Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Writing review of common-threats.en.md #1836

Merged
merged 1 commit into from
Oct 15, 2022
Merged

Writing review of common-threats.en.md #1836

merged 1 commit into from
Oct 15, 2022

Conversation

KaiTebay
Copy link
Contributor

Notes

Need citation:

The best example of this is trusting data to Google who, given their scale, have had few security incidents by employing industry-leading security experts to secure their infrastructure.

Generally, mobile operating systems have better application sandboxing than desktop operating systems: Apps cannot obtain root access, and require permission for access to system resources.

Linux tends to not submit information to system vendors, but it has poor protection against exploits and malicious apps.

Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime.

However it is most often used to disproportionately target minorities, political dissidents, and many other groups to create a chilling effect on free speech.

Pervasive ad networks, like those operated by Google and Facebook, span the internet far beyond just the sites they control, tracking your actions along the way.

Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies.

the Chinese government requiring companies to adhere to a strict regime of censorship.

For example, you may want to avoid Google Drive, which gives Google access to all of your data.

This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc.

It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)

References (with further information) would be helpful:

Pluggable transports can help you evade firewalls that block common VPN protocols or Tor, but your circumvention attempts can still be detected by methods like probing ⚠️ or deep packet inspection. ✔️

Employing alt-coin shifting may also help disguise where your currency originated.

  • Please check this box to confirm you have disclosed any relevant conflicts of interest in your post.
  • Please check this box to confirm your agreement to publish your work under the Creative Commons Attribution-NoDerivatives 4.0 International license, and to grant Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project.

@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 13:35 Inactive
@github-actions
Copy link

github-actions bot commented Oct 13, 2022

🎊 PR Preview 812558d has been successfully built and deployed to https://privacyguides-privacyguides-org-preview-pr-1836.surge.sh

🕐 Build time: 79.109s

🤖 By surge-preview

@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 14:22 Inactive
Copy link
Member

@jonaharagon jonaharagon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

.

@privacyguides-bot

This comment was marked as off-topic.

Copy link
Member

@jonaharagon jonaharagon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These re-wordings generally LGTM. I think there's a lot of comma over-use in this PR, and I suggested a few other minor changes as well.

docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 16:49 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 16:52 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 17:24 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 17:26 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 17:38 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 17:45 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 17:47 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:39 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:42 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:44 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:46 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:49 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:51 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 13, 2022 18:56 Inactive
@dngray dngray temporarily deployed to preview October 15, 2022 03:46 Inactive
@dngray dngray temporarily deployed to preview October 15, 2022 04:07 Inactive
@dngray dngray temporarily deployed to preview October 15, 2022 04:10 Inactive
Copy link
Member

@dngray dngray left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I went through this, and I think it's a vast improvement on readability.

docs/basics/common-threats.en.md Outdated Show resolved Hide resolved

## Privacy From Service Providers

<span class="pg-teal">:material-server-network: Service Providers</span>

We live in a world where almost everything is connected to the internet. Our "private" messages, emails, social interactions are typically stored on a server somewhere. Generally, when you send someone a message, that message is then stored on a server, and when your friend wