix"]
- icon: simple/discourse
link: https://discuss.privacyguides.net/
name: !ENV [SOCIAL_FORUM, "Forum"]
- icon: simple/github
link: https://github.com/privacyguides
name: !ENV [SOCIAL_GITHUB, "GitHub"]
- icon: simple/torbrowser
link: http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/posts/
name: !ENV [SOCIAL_TOR_SITE, "Hidden service"]
repo_url:
!ENV [BUILD_REPO_URL, "https://github.com/privacyguides/privacyguides.org"]
repo_name: ""
theme:
name: material
language: en
custom_dir: theme
font:
text: Public Sans
code: DM Mono
palette:
- media: "(prefers-color-scheme)"
scheme: default
accent: deep purple
toggle:
icon: material/brightness-auto
name: !ENV [THEME_DARK, "Switch to dark mode"]
- media: "(prefers-color-scheme: dark)"
scheme: slate
accent: amber
toggle:
icon: material/brightness-2
name: !ENV [THEME_LIGHT, "Switch to light mode"]
- media: "(prefers-color-scheme: light)"
scheme: default
accent: deep purple
toggle:
icon: material/brightness-5
name: !ENV [THEME_AUTO, "Switch to system theme"]
favicon: assets/brand/logos/png/favicon-32x32.png
icon:
repo: simple/github
features:
- announce.dismiss
- navigation.tracking
- navigation.tabs
- navigation.path
- navigation.indexes
- navigation.footer
- content.action.edit
- content.tabs.link
- content.tooltips
- search.highlight
extra_css:
- assets/stylesheets/extra.css?v=20250723
watch:
- theme
- includes
plugins:
blog:
blog_dir: .
blog_toc: true
post_url_format: "{date}/{file}"
post_excerpt_max_authors: 0
authors_profiles: false
categories: false
rss:
match_path: posts/.*
abstract_chars_count: -1
date_from_meta:
as_creation: date.created
as_update: date.updated
categories:
- categories
- tags
glightbox: {}
tags: {}
search: {}
privacy:
enabled: !ENV [BUILD_PRIVACY, true]
offline:
enabled: !ENV [BUILD_OFFLINE, false]
group:
enabled: !ENV [BUILD_INSIDERS, true]
plugins:
macros: {}
meta: {}
optimize:
enabled: !ENV [OPTIMIZE, PRODUCTION, NETLIFY, false]
typeset: {}
social:
cards: !ENV [CARDS, true]
cards_dir: assets/img/social
cards_layout_dir: theme/layouts
cards_layout: page
markdown_extensions:
admonition: {}
pymdownx.details: {}
pymdownx.superfences:
custom_fences:
- name: mermaid
class: mermaid
format: !!python/name:pymdownx.superfences.fence_code_format
pymdownx.tabbed:
alternate_style: true
pymdownx.arithmatex:
generic: true
pymdownx.critic: {}
pymdownx.caret: {}
pymdownx.keys: {}
pymdownx.mark: {}
pymdownx.tilde: {}
pymdownx.snippets:
auto_append:
- !ENV [BUILD_ABBREVIATIONS, "includes/abbreviations.en.txt"]
pymdownx.tasklist:
custom_checkbox: true
attr_list: {}
def_list: {}
md_in_html: {}
meta: {}
abbr: {}
pymdownx.emoji:
emoji_index: !!python/name:material.extensions.emoji.twemoji
emoji_generator: !!python/name:material.extensions.emoji.to_svg
tables: {}
footnotes: {}
toc:
toc_depth: 4
nav:
- !ENV [NAV_HOME, "Home"]: !ENV [MAIN_SITE_BASE_URL, "/en/"]
- !ENV [NAV_KNOWLEDGE_BASE, "Knowledge Base"]:
!ENV [MAIN_SITE_KNOWLEDGE_BASE_URL, "/en/basics/why-privacy-matters/"]
- !ENV [NAV_RECOMMENDATIONS, "Recommendations"]:
!ENV [MAIN_SITE_RECOMMENDATIONS_URL, "/en/tools/"]
- !ENV [NAV_BLOG, "Articles"]: !ENV [ARTICLES_SITE_BASE_URL, "/articles/"]
- !ENV [NAV_VIDEOS, "Videos"]:
- index.md
- "This Week in Privacy": https://discuss.privacyguides.net/c/announcements/livestreams/9414
- playlists.md
- !ENV [NAV_FORUM, "Forum"]: "https://discuss.privacyguides.net/"
- !ENV [NAV_WIKI, "Wiki"]:
!ENV [
NAV_WIKI_LINK,
"https://discuss.privacyguides.net/c/community-wiki/9411/none",
]
- !ENV [NAV_ABOUT, "About"]: !ENV [MAIN_SITE_ABOUT_URL, "/en/about/"]
validation:
nav:
not_found: info

