Compare commits
1 Commits
main
...
delete-vid
Author | SHA1 | Date | |
---|---|---|---|
815eb65d10
|
@@ -1,6 +1,5 @@
|
||||
:1337 {
|
||||
reverse_proxy /articles/* http://127.0.0.1:8001
|
||||
reverse_proxy /videos/* http://127.0.0.1:8002
|
||||
reverse_proxy /en/* http://127.0.0.1:8000
|
||||
redir / /en/
|
||||
}
|
||||
|
@@ -19,10 +19,6 @@
|
||||
"8001": {
|
||||
"label": "Articles",
|
||||
"onAutoForward": "silent"
|
||||
},
|
||||
"8002": {
|
||||
"label": "Videos",
|
||||
"onAutoForward": "silent"
|
||||
}
|
||||
},
|
||||
"otherPortsAttributes": {
|
||||
@@ -52,20 +48,6 @@
|
||||
"group": "Live server"
|
||||
}
|
||||
},
|
||||
{
|
||||
"label": "Videos",
|
||||
"type": "shell",
|
||||
"command": "mkdocs serve --config-file=mkdocs.videos.yml --dev-addr=localhost:8002",
|
||||
"group": "test",
|
||||
"runOptions": {
|
||||
"runOn": "folderOpen"
|
||||
},
|
||||
"presentation": {
|
||||
"reveal": "always",
|
||||
"panel": "dedicated",
|
||||
"group": "Live server"
|
||||
}
|
||||
},
|
||||
{
|
||||
"label": "Main",
|
||||
"type": "shell",
|
||||
|
17
.github/workflows/build-pr.yml
vendored
@@ -101,24 +101,13 @@ jobs:
|
||||
continue-on-error: true
|
||||
privileged: ${{ fromJSON(needs.metadata.outputs.privileged) }}
|
||||
|
||||
build_videos:
|
||||
if: ${{ contains(github.event.pull_request.labels.*.name, 'ci:build videos') }}
|
||||
needs: [submodule, metadata]
|
||||
uses: ./.github/workflows/build-videos.yml
|
||||
with:
|
||||
ref: ${{github.event.pull_request.head.ref}}
|
||||
repo: ${{github.event.pull_request.head.repo.full_name}}
|
||||
continue-on-error: true
|
||||
privileged: ${{ fromJSON(needs.metadata.outputs.privileged) }}
|
||||
|
||||
combine_build:
|
||||
needs: [build_english, build_i18n, build_blog, build_videos]
|
||||
needs: [build_english, build_i18n, build_blog]
|
||||
if: |
|
||||
(always() && !cancelled() && !failure()) &&
|
||||
needs.build_english.result == 'success' &&
|
||||
(needs.build_i18n.result == 'success' || needs.build_i18n.result == 'skipped') &&
|
||||
(needs.build_blog.result == 'success' || needs.build_blog.result == 'skipped') &&
|
||||
(needs.build_videos.result == 'success' || needs.build_videos.result == 'skipped')
|
||||
(needs.build_blog.result == 'success' || needs.build_blog.result == 'skipped')
|
||||
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
@@ -140,5 +129,5 @@ jobs:
|
||||
|
||||
cleanup:
|
||||
if: ${{ always() }}
|
||||
needs: [build_english, build_i18n, build_blog, build_videos]
|
||||
needs: [build_english, build_i18n, build_blog]
|
||||
uses: privacyguides/.github/.github/workflows/cleanup.yml@main
|
||||
|
116
.github/workflows/build-videos.yml
vendored
@@ -1,116 +0,0 @@
|
||||
name: 🛠️ Build Videos
|
||||
|
||||
on:
|
||||
workflow_call:
|
||||
inputs:
|
||||
ref:
|
||||
required: true
|
||||
type: string
|
||||
repo:
|
||||
required: true
|
||||
type: string
|
||||
context:
|
||||
type: string
|
||||
default: deploy-preview
|
||||
continue-on-error:
|
||||
type: boolean
|
||||
default: true
|
||||
privileged:
|
||||
type: boolean
|
||||
default: true
|
||||
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
build:
|
||||
runs-on: ubuntu-latest
|
||||
continue-on-error: ${{ inputs.continue-on-error }}
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
steps:
|
||||
- name: Add GitHub Token to Environment
|
||||
run: |
|
||||
echo "GH_TOKEN=${{ secrets.GITHUB_TOKEN }}" >> "$GITHUB_ENV"
|
||||
|
||||
- name: Download Repository
|
||||
uses: actions/checkout@v4
|
||||
with:
|
||||
repository: ${{ inputs.repo }}
|
||||
ref: ${{ inputs.ref }}
|
||||
persist-credentials: "false"
|
||||
fetch-depth: 0
|
||||
|
||||
- name: Download Submodules
|
||||
uses: actions/download-artifact@v4
|
||||
with:
|
||||
pattern: repo-*
|
||||
path: modules
|
||||
|
||||
- name: Move mkdocs-material-insiders to mkdocs-material
|
||||
if: inputs.privileged
|
||||
run: |
|
||||
rmdir modules/mkdocs-material
|
||||
mv modules/repo-mkdocs-material-insiders modules/mkdocs-material
|
||||
|
||||
- name: Move brand submodule to theme/assets/brand
|
||||
run: |
|
||||
rmdir theme/assets/brand
|
||||
mv modules/repo-brand theme/assets/brand
|
||||
|
||||
- name: Install Python (pipenv)
|
||||
if: inputs.privileged
|
||||
uses: actions/setup-python@v5
|
||||
with:
|
||||
cache: "pipenv"
|
||||
|
||||
- name: Install Python (no pipenv)
|
||||
if: ${{ !inputs.privileged }}
|
||||
uses: actions/setup-python@v5
|
||||
|
||||
- name: Install Python Dependencies
|
||||
if: inputs.privileged
|
||||
run: |
|
||||
pip install pipenv
|
||||
pipenv install
|
||||
sudo apt install pngquant
|
||||
|
||||
- name: Install Python Dependencies (Unprivileged)
|
||||
if: ${{ !inputs.privileged }}
|
||||
run: |
|
||||
pip install mkdocs-material mkdocs-rss-plugin mkdocs-glightbox mkdocs-macros-plugin
|
||||
sudo apt install pngquant
|
||||
|
||||
- name: Set base navigation URLs for production build
|
||||
if: inputs.context == 'production'
|
||||
run: |
|
||||
{
|
||||
echo "MAIN_SITE_BASE_URL=https://www.privacyguides.org/en/"
|
||||
echo "MAIN_SITE_ABOUT_URL=https://www.privacyguides.org/en/about/"
|
||||
echo "MAIN_SITE_RECOMMENDATIONS_URL=https://www.privacyguides.org/en/tools/"
|
||||
echo "MAIN_SITE_KNOWLEDGE_BASE_URL=https://www.privacyguides.org/en/basics/why-privacy-matters/"
|
||||
echo "ARTICLES_SITE_BASE_URL=https://www.privacyguides.org/articles/"
|
||||
echo "VIDEOS_SITE_BASE_URL=https://www.privacyguides.org/videos/"
|
||||
} >> "$GITHUB_ENV"
|
||||
|
||||
- name: Build Website (Privileged)
|
||||
if: inputs.privileged
|
||||
run: |
|
||||
pipenv run mkdocs build --config-file mkdocs.videos.yml
|
||||
|
||||
- name: Build Website (Unprivileged)
|
||||
if: ${{ !inputs.privileged }}
|
||||
run: |
|
||||
BUILD_INSIDERS=false mkdocs build --config-file mkdocs.videos.yml
|
||||
|
||||
- name: Package Website
|
||||
run: |
|
||||
tar -czf site-build-videos.tar.gz site
|
||||
|
||||
- name: Upload Site
|
||||
uses: actions/upload-artifact@v4
|
||||
with:
|
||||
name: site-build-videos.tar.gz
|
||||
path: site-build-videos.tar.gz
|
||||
retention-days: 1
|
16
.github/workflows/publish-immediate.yml
vendored
@@ -27,7 +27,6 @@ on:
|
||||
- "main"
|
||||
paths:
|
||||
- "blog/**"
|
||||
- "videos/**"
|
||||
|
||||
concurrency:
|
||||
group: release-deployment
|
||||
@@ -61,19 +60,8 @@ jobs:
|
||||
continue-on-error: false
|
||||
context: production
|
||||
|
||||
build_videos:
|
||||
needs: submodule
|
||||
permissions:
|
||||
contents: read
|
||||
uses: ./.github/workflows/build-videos.yml
|
||||
with:
|
||||
repo: ${{ github.repository }}
|
||||
ref: ${{ github.ref }}
|
||||
continue-on-error: false
|
||||
context: production
|
||||
|
||||
deploy:
|
||||
needs: [build_blog, build_videos]
|
||||
needs: [build_blog]
|
||||
uses: privacyguides/webserver/.github/workflows/deploy-garage.yml@main
|
||||
with:
|
||||
environment: production
|
||||
@@ -83,5 +71,5 @@ jobs:
|
||||
|
||||
cleanup:
|
||||
if: ${{ always() }}
|
||||
needs: [build_blog, build_videos]
|
||||
needs: [build_blog]
|
||||
uses: privacyguides/.github/.github/workflows/cleanup.yml@main
|
||||
|
15
.github/workflows/publish-release.yml
vendored
@@ -77,17 +77,6 @@ jobs:
|
||||
continue-on-error: false
|
||||
context: production
|
||||
|
||||
build_videos:
|
||||
needs: submodule
|
||||
permissions:
|
||||
contents: read
|
||||
uses: ./.github/workflows/build-videos.yml
|
||||
with:
|
||||
repo: ${{ github.repository }}
|
||||
ref: ${{ github.ref }}
|
||||
continue-on-error: false
|
||||
context: production
|
||||
|
||||
release:
|
||||
name: Create release notes
|
||||
needs: build
|
||||
@@ -109,7 +98,7 @@ jobs:
|
||||
makeLatest: true
|
||||
|
||||
deploy:
|
||||
needs: [build, build_blog, build_videos]
|
||||
needs: [build, build_blog]
|
||||
uses: privacyguides/webserver/.github/workflows/deploy-all.yml@main
|
||||
secrets:
|
||||
NETLIFY_TOKEN: ${{ secrets.NETLIFY_TOKEN }}
|
||||
@@ -126,5 +115,5 @@ jobs:
|
||||
|
||||
cleanup:
|
||||
if: ${{ always() }}
|
||||
needs: [build, build_blog, build_videos]
|
||||
needs: [build, build_blog]
|
||||
uses: privacyguides/.github/.github/workflows/cleanup.yml@main
|
||||
|
@@ -3,7 +3,7 @@ title: Private Payments
|
||||
icon: material/hand-coin
|
||||
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
|
||||
---
|
||||
Data about your buying habits is considered the holy grail of ad targeting: Your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
|
||||
Data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
|
||||
|
||||
## Cash
|
||||
|
||||
@@ -17,7 +17,7 @@ Despite the above, cash is typically the best option when available.
|
||||
|
||||
You can easily purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually don’t have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout in an effort to reduce fraud.
|
||||
|
||||
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (e.g. from Visa or Mastercard) usually have limits of up to $1,000 per card.
|
||||
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (e.g.: from Visa or Mastercard) usually have limits of up to $1,000 per card.
