summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKatherine Peeters <katherine.peeters@leagueh.xyz>2021-11-22 14:06:26 -0800
committerKatherine Peeters <katherine.peeters@leagueh.xyz>2021-11-22 14:06:26 -0800
commitd7267716818d857d8edd881f66b4db21e6f687de (patch)
tree3f40453284075c389b0c99309ec1236ba9d82d07
parentfeb104919eba1f53376a5909c797d055481c7fa0 (diff)
downloadloh-website-d7267716818d857d8edd881f66b4db21e6f687de.tar.gz
Fixed typo and dead link in privacy guide
-rw-r--r--site/en/privacy.gmi4
1 files changed, 2 insertions, 2 deletions
diff --git a/site/en/privacy.gmi b/site/en/privacy.gmi
index 434e5d1..b4755aa 100644
--- a/site/en/privacy.gmi
+++ b/site/en/privacy.gmi
@@ -15,7 +15,7 @@ Here's some tips on how to improve your privacy on the net! Disclaimer: This is
* Use a VPN or Tor. Note that using a VPN **does not automatically make your connection private**; you need to ensure that your VPN provider does not log your traffic and change your IP address frequently, and even then absolute anonymity is not guaranteed. The vast majority of commerical VPN services use deceptive marketing, and do not enhance your privacy whatsoever. Tor[4] is a much more reliable option, with the only major downside being that Tor is much slower than traditional VPN services. Unlike commerical VPN offerings, Tor is run by a 501(c)(3) nonprofit group aiming to protect human rights amongst prosecuted groups.
* Use secure email. Do not use a web email client; instead, download an open source client to your device, and ensure that your client is connecting to servers securely via IMAPS and SMTPS (rather than unencrypted IMAP or SMTP). Use OpenPGP[5] encryption to provide further protection. If you need an email address for an online account you don't care about, use a disposable email service such as Guerilla Mail[6].
* Do not use biometrics. Face recognition and fingerprint scanning is convenient, but not good for security. Most commerical face recognition devices can be defeated very easily.
-* Full disk encryption should be used if your device contains information that you would not want someone to get hold off in the event that your device was stolen.
+* Full disk encryption should be used if your device contains information that you would not want someone to get hold of in the event that your device was stolen.
* Ensure your camera app does not save location tags. As an extra precaution, strip EXIF metadata from any images before you upload them to the internet.
You may not want or be able to follow all of the above rules, but you should follow as many as you can in order to ensure your safety on the internet.
@@ -30,7 +30,7 @@ You may not want or be able to follow all of the above rules, but you should fol
## Alternatives to proprietary services
=> https://duckduckgo.com/ DuckDuckGo, an alternative to Google Search
-=> https://invidious.snoptya.org/ Invidious, an alternative YouTube player
+=> https://invidious.io/ Invidious, an alternative YouTube player
=> https://notabug.org/ NotABug, an open source alternative to GitHub
=> https://tox.chat/ Tox, a peer-to-peer and open source alternative to messengers
=> https://netsplit.de/ netsplit.de, an information site for IRC, which is an alternative to chat rooms such as Discord