View File

@@ -32,6 +32,7 @@ edit_uri_template:
!ENV [BUILD_EDIT_URI_TEMPLATE, "blob/main/docs/{path}?plain=1"] !ENV [BUILD_EDIT_URI_TEMPLATE, "blob/main/docs/{path}?plain=1"]
extra: extra:
scope: /
generator: false generator: false
context: !ENV [BUILD_CONTEXT, "production"] context: !ENV [BUILD_CONTEXT, "production"]
offline: !ENV [BUILD_OFFLINE, false] offline: !ENV [BUILD_OFFLINE, false]

View File

@@ -44,7 +44,11 @@
<link rel="next" href="{{ page.next_page.url | url }}"> <link rel="next" href="{{ page.next_page.url | url }}">
{% endif %} {% endif %}
{% if config.extra.alternate is iterable %} {% if config.extra.alternate is iterable %}
{% if page.is_homepage %}
<link rel="alternate" href="https://www.privacyguides.org/" hreflang="x-default">
{% else %}
<link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ "en" ~ "/" ~ page.url }}" hreflang="x-default"> <link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ "en" ~ "/" ~ page.url }}" hreflang="x-default">
{% endif %}
{% for alt in config.extra.alternate %} {% for alt in config.extra.alternate %}
<link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ alt.lang ~ "/" ~ page.url }}" hreflang="{{ alt.lang | d(lang.t('language')) }}"> <link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ alt.lang ~ "/" ~ page.url }}" hreflang="{{ alt.lang | d(lang.t('language')) }}">
{% endfor %} {% endfor %}

View File

@@ -1 +0,0 @@
../blog/.authors.yml

View File

@@ -1,14 +0,0 @@
---
description: >-
This is our home for the latest video content from the Privacy Guides team. Be sure you are subscribed to find out about our latest uploads, and share these videos with your family and friends if you find them helpful!
template: video.html
hide:
- footer
---
# Latest Videos
This is our home for the latest video content from the Privacy Guides team. Be sure you are subscribed to find out about our latest uploads, and share these videos with your family and friends if you find them helpful!
[:simple-youtube: Subscribe on YouTube](https://www.youtube.com/@privacyguides){ .md-button .md-button--primary }
[:simple-peertube: Subscribe on PeerTube](https://neat.tube/c/privacyguides){ .md-button .md-button--primary }

View File

@@ -1,3 +0,0 @@
# Playlists
<!-- material/tags -->

View File

@@ -1,5 +0,0 @@
template: video-post.html
hide:
- toc
social:
cards_layout: video

View File

@@ -1,31 +0,0 @@
---
title: 5 Easy Steps to Protect Yourself Online
date:
created: 2025-02-14T17:00:00Z
authors:
- jordan
description: Worried about hackers and data breaches? You're not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.
readtime: 8
thumbnail: https://neat.tube/lazy-static/previews/59e10e27-2bc4-4cd4-8cb7-605b101baf4e.jpg
embed: https://neat.tube/videos/embed/059b71a5-a1aa-44d5-b410-14a69e3082da
peertube: https://neat.tube/w/1GaeNH2GyUark4kNXCcL6Q
youtube: https://www.youtube.com/watch?v=x5bKUA2sVFM
links:
- Password Managers: https://www.privacyguides.org/en/passwords/
- Multifactor Authentication: https://www.privacyguides.org/en/multi-factor-authentication/
- Desktop Browsers: https://www.privacyguides.org/en/desktop-browsers/
- Browser Extensions: https://www.privacyguides.org/en/browser-extensions/
- Recommendation Criteria: https://www.privacyguides.org/en/about/criteria/
---
Worried about hackers and data breaches? You're not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.
## Sources
- The biggest data breaches in 2024: <https://techcrunch.com/2024/10/14/2024-in-data-breaches-1-billion-stolen-records-and-rising/>
- Bitwarden Password Strength Tester: <https://bitwarden.com/password-strength/>
- Proton Pass Showcase video: <https://www.youtube.com/watch?v=4YLxjvxHMYo>
- Bitwarden Showcase video: <https://www.youtube.com/watch?v=3w0sJlgKfWQ>
- Google Incognito Lawsuit: <https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d>
- Google ad for GIMP was malicious: <https://www.bleepingcomputer.com/news/security/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site/>
- Cops were allowed to force a suspect to use thumbprint to unlock phone, says court: <https://9to5mac.com/2024/04/19/thumbprint-to-unlock-phone-kaw/>