|
||||
|
||||
Gift cards have the downside of being subject to merchant policies, which can have terrible terms and restrictions. For example, some merchants don’t accept payment in gift cards exclusively, or they may cancel the value of the card if they consider you to be a high-risk user. Once you have merchant credit, the merchant has a strong degree of control over this credit.
|
||||
|
||||
@@ -43,7 +43,7 @@ These tend to be good options for recurring/subscription payments online, while
|
||||
|
||||
## Cryptocurrency
|
||||
|
||||
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a transparent blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only purchase amounts which would not be disastrous to lose.
|
||||
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a transparent blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
|
||||
|
||||
<div class="admonition danger" markdown>
|
||||
<p class="admonition-title">Danger</p>
|
||||
@@ -72,7 +72,7 @@ Anonymous transactions on a transparent blockchain are *theoretically* possible,
|
||||
|
||||
### Wallet Custody
|
||||
|
||||
With cryptocurrency there are two forms of wallets: custodial wallets and self-custody wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Self-custody wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, self-custody wallets provide greater security and censorship resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
|
||||
With cryptocurrency there are two forms of wallets: custodial wallets and self-custody wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Self-custody wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, self-custody wallets provide greater security and censorship-resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
|
||||
|
||||
### Acquisition
|
||||
|
||||
@@ -84,7 +84,7 @@ If you go this route, make sure to purchase Monero at different times and in dif
|
||||
|
||||
## Additional Considerations
|
||||
|
||||
When you're making a payment in person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself.
|
||||
When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself.
|
||||
|
||||
When purchasing online, ideally you should do so over [Tor](tor-overview.md). However, many merchants don’t allow purchases with Tor. You can consider using a [recommended VPN](../vpn.md) (paid for with cash, gift card, or Monero), or making the purchase from a coffee shop or library with free Wi-Fi. If you are ordering a physical item that needs to be delivered, you will need to provide a delivery address. You should consider using a PO box, private mailbox, or work address.
|
||||
|
||||
|
57
docs/dns.md
@@ -1,5 +1,5 @@
|
||||
---
|
||||
title: DNS Resolvers
|
||||
title: "DNS Resolvers"
|
||||
icon: material/dns
|
||||
description: We recommend choosing these encrypted DNS providers to replace your ISP's default configuration.
|
||||
cover: dns.webp
|
||||
@@ -10,7 +10,7 @@ global:
|
||||
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||
|
||||
Encrypted **DNS** with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
||||
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
||||
|
||||
[Learn more about DNS :material-arrow-right-drop-circle:](advanced/dns-overview.md){ .md-button }
|
||||
|
||||
@@ -54,9 +54,52 @@ These are our favorite public DNS resolvers based on their privacy and security
|
||||
|
||||
Quad9: [*Data and Privacy Policy*](https://quad9.net/privacy/policy)
|
||||
|
||||
## Self-Hosted DNS Filtering
|
||||
|
||||
A self-hosted DNS solution is useful for providing filtering on controlled platforms, such as Smart TVs and other IoT devices, as no client-side software is needed.
|
||||
|
||||
### Pi-hole
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements.
|
||||
|
||||
Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content.
|
||||
|
||||
[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation}
|
||||
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
|
||||
|
||||
</details>
|
||||
|
||||
</div>
|
||||
|
||||
### AdGuard Home
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements.
|
||||
|
||||
AdGuard Home features a polished web interface to view insights and manage blocked content.
|
||||
|
||||
[:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentation}
|
||||
[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" }
|
||||
|
||||
</details>
|
||||
|
||||
</div>
|
||||
|
||||
## Cloud-Based DNS Filtering
|
||||
|
||||
These DNS filtering solutions offer a web dashboard where you can customize the block lists to your exact needs. These services can be used easily across multiple networks.
|
||||
These DNS filtering solutions offer a web dashboard where you can customize the block lists to your exact needs, similarly to a Pi-hole. These services are usually easier to set up and configure than self-hosted services like the ones above, and can be used more easily across multiple networks (self-hosted solutions are typically restricted to your home/local network unless you set up a more advanced configuration).
|
||||
|
||||
### Control D
|
||||
|
||||
@@ -64,9 +107,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Control D** is a customizable DNS service which lets you block security threats, unwanted content, and advertisements on a DNS level.
|
||||
|
||||
In addition to their paid plans, they offer a number of preconfigured DNS resolvers you can use for free.
|
||||
**Control D** is a customizable DNS service which lets you block security threats, unwanted content, and advertisements on a DNS level. In addition to their paid plans, they offer a number of preconfigured DNS resolvers you can use for free.
|
||||
|
||||
[:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" }
|
||||
@@ -93,9 +134,7 @@ In addition to their paid plans, they offer a number of preconfigured DNS resolv
|
||||
|
||||
{ align=right }
|
||||
|
||||
**NextDNS** is a customizable DNS service which lets you block security threats, unwanted content, and advertisements on a DNS level.
|
||||
|
||||
They offer a fully functional free plan for limited use.
|
||||
**NextDNS** is a customizable DNS service which lets you block security threats, unwanted content, and advertisements on a DNS level. They offer a fully functional free plan for limited use.
|
||||
|
||||
[:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" }
|
||||
|
@@ -66,20 +66,21 @@ Popular menstrual trackers like [Flo](https://techcrunch.com/2021/01/13/flo-gets
|
||||
|
||||
These general purpose apps can do everything from counting steps and tracking sleep to measuring your heartbeat.
|
||||
|
||||
### Apple Fitness
|
||||
### Apple Health
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
{ align=right }{ align=right }
|
||||
|
||||
**Apple Fitness** is the default fitness app for iOS. Apple Fitness always uses end-to-end encryption when syncing across multiple devices. Additionally, almost all measured data is processed on your device.
|
||||
**Apple Health** is the default health and fitness app for iOS. Apple Health always uses end-to-end encryption when syncing across multiple devices. Additionally, almost all measured data is processed on your device.
|
||||
|
||||
[:octicons-home-16: Homepage](https://apple.com/health){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://apple.com/legal/privacy/consumer-health-personal-data/en-ww){ .card-link title="Privacy Policy" }
|
||||
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1208224953)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-health/id1242545199)
|
||||
|
||||
</details>
|
||||
|
||||
@@ -119,9 +120,9 @@ These apps help you collect and manage personal health data and share it with he
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }{ align=right }
|
||||
{ align=right }{ align=right }
|
||||
|
||||
**Apple Health Records** is a built-in feature within [Apple Health](https://apple.com/health) that allows you to view, store, and share your health records. It shares the security and privacy features of [Apple Fitness](#apple-fitness).
|
||||
**Apple Health Records** is a built-in feature within [Apple Health](#apple-health) that allows you to view, store, and share your health records. It shares the security and privacy features of Apple Health.
|
||||
|
||||
[:octicons-home-16: Homepage](https://apple.com/health){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://apple.com/legal/privacy/consumer-health-personal-data/en-ww){ .card-link title="Privacy Policy" }
|
||||
|
@@ -25,14 +25,14 @@ Features include cycling routes, hiking trails and walking paths, turn-by-turn n
|
||||
|
||||
[:octicons-home-16: Homepage](https://organicmaps.app){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://organicmaps.app/privacy){ .card-link title="Privacy Policy" }
|
||||
[:octicons-code-16:](https://github.com/organicmaps/organicmaps){ .card-link title="Source Code" }
|
||||
[:octicons-code-16:](https://git.omaps.dev/organicmaps/organicmaps){ .card-link title="Source Code" }
|
||||
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.organicmaps)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/app/organic-maps/id1567437057)
|
||||
- [:simple-github: GitHub](https://github.com/organicmaps/organicmaps/releases)
|
||||
- [:simple-forgejo: Forgejo](https://git.omaps.dev/organicmaps/organicmaps/releases)
|
||||
- [:simple-linux: Linux](https://flathub.org/apps/app.organicmaps.desktop)
|
||||
|
||||
</details>
|
||||
|
@@ -1,6 +1,6 @@
|
||||
---
|
||||
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
|
||||
title: Password Managers
|
||||
title: "Password Managers"
|
||||
icon: material/form-textbox-password
|
||||
description: Password managers allow you to securely store and manage passwords and other credentials.
|
||||
cover: passwords.webp
|
||||
@@ -176,10 +176,17 @@ These password managers sync your passwords to a cloud server for easy accessibi
|
||||
|
||||
Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault:
|
||||
|
||||
- [x] Select **Settings → Security → Keys → KDF algorithm → Argon2id**
|
||||
- [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id**
|
||||
|
||||
Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server.
|
||||
|
||||
**Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code.
|
||||
|
||||
[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden){ .md-button }
|
||||
[:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" }
|
||||
[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" }
|
||||
|
||||
### Proton Pass
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
@@ -85,7 +85,7 @@ The firmware of YubiKey is not updatable. If you want features in newer firmware
|
||||
{ width="300" }
|
||||
</figure>
|
||||
|
||||
The **Nitrokey 3A Mini** [has FIDO Authenticator Level 1 Certification](https://www.nitrokey.com/news/2024/nitrokey-3a-mini-receives-official-fido2-certification). The Nitrokey 3 Series in general has a wide range of features such as [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), Personal Identity Verification (PIV), OpenPGP, and TOTP and HOTP authentication.
|
||||
**Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2**, or the **Nitrokey Storage 2**.
|
||||
|
||||
[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" }
|
||||
@@ -95,26 +95,23 @@ The **Nitrokey 3A Mini** [has FIDO Authenticator Level 1 Certification](https://
|
||||
|
||||
</div>
|
||||
|
||||
The [comparison table](https://nitrokey.com/products/nitrokeys) shows how the different Nitrokey models compare to each other in terms of features and other specifications.
|
||||
The [comparison table](https://nitrokey.com/products/nitrokeys) shows how the different Nitrokey models compare to each other in terms of features and other specifications. The **Nitrokey 3** listed will have a combined feature set.
|
||||
|
||||
Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download).
|
||||
|
||||
The Nitrokey 3 Series can act as a password manager. They can store up to 50 different entries, and each entry can contain login, password, comment and OTP.
|
||||
For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.
|
||||
|
||||
<div class="admonition warning" markdown>
|
||||
<p class="admonition-title">Warning</p>
|
||||
|
||||
Excluding the Nitrokey 3, Nitrokeys with HOTP and TOTP storage do not have it encrypted, making them vulnerable to physical attacks.
|
||||
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.
|
||||
|
||||
</div>
|
||||
|
||||
**Nitrokey** also has the **Nitrokey Passkey**, a lower-price security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online). This key provides only basic FIDO2 functionality, but for most people that is all you will need. Some notable features the Security Key series does **not** have include:
|
||||
<div class="admonition warning" markdown>
|
||||
<p class="admonition-title">Warning</p>
|
||||
|
||||
- Password Manager
|
||||
- PIV
|
||||
- OpenPGP
|
||||
- Tamper-resistant smart card
|
||||
- TOTP and HOTP
|
||||
Resetting the OpenPGP interface on a Nitrokey [Pro 2](https://docs.nitrokey.com/nitrokeys/pro/factory-reset) or Nitrokey [Start 2](https://docs.nitrokey.com/nitrokeys/storage/factory-reset) will also make the password database inaccessible.
|
||||
|
||||
</div>
|
||||
|
||||
|
@@ -1,48 +0,0 @@
|
||||
---
|
||||
title: DNS Filtering
|
||||
meta_title: "Self-Hosting DNS Solutions - Privacy Guides"
|
||||
icon: material/dns
|
||||
description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions.
