From 23451b9cc96f0c6aab4349ed2c0192635ba0e063 Mon Sep 17 00:00:00 2001 From: djoate <56777051+djoate@users.noreply.github.com> Date: Sat, 19 Oct 2019 20:18:29 -0700 Subject: [PATCH] Fix some typos, grammar, etc. on the site Fixes some issues with typos, capitalization, grammar, and et cetera. --- _includes/footer.html | 2 +- _includes/sections/browser-fingerprint.html | 2 +- _includes/sections/browser-recommendation.html | 16 ++++++++-------- _includes/sections/browser-webrtc.html | 4 ++-- _includes/sections/calendar-contacts-sync.html | 4 ++-- _includes/sections/cloud-storage.html | 2 +- _includes/sections/file-sharing.html | 4 ++-- _includes/sections/fourteen-eyes.html | 2 +- _includes/sections/instant-messenger.html | 2 +- _includes/sections/key-disclosure-law.html | 2 +- _includes/sections/live-operating-systems.html | 2 +- _includes/sections/router-firmware.html | 2 +- _includes/sections/teamchat.html | 4 ++-- _includes/sections/vpn.html | 8 ++++---- _includes/sections/windows10.html | 4 ++-- pages/providers/vpn.html | 18 +++++++++--------- 16 files changed, 39 insertions(+), 39 deletions(-) diff --git a/_includes/footer.html b/_includes/footer.html index 5c7cfa7b..5fe90858 100644 --- a/_includes/footer.html +++ b/_includes/footer.html @@ -73,7 +73,7 @@

No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests. - privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt. + privacytools.io is a socially-motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt. View our privacy statement.

diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 4c2144b1..5696c016 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -12,7 +12,7 @@

-

You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.

+

You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.

Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.

diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html index 1859668d..ebf291cc 100644 --- a/_includes/sections/browser-recommendation.html +++ b/_includes/sections/browser-recommendation.html @@ -6,7 +6,7 @@ {% include cardv2.html title="Firefox" image="/assets/img/tools/Firefox.png" -description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our +description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.' website="https://firefox.com" forum="https://forum.privacytools.io/t/discussion-firefox/279" @@ -22,7 +22,7 @@ netbsd="http://pkgsrc.se/www/firefox" {% include cardv2.html title="Tor Browser - Provides Anonymity" image="/assets/img/tools/Tor-Browser.png" -description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. How does Tor work?' +description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. How does Tor work?' website="https://www.torproject.org/" tor="http://expyuzz4wqqyqhjn.onion/" forum="https://forum.privacytools.io/t/discussion-tor-browser/278" @@ -40,7 +40,7 @@ linux="https://www.torproject.org/download/" {% include cardv2.html title="Firefox" image="/assets/img/tools/Firefox.png" -description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our +description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.' website="https://www.mozilla.org/en-US/firefox/mobile/" forum="https://forum.privacytools.io/t/discussion-firefox/279" @@ -79,7 +79,7 @@ android="https://www.bromite.org/#download-bromite" @@ -145,7 +145,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your

In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.

Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.

Should I use encrypted DNS with a VPN?

-

The answer to this question is also the not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.

+

The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.

However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.

What if I need anonymity?

VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.

@@ -159,9 +159,9 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your

A VPN may still be useful to you in a variety of scenarios, such as:

  1. Hiding your traffic from only your Internet Service Provider.
  2. -
  3. Hiding your downloads (such as Torrents) from your ISP and anti-piracy organizations.
  4. +
  5. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
-

For use-cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.

+

For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.

@@ -170,7 +170,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
  1. VPN - a Very Precarious Narrative by Dennis Schubert
  2. Don't use VPN services by Sven Slootweg
  3. -
  4. Self-contained networks on privacytools.io are able to replace a VPN that allows access to services on local area network
  5. +
  6. The self-contained networks recommended on privacytools.io are able to replace a VPN that allows access to services on local area network
  7. Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
  8. Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447