Skip to content

Commit

Permalink
Adding images in.
Browse files Browse the repository at this point in the history
  • Loading branch information
Amanda on Mona committed Mar 14, 2018
1 parent ba310b4 commit a7fb43d
Show file tree
Hide file tree
Showing 6 changed files with 5 additions and 0 deletions.
Binary file added docs/img/ch2_o01_01.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/img/ch2_o01_02.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/img/ch2_o01_03.jpg
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/img/ch2_o01_04.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/img/ch2_o01_05.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
5 changes: 5 additions & 0 deletions drafts/Chapter02-Overview-LoggingIn-and-Authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -232,6 +232,9 @@ Your email becomes a gateway to many other accounts, as it is the username, and

Note that Google Mail allows you to use [*different forms*](https://gmail.googleblog.com/2008/03/2-hidden-ways-to-get-more-from-your.html) of your email address. This helps obfuscate your address, making it slightly harder to associate accounts.

![Lock icon](img/ch2_o01_01.png)

**At the very least, make sure you use strong passwords and 2FA for your email addresses.**

### Temporary emails

Expand All @@ -249,6 +252,8 @@ Just as importantly, you should make sure the browser is communicating securely

Look for a lock icon near the website address. Similar to the following:

![HTTPS Lock icon](img/ch2_o01_01.png)

## In the newsroom

What are specific considerations in the newsroom. Indirectly, any information or communications that can be accessed by a login is at stake; this may include a source’s identity, communication to colleagues, sensitive documents, etc.
Expand Down

0 comments on commit a7fb43d

Please sign in to comment.