|
||||
cover: dns.webp
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||
- [:material-account-cash: Surveillance Capitalism](../basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||
|
||||
**Self-hosting DNS** is useful for providing [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) on controlled platforms, such as smart TVs and other IoT devices, as no client-side software is needed. Keep in mind that the DNS solutions below are typically restricted to your home or local network unless you set up a more advanced configuration.
|
||||
|
||||
## DNS Sinkholes
|
||||
|
||||
[**DNS sinkholes**](https://en.wikipedia.org/wiki/DNS_sinkhole) use DNS filtering to block unwanted web content such as advertisements.
|
||||
|
||||
### Pi-Hole
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Pi-hole** is an open-source DNS sinkhole which features a friendly web interface to view insights and manage blocked content. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware.
|
||||
|
||||
[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title="Documentation" }
|
||||
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title="Contribute" }
|
||||
|
||||
</div>
|
||||
|
||||
### AdGuard Home
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**AdGuard Home** is an open-source DNS sinkhole which features a polished web interface to view insights and manage blocked content.
|
||||
|
||||
[:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title="Documentation" }
|
||||
[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" }
|
||||
|
||||
</div>
|
@@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Email Servers
|
||||
meta_title: "Self-Hosting Email - Privacy Guides"
|
||||
meta_title: "Self-Hosted Email - Privacy Guides"
|
||||
icon: material/email
|
||||
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
|
||||
cover: email.webp
|
||||
@@ -9,7 +9,7 @@ cover: email.webp
|
||||
|
||||
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||
|
||||
Advanced system administrators may consider setting up their own **email server**. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach:
|
||||
Advanced system administrators may consider setting up their own email server. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach:
|
||||
|
||||
- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019)
|
||||
- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide) (August 2017)
|
||||
|
@@ -1,14 +1,14 @@
|
||||
---
|
||||
title: Self-Hosting
|
||||
meta_title: "Self-Hosting Software and Services - Privacy Guides"
|
||||
description: For our more technical readers, self-hosting software and services can provide additional privacy assurances since you have maximum control over your data.
|
||||
meta_title: "Self-Hosted Software and Services - Privacy Guides"
|
||||
description: For our more technical readers, self-hosted software and services can provide additional privacy assurances since you have maximum control over your data.
|
||||
cover: router.webp
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||
|
||||
**Self-hosting** software and services can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware.
|
||||
Using **self-hosted software and services** can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware.
|
||||
|
||||
Self-hosting your own solutions requires advanced technical knowledge and a deep understanding of the associated risks. By becoming the host for yourself and possibly others, you take on responsibilities you might not otherwise have. Self-hosting privacy software improperly can leave you worse off than using e.g. an end-to-end encrypted service provider, so it is best avoided if you are not already comfortable doing so.
|
||||
|
||||
@@ -24,35 +24,6 @@ Self-hosting your own solutions requires advanced technical knowledge and a deep
|
||||
|
||||
[Learn more :material-arrow-right-drop-circle:](email-servers.md)
|
||||
|
||||
## :material-dns: DNS Filtering
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [AdGuard Home](dns-filtering.md#adguard-home)
|
||||
- { .twemoji loading=lazy } [Pi-Hole](dns-filtering.md#pi-hole)
|
||||
|
||||
</div>
|
||||
|
||||
[Learn more :material-arrow-right-drop-circle:](dns-filtering.md)
|
||||
|
||||
## :material-form-textbox-password: Password Management
|
||||
|
||||
### Vaultwarden
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
{ align=right }
|
||||
|
||||
**Vaultwarden** is an alternative implementation of [Bitwarden](../passwords.md#bitwarden)'s sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy, [official service](https://github.com/bitwarden/server) might not be ideal.
|
||||
|
||||
[:octicons-repo-16: Repository](https://github.com/dani-garcia/vaultwarden#readme){ .md-button .md-button--primary }
|
||||
[:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" }
|
||||
[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" }
|
||||
|
||||
</div>
|
||||
|
||||
## :material-account-supervisor-circle-outline: Social Networks
|
||||
|
||||
Self-hosting your own instance of a social network software can help circumvent potential [censorship on a server level](../social-networks.md#censorship-resistance) by a public server's administrator or admin team.
|
||||
|
@@ -299,6 +299,17 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
|
||||
|
||||
[Learn more :material-arrow-right-drop-circle:](dns.md#encrypted-dns-proxies)
|
||||
|
||||
#### Self-hosted Solutions
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [AdGuard Home](dns.md#adguard-home)
|
||||
- { .twemoji loading=lazy } [Pi-hole](dns.md#pi-hole)
|
||||
|
||||
</div>
|
||||
|
||||
[Learn more :material-arrow-right-drop-circle:](dns.md#self-hosted-dns-filtering)
|
||||
|
||||
### Financial Services
|
||||
|
||||
#### Payment Masking Services
|
||||
@@ -480,9 +491,9 @@ For encrypting your OS drive, we typically recommend using the encryption tool y
|
||||
|
||||
- { .twemoji loading=lazy } [Drip](health-and-wellness.md#drip)
|
||||
- { .twemoji loading=lazy } [Euki](health-and-wellness.md#euki)
|
||||
- { .twemoji loading=lazy } [Apple Fitness](health-and-wellness.md#apple-fitness)
|
||||
- { .twemoji loading=lazy } { .twemoji loading=lazy } [Apple Health](health-and-wellness.md#apple-health)
|
||||
- { .twemoji loading=lazy }{ .twemoji loading=lazy } [Gadgetbridge](health-and-wellness.md#gadgetbridge)
|
||||
- { .twemoji loading=lazy } { .twemoji loading=lazy } [Apple Health Records](health-and-wellness.md#apple-health-records)
|
||||
- { .twemoji loading=lazy } { .twemoji loading=lazy } [Apple Health Records](health-and-wellness.md#apple-health-records)
|
||||
- { .twemoji loading=lazy } [CommonHealth](health-and-wellness.md#commonhealth)
|
||||
|
||||
</div>
|
||||
|
@@ -340,6 +340,7 @@ A VPN is pointless if it can't even provide adequate security. We require all ou
|
||||
|
||||
- Strongest Encryption: RSA-4096.
|
||||
- Optional quantum-resistant encryption.
|
||||
- Forward Secrecy.
|
||||
- Comprehensive published security audits from a reputable third-party firm.
|
||||
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
|
||||
- RAM-only VPN servers.
|
||||
|
@@ -27,6 +27,7 @@ site_description: "Privacy Guides is the most popular & trustworthy non-profit p
|
||||
edit_uri_template: blob/main/blog/{path}?plain=1
|
||||
|
||||
extra:
|
||||
scope: /
|
||||
privacy_guides:
|
||||
footer:
|
||||
intro:
|
||||
|
@@ -1,221 +0,0 @@
|
||||
# Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
|
||||
|
||||
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
# of this software and associated documentation files (the "Software"), to
|
||||
# deal in the Software without restriction, including without limitation the
|
||||
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||
# sell copies of the Software, and to permit persons to whom the Software is
|
||||
# furnished to do so, subject to the following conditions:
|
||||
|
||||
# The above copyright notice and this permission notice shall be included in
|
||||
# all copies or substantial portions of the Software.
|
||||
|
||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||
# IN THE SOFTWARE.
|
||||
|
||||
docs_dir: "videos"
|
||||
site_url: "https://www.privacyguides.org/videos/"
|
||||
site_dir: "site/videos"
|
||||
|
||||
site_name: Privacy Guides
|
||||
site_description: "This is our home for the latest video content from the Privacy Guides team. Privacy Guides is the most popular & trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life."
|
||||
edit_uri_template: blob/main/videos/{path}?plain=1
|
||||
|
||||
extra:
|
||||
privacy_guides:
|
||||
footer:
|
||||
intro:
|
||||
!ENV [
|
||||
FOOTER_INTRO,
|
||||
"Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.",
|
||||
]
|
||||
note:
|
||||
!ENV [
|
||||
FOOTER_NOTE,
|
||||
"We do not make money from recommending certain products, and we do not use affiliate links.",
|
||||
]
|
||||
copyright:
|
||||
author:
|
||||
!ENV [FOOTER_COPYRIGHT_AUTHOR, "Privacy Guides and contributors."]
|
||||
date: !ENV [FOOTER_COPYRIGHT_DATE, "2019-2025"]
|
||||
license:
|
||||
- fontawesome/brands/creative-commons
|
||||
- fontawesome/brands/creative-commons-by
|
||||
- fontawesome/brands/creative-commons-sa
|
||||
homepage: !ENV [MAIN_SITE_BASE_URL, "https://www.privacyguides.org/en/"]
|
||||
generator: false
|
||||
context: !ENV [BUILD_CONTEXT, "production"]
|
||||
offline: !ENV [BUILD_OFFLINE, false]
|
||||
deploy: !ENV DEPLOY_ID
|
||||
social:
|
||||
- icon: simple/mastodon
|
||||
link: https://mastodon.neat.computer/@privacyguides
|
||||
name: !ENV [SOCIAL_MASTODON, "Mastodon"]
|
||||
- icon: simple/peertube
|
||||
link: https://neat.tube/c/privacyguides
|
||||
name: !ENV [SOCIAL_PEERTUBE, "PeerTube"]
|
||||
- icon: simple/matrix
|
||||
link: https://matrix.to/#/#privacyguides:matrix.org
|
||||
name: !ENV [SOCIAL_MATRIX, "Matrix"]
|
||||
- icon: simple/discourse
|
||||
link: https://discuss.privacyguides.net/
|
||||
name: !ENV [SOCIAL_FORUM, "Forum"]
|
||||
- icon: simple/github
|
||||
link: https://github.com/privacyguides
|
||||
name: !ENV [SOCIAL_GITHUB, "GitHub"]
|
||||
- icon: simple/torbrowser
|
||||
link: http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/posts/
|
||||
name: !ENV [SOCIAL_TOR_SITE, "Hidden service"]
|
||||
|
||||
repo_url:
|
||||
!ENV [BUILD_REPO_URL, "https://github.com/privacyguides/privacyguides.org"]
|
||||
repo_name: ""
|
||||
|
||||
theme:
|
||||
name: material
|
||||
language: en
|
||||
custom_dir: theme
|
||||
font:
|
||||
text: Public Sans
|
||||
code: DM Mono
|
||||
palette:
|
||||
- media: "(prefers-color-scheme)"
|
||||
scheme: default
|
||||
accent: deep purple
|
||||
toggle:
|
||||
icon: material/brightness-auto
|
||||
name: !ENV [THEME_DARK, "Switch to dark mode"]
|
||||
- media: "(prefers-color-scheme: dark)"
|
||||
scheme: slate
|
||||
accent: amber
|
||||
toggle:
|
||||
icon: material/brightness-2
|
||||
name: !ENV [THEME_LIGHT, "Switch to light mode"]
|
||||
- media: "(prefers-color-scheme: light)"
|
||||
scheme: default
|
||||
accent: deep purple
|
||||
toggle:
|
||||
icon: material/brightness-5
|
||||
name: !ENV [THEME_AUTO, "Switch to system theme"]
|
||||
favicon: assets/brand/logos/png/favicon-32x32.png
|
||||
icon:
|
||||
repo: simple/github
|
||||
features:
|
||||
- announce.dismiss
|
||||
- navigation.tracking
|
||||
- navigation.tabs
|
||||
- navigation.path
|
||||
- navigation.indexes
|
||||
- navigation.footer
|
||||
- content.action.edit
|
||||
- content.tabs.link
|
||||
- content.tooltips
|
||||
- search.highlight
|
||||
|
||||
extra_css:
|
||||
- assets/stylesheets/extra.css?v=20250723
|
||||
|
||||
watch:
|
||||
- theme
|
||||
- includes
|
||||
|
||||
plugins:
|
||||
blog:
|
||||
blog_dir: .
