From edfa5c0f85cc831de36166cc46cddb14e5f84454 Mon Sep 17 00:00:00 2001 From: liss-bot Date: Sun, 3 Jul 2022 02:30:16 +0100 Subject: [PATCH 1/6] =?UTF-8?q?=F0=9F=92=93=20Updates=20contributors=20lis?= =?UTF-8?q?t?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ATTRIBUTIONS.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/ATTRIBUTIONS.md b/ATTRIBUTIONS.md index 347f242..88db4c9 100644 --- a/ATTRIBUTIONS.md +++ b/ATTRIBUTIONS.md @@ -276,7 +276,7 @@ Thanks goes to these wonderful people marjamis
- marjamis + Marjamis
@@ -388,10 +388,10 @@ Thanks goes to these wonderful people - - D0xx249 + + Z4rak
- Felipe + Z4rak
From d1575bfeb7062618cae298112a8aacbf21cbf465 Mon Sep 17 00:00:00 2001 From: Alicia Bot <87835202+liss-bot@users.noreply.github.com> Date: Sun, 3 Jul 2022 02:30:21 +0100 Subject: [PATCH 2/6] =?UTF-8?q?=F0=9F=92=93=20Updates=20contributor=20SVG?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .github/CONTRIBUTORS.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/CONTRIBUTORS.svg b/.github/CONTRIBUTORS.svg index 7a1f94c..151f6af 100644 --- a/.github/CONTRIBUTORS.svg +++ b/.github/CONTRIBUTORS.svg @@ -99,7 +99,7 @@ - + From caefd7086a220ac8fb28d5aaecc5e5c39d359d5e Mon Sep 17 00:00:00 2001 From: Alicia Sykes Date: Thu, 7 Jul 2022 12:43:21 +0100 Subject: [PATCH 3/6] =?UTF-8?q?Adds=20WhoTracks.Me=20under=20Links=20?= =?UTF-8?q?=E2=86=92=20Online=20Tools?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 4_Privacy_And_Security_Links.md | 1 + 1 file changed, 1 insertion(+) diff --git a/4_Privacy_And_Security_Links.md b/4_Privacy_And_Security_Links.md index 77aa616..f3806ca 100644 --- a/4_Privacy_And_Security_Links.md +++ b/4_Privacy_And_Security_Links.md @@ -337,6 +337,7 @@ See also: [awesome-sec-talks](https://github.com/PaulSec/awesome-sec-talks) by @ - [Have I been Pwned](https://haveibeenpwned.com) and [Dehashed](https://www.dehashed.com) - Check if your details have been compromised - [Redirect Detective](https://redirectdetective.com) - Check where a suspicious URL redirects to - [Botometer](https://botometer.iuni.iu.edu/) - An AI script to check if a certain username is a bot + - [Who Tracks Me](https://whotracks.me/trackers.html) - Breakdown of common tracking scripts, and which sites use them - **Utilities** - [Privacy.sexy](https://privacy.sexy/) - A collection of commands you can run to impplement best prctices on Windows or MacOS - [ExifRemove](https://www.exifremove.com) - Remove Meta/ EXIF data online From 479618fa95132a33742df80b3b7d5be16b3d819f Mon Sep 17 00:00:00 2001 From: Alicia Sykes Date: Fri, 8 Jul 2022 21:54:33 +0100 Subject: [PATCH 4/6] Updates grammar in software considerations --- 5_Privacy_Respecting_Software.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/5_Privacy_Respecting_Software.md b/5_Privacy_Respecting_Software.md index 4935e03..c2859a6 100644 --- a/5_Privacy_Respecting_Software.md +++ b/5_Privacy_Respecting_Software.md @@ -1559,9 +1559,9 @@ A custom Reddit feed covering news and updates for privacy-respecting apps, soft ### Conclusion -Many coporations put profit before people, collecting data and exploiting privacy. They claim to be secure but without being open source it can't be verified, until there's been a breach and it's too late. Switching to privacy-respecting open source software will drastically help improving your security, privacy and anonymity online. +Many coporations put profit before people, collecting data and exploiting privacy. They claim to be secure but without being open source it can't be verified, until there's been a breach and it's too late. Switching to privacy-respecting open source software will drastically help improve your security, privacy and anonymity online. -However, that's not all you need to do. It is also important to : use strong and unique passwords, 2-factor authentication, +However, that's not all you need to do. It is also important to: use strong and unique passwords, 2-factor authentication, adopt good networking practices and be mindful of data that are collected when browsing the web. You can see the full **[personal security checklist](https://github.com/Lissy93/personal-security-checklist/blob/master/README.md)** for more tips to stay safe. @@ -1575,7 +1575,10 @@ No piece of software is truly secure or private. Further to this, software can It is a good idea to keep your trusted software base small, to reduce potential attack surface. At the same time trusting a single application for too many tasks or too much personal data could be a weakness in your system. So you will need to judge the situation according to your threat model, and carefully plan which software and applications you trust with each segment of your data. **Convenience Vs Security**
