From 23451b9cc96f0c6aab4349ed2c0192635ba0e063 Mon Sep 17 00:00:00 2001 From: djoate <56777051+djoate@users.noreply.github.com> Date: Sat, 19 Oct 2019 20:18:29 -0700 Subject: [PATCH] Fix some typos, grammar, etc. on the site Fixes some issues with typos, capitalization, grammar, and et cetera. --- _includes/footer.html | 2 +- _includes/sections/browser-fingerprint.html | 2 +- _includes/sections/browser-recommendation.html | 16 ++++++++-------- _includes/sections/browser-webrtc.html | 4 ++-- _includes/sections/calendar-contacts-sync.html | 4 ++-- _includes/sections/cloud-storage.html | 2 +- _includes/sections/file-sharing.html | 4 ++-- _includes/sections/fourteen-eyes.html | 2 +- _includes/sections/instant-messenger.html | 2 +- _includes/sections/key-disclosure-law.html | 2 +- _includes/sections/live-operating-systems.html | 2 +- _includes/sections/router-firmware.html | 2 +- _includes/sections/teamchat.html | 4 ++-- _includes/sections/vpn.html | 8 ++++---- _includes/sections/windows10.html | 4 ++-- pages/providers/vpn.html | 18 +++++++++--------- 16 files changed, 39 insertions(+), 39 deletions(-) diff --git a/_includes/footer.html b/_includes/footer.html index 5c7cfa7b..5fe90858 100644 --- a/_includes/footer.html +++ b/_includes/footer.html @@ -73,7 +73,7 @@
No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests. - privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt. + privacytools.io is a socially-motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt. View our privacy statement.
diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 4c2144b1..5696c016 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -12,7 +12,7 @@
-You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
+You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html index 1859668d..ebf291cc 100644 --- a/_includes/sections/browser-recommendation.html +++ b/_includes/sections/browser-recommendation.html @@ -6,7 +6,7 @@ {% include cardv2.html title="Firefox" image="/assets/img/tools/Firefox.png" -description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our +description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.' website="https://firefox.com" forum="https://forum.privacytools.io/t/discussion-firefox/279" @@ -22,7 +22,7 @@ netbsd="http://pkgsrc.se/www/firefox" {% include cardv2.html title="Tor Browser - Provides Anonymity" image="/assets/img/tools/Tor-Browser.png" -description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. How does Tor work?' +description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. How does Tor work?' website="https://www.torproject.org/" tor="http://expyuzz4wqqyqhjn.onion/" forum="https://forum.privacytools.io/t/discussion-tor-browser/278" @@ -40,7 +40,7 @@ linux="https://www.torproject.org/download/" {% include cardv2.html title="Firefox" image="/assets/img/tools/Firefox.png" -description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our +description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.' website="https://www.mozilla.org/en-US/firefox/mobile/" forum="https://forum.privacytools.io/t/discussion-firefox/279" @@ -79,7 +79,7 @@ android="https://www.bromite.org/#download-bromite"If you want to make sure every single WebRTC related setting is really disabled change these settings:
+If you want to make sure every single WebRTC-related setting is really disabled change these settings:
WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
+WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
+The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
+Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
diff --git a/_includes/sections/live-operating-systems.html b/_includes/sections/live-operating-systems.html index d718ece0..f02b4872 100644 --- a/_includes/sections/live-operating-systems.html +++ b/_includes/sections/live-operating-systems.html @@ -3,7 +3,7 @@ {% include cardv2.html title="Tails" image="/assets/img/tools/Tails.png" -description='Tails is a live operating system, that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps to: Use the Internet anonymously and circumvent censorship; Internet connections go through the Tor network; leave no trace on the computer; use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.' +description='Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps you to use the Internet anonymously and circumvent censorship by forcing Internet connections to go through the Tor network; leave no trace on the computer; and use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.' badges="info:GNU/Linux" labels="warning:contrib:This software may depend on or recommend non-free software." website="https://tails.boum.org/" diff --git a/_includes/sections/router-firmware.html b/_includes/sections/router-firmware.html index 1f785d5e..01360ed3 100644 --- a/_includes/sections/router-firmware.html +++ b/_includes/sections/router-firmware.html @@ -33,5 +33,5 @@ git="https://gogs.librecmc.org/libreCMC/libreCMC"Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security, they have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
+Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
Mullvad has 409 servers in 38 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
In addition to standard OpenVPN connections, Mullvad supports Wireguard. Wireguard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
+In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de. The security researchers concluded:
@@ -58,7 +58,7 @@442+ Servers
ProtonVPN has 442 servers in 33 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
Accepts Bitcoin
-ProtonVPN does technically accept Bitcoin payments, however you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
+ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
Mobile Clients
In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
Extra Functionality
@@ -72,7 +72,7 @@
IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately due to its lack of an independent security audit it does not meet the complete criteria for recommendation, see our notes below.
+IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team reportedly plans to begin the process in September.
We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner. diff --git a/_includes/sections/windows10.html b/_includes/sections/windows10.html index 8ea3cc88..6d4987b4 100644 --- a/_includes/sections/windows10.html +++ b/_includes/sections/windows10.html @@ -80,7 +80,7 @@
We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a kill-switch to block network data leaks when disconnected.
+We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
Minimum to Qualify:
@@ -59,8 +59,8 @@ description: "Find a no-logging VPN operator who isn't out to sell or read yourBest Case:
A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security. Ideally in a very comprehensive manner and on a repeated (yearly) basis.
+A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
Minimum to Qualify:
@@ -102,7 +102,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read yourIn most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
The answer to this question is also the not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
+The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.
@@ -159,9 +159,9 @@ description: "Find a no-logging VPN operator who isn't out to sell or read yourA VPN may still be useful to you in a variety of scenarios, such as:
For use-cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
+For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.