Skip to content

Commit

Permalink
Fix mistakes in various files (#2027)
Browse files Browse the repository at this point in the history
  • Loading branch information
dngray committed Feb 25, 2023
1 parent 7b6a158 commit c6161ef
Show file tree
Hide file tree
Showing 8 changed files with 14 additions and 15 deletions.
4 changes: 2 additions & 2 deletions docs/android.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ The installation of GrapheneOS on a Pixel phone is easy with their [web installe
A few more tips for purchasing a Google Pixel:

- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
- Consider price beating options and specials offered at brick and mortar stores.
- Consider price beating options and specials offered at physical stores.
- Look at online community bargain sites in your country. These can alert you to good sales.
- Google provides a list showing the [support cycle](https://support.google.com/nexus/answer/4457705) for each one of their devices. The price per day for a device can be calculated as: $\text{Cost} \over \text {EOL Date }-\text{ Current Date}$, meaning that the longer use of the device the lower cost per day.

Expand Down Expand Up @@ -184,7 +184,7 @@ To make sure that your hardware and operating system is genuine, [perform local
![Secure camera logo](assets/img/android/secure_camera.svg#only-light){ align=right }
![Secure camera logo](assets/img/android/secure_camera-dark.svg#only-dark){ align=right }

**Secure Camera** is a camera app focused on privacy and security which can capture images, videos and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.

[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
Expand Down
2 changes: 1 addition & 1 deletion docs/basics/account-creation.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Often people sign up for services without thinking. Maybe it's a streaming servi

There are risks associated with every new service that you use. Data breaches; disclosure of customer information to third parties; rogue employees accessing data; all are possibilities that must be considered when giving your information out. You need to be confident that you can trust the service, which is why we don't recommend storing valuable data on anything but the most mature and battle-tested products. That usually means services which provide E2EE and have undergone a cryptographic audit. An audit increases assurance that the product was designed without glaring security issues caused by an inexperienced developer.

It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.en.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account.
It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account.

## Terms of Service & Privacy Policy

Expand Down
9 changes: 4 additions & 5 deletions docs/basics/passwords-overview.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,11 +25,10 @@ You should avoid changing passwords that you have to remember (such as your pass

When it comes to passwords that you don't have to remember (such as passwords stored inside your password manager), if your [threat model](threat-modeling.md) calls for it, we recommend going through important accounts (especially accounts that don't use multi-factor authentication) and changing their password every couple of months, in case they have been compromised in a data breach that hasn't become public yet. Most password managers allow you to set an expiry date for your password to make this easier to manage.

!!! Tip "Checking for data breaches"
!!! tip "Checking for data breaches"

If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).


## Creating strong passwords

### Passwords
Expand All @@ -48,7 +47,7 @@ An example of a diceware passphrase is `viewable fastness reluctant squishy seve

To generate a diceware passphrase using real dice, follow these steps:

!!! Note
!!! note

These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.

Expand All @@ -60,15 +59,15 @@ To generate a diceware passphrase using real dice, follow these steps:

4. Repeat this process until your passphrase has as many words as you need, which you should separate with a space.

!!! Warning "Important"
!!! warning "Important"

You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random.

If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.

We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also other wordlists in different languages, if you do not want your passphrase to be in English.

??? Note "Explanation of entropy and strength of diceware passphrases"
??? note "Explanation of entropy and strength of diceware passphrases"

To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example.

Expand Down
2 changes: 1 addition & 1 deletion docs/basics/vpn-overview.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ However, they do hide your actual IP from a third-party service, provided that t

## When shouldn't I use a VPN?

Using a VPN in cases where you're using your [known identity](../basics/common-threats.en.md#common-misconceptions) is unlikely be useful.
Using a VPN in cases where you're using your [known identity](common-threats.md#common-misconceptions) is unlikely be useful.

Doing so may trigger spam and fraud detection systems, such as if you were to log into your bank's website.

Expand Down
3 changes: 1 addition & 2 deletions docs/encryption.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -199,7 +199,7 @@ Browser-based encryption can be useful when you need to encrypt a file but canno
[:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" }
:octicons-heart-16:{ .card-link title="Donations methods can be found at the bottom of the website" }
[:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" }

## Command-line

Expand Down Expand Up @@ -325,7 +325,6 @@ When encrypting with PGP, you have the option to configure different options in
[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
:octicons-heart-16:{ .card-link title="Donations can be made within the app" }

??? downloads

Expand Down
6 changes: 3 additions & 3 deletions docs/frontends.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ When you are using a ProxiTok instance, make sure to read the privacy policy of
- [:simple-linux: Linux](https://freetubeapp.io/#download)
- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube)

!!! Warning
!!! warning

When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.

Expand All @@ -136,7 +136,7 @@ When you are using a ProxiTok instance, make sure to read the privacy policy of
- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629)
- [:simple-github: GitHub](https://github.com/yattee/yattee/releases)

!!! Warning
!!! warning

When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.

Expand All @@ -162,7 +162,7 @@ By default, Yattee blocks all YouTube advertisements. In addition, Yattee option

- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases)

!!! Warning
!!! warning

When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.

Expand Down
2 changes: 1 addition & 1 deletion docs/router.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to

!!! recommendation

![pfSense logo](assets/img/router/opnsense.svg){ align=right }
![OPNsense logo](assets/img/router/opnsense.svg){ align=right }

**OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint.

Expand Down
1 change: 1 addition & 0 deletions includes/abbreviations.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,7 @@
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
*[P2P]: Peer-to-Peer
*[PAM]: Linux Pluggable Authentication Modules
*[POP3]: Post Office Protocol 3
*[PGP]: Pretty Good Privacy (see OpenPGP)
*[PII]: Personally Identifiable Information
*[QNAME]: Qualified Name
Expand Down

0 comments on commit c6161ef

Please sign in to comment.