View File

@@ -1,66 +0,0 @@
---
title: |
Age Verification is a Privacy Nightmare...
date:
created: 2025-08-15T20:00:00Z
authors:
- jordan
description: |
Age verification laws and propositions forcing platforms to restrict content accessed by children and teens have been multiplying in recent years. The problem is, implementing such measures necessarily requires identifying each user accessing this content, one way or another. This is bad news for your privacy.
readtime: 11
thumbnail: https://neat.tube/lazy-static/previews/90d80b0a-48a9-4c8f-b4c3-74866afa3c49.jpg
embed: https://neat.tube/videos/embed/aR4toTWJpcBZamUdQQpGRu
peertube: https://neat.tube/w/aR4toTWJpcBZamUdQQpGRu
youtube: https://www.youtube.com/watch?v=dczrLhSKO_A
---
## Sources
- 0:05 <https://www.gov.uk/government/collections/online-safety-act>
- 0:08 <https://www.conseil-etat.fr/Pages-internationales/english/news/pornographic-websites-the-order-requiring-user-age-verification-is-maintained>
- 0:11: <https://www.infrastructure.gov.au/media-communications/internet/online-safety/social-media-minimum-age>
- 0:19 <https://help.withpersona.com/articles/1DfUf0PhctXPDY8s1sbOaI/>
- 0:46 <https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites>
- 0:57 <https://www.reddit.com/r/AlJazeera/>
- 1:16 <https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/>
- 1:34 <https://duckduckgo.com/?t=ffab&q=on+device+age+verification&ia=web>
- 1:46 <https://www.idnow.io/>
- 1:46 <https://withpersona.com/>
- 2:11 <https://www.grandviewresearch.com/horizon/outlook/identity-verification-market/north-america>
- 2:28 <https://www.aclu-mn.org/en/news/biased-technology-automated-discrimination-facial-recognition>
- 3:08 <https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/>
- 3:20 <https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/>
- 3:27 <https://www.forbes.com/sites/paultassi/2025/07/31/the-uks-internet-age-verification-is-being-bypassed-by-death-stranding-2-garrys-mod/>
- 3:30 <https://www.youtube.com/watch?v=BfyF3ZUYtyQ>
- 3:33 <https://cybernews.com/security/developer-protests-uk-age-gating-with-mock-mp-ids/>
- 3:56 <https://www.theverge.com/news/650493/discord-age-verification-face-id-scan-experiment>
- 4:09 <https://www.gov.uk/government/collections/online-safety-act>
- 4:26 <https://edition.cnn.com/2025/08/13/tech/youtube-ai-age-verification>
- 4:27 <https://www.nme.com/news/music/youll-now-have-to-verify-your-age-to-access-certain-content-on-spotify-3881717>
- 4:28 <https://arstechnica.com/tech-policy/2025/07/reddit-starts-verifying-ages-of-uk-users-to-comply-with-child-safety-law/>
- 4:36 <https://web.archive.org/web/20250120205725/https://www.thegreenlivingforum.net/forum/viewtopic.php?f=2&t=114519>
- 4:42 <https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/>
- 4:51 <https://www.parl.ca/legisinfo/en/bill/44-1/s-210>
- 4:53 <https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution>
- 5:22 <https://www.infrastructure.gov.au/media-communications/internet/online-safety/social-media-minimum-age>
- 5:54 <https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer>
- 6:08 <https://www.404media.co/uk-users-need-to-post-selfie-or-photo-id-to-view-reddits-r-israelcrimes-r-ukrainewarfootage/>
- 6:16 <https://www.reddit.com/r/IsraelCrimes/>
- 6:18 <https://www.reddit.com/r/lgbt/comments/1m8ipus/how_is_this_okay_reddit_seems_to_be_classifying/>
- 6:20 <https://www.reddit.com/r/AlJazeera/>
- 6:34 <https://en.wikipedia.org/wiki/Criminalization_of_homosexuality>
- 6:50 <https://www.cbc.ca/news/world/facebook-clarifies-breastfeeding-pics-ok-updates-rules-1.2997124>
- 6:56 <https://www.plannedparenthood.org/learn/teens>
- 7:36 <https://www.reddit.com/r/Twitter/comments/1mo4lmn/i_made_a_chrome_extension_to_bypass_age/>
- 7:37 <https://x.com/DanySterkhov/status/1948665431633404170>
- 7:43 <https://arstechnica.com/tech-policy/2025/07/vpn-use-soars-in-uk-after-age-verification-laws-go-into-effect/>
- 7:48 <https://play.google.com/store/apps/details?id=ch.protonvpn.android>
- 8:00 <https://cybernews.com/security/developer-protests-uk-age-gating-with-mock-mp-ids/>
- 8:12 <https://www.youtube.com/watch?v=3vXZzRCc8WA>
- 8:33 <https://withpersona.com/>
- 8:42 <https://www.edps.europa.eu/data-protection/data-protection/glossary/d_en>
- 8:50 <https://www.forbes.com/sites/daveywinder/2025/08/10/google-data-breach---august-8-email-warnings-now-confirmed/>
- 8:52 <https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/>
- 8:55 <https://techcrunch.com/2025/01/15/powerschool-data-breach-victims-say-hackers-stole-all-historical-student-and-teacher-data/>
- 9:33 <https://www.privacyguides.org/articles/2025/05/06/age-verification-wants-your-face/>
- 10:03 <https://www.youtube.com/watch?v=uSliYzklo1w>