|
||||
blog_toc: true
|
||||
post_url_format: "{date}/{file}"
|
||||
post_excerpt_max_authors: 0
|
||||
authors_profiles: false
|
||||
categories: false
|
||||
rss:
|
||||
match_path: posts/.*
|
||||
abstract_chars_count: -1
|
||||
date_from_meta:
|
||||
as_creation: date.created
|
||||
as_update: date.updated
|
||||
categories:
|
||||
- categories
|
||||
- tags
|
||||
glightbox: {}
|
||||
tags: {}
|
||||
search: {}
|
||||
privacy:
|
||||
enabled: !ENV [BUILD_PRIVACY, true]
|
||||
offline:
|
||||
enabled: !ENV [BUILD_OFFLINE, false]
|
||||
group:
|
||||
enabled: !ENV [BUILD_INSIDERS, true]
|
||||
plugins:
|
||||
macros: {}
|
||||
meta: {}
|
||||
optimize:
|
||||
enabled: !ENV [OPTIMIZE, PRODUCTION, NETLIFY, false]
|
||||
typeset: {}
|
||||
social:
|
||||
cards: !ENV [CARDS, true]
|
||||
cards_dir: assets/img/social
|
||||
cards_layout_dir: theme/layouts
|
||||
cards_layout: page
|
||||
|
||||
markdown_extensions:
|
||||
admonition: {}
|
||||
pymdownx.details: {}
|
||||
pymdownx.superfences:
|
||||
custom_fences:
|
||||
- name: mermaid
|
||||
class: mermaid
|
||||
format: !!python/name:pymdownx.superfences.fence_code_format
|
||||
pymdownx.tabbed:
|
||||
alternate_style: true
|
||||
pymdownx.arithmatex:
|
||||
generic: true
|
||||
pymdownx.critic: {}
|
||||
pymdownx.caret: {}
|
||||
pymdownx.keys: {}
|
||||
pymdownx.mark: {}
|
||||
pymdownx.tilde: {}
|
||||
pymdownx.snippets:
|
||||
auto_append:
|
||||
- !ENV [BUILD_ABBREVIATIONS, "includes/abbreviations.en.txt"]
|
||||
pymdownx.tasklist:
|
||||
custom_checkbox: true
|
||||
attr_list: {}
|
||||
def_list: {}
|
||||
md_in_html: {}
|
||||
meta: {}
|
||||
abbr: {}
|
||||
pymdownx.emoji:
|
||||
emoji_index: !!python/name:material.extensions.emoji.twemoji
|
||||
emoji_generator: !!python/name:material.extensions.emoji.to_svg
|
||||
tables: {}
|
||||
footnotes: {}
|
||||
toc:
|
||||
toc_depth: 4
|
||||
|
||||
nav:
|
||||
- !ENV [NAV_HOME, "Home"]: !ENV [MAIN_SITE_BASE_URL, "/en/"]
|
||||
- !ENV [NAV_KNOWLEDGE_BASE, "Knowledge Base"]:
|
||||
!ENV [MAIN_SITE_KNOWLEDGE_BASE_URL, "/en/basics/why-privacy-matters/"]
|
||||
- !ENV [NAV_RECOMMENDATIONS, "Recommendations"]:
|
||||
!ENV [MAIN_SITE_RECOMMENDATIONS_URL, "/en/tools/"]
|
||||
- !ENV [NAV_BLOG, "Articles"]: !ENV [ARTICLES_SITE_BASE_URL, "/articles/"]
|
||||
- !ENV [NAV_VIDEOS, "Videos"]:
|
||||
- index.md
|
||||
- "This Week in Privacy": https://discuss.privacyguides.net/c/announcements/livestreams/9414
|
||||
- playlists.md
|
||||
- !ENV [NAV_FORUM, "Forum"]: "https://discuss.privacyguides.net/"
|
||||
- !ENV [NAV_WIKI, "Wiki"]:
|
||||
!ENV [
|
||||
NAV_WIKI_LINK,
|
||||
"https://discuss.privacyguides.net/c/community-wiki/9411/none",
|
||||
]
|
||||
- !ENV [NAV_ABOUT, "About"]: !ENV [MAIN_SITE_ABOUT_URL, "/en/about/"]
|
||||
|
||||
validation:
|
||||
nav:
|
||||
not_found: info
|
@@ -32,6 +32,7 @@ edit_uri_template:
|
||||
!ENV [BUILD_EDIT_URI_TEMPLATE, "blob/main/docs/{path}?plain=1"]
|
||||
|
||||
extra:
|
||||
scope: /
|
||||
generator: false
|
||||
context: !ENV [BUILD_CONTEXT, "production"]
|
||||
offline: !ENV [BUILD_OFFLINE, false]
|
||||
@@ -396,7 +397,6 @@ nav:
|
||||
- !ENV [NAV_SELF_HOSTING, "Self-Hosting"]:
|
||||
- "self-hosting/index.md"
|
||||
- "self-hosting/email-servers.md"
|
||||
- "self-hosting/dns-filtering.md"
|
||||
- !ENV [NAV_INTERNET_BROWSING, "Internet Browsing"]:
|
||||
- "tor.md"
|
||||
- "desktop-browsers.md"
|
||||
|
Before Width: | Height: | Size: 524 B After Width: | Height: | Size: 523 B |
Before Width: | Height: | Size: 1.3 KiB After Width: | Height: | Size: 1.3 KiB |
Before Width: | Height: | Size: 21 KiB |
@@ -0,0 +1 @@
|
||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><defs><linearGradient id="SVGID_1_" x1="166.22" x2="166.22" y1="758.59" y2="757.09" gradientTransform="matrix(28 0 0 -24.5 -4594.5 18606)" gradientUnits="userSpaceOnUse"><stop stop-color="#FF61AD" offset="0"/><stop stop-color="#FF2719" offset="1"/></linearGradient></defs><g id="Symbols_1_" transform="matrix(.3763 0 0 .3763 -1.8815 -1.8815)"><path id="Background" class="st3" d="m63.6 5c9 0 13.5 0 18.4 1.5 5.3 1.9 9.5 6.1 11.4 11.4 1.6 4.9 1.6 9.5 1.6 18.5v27.2c0 9 0 13.5-1.5 18.4-1.9 5.3-6.1 9.5-11.4 11.4-5 1.6-9.5 1.6-18.5 1.6h-27.2c-9 0-13.5 0-18.4-1.5-5.4-2-9.5-6.1-11.5-11.5-1.5-4.8-1.5-9.3-1.5-18.4v-27.2c0-9 0-13.5 1.5-18.4 2-5.3 6.1-9.5 11.5-11.4 4.8-1.6 9.3-1.6 18.4-1.6z" fill="#fff"/><path class="st5" d="m80.7 32c0-6.8-5.2-12-11.2-12-4.2 0-7.6 1.4-9.7 4.5-2.1-3.1-5.5-4.5-9-4.5-6.8 0-12 5.2-12 12v0 0c0 10.1 9.7 20.3 21 24.7 8.8-2.9 20.9-14.6 20.9-24.7v0 0z" fill="url(#SVGID_1_)"/></g></svg>
|
After Width: | Height: | Size: 1016 B |
Before Width: | Height: | Size: 7.6 KiB |
1
theme/assets/img/health-and-wellness/apple-health.svg
Normal file
@@ -0,0 +1 @@
|
||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><linearGradient id="c-5" x1="512" x2="512" y2="1024" gradientUnits="userSpaceOnUse"><stop stop-color="#313131" offset="0"/><stop stop-color="#141414" offset="1"/></linearGradient><linearGradient id="d-9" x1="674.52" x2="674.52" y1="160.14" y2="596.75" gradientTransform="matrix(.98167 0 0 .98167 -32.187 2.9351)" gradientUnits="userSpaceOnUse"><stop stop-color="#ff5fa9" offset="0"/><stop stop-color="#ff281d" offset="1"/></linearGradient></defs><g transform="matrix(.033073 0 0 .033073 2.25e-6 3.75e-7)"><path d="m1024 703.67c0 12.244 0 24.466-0.092 36.687-0.061 10.307-0.1779 20.614-0.4453 30.9-0.2837 22.534-2.2629 45.016-5.9213 67.253-3.8067 22.262-10.908 43.811-21.081 63.958-20.619 40.481-53.528 73.391-94.007 94.012-20.138 10.16-41.678 17.258-63.911 21.06-22.261 3.6732-44.744 5.6545-67.272 5.9217-10.297 0.2661-20.597 0.4218-30.898 0.4669-12.244 0.0714-24.465 0.0714-36.686 0.0714h-383.37c-12.221 0-24.442 0-36.686-0.061-10.301-0.04-20.6-0.1866-30.898-0.4453-22.541-0.2877-45.029-2.2745-67.272-5.944-22.238-3.7846-43.787-10.908-63.911-21.06-40.474-20.616-73.383-53.518-94.007-93.99-10.17-20.159-17.275-41.724-21.081-63.981-3.6583-22.23-5.6377-44.704-5.9213-67.231-0.26726-10.307-0.40038-20.614-0.44544-30.922-0.092159-12.244-0.092159-24.444-0.092159-36.688v-383.35c0-12.244 0-24.488 0.092159-36.732 0.04096-10.285 0.17817-20.592 0.44544-30.877 0.28365-22.527 2.2633-45.001 5.9213-67.231 3.8066-22.262 10.908-43.811 21.081-63.98 20.619-40.481 53.528-73.391 94.007-94.012 20.132-10.154 41.664-17.252 63.888-21.06 22.261-3.651 44.744-5.6322 67.272-5.9216 10.307-0.26726 20.614-0.40038 30.898-0.44544 12.243-0.07168 24.487-0.07168 36.686-0.07168h383.37c12.243 0 24.487 0 36.708 0.07168 10.301 0.04096 20.6 0.18637 30.898 0.44544 22.528 0.28979 45.011 2.2706 67.25 5.9216 22.261 3.8068 43.787 10.908 63.933 21.06 40.489 20.614 73.407 53.526 94.029 94.012 10.161 20.153 17.259 41.71 21.059 63.958 3.6587 22.237 5.638 44.718 5.9214 67.253 0.2674 10.307 0.4002 20.614 0.4453 30.899 0.092 12.244 0.092 24.466 0.092 36.687z" fill="url(#c-5)"/><path d="m532.07 160.24c-20.075 0-37.294 3.9892-53.083 11.074-15.904 7.1368-29.621 17.248-40.67 28.916-12.332 12.867-21.89 28.307-28.873 46.203-13.486 34.728-13.972 77.488-0.79062 117.4 3.9359 11.918 9.1299 24.125 15.652 36.362 16.713 31.207 40.352 61.701 70.671 91.281 15.16 14.716 31.48 29.03 49.227 43.093 17.748 14.063 36.975 27.775 57.311 41.086 5.0286 3.4017 10.179 6.4335 15.355 9.0957s9.079 3.9922 13.212 3.9922c3.6975 0 7.9349-1.33 13.111-3.9922s10.329-5.694 15.357-9.0957c20.336-13.311 39.528-27.023 57.275-41.086 17.748-14.063 34.202-28.477 49.361-43.193 30.319-29.58 53.934-60.174 70.646-91.381 6.5225-12.237 11.718-24.244 15.654-36.162 6.4458-19.517 9.5156-39.73 9.5156-58.445 0-20.898-3.1513-40.59-10.283-58.955-6.9834-17.896-16.541-33.336-28.873-46.203-11.048-11.668-24.764-21.779-40.668-28.916-15.789-7.0852-33.21-11.129-53.285-11.129-23.268 0-42.45 6.0435-58.867 17.432-6.8489 4.732-14.992 11.847-21.328 19.045-7.5867 8.6189-12.591 16.046-17.617 25.338-5.0266-9.2916-10.029-16.719-17.615-25.338-6.336-7.198-14.681-14.313-21.53-19.045-16.417-11.388-35.599-17.377-58.867-17.377z" fill="url(#d-9)"/></g></svg>
|
After Width: | Height: | Size: 3.2 KiB |
Before Width: | Height: | Size: 8.8 KiB |