-There is often a trade-off between convenience and security. Construct a threat model, and choose a balance that is right for you. In a similar way in some situations there is privacy and security conflict (e.g. Find My Phone is great for security, but terrible for privacy, and anonymous payments may be good for privacy but less secure than insured fiat currency). Again it is about assessing your situation, understanding the risks and making an informed decision. +There is often a trade-off between convenience and security. Construct a threat model, and choose a balance that is right for you. + +**Privacy Vs Security**
+In some situations there is a conflict beterrn privacy and security. E.g. Find My Phone may be good for security, but it is terrible for privacy, and anonymous payments may be good for privacy but less secure than insured fiat currency. Again it is about assessing your situation, understanding the risks and making an informed decision. **Hosted Vs Self-Hosted Considerations**
When using a hosted or managed application that is open-source software - there is often no easyily way to tell if the version running is the same as that of the published source code (even published signatures can be faked). There is always the possibility that additional backdoors may have been knowingly or unknowingly implemented in the running instance. One way round this is to self-host software yourself. When self-hosting you will then know for sure which code is running, however you will also be responsible for the managing security of the server, and so may not be recommended for beginners. @@ -1591,7 +1594,7 @@ When using a hosted or proprietary solution - always check the privacy policy, r When selecting a new application, ensure it is still being regularly maintained, as this will allow for recently discovered security issues to be addressed. Software in an alpha or beta phase, may be buggy and lacking in features, but more importantly - it could have critical vulnerabilities open to exploit. Similarly, applications that are no longer being actively maintained may pose a security risk, due to lack of patching. When using a forked application, or software that is based on an upstream code base, be aware that it may receive security-critical patches and updates at a slightly later date than the original application. **This List: Disclaimer**
-This list contains packages that range from entry-level to advanced, a lot of the software here will not be appropriate for all audiences. It is in no way a definitive list of secure applications, and aims only to be a guide, a collection of software and services that myself and other contributers have used, and would recommend. There will always be new vulnerabilities discovered or introduced, bugs and security-critical glitches, malicious actors and poorly configured systems. It is up to you to do your research, draw up a threat model, and decide where and how your data are managed. +This list contains packages that range from entry-level to advanced, a lot of the software here will not be appropriate for all audiences. It is in no way a definitive list of secure applications, and aims only to be a guide, a collection of software and services that myself and other contributers have used, and would recommend. There will always be new vulnerabilities discovered or introduced, bugs and security-critical glitches, malicious actors and poorly configured systems. It is up to you to do your research, draw up a threat model, and decide where and how your data is managed. If you find something on this list that should no longer be deemed secure or private/ or should have a warning note attached, please raise an issue. In the same way if you know of something that is missing, or would like to make an edit, then pull requests are welcome, and are much appreiciated! From 21064e185a3af92ee6df695deaed46b24a254083 Mon Sep 17 00:00:00 2001 From: liss-bot Date: Sun, 10 Jul 2022 04:03:59 +0100 Subject: [PATCH 5/6] =?UTF-8?q?=F0=9F=92=93=20Updates=20contributors=20lis?= =?UTF-8?q?t?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ATTRIBUTIONS.md | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/ATTRIBUTIONS.md b/ATTRIBUTIONS.md index 88db4c9..8589cfb 100644 --- a/ATTRIBUTIONS.md +++ b/ATTRIBUTIONS.md @@ -105,13 +105,6 @@ Kieren Connell
- - - ced4568 -
- Kyforker148 -
- ratty222 @@ -132,8 +125,7 @@
Jtfinley72
- - + zacharyraber From d3714bd0647eac301f31745f3635d2ab8818cdaa Mon Sep 17 00:00:00 2001 From: Alicia Bot <87835202+liss-bot@users.noreply.github.com> Date: Sun, 10 Jul 2022 04:04:06 +0100 Subject: [PATCH 6/6] =?UTF-8?q?=F0=9F=92=93=20Updates=20contributor=20SVG?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .github/CONTRIBUTORS.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/CONTRIBUTORS.svg b/.github/CONTRIBUTORS.svg index 151f6af..fba7318 100644 --- a/.github/CONTRIBUTORS.svg +++ b/.github/CONTRIBUTORS.svg @@ -16,7 +16,7 @@ - +