View File

@@ -1,56 +0,0 @@
---
title: |
How the NSA Tried to Backdoor Every Phone
date:
created: 2025-07-03T20:00:00Z
authors:
- jordan
tags:
- The History and Future of the Encryption Wars
description: |
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Intentionally separating different parts of your life can help you with managing stress, with keeping your data secure, and with staying private online.
readtime: 9
thumbnail: https://neat.tube/lazy-static/previews/a5ca14cb-0317-4f93-8ac9-ba3257b38b2f.jpg
embed: https://neat.tube/videos/embed/qFThArEaKeHtDu78i27F29
peertube: https://neat.tube/w/qFThArEaKeHtDu78i27F29
youtube: https://www.youtube.com/watch?v=dDD37mSA0iw
---
Imagine a world where every conversation you had, every message you sent, every piece of data on your phone, was an open book to the government. In 1993, the NSA tried to do just that by inserting a tiny chip into everyone's phone. This is the second part of our series on the Crypto Wars, a monumental moment in history that shaped digital privacy forever.
## Sources
0:38 <https://en.wikipedia.org/wiki/Crypto_Wars>
0:52 <https://www.youtube.com/watch?v=2SWjIPwm954>
0:58 <https://www.youtube.com/watch?v=TLfZ5Sb1EGw>
1:02 <https://www.youtube.com/watch?v=bgTxFLHcuKc>
1:06 <https://www.youtube.com/watch?v=cmGkYHtV0Mo>
1:15 <https://www.youtube.com/watch?v=j9Qp7AWIylk>
3:43 <https://www.youtube.com/watch?v=ulWwPwm1jck>
3:46 <https://www.youtube.com/watch?v=hhxX8tSHnl0>
4:00 <https://www.youtube.com/watch?v=9vM0oIEhMag>
4:07 <https://www.youtube.com/watch?v=y36Z9dt5AWI>
4:27 <https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipper-chip.html>
5:18 <https://archive.epic.org/crypto/clipper/foia/att3600_2_9_93.html>
5:49 <https://www.youtube.com/watch?v=re9nG81Vft8>
6:27 <https://dl.acm.org/doi/10.1145/191177.191193>
7:14 <https://www.legislation.gov.uk/ukpga/2023/50/contents>
7:15 <https://www.homeaffairs.gov.au/help-and-support/how-to-engage-us/consultations/the-assistance-and-access-bill-2018>
7:35 <https://www.youtube.com/watch?v=bKIR8JLJOlc>
7:37 <https://www.youtube.com/watch?v=I5WjTTi67BE>

View File

@@ -1,60 +0,0 @@
---
title: |
Compartmentalize Your Life (and Your Privacy)
date:
created: 2025-06-05T20:00:00Z
authors:
- jordan
tags:
- Pride Month
description: |
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Intentionally separating different parts of your life can help you with managing stress, with keeping your data secure, and with staying private online.
readtime: 8
thumbnail: https://neat.tube/lazy-static/previews/d2f0d1c3-8ea8-4c50-9a1b-9534f61874a7.jpg
embed: https://neat.tube/videos/embed/k1EeZGt9886WJQMDz2L9pB
peertube: https://neat.tube/w/k1EeZGt9886WJQMDz2L9pB
youtube: https://www.youtube.com/watch?v=Lhep-1Ynf4g
links:
- The Importance of Data Privacy For The Queer Community: https://www.privacyguides.org/articles/2025/06/03/importance-of-privacy-for-the-queer-community/#seeking-health-information
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
- Threat Modeling: https://www.privacyguides.org/en/basics/threat-modeling/
---
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Compartmentalization can be a good strategy and important privacy technique: Intentionally separating different parts of your life can help you manage stress, keep your data secure, and stay private online.
## Sources
- <https://www.intomore.com/culture/identity/nearly-one-in-five-lgbtq-americans-are-still-in-the-closet-says-new-study/>
- <https://www.forbes.com/sites/daveywinder/2025/03/27/iphone-users-warned-as-dating-apps-leak-sensitive-photos-messages/>
- <https://en.wikipedia.org/wiki/Capital_punishment_for_homosexuality>
## Additional resources
### Helplines
- [Mindline Trans+ (UK)](https://www.mindinsomerset.org.uk/our-services/adult-one-to-one-support/mindline-trans/): A confidential emotional, mental health support helpline for people who identify as Trans, Agender, Gender Fluid or Non-Binary.
- [Trans Lifeline Hotline (US and Canada)](https://translifeline.org/hotline/): Trans peer support over the phone.
- [Suicide & Crisis Helpline (US and Canada)](https://988lifeline.org/): General support 24/7 phone number 988.
- [Suicide & Crisis Helpline (International)](https://en.wikipedia.org/wiki/List_of_suicide_crisis_lines): List of suicide crisis lines around the world.
### Supportive organizations
- [Egale (Canada, International)](https://egale.ca/asylum/): Resources for LGBTQ+ asylum and immigration requests from outside and inside Canada.
- [SOS Homophobie (France)](https://www.sos-homophobie.org/international-content): Non-profit, volunteer-run organization committed to combatting hate-motivated violence and discrimination against LGBTI people.
- [The Trevor Project (US)](https://www.thetrevorproject.org/): Suicide prevention and crisis intervention non-profit organization for LGBTQ+ young people.
- [Trans Rescue (International)](https://transrescue.org/): Organization assisting trans and queer individuals in relocating from dangerous areas to safer places.
- [Twenty10 (Australia)](https://twenty10.org.au/): Sydney-based organization providing a broad range of free support programs to the LGBTIQA+ community.
### International advocacy
- [Amnesty International](https://www.amnesty.org/en/what-we-do/discrimination/lgbti-rights/): Human rights organization running campaigns to protect and uphold the rights of LGBTI people globally.
- [Human Rights Watch](https://www.hrw.org/topic/lgbt-rights): Human rights non-profit who documents and exposes abuses based on sexual orientation and gender identity worldwide, and advocate for better protective laws and policies.

