Updates Intro

pull/20/head
Alicia Sykes 2020-03-22 20:14:50 +00:00 committed by GitHub
parent c1fe79aa27
commit 67beeac2ee
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 5 deletions

View File

@ -3,7 +3,7 @@
[![License](https://img.shields.io/badge/LICENSE-CC_BY_4.0-00a2ff?&style=flat-square)](https://creativecommons.org/licenses/by/4.0/) [![License](https://img.shields.io/badge/LICENSE-CC_BY_4.0-00a2ff?&style=flat-square)](https://creativecommons.org/licenses/by/4.0/)
# Privacy & Security-Focused Software and Services # Privacy & Security-Focused Software and Services
> A curated list of privacy-respecting apps, software, and providers 🔐 A curated list of privacy-respecting apps, software, and providers 🔐
**Too long? 🦒** See the [TLDR version](/2_TLDR_Short_List.md#open-source-privacy-focused-software) instead. **Too long? 🦒** See the [TLDR version](/2_TLDR_Short_List.md#open-source-privacy-focused-software) instead.
@ -13,10 +13,11 @@
## Intro ## Intro
Migrating to encrypted, privacy-respecting open source software and services can greatly Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy.
help protect your privacy, and improve your digital security. Migrating to open-source applications with a strong emphasis on security will help stop
Choosing open-source applications with a strong emphasis on security will help stop large corporations, governments, and hackers from logging, storing or selling your personal data.
corporations, governments, and hackers from logging, storing or selling your personal details.
Be aware that no software is perfect- there will always be bugs and vulnerabilities. Also, applications can only as secure as the system they are running on. You keep your system up-to-date and [follow good security practices](https://github.com/Lissy93/personal-security-checklist).
### Categories ### Categories