@@ -1,2 +0,0 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><mask id="holes"><rect x="-60" y="-60" width="120" height="120" fill="#fff"/><circle id="hole" cy="-40" r="3"/><use transform="rotate(72)" xlink:href="#hole"/><use transform="rotate(144)" xlink:href="#hole"/><use transform="rotate(216)" xlink:href="#hole"/><use transform="rotate(-72)" xlink:href="#hole"/></mask></defs><g id="logo" transform="matrix(.32254 0 0 .32254 16.933 16.933)"><g id="gear" mask="url(#holes)" stroke="#fff"><path d="m-31.172-33.813 26.496 74.189h9.3515l26.496-74.189h-9.7672l-16.729 47.589q-1.6625 4.5719-2.8055 8.6242-1.143 3.9484-1.8703 7.5851-0.72734-3.6367-1.8703-7.689-1.143-4.0523-2.8055-8.7281l-16.625-47.381z" fill="#fff" stroke-width="4.5117"/><circle transform="scale(-1,1)" r="43" fill="none" stroke-width="9"/><g id="cogs" transform="scale(-1,1)"><polygon id="cog" points="46 3 51 0 46 -3" fill="#fff" stroke="#fff" stroke-linejoin="round" stroke-width="3"/><g fill="#fff" stroke="#fff"><use transform="rotate(11.25)" xlink:href="#cog"/><use transform="rotate(22.5)" xlink:href="#cog"/><use transform="rotate(33.75)" xlink:href="#cog"/><use transform="rotate(45)" xlink:href="#cog"/><use transform="rotate(56.25)" xlink:href="#cog"/><use transform="rotate(67.5)" xlink:href="#cog"/><use transform="rotate(78.75)" xlink:href="#cog"/><use transform="rotate(90)" xlink:href="#cog"/><use transform="rotate(101.25)" xlink:href="#cog"/><use transform="rotate(112.5)" xlink:href="#cog"/><use transform="rotate(123.75)" xlink:href="#cog"/><use transform="rotate(135)" xlink:href="#cog"/><use transform="rotate(146.25)" xlink:href="#cog"/><use transform="rotate(157.5)" xlink:href="#cog"/><use transform="rotate(168.75)" xlink:href="#cog"/><use transform="scale(-1)" xlink:href="#cog"/><use transform="rotate(191.25)" xlink:href="#cog"/><use transform="rotate(202.5)" xlink:href="#cog"/><use transform="rotate(213.75)" xlink:href="#cog"/><use transform="rotate(225)" xlink:href="#cog"/><use transform="rotate(236.25)" xlink:href="#cog"/><use transform="rotate(247.5)" xlink:href="#cog"/><use transform="rotate(258.75)" xlink:href="#cog"/><use transform="rotate(-90)" xlink:href="#cog"/><use transform="rotate(-78.75)" xlink:href="#cog"/><use transform="rotate(-67.5)" xlink:href="#cog"/><use transform="rotate(-56.25)" xlink:href="#cog"/><use transform="rotate(-45)" xlink:href="#cog"/><use transform="rotate(-33.75)" xlink:href="#cog"/><use transform="rotate(-22.5)" xlink:href="#cog"/><use transform="rotate(-11.25)" xlink:href="#cog"/></g></g><g id="mounts" transform="scale(-1,1)"><polygon id="mount" points="-7 -42 0 -35 7 -42" fill="#fff" stroke="#fff" stroke-linejoin="round" stroke-width="6"/><g fill="#fff" stroke="#fff"><use transform="rotate(72)" xlink:href="#mount"/><use transform="rotate(144)" xlink:href="#mount"/><use transform="rotate(216)" xlink:href="#mount"/><use transform="rotate(-72)" xlink:href="#mount"/></g></g></g><mask><rect x="-60" y="-60" width="120" height="120" fill="#fff"/><circle cy="-40" r="3"/><use transform="rotate(72)" xlink:href="#hole"/><use transform="rotate(144)" xlink:href="#hole"/><use transform="rotate(216)" xlink:href="#hole"/><use transform="rotate(-72)" xlink:href="#hole"/></mask></g></svg>
|
Before Width: | Height: | Size: 3.3 KiB |
@@ -1,2 +0,0 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><mask id="holes"><rect x="-60" y="-60" width="120" height="120" fill="#fff"/><circle id="hole" cy="-40" r="3"/><use transform="rotate(72)" xlink:href="#hole"/><use transform="rotate(144)" xlink:href="#hole"/><use transform="rotate(216)" xlink:href="#hole"/><use transform="rotate(-72)" xlink:href="#hole"/></mask></defs><g id="logo" transform="matrix(.32254 0 0 .32254 16.933 16.933)"><g id="gear" mask="url(#holes)"><path d="m-31.172-33.813 26.496 74.189h9.3515l26.496-74.189h-9.7672l-16.729 47.589q-1.6625 4.5719-2.8055 8.6242-1.143 3.9484-1.8703 7.5851-0.72734-3.6367-1.8703-7.689-1.143-4.0523-2.8055-8.7281l-16.625-47.381z" stroke="#000" stroke-width="4.5117"/><circle transform="scale(-1,1)" r="43" fill="none" stroke="#000" stroke-width="9"/><g id="cogs" transform="scale(-1,1)"><polygon id="cog" points="46 -3 46 3 51 0" stroke="#000" stroke-linejoin="round" stroke-width="3"/><use transform="rotate(11.25)" xlink:href="#cog"/><use transform="rotate(22.5)" xlink:href="#cog"/><use transform="rotate(33.75)" xlink:href="#cog"/><use transform="rotate(45)" xlink:href="#cog"/><use transform="rotate(56.25)" xlink:href="#cog"/><use transform="rotate(67.5)" xlink:href="#cog"/><use transform="rotate(78.75)" xlink:href="#cog"/><use transform="rotate(90)" xlink:href="#cog"/><use transform="rotate(101.25)" xlink:href="#cog"/><use transform="rotate(112.5)" xlink:href="#cog"/><use transform="rotate(123.75)" xlink:href="#cog"/><use transform="rotate(135)" xlink:href="#cog"/><use transform="rotate(146.25)" xlink:href="#cog"/><use transform="rotate(157.5)" xlink:href="#cog"/><use transform="rotate(168.75)" xlink:href="#cog"/><use transform="scale(-1)" xlink:href="#cog"/><use transform="rotate(191.25)" xlink:href="#cog"/><use transform="rotate(202.5)" xlink:href="#cog"/><use transform="rotate(213.75)" xlink:href="#cog"/><use transform="rotate(225)" xlink:href="#cog"/><use transform="rotate(236.25)" xlink:href="#cog"/><use transform="rotate(247.5)" xlink:href="#cog"/><use transform="rotate(258.75)" xlink:href="#cog"/><use transform="rotate(-90)" xlink:href="#cog"/><use transform="rotate(-78.75)" xlink:href="#cog"/><use transform="rotate(-67.5)" xlink:href="#cog"/><use transform="rotate(-56.25)" xlink:href="#cog"/><use transform="rotate(-45)" xlink:href="#cog"/><use transform="rotate(-33.75)" xlink:href="#cog"/><use transform="rotate(-22.5)" xlink:href="#cog"/><use transform="rotate(-11.25)" xlink:href="#cog"/></g><g id="mounts" transform="scale(-1,1)"><polygon id="mount" points="7 -42 -7 -42 0 -35" stroke="#000" stroke-linejoin="round" stroke-width="6"/><use transform="rotate(72)" xlink:href="#mount"/><use transform="rotate(144)" xlink:href="#mount"/><use transform="rotate(216)" xlink:href="#mount"/><use transform="rotate(-72)" xlink:href="#mount"/></g></g><mask><rect x="-60" y="-60" width="120" height="120" fill="#fff"/><circle cy="-40" r="3"/><use transform="rotate(72)" xlink:href="#hole"/><use transform="rotate(144)" xlink:href="#hole"/><use transform="rotate(216)" xlink:href="#hole"/><use transform="rotate(-72)" xlink:href="#hole"/></mask></g></svg>
|
Before Width: | Height: | Size: 3.2 KiB |
@@ -44,7 +44,11 @@
|
||||
<link rel="next" href="{{ page.next_page.url | url }}">
|
||||
{% endif %}
|
||||
{% if config.extra.alternate is iterable %}
|
||||
{% if page.is_homepage %}
|
||||
<link rel="alternate" href="https://www.privacyguides.org/" hreflang="x-default">
|
||||
{% else %}
|
||||
<link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ "en" ~ "/" ~ page.url }}" hreflang="x-default">
|
||||
{% endif %}
|
||||
{% for alt in config.extra.alternate %}
|
||||
<link rel="alternate" href="{{ "https://www.privacyguides.org/" ~ alt.lang ~ "/" ~ page.url }}" hreflang="{{ alt.lang | d(lang.t('language')) }}">
|
||||
{% endfor %}
|
||||
|
@@ -1 +0,0 @@
|
||||
../blog/.authors.yml
|
@@ -1,14 +0,0 @@
|
||||
---
|
||||
description: >-
|
||||
This is our home for the latest video content from the Privacy Guides team. Be sure you are subscribed to find out about our latest uploads, and share these videos with your family and friends if you find them helpful!
|
||||
template: video.html
|
||||
hide:
|
||||
- footer
|
||||
---
|
||||
|
||||
# Latest Videos
|
||||
|
||||
This is our home for the latest video content from the Privacy Guides team. Be sure you are subscribed to find out about our latest uploads, and share these videos with your family and friends if you find them helpful!
|
||||
|
||||
[:simple-youtube: Subscribe on YouTube](https://www.youtube.com/@privacyguides){ .md-button .md-button--primary }
|
||||
[:simple-peertube: Subscribe on PeerTube](https://neat.tube/c/privacyguides){ .md-button .md-button--primary }
|
@@ -1,3 +0,0 @@
|
||||
# Playlists
|
||||
|
||||
<!-- material/tags -->
|
@@ -1,5 +0,0 @@
|
||||
template: video-post.html
|
||||
hide:
|
||||
- toc
|
||||
social:
|
||||
cards_layout: video
|
@@ -1,31 +0,0 @@
|
||||
---
|
||||
title: 5 Easy Steps to Protect Yourself Online
|
||||
date:
|
||||
created: 2025-02-14T17:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: Worried about hackers and data breaches? You're not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.