View File

@@ -1,24 +0,0 @@
---
title: Do you need a VPN?
date:
created: 2024-12-12T20:00:00Z
authors:
- jordan
description: Commercial Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. This can have substantial privacy benefits, but not all VPNs are created equal.
readtime: 6
thumbnail: https://neat.tube/lazy-static/previews/3f9c497c-d0f1-4fe8-8ac5-539f0f5e40ed.jpg
embed: https://neat.tube/videos/embed/2e4e81e8-f59e-4eab-be4d-8464a4a83328
peertube: https://neat.tube/w/6HDQH1wnTACKFHh2u1CRQ5
youtube: https://www.youtube.com/watch?v=XByp-F8FXtg
links:
- VPN Recommendations: https://www.privacyguides.org/en/vpn/
- VPN Overview: https://www.privacyguides.org/en/basics/vpn-overview/
---
Commercial Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. This can have substantial privacy benefits, but not all VPNs are created equal. More information about VPNs can be found on our website: <https://www.privacyguides.org/en/basics/vpn-overview/>
## Sources
- VPN Sponsorship Study: <https://www.cs.umd.edu/~dml/papers/vpn-ads-oakland22.pdf>
- VPNs Questionable Security Practices: <https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-VPN-complaint-8-7-17.pdf>
- VPN Relationship Map: <https://kumu.io/Windscribe/vpn-relationships>

View File

@@ -1,24 +0,0 @@
---
title: |
Think Privacy Is Dead? You're Wrong.
date:
created: 2025-04-17T20:00:00Z
authors:
- jordan
description: |
Privacy isnt dead, in fact its growing. In this video, we explore common arguments against protecting your privacy and why they're not only wrong but dangerous.
readtime: 5
thumbnail: https://neat.tube/lazy-static/previews/ebdd1d98-7136-4f5d-9a9e-449004ce47d1.jpg
embed: https://neat.tube/videos/embed/sSx1yyXESXhvZh1E3VTwtG
peertube: https://neat.tube/w/sSx1yyXESXhvZh1E3VTwtG
youtube: https://www.youtube.com/watch?v=Ni2_BN_9xAY
links:
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
- posts/5-easy-steps-to-protect-yourself-online.md
---
Privacy isnt dead, in fact its growing. In this video, we explore common arguments against protecting your privacy and why they're not only wrong but dangerous.
## Sources
- <https://www.wired.com/story/google-app-gmail-chrome-data/>
- <https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/>

View File

@@ -1,26 +0,0 @@
---
title: |
Is Your Data Really Safe? Understanding Encryption
date:
created: 2025-04-03T20:00:00Z
authors:
- jordan
description: |
Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it's so important.
readtime: 7
thumbnail: https://neat.tube/lazy-static/previews/f23bff89-bc84-46b7-ac0b-7e72a9c3ad7d.jpg
embed: https://neat.tube/videos/embed/6gASFPMvy7EBwTiM3XetEZ
peertube: https://neat.tube/w/6gASFPMvy7EBwTiM3XetEZ
youtube: https://www.youtube.com/watch?v=0uQVzK8QWsw
links:
- Privacy Means Safety<br><small>by Em on March 5, 2025</small>: https://www.privacyguides.org/articles/2025/03/25/privacy-means-safety/
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
---
Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it's so important. This is especially crucial as many governments around the world are pushing to ban encryption and breach our fundamental right to privacy.
## Sources
- <https://www.bbc.co.uk/news/articles/cgj54eq4vejo>
- <https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all>
- <https://www.eff.org/deeplinks/2019/12/fancy-new-terms-same-old-backdoors-encryption-debate-2019>
- <https://www.amnesty.org/en/latest/news/2025/02/https-www-amnesty-org-en-latest-news-2025-02-uk-encryption-order-threatens-global-privacy-rights/>

View File

@@ -1,31 +0,0 @@
---
title: It's time to stop using SMS, here's why!
date:
created: 2025-01-24T20:00:00Z
authors:
- jordan
description: Text messaging has been a staple of communication for decades, but it's time to move on. In this video, we'll explore why SMS is an outdated and insecure technology and discuss better alternatives.
readtime: 7
thumbnail: https://neat.tube/lazy-static/previews/f3b63055-e1b3-4691-8687-4a838738141b.jpg
embed: https://neat.tube/videos/embed/7887f661-541c-4bff-9f69-2b7dd81622ca
peertube: https://neat.tube/w/fTfKp1tatNnGTtfP3SwbXu
youtube: https://www.youtube.com/watch?v=B9BWXvn-rB4s
links:
- Instant Messengers: https://www.privacyguides.org/en/real-time-communication/
---
Text messaging has been a staple of communication for decades, but it's time to move on. In this video, we'll explore why SMS is an outdated and insecure technology and discuss better alternatives.
## Sources
- <https://www.ivpn.net/blog/collection-of-user-data-by-isps-and-telecom-providers-and-sharing-with-third-parties>
- <https://www.t-mobile.com/privacy-center/education/analytics-reporting>
- <https://arstechnica.com/tech-policy/2021/03/t-mobile-will-tell-advertisers-how-you-use-the-web-starting-next-month/>
- <https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf>
- <https://www.abc.net.au/news/2024-12-05/united-states-allege-china-behind-salt-typhoon-telecoms-hack/104687712>
- <https://mashable.com/article/salt-typhoon-telcom-hack-explainer-us-china>
- <https://docs.fcc.gov/public/attachments/DOC-408013A1.pdf>
- <https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/>
- <https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-for-development/wp-content/uploads/2019/02/ProofofIdentity2019_WebSpreads.pdf> (Page 12)
- <https://www.gsma.com/solutions-and-impact/technologies/networks/rcs/>
- <https://www.gsma.com/newsroom/article/rcs-nowin-ios-a-new-chapter-for-mobile-messaging/>

View File

@@ -1,37 +0,0 @@
---
title: |
Privacy is Power. And You're Giving Yours Away.
date:
created: 2025-08-29T01:00:00Z
authors:
- jordan
description: |
Privacy isn't about hiding secrets - it's about power. In this video, we explain why thinking you "have nothing to hide" is a dangerous misconception, especially in our ever-connected digital age. Taking back your privacy is easier than you might think!
readtime: 4
thumbnail: https://neat.tube/lazy-static/previews/c2bb2266-f508-4cb6-993c-c458585cb230.jpg
embed: https://neat.tube/videos/embed/vVECH95JDrM4pQf8vP612a
peertube: https://neat.tube/w/vVECH95JDrM4pQf8vP612a
youtube: https://www.youtube.com/watch?v=fPYsIJeN5WE
---
## Sources
- 0:01 <https://www.forbes.com/sites/dereksaul/2023/10/25/meta-earnings-record-profits-sales-as-ads-stay-robust-during-zuckerbergs-year-of-efficiency/>
- 0:03 <https://apnews.com/article/google-alphabet-earnings-artificial-intelligence-antitrust-30a75937bfbd9a4dfcee91cd4594cd59>
- 0:05 <https://www.wired.com/story/openai-valuation-500-billion-skepticism/>
- 1:53 <https://en.wikipedia.org/wiki/General_Data_Protection_Regulation>
- 2:07 <https://duckduckgo.com/?q=privacy+definition&ia=web>
- 2:18 <https://www.euronews.com/>
- 2:22 <https://edition.cnn.com/>
- 2:25 <https://www.france24.com/en/europe/>
- 2:28 <https://www.db.com/index?language_id=3>
- 2:39 <https://apnews.com/hub/europe>
- 3:07 <https://myaccount.google.com/>
- 3:41 <https://www.privacyguides.org/en/>
- 3:55 <https://www.zdnet.com/article/not-just-youtube-google-is-using-ai-to-guess-your-age-based-on-your-activity-everywhere/>
- 3:56 <https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-protect-users-from-malware/>
- 3:57 <https://apnews.com/article/age-verification-kids-social-media-privacy-speech-1cf99c96ab6b461cf7612d312e111e79>
- 3:59 <https://www.wired.com/story/europe-break-encryption-leaked-document-csa-law/>
- 4:01 <https://www.forbes.com/sites/larsdaniel/2024/12/19/eus-chat-control-the-end-of-private-messaging-as-we-know-it/>
- 4:02 <https://www.abc.net.au/news/2024-11-28/social-media-age-ban-passes-parliament/104647138>
- 4:04 <https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/>