|
||||
readtime: 8
|
||||
thumbnail: https://neat.tube/lazy-static/previews/59e10e27-2bc4-4cd4-8cb7-605b101baf4e.jpg
|
||||
embed: https://neat.tube/videos/embed/059b71a5-a1aa-44d5-b410-14a69e3082da
|
||||
peertube: https://neat.tube/w/1GaeNH2GyUark4kNXCcL6Q
|
||||
youtube: https://www.youtube.com/watch?v=x5bKUA2sVFM
|
||||
links:
|
||||
- Password Managers: https://www.privacyguides.org/en/passwords/
|
||||
- Multifactor Authentication: https://www.privacyguides.org/en/multi-factor-authentication/
|
||||
- Desktop Browsers: https://www.privacyguides.org/en/desktop-browsers/
|
||||
- Browser Extensions: https://www.privacyguides.org/en/browser-extensions/
|
||||
- Recommendation Criteria: https://www.privacyguides.org/en/about/criteria/
|
||||
---
|
||||
|
||||
Worried about hackers and data breaches? You're not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.
|
||||
|
||||
## Sources
|
||||
|
||||
- The biggest data breaches in 2024: <https://techcrunch.com/2024/10/14/2024-in-data-breaches-1-billion-stolen-records-and-rising/>
|
||||
- Bitwarden Password Strength Tester: <https://bitwarden.com/password-strength/>
|
||||
- Proton Pass Showcase video: <https://www.youtube.com/watch?v=4YLxjvxHMYo>
|
||||
- Bitwarden Showcase video: <https://www.youtube.com/watch?v=3w0sJlgKfWQ>
|
||||
- Google Incognito Lawsuit: <https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d>
|
||||
- Google ad for GIMP was malicious: <https://www.bleepingcomputer.com/news/security/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site/>
|
||||
- Cops were allowed to force a suspect to use thumbprint to unlock phone, says court: <https://9to5mac.com/2024/04/19/thumbprint-to-unlock-phone-kaw/>
|
@@ -1,66 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Age Verification is a Privacy Nightmare...
|
||||
date:
|
||||
created: 2025-08-15T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Age verification laws and propositions forcing platforms to restrict content accessed by children and teens have been multiplying in recent years. The problem is, implementing such measures necessarily requires identifying each user accessing this content, one way or another. This is bad news for your privacy.
|
||||
readtime: 11
|
||||
thumbnail: https://neat.tube/lazy-static/previews/90d80b0a-48a9-4c8f-b4c3-74866afa3c49.jpg
|
||||
embed: https://neat.tube/videos/embed/aR4toTWJpcBZamUdQQpGRu
|
||||
peertube: https://neat.tube/w/aR4toTWJpcBZamUdQQpGRu
|
||||
youtube: https://www.youtube.com/watch?v=dczrLhSKO_A
|
||||
---
|
||||
|
||||
## Sources
|
||||
|
||||
- 0:05 <https://www.gov.uk/government/collections/online-safety-act>
|
||||
- 0:08 <https://www.conseil-etat.fr/Pages-internationales/english/news/pornographic-websites-the-order-requiring-user-age-verification-is-maintained>
|
||||
- 0:11: <https://www.infrastructure.gov.au/media-communications/internet/online-safety/social-media-minimum-age>
|
||||
- 0:19 <https://help.withpersona.com/articles/1DfUf0PhctXPDY8s1sbOaI/>
|
||||
- 0:46 <https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites>
|
||||
- 0:57 <https://www.reddit.com/r/AlJazeera/>
|
||||
- 1:16 <https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/>
|
||||
- 1:34 <https://duckduckgo.com/?t=ffab&q=on+device+age+verification&ia=web>
|
||||
- 1:46 <https://www.idnow.io/>
|
||||
- 1:46 <https://withpersona.com/>
|
||||
- 2:11 <https://www.grandviewresearch.com/horizon/outlook/identity-verification-market/north-america>
|
||||
- 2:28 <https://www.aclu-mn.org/en/news/biased-technology-automated-discrimination-facial-recognition>
|
||||
- 3:08 <https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/>
|
||||
- 3:20 <https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/>
|
||||
- 3:27 <https://www.forbes.com/sites/paultassi/2025/07/31/the-uks-internet-age-verification-is-being-bypassed-by-death-stranding-2-garrys-mod/>
|
||||
- 3:30 <https://www.youtube.com/watch?v=BfyF3ZUYtyQ>
|
||||
- 3:33 <https://cybernews.com/security/developer-protests-uk-age-gating-with-mock-mp-ids/>
|
||||
- 3:56 <https://www.theverge.com/news/650493/discord-age-verification-face-id-scan-experiment>
|
||||
- 4:09 <https://www.gov.uk/government/collections/online-safety-act>
|
||||
- 4:26 <https://edition.cnn.com/2025/08/13/tech/youtube-ai-age-verification>
|
||||
- 4:27 <https://www.nme.com/news/music/youll-now-have-to-verify-your-age-to-access-certain-content-on-spotify-3881717>
|
||||
- 4:28 <https://arstechnica.com/tech-policy/2025/07/reddit-starts-verifying-ages-of-uk-users-to-comply-with-child-safety-law/>
|
||||
- 4:36 <https://web.archive.org/web/20250120205725/https://www.thegreenlivingforum.net/forum/viewtopic.php?f=2&t=114519>
|
||||
- 4:42 <https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/>
|
||||
- 4:51 <https://www.parl.ca/legisinfo/en/bill/44-1/s-210>
|
||||
- 4:53 <https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution>
|
||||
- 5:22 <https://www.infrastructure.gov.au/media-communications/internet/online-safety/social-media-minimum-age>
|
||||
- 5:54 <https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer>
|
||||
- 6:08 <https://www.404media.co/uk-users-need-to-post-selfie-or-photo-id-to-view-reddits-r-israelcrimes-r-ukrainewarfootage/>
|
||||
- 6:16 <https://www.reddit.com/r/IsraelCrimes/>
|
||||
- 6:18 <https://www.reddit.com/r/lgbt/comments/1m8ipus/how_is_this_okay_reddit_seems_to_be_classifying/>
|
||||
- 6:20 <https://www.reddit.com/r/AlJazeera/>
|
||||
- 6:34 <https://en.wikipedia.org/wiki/Criminalization_of_homosexuality>
|
||||
- 6:50 <https://www.cbc.ca/news/world/facebook-clarifies-breastfeeding-pics-ok-updates-rules-1.2997124>
|
||||
- 6:56 <https://www.plannedparenthood.org/learn/teens>
|
||||
- 7:36 <https://www.reddit.com/r/Twitter/comments/1mo4lmn/i_made_a_chrome_extension_to_bypass_age/>
|
||||
- 7:37 <https://x.com/DanySterkhov/status/1948665431633404170>
|
||||
- 7:43 <https://arstechnica.com/tech-policy/2025/07/vpn-use-soars-in-uk-after-age-verification-laws-go-into-effect/>
|
||||
- 7:48 <https://play.google.com/store/apps/details?id=ch.protonvpn.android>
|
||||
- 8:00 <https://cybernews.com/security/developer-protests-uk-age-gating-with-mock-mp-ids/>
|
||||
- 8:12 <https://www.youtube.com/watch?v=3vXZzRCc8WA>
|
||||
- 8:33 <https://withpersona.com/>
|
||||
- 8:42 <https://www.edps.europa.eu/data-protection/data-protection/glossary/d_en>
|
||||
- 8:50 <https://www.forbes.com/sites/daveywinder/2025/08/10/google-data-breach---august-8-email-warnings-now-confirmed/>
|
||||
- 8:52 <https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/>
|
||||
- 8:55 <https://techcrunch.com/2025/01/15/powerschool-data-breach-victims-say-hackers-stole-all-historical-student-and-teacher-data/>
|
||||
- 9:33 <https://www.privacyguides.org/articles/2025/05/06/age-verification-wants-your-face/>
|
||||
- 10:03 <https://www.youtube.com/watch?v=uSliYzklo1w>
|
@@ -1,56 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
How the NSA Tried to Backdoor Every Phone
|
||||
date:
|
||||
created: 2025-07-03T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
tags:
|
||||
- The History and Future of the Encryption Wars
|
||||
description: |
|
||||
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Intentionally separating different parts of your life can help you with managing stress, with keeping your data secure, and with staying private online.
|
||||
readtime: 9
|
||||
thumbnail: https://neat.tube/lazy-static/previews/a5ca14cb-0317-4f93-8ac9-ba3257b38b2f.jpg
|
||||
embed: https://neat.tube/videos/embed/qFThArEaKeHtDu78i27F29
|
||||
peertube: https://neat.tube/w/qFThArEaKeHtDu78i27F29
|
||||
youtube: https://www.youtube.com/watch?v=dDD37mSA0iw
|
||||
---
|
||||
Imagine a world where every conversation you had, every message you sent, every piece of data on your phone, was an open book to the government. In 1993, the NSA tried to do just that by inserting a tiny chip into everyone's phone. This is the second part of our series on the Crypto Wars, a monumental moment in history that shaped digital privacy forever.
|
||||
|
||||
## Sources
|
||||
|
||||
0:38 <https://en.wikipedia.org/wiki/Crypto_Wars>
|
||||
|
||||
0:52 <https://www.youtube.com/watch?v=2SWjIPwm954>
|
||||
|
||||
0:58 <https://www.youtube.com/watch?v=TLfZ5Sb1EGw>
|
||||
|
||||
1:02 <https://www.youtube.com/watch?v=bgTxFLHcuKc>
|
||||
|
||||
1:06 <https://www.youtube.com/watch?v=cmGkYHtV0Mo>
|
||||
|
||||
1:15 <https://www.youtube.com/watch?v=j9Qp7AWIylk>
|
||||
|
||||
3:43 <https://www.youtube.com/watch?v=ulWwPwm1jck>
|
||||
|
||||
3:46 <https://www.youtube.com/watch?v=hhxX8tSHnl0>
|
||||
|
||||
4:00 <https://www.youtube.com/watch?v=9vM0oIEhMag>
|
||||
|
||||
4:07 <https://www.youtube.com/watch?v=y36Z9dt5AWI>
|
||||
|
||||
4:27 <https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipper-chip.html>
|
||||
|
||||
5:18 <https://archive.epic.org/crypto/clipper/foia/att3600_2_9_93.html>
|
||||
|
||||
5:49 <https://www.youtube.com/watch?v=re9nG81Vft8>
|
||||
|
||||
6:27 <https://dl.acm.org/doi/10.1145/191177.191193>
|
||||
|
||||
7:14 <https://www.legislation.gov.uk/ukpga/2023/50/contents>
|
||||
|
||||
7:15 <https://www.homeaffairs.gov.au/help-and-support/how-to-engage-us/consultations/the-assistance-and-access-bill-2018>
|
||||
|
||||
7:35 <https://www.youtube.com/watch?v=bKIR8JLJOlc>
|
||||
|
||||
7:37 <https://www.youtube.com/watch?v=I5WjTTi67BE>
|
@@ -1,60 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Compartmentalize Your Life (and Your Privacy)
|
||||
date:
|
||||
created: 2025-06-05T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
tags:
|
||||
- Pride Month
|
||||
description: |
|
||||
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Intentionally separating different parts of your life can help you with managing stress, with keeping your data secure, and with staying private online.