View File

@@ -1,23 +0,0 @@
---
title: |
Recall Is Back, But You Still Shouldnt Use It
date:
created: 2025-05-22T22:00:00Z
authors:
- jordan
description: |
Microsoft is rolling out its controversial Recall feature to Windows users with Copilot+ PCs. However, there are still many privacy and security concerns that remain, even after its reworking.
readtime: 6
thumbnail: https://neat.tube/lazy-static/previews/54ba6b19-122f-47b6-8f48-8ed651748fd6.jpg
embed: https://neat.tube/videos/embed/pAAK8bzb6saZfQSqZLW7eU
peertube: https://neat.tube/w/pAAK8bzb6saZfQSqZLW7eU
youtube: https://www.youtube.com/watch?v=AzLsJ-4_fhU
---
Microsoft is rolling out its controversial Recall feature to Windows users with Copilot+ PCs. However, there are still many privacy and security concerns that remain, even after its reworking.
## Sources
- Introducing Copilot+ PC's Full Keynote - Microsoft: <https://www.youtube.com/watch?v=aZbHd4suAnQ>
- Introducing Windows 11 - Microsoft: <https://www.youtube.com/watch?v=Uh9643c2P6k>
- Introducing Copilot - Microsoft: <https://www.youtube.com/watch?v=5rEZGSFgZVY>
- Introducing a new Copilot key for Windows 11 PCs - Microsoft: <https://www.youtube.com/watch?v=S1R08Qx6Fvs>

View File

@@ -1,16 +0,0 @@
---
title: |
Secureblue: Is This the Most Secure Linux Distro?
date:
created: 2025-07-25T18:00:00Z
authors:
- jordan
description: |
Today, were exploring Secureblue, a project aimed at addressing security concerns in traditional Linux distributions by significantly hardening existing components and systems.
readtime: 19
thumbnail: https://neat.tube/lazy-static/previews/708bf564-963b-4c3f-bb0e-5e2424353509.jpg
embed: https://neat.tube/videos/embed/4YA5XTiVbAdYv7nRsCroxn
peertube: https://neat.tube/w/4YA5XTiVbAdYv7nRsCroxn
youtube: https://www.youtube.com/watch?v=hmKQyeyOd54
---
Today, were exploring [**Secureblue**](https://www.privacyguides.org/en/desktop/#secureblue), a project aimed at addressing security concerns in traditional Linux distributions by significantly hardening existing components and systems.

View File

@@ -1,27 +0,0 @@
---
title: |
Stop Confusing Privacy, Anonymity, and Security
date:
created: 2025-03-14T02:00:00Z
authors:
- jordan
description: |
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what tools are best for you.
readtime: 7
thumbnail: https://neat.tube/lazy-static/previews/35388c84-1dc5-4e09-867e-0badf6ea75fa.jpg
embed: https://neat.tube/videos/embed/1f5361c6-2230-4466-9390-659e0a0692ad
peertube: https://neat.tube/w/4SmJxn7Q2XRp7ZGDCxvNUV
youtube: https://www.youtube.com/watch?v=RRt08MvK4tE
links:
- Common Threats: https://www.privacyguides.org/en/basics/common-threats/#security-and-privacy
- Recommended Tools: https://www.privacyguides.org/en/tools/
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
- VPN Overview: https://www.privacyguides.org/en/basics/vpn-overview/
- Do You Need a VPN?: https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/
---
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what [privacy tools](https://www.privacyguides.org/en/tools/) are best for you.
## Sources
- <https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d>
- <https://cloud.google.com/blog/products/chrome-enterprise/chromeos-the-platform-designed-for-zero-trust-security>

View File

@@ -1,40 +0,0 @@
---
title: |
When Code Became a Weapon
date:
created: 2025-05-08T20:00:00Z
authors:
- jordan
description: |
During the Cold War, the US government tried to stop the export of strong cryptography. In this video we'll dive into the history and explain what happened to cause this and why it was eventually overturned.
tags:
- The History and Future of the Encryption Wars
readtime: 10
thumbnail: https://neat.tube/lazy-static/previews/64ffa267-44f4-4780-b283-a620bf856934.jpg
embed: https://neat.tube/videos/embed/8Yrh3JVFbS3ekG8i2JGzjN
peertube: https://neat.tube/w/8Yrh3JVFbS3ekG8i2JGzjN
youtube: https://youtu.be/DtPKBngQcEQ
links:
- Encryption Software: https://www.privacyguides.org/en/encryption/#openpgp
---
During the Cold War, the US government tried to stop the export of strong cryptography. In this video we'll dive into the history and explain what happened to cause this and why it was eventually overturned. The ability to use strong encryption wasnt a given; it has been continually fought for throughout history.
## Sources
- <https://hiddenheroes.netguru.com/philip-zimmermann>
- <https://dubois.com/pgp-case/>
- <https://www.philzimmermann.com/EN/background/index.html>
- <https://www.philzimmermann.com/EN/bibliography/index.html>
- <https://www.philzimmermann.com/multimedia/NPR%20Morning%20Edition%2012%20Jan%201996%20-%20Justice%20Dept%20drops%20Zimmermann%20case.m4a>
- [158,962,555,217,826,360,000 (Enigma Machine) - Numberphile](https://www.youtube.com/watch?v=G2_Q9FoD-oQ&pp=ygUSbnVtYmVycGhpbGUgZW5pZ21h)
- [Enigma Code](https://www.youtube.com/watch?v=LU2s28-tN08&pp=ygUbZW5pZ21hIG1hY2hpbmUgZGlzY292ZXJ5IHVr)
- [Our History](https://www.youtube.com/watch?v=tIDb-rVvHgQ&pp=ygUSb3VyIGhpc3RvcnkgbnNhIHl0)
- [The cold war, Checkpoint Charlie](https://www.youtube.com/watch?v=-pUmfKX3C04&pp=ygUSY2hlY2twb2ludCBjaGFybGll)
- [Ordinary Life in the USSR 1961](https://www.youtube.com/watch?v=ExHCAjRsZhA&pp=ygUYbGlmZSBpbiB0aGUgdXNzciBmb290YWdl)
- [USA: WASHINGTON: ANTI-NUCLEAR PROTESTS](https://www.youtube.com/watch?v=3SbC3EHS04I&pp=ygUZYW50aSBudWtlIHByb3Rlc3QgMTk5MCBhcNIHCQmGCQGHKiGM7w%3D%3D)
- [DEF CON 11 - Phil Zimmerman - A Conversation with Phil Zimmermann](https://www.youtube.com/watch?v=4ww8AAkWFhM&pp=ygUTcGhpbCB6aW1tZXJtYW5uIHBncA%3D%3D)
- [The Screen Savers - Phil Zimmerman, creator of Pretty Good Privacy (PGP) Interview](https://www.youtube.com/watch?v=cZD36L3BXXs&pp=ygUdcGhpbCB6aW1tZXJtYW5uIHNjcmVlbiBzYXZlcnM%3D)
- [Creator of PGP, Phil Zimmermann Talks At Bitcoin Wednesday](https://www.youtube.com/watch?v=M8z0Nx8svC4&pp=ygUXcGhpbCB6aW1tZXJtYW5uIGJpdGNvaW4%3D)
- [Life On The Internet: Networking (1996 Usenet Documentary)](https://www.youtube.com/watch?v=jNme5DlNaZY&pp=ygUbbGlmZSBvbiB0aGUgaW50ZXJuZXIgdXNlbmV0)
- [Snooping is in the nature of govts king of encryption Phil Zimmermann](https://www.youtube.com/watch?v=1eYZ8v_R9jI&pp=ygUdcGhpbCB6aW1tZXJtYW5uIHNjcmVlbiBzYXZlcnM%3D)
- <https://www.eff.org/cases/bernstein-v-us-dept-justice>

View File

@@ -1,22 +0,0 @@
---
title: |
Anonymity for Everyone: Why You Need Tor
date:
created: 2025-03-02T18:00:00Z
authors:
- jordan
description: Tor is an invaluable tool for bypassing censorship and browsing privately, in this week's video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.
readtime: 7
thumbnail: https://neat.tube/lazy-static/previews/c47cf1e6-c0ba-4d80-82fb-fde27e1569c5.jpg
embed: https://neat.tube/videos/embed/725431de-407d-4d36-a4a0-f01e169e0cad
peertube: https://neat.tube/w/f7QkKGe5TJaPi6Y4S61Uoi
youtube: https://www.youtube.com/watch?v=R7vECGYUhyg
links:
- Tor Overview: https://www.privacyguides.org/en/advanced/tor-overview/
- Tor Browser: https://www.privacyguides.org/en/tor/
---
Tor is an invaluable tool for bypassing censorship and browsing privately, in this week's video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.
## Sources
- Tor support documentation: <https://support.torproject.org/>