|
||||
readtime: 8
|
||||
thumbnail: https://neat.tube/lazy-static/previews/d2f0d1c3-8ea8-4c50-9a1b-9534f61874a7.jpg
|
||||
embed: https://neat.tube/videos/embed/k1EeZGt9886WJQMDz2L9pB
|
||||
peertube: https://neat.tube/w/k1EeZGt9886WJQMDz2L9pB
|
||||
youtube: https://www.youtube.com/watch?v=Lhep-1Ynf4g
|
||||
links:
|
||||
- The Importance of Data Privacy For The Queer Community: https://www.privacyguides.org/articles/2025/06/03/importance-of-privacy-for-the-queer-community/#seeking-health-information
|
||||
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
|
||||
- Threat Modeling: https://www.privacyguides.org/en/basics/threat-modeling/
|
||||
---
|
||||
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Compartmentalization can be a good strategy and important privacy technique: Intentionally separating different parts of your life can help you manage stress, keep your data secure, and stay private online.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://www.intomore.com/culture/identity/nearly-one-in-five-lgbtq-americans-are-still-in-the-closet-says-new-study/>
|
||||
|
||||
- <https://www.forbes.com/sites/daveywinder/2025/03/27/iphone-users-warned-as-dating-apps-leak-sensitive-photos-messages/>
|
||||
|
||||
- <https://en.wikipedia.org/wiki/Capital_punishment_for_homosexuality>
|
||||
|
||||
## Additional resources
|
||||
|
||||
### Helplines
|
||||
|
||||
- [Mindline Trans+ (UK)](https://www.mindinsomerset.org.uk/our-services/adult-one-to-one-support/mindline-trans/): A confidential emotional, mental health support helpline for people who identify as Trans, Agender, Gender Fluid or Non-Binary.
|
||||
|
||||
- [Trans Lifeline Hotline (US and Canada)](https://translifeline.org/hotline/): Trans peer support over the phone.
|
||||
|
||||
- [Suicide & Crisis Helpline (US and Canada)](https://988lifeline.org/): General support 24/7 phone number 988.
|
||||
|
||||
- [Suicide & Crisis Helpline (International)](https://en.wikipedia.org/wiki/List_of_suicide_crisis_lines): List of suicide crisis lines around the world.
|
||||
|
||||
### Supportive organizations
|
||||
|
||||
- [Egale (Canada, International)](https://egale.ca/asylum/): Resources for LGBTQ+ asylum and immigration requests from outside and inside Canada.
|
||||
|
||||
- [SOS Homophobie (France)](https://www.sos-homophobie.org/international-content): Non-profit, volunteer-run organization committed to combatting hate-motivated violence and discrimination against LGBTI people.
|
||||
|
||||
- [The Trevor Project (US)](https://www.thetrevorproject.org/): Suicide prevention and crisis intervention non-profit organization for LGBTQ+ young people.
|
||||
|
||||
- [Trans Rescue (International)](https://transrescue.org/): Organization assisting trans and queer individuals in relocating from dangerous areas to safer places.
|
||||
|
||||
- [Twenty10 (Australia)](https://twenty10.org.au/): Sydney-based organization providing a broad range of free support programs to the LGBTIQA+ community.
|
||||
|
||||
### International advocacy
|
||||
|
||||
- [Amnesty International](https://www.amnesty.org/en/what-we-do/discrimination/lgbti-rights/): Human rights organization running campaigns to protect and uphold the rights of LGBTI people globally.
|
||||
|
||||
- [Human Rights Watch](https://www.hrw.org/topic/lgbt-rights): Human rights non-profit who documents and exposes abuses based on sexual orientation and gender identity worldwide, and advocate for better protective laws and policies.
|
@@ -1,24 +0,0 @@
|
||||
---
|
||||
title: Do you need a VPN?
|
||||
date:
|
||||
created: 2024-12-12T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: Commercial Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. This can have substantial privacy benefits, but not all VPNs are created equal.
|
||||
readtime: 6
|
||||
thumbnail: https://neat.tube/lazy-static/previews/3f9c497c-d0f1-4fe8-8ac5-539f0f5e40ed.jpg
|
||||
embed: https://neat.tube/videos/embed/2e4e81e8-f59e-4eab-be4d-8464a4a83328
|
||||
peertube: https://neat.tube/w/6HDQH1wnTACKFHh2u1CRQ5
|
||||
youtube: https://www.youtube.com/watch?v=XByp-F8FXtg
|
||||
links:
|
||||
- VPN Recommendations: https://www.privacyguides.org/en/vpn/
|
||||
- VPN Overview: https://www.privacyguides.org/en/basics/vpn-overview/
|
||||
---
|
||||
|
||||
Commercial Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. This can have substantial privacy benefits, but not all VPNs are created equal. More information about VPNs can be found on our website: <https://www.privacyguides.org/en/basics/vpn-overview/>
|
||||
|
||||
## Sources
|
||||
|
||||
- VPN Sponsorship Study: <https://www.cs.umd.edu/~dml/papers/vpn-ads-oakland22.pdf>
|
||||
- VPNs Questionable Security Practices: <https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-VPN-complaint-8-7-17.pdf>
|
||||
- VPN Relationship Map: <https://kumu.io/Windscribe/vpn-relationships>
|
@@ -1,24 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Think Privacy Is Dead? You're Wrong.
|
||||
date:
|
||||
created: 2025-04-17T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Privacy isn’t dead, in fact it’s growing. In this video, we explore common arguments against protecting your privacy and why they're not only wrong but dangerous.
|
||||
readtime: 5
|
||||
thumbnail: https://neat.tube/lazy-static/previews/ebdd1d98-7136-4f5d-9a9e-449004ce47d1.jpg
|
||||
embed: https://neat.tube/videos/embed/sSx1yyXESXhvZh1E3VTwtG
|
||||
peertube: https://neat.tube/w/sSx1yyXESXhvZh1E3VTwtG
|
||||
youtube: https://www.youtube.com/watch?v=Ni2_BN_9xAY
|
||||
links:
|
||||
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
|
||||
- posts/5-easy-steps-to-protect-yourself-online.md
|
||||
---
|
||||
Privacy isn’t dead, in fact it’s growing. In this video, we explore common arguments against protecting your privacy and why they're not only wrong but dangerous.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://www.wired.com/story/google-app-gmail-chrome-data/>
|
||||
- <https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/>
|
@@ -1,26 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Is Your Data Really Safe? Understanding Encryption
|
||||
date:
|
||||
created: 2025-04-03T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it's so important.
|
||||
readtime: 7
|
||||
thumbnail: https://neat.tube/lazy-static/previews/f23bff89-bc84-46b7-ac0b-7e72a9c3ad7d.jpg
|
||||
embed: https://neat.tube/videos/embed/6gASFPMvy7EBwTiM3XetEZ
|
||||
peertube: https://neat.tube/w/6gASFPMvy7EBwTiM3XetEZ
|
||||
youtube: https://www.youtube.com/watch?v=0uQVzK8QWsw
|
||||
links:
|
||||
- Privacy Means Safety<br><small>by Em on March 5, 2025</small>: https://www.privacyguides.org/articles/2025/03/25/privacy-means-safety/
|
||||
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
|
||||
---
|
||||
Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it's so important. This is especially crucial as many governments around the world are pushing to ban encryption and breach our fundamental right to privacy.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://www.bbc.co.uk/news/articles/cgj54eq4vejo>
|
||||
- <https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all>
|
||||
- <https://www.eff.org/deeplinks/2019/12/fancy-new-terms-same-old-backdoors-encryption-debate-2019>
|
||||
- <https://www.amnesty.org/en/latest/news/2025/02/https-www-amnesty-org-en-latest-news-2025-02-uk-encryption-order-threatens-global-privacy-rights/>
|
@@ -1,31 +0,0 @@
|
||||
---
|
||||
title: It's time to stop using SMS, here's why!
|
||||
date:
|
||||
created: 2025-01-24T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: Text messaging has been a staple of communication for decades, but it's time to move on. In this video, we'll explore why SMS is an outdated and insecure technology and discuss better alternatives.
|
||||
readtime: 7
|
||||
thumbnail: https://neat.tube/lazy-static/previews/f3b63055-e1b3-4691-8687-4a838738141b.jpg
|
||||
embed: https://neat.tube/videos/embed/7887f661-541c-4bff-9f69-2b7dd81622ca
|
||||
peertube: https://neat.tube/w/fTfKp1tatNnGTtfP3SwbXu
|
||||
youtube: https://www.youtube.com/watch?v=B9BWXvn-rB4s
|
||||
links:
|
||||
- Instant Messengers: https://www.privacyguides.org/en/real-time-communication/
|
||||
---
|
||||
|
||||
Text messaging has been a staple of communication for decades, but it's time to move on. In this video, we'll explore why SMS is an outdated and insecure technology and discuss better alternatives.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://www.ivpn.net/blog/collection-of-user-data-by-isps-and-telecom-providers-and-sharing-with-third-parties>
|
||||
- <https://www.t-mobile.com/privacy-center/education/analytics-reporting>
|
||||
- <https://arstechnica.com/tech-policy/2021/03/t-mobile-will-tell-advertisers-how-you-use-the-web-starting-next-month/>
|
||||
- <https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf>
|
||||
- <https://www.abc.net.au/news/2024-12-05/united-states-allege-china-behind-salt-typhoon-telecoms-hack/104687712>
|
||||
- <https://mashable.com/article/salt-typhoon-telcom-hack-explainer-us-china>
|
||||
- <https://docs.fcc.gov/public/attachments/DOC-408013A1.pdf>
|
||||
- <https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/>
|
||||
- <https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-for-development/wp-content/uploads/2019/02/ProofofIdentity2019_WebSpreads.pdf> (Page 12)
|
||||
- <https://www.gsma.com/solutions-and-impact/technologies/networks/rcs/>
|
||||
- <https://www.gsma.com/newsroom/article/rcs-nowin-ios-a-new-chapter-for-mobile-messaging/>
|
@@ -1,37 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Privacy is Power. And You're Giving Yours Away.
|
||||
date:
|
||||
created: 2025-08-29T01:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Privacy isn't about hiding secrets - it's about power. In this video, we explain why thinking you "have nothing to hide" is a dangerous misconception, especially in our ever-connected digital age. Taking back your privacy is easier than you might think!
|
||||
readtime: 4
|
||||
thumbnail: https://neat.tube/lazy-static/previews/c2bb2266-f508-4cb6-993c-c458585cb230.jpg
|
||||
embed: https://neat.tube/videos/embed/vVECH95JDrM4pQf8vP612a
|
||||
peertube: https://neat.tube/w/vVECH95JDrM4pQf8vP612a
|
||||
youtube: https://www.youtube.com/watch?v=fPYsIJeN5WE
|
||||
---
|
||||
|
||||
## Sources
|
||||
|
||||
- 0:01 <https://www.forbes.com/sites/dereksaul/2023/10/25/meta-earnings-record-profits-sales-as-ads-stay-robust-during-zuckerbergs-year-of-efficiency/>
|
||||
- 0:03 <https://apnews.com/article/google-alphabet-earnings-artificial-intelligence-antitrust-30a75937bfbd9a4dfcee91cd4594cd59>
|
||||
- 0:05 <https://www.wired.com/story/openai-valuation-500-billion-skepticism/>
|
||||
- 1:53 <https://en.wikipedia.org/wiki/General_Data_Protection_Regulation>
|
||||
- 2:07 <https://duckduckgo.com/?q=privacy+definition&ia=web>
|
||||
- 2:18 <https://www.euronews.com/>
|
||||
- 2:22 <https://edition.cnn.com/>
|
||||
- 2:25 <https://www.france24.com/en/europe/>
|
||||
- 2:28 <https://www.db.com/index?language_id=3>
|
||||
- 2:39 <https://apnews.com/hub/europe>
|
||||
- 3:07 <https://myaccount.google.com/>
|
||||
- 3:41 <https://www.privacyguides.org/en/>
|
||||
- 3:55 <https://www.zdnet.com/article/not-just-youtube-google-is-using-ai-to-guess-your-age-based-on-your-activity-everywhere/>
|
||||
- 3:56 <https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-protect-users-from-malware/>
|
||||
- 3:57 <https://apnews.com/article/age-verification-kids-social-media-privacy-speech-1cf99c96ab6b461cf7612d312e111e79>
|
||||
- 3:59 <https://www.wired.com/story/europe-break-encryption-leaked-document-csa-law/>
|
||||
- 4:01 <https://www.forbes.com/sites/larsdaniel/2024/12/19/eus-chat-control-the-end-of-private-messaging-as-we-know-it/>
|
||||
- 4:02 <https://www.abc.net.au/news/2024-11-28/social-media-age-ban-passes-parliament/104647138>
|
||||
- 4:04 <https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/>
|
@@ -1,23 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Recall Is Back, But You Still Shouldn’t Use It
|
||||
date:
|
||||
created: 2025-05-22T22:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Microsoft is rolling out its controversial Recall feature to Windows users with Copilot+ PCs. However, there are still many privacy and security concerns that remain, even after its reworking.
|
||||
readtime: 6
|
||||
thumbnail: https://neat.tube/lazy-static/previews/54ba6b19-122f-47b6-8f48-8ed651748fd6.jpg
|
||||
embed: https://neat.tube/videos/embed/pAAK8bzb6saZfQSqZLW7eU
|
||||
peertube: https://neat.tube/w/pAAK8bzb6saZfQSqZLW7eU
|
||||
youtube: https://www.youtube.com/watch?v=AzLsJ-4_fhU
|
||||
---
|
||||
Microsoft is rolling out its controversial Recall feature to Windows users with Copilot+ PCs. However, there are still many privacy and security concerns that remain, even after its reworking.
|
||||
|
||||
## Sources
|
||||
|
||||
- Introducing Copilot+ PC's Full Keynote - Microsoft: <https://www.youtube.com/watch?v=aZbHd4suAnQ>
|
||||
- Introducing Windows 11 - Microsoft: <https://www.youtube.com/watch?v=Uh9643c2P6k>
|
||||
- Introducing Copilot - Microsoft: <https://www.youtube.com/watch?v=5rEZGSFgZVY>
|
||||
- Introducing a new Copilot key for Windows 11 PCs - Microsoft: <https://www.youtube.com/watch?v=S1R08Qx6Fvs>
|
@@ -1,16 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Secureblue: Is This the Most Secure Linux Distro?
|
||||
date:
|
||||
created: 2025-07-25T18:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Today, we’re exploring Secureblue, a project aimed at addressing security concerns in traditional Linux distributions by significantly hardening existing components and systems.
|
||||
readtime: 19
|
||||
thumbnail: https://neat.tube/lazy-static/previews/708bf564-963b-4c3f-bb0e-5e2424353509.jpg
|
||||
embed: https://neat.tube/videos/embed/4YA5XTiVbAdYv7nRsCroxn
|
||||
peertube: https://neat.tube/w/4YA5XTiVbAdYv7nRsCroxn
|
||||
youtube: https://www.youtube.com/watch?v=hmKQyeyOd54
|
||||
---
|
||||
Today, we’re exploring [**Secureblue**](https://www.privacyguides.org/en/desktop/#secureblue), a project aimed at addressing security concerns in traditional Linux distributions by significantly hardening existing components and systems.
|
@@ -1,27 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Stop Confusing Privacy, Anonymity, and Security
|
||||
date:
|
||||
created: 2025-03-14T02:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what tools are best for you.
|
||||
readtime: 7
|
||||
thumbnail: https://neat.tube/lazy-static/previews/35388c84-1dc5-4e09-867e-0badf6ea75fa.jpg
|
||||
embed: https://neat.tube/videos/embed/1f5361c6-2230-4466-9390-659e0a0692ad
|
||||
peertube: https://neat.tube/w/4SmJxn7Q2XRp7ZGDCxvNUV
|
||||
youtube: https://www.youtube.com/watch?v=RRt08MvK4tE
|
||||
links:
|
||||
- Common Threats: https://www.privacyguides.org/en/basics/common-threats/#security-and-privacy
|
||||
- Recommended Tools: https://www.privacyguides.org/en/tools/
|
||||
- Why Privacy Matters: https://www.privacyguides.org/en/basics/why-privacy-matters/
|
||||
- VPN Overview: https://www.privacyguides.org/en/basics/vpn-overview/
|
||||
- Do You Need a VPN?: https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/
|
||||
---
|
||||
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what [privacy tools](https://www.privacyguides.org/en/tools/) are best for you.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d>
|
||||
- <https://cloud.google.com/blog/products/chrome-enterprise/chromeos-the-platform-designed-for-zero-trust-security>
|
@@ -1,40 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
When Code Became a Weapon
|
||||
date:
|
||||
created: 2025-05-08T20:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: |
|
||||
During the Cold War, the US government tried to stop the export of strong cryptography. In this video we'll dive into the history and explain what happened to cause this and why it was eventually overturned.
|
||||
tags:
|
||||
- The History and Future of the Encryption Wars
|
||||
readtime: 10
|
||||
thumbnail: https://neat.tube/lazy-static/previews/64ffa267-44f4-4780-b283-a620bf856934.jpg
|
||||
embed: https://neat.tube/videos/embed/8Yrh3JVFbS3ekG8i2JGzjN
|
||||
peertube: https://neat.tube/w/8Yrh3JVFbS3ekG8i2JGzjN
|
||||
youtube: https://youtu.be/DtPKBngQcEQ
|
||||
links:
|
||||
- Encryption Software: https://www.privacyguides.org/en/encryption/#openpgp
|
||||
---
|
||||
During the Cold War, the US government tried to stop the export of strong cryptography. In this video we'll dive into the history and explain what happened to cause this and why it was eventually overturned. The ability to use strong encryption wasn’t a given; it has been continually fought for throughout history.
|
||||
|
||||
## Sources
|
||||
|
||||
- <https://hiddenheroes.netguru.com/philip-zimmermann>
|
||||
- <https://dubois.com/pgp-case/>
|
||||
- <https://www.philzimmermann.com/EN/background/index.html>
|
||||
- <https://www.philzimmermann.com/EN/bibliography/index.html>
|
||||
- <https://www.philzimmermann.com/multimedia/NPR%20Morning%20Edition%2012%20Jan%201996%20-%20Justice%20Dept%20drops%20Zimmermann%20case.m4a>
|
||||
- [158,962,555,217,826,360,000 (Enigma Machine) - Numberphile](https://www.youtube.com/watch?v=G2_Q9FoD-oQ&pp=ygUSbnVtYmVycGhpbGUgZW5pZ21h)
|
||||
- [Enigma Code](https://www.youtube.com/watch?v=LU2s28-tN08&pp=ygUbZW5pZ21hIG1hY2hpbmUgZGlzY292ZXJ5IHVr)
|
||||
- [Our History](https://www.youtube.com/watch?v=tIDb-rVvHgQ&pp=ygUSb3VyIGhpc3RvcnkgbnNhIHl0)
|
||||
- [The cold war, Checkpoint Charlie](https://www.youtube.com/watch?v=-pUmfKX3C04&pp=ygUSY2hlY2twb2ludCBjaGFybGll)
|
||||
- [Ordinary Life in the USSR 1961](https://www.youtube.com/watch?v=ExHCAjRsZhA&pp=ygUYbGlmZSBpbiB0aGUgdXNzciBmb290YWdl)
|
||||
- [USA: WASHINGTON: ANTI-NUCLEAR PROTESTS](https://www.youtube.com/watch?v=3SbC3EHS04I&pp=ygUZYW50aSBudWtlIHByb3Rlc3QgMTk5MCBhcNIHCQmGCQGHKiGM7w%3D%3D)
|
||||
- [DEF CON 11 - Phil Zimmerman - A Conversation with Phil Zimmermann](https://www.youtube.com/watch?v=4ww8AAkWFhM&pp=ygUTcGhpbCB6aW1tZXJtYW5uIHBncA%3D%3D)
|
||||
- [The Screen Savers - Phil Zimmerman, creator of Pretty Good Privacy (PGP) Interview](https://www.youtube.com/watch?v=cZD36L3BXXs&pp=ygUdcGhpbCB6aW1tZXJtYW5uIHNjcmVlbiBzYXZlcnM%3D)
|
||||
- [Creator of PGP, Phil Zimmermann Talks At Bitcoin Wednesday](https://www.youtube.com/watch?v=M8z0Nx8svC4&pp=ygUXcGhpbCB6aW1tZXJtYW5uIGJpdGNvaW4%3D)
|
||||
- [Life On The Internet: Networking (1996 Usenet Documentary)](https://www.youtube.com/watch?v=jNme5DlNaZY&pp=ygUbbGlmZSBvbiB0aGUgaW50ZXJuZXIgdXNlbmV0)
|
||||
- [Snooping is in the nature of govts – king of encryption Phil Zimmermann](https://www.youtube.com/watch?v=1eYZ8v_R9jI&pp=ygUdcGhpbCB6aW1tZXJtYW5uIHNjcmVlbiBzYXZlcnM%3D)
|
||||
- <https://www.eff.org/cases/bernstein-v-us-dept-justice>
|
@@ -1,22 +0,0 @@
|
||||
---
|
||||
title: |
|
||||
Anonymity for Everyone: Why You Need Tor
|
||||
date:
|
||||
created: 2025-03-02T18:00:00Z
|
||||
authors:
|
||||
- jordan
|
||||
description: Tor is an invaluable tool for bypassing censorship and browsing privately, in this week's video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.
|
||||
readtime: 7
|
||||
thumbnail: https://neat.tube/lazy-static/previews/c47cf1e6-c0ba-4d80-82fb-fde27e1569c5.jpg
|
||||
embed: https://neat.tube/videos/embed/725431de-407d-4d36-a4a0-f01e169e0cad
|
||||
peertube: https://neat.tube/w/f7QkKGe5TJaPi6Y4S61Uoi
|
||||
youtube: https://www.youtube.com/watch?v=R7vECGYUhyg
|
||||
links:
|
||||
- Tor Overview: https://www.privacyguides.org/en/advanced/tor-overview/
|
||||
- Tor Browser: https://www.privacyguides.org/en/tor/
|
||||
---
|
||||
Tor is an invaluable tool for bypassing censorship and browsing privately, in this week's video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.
|
||||
|
||||
## Sources
|
||||
|
||||
- Tor support documentation: <https://support.torproject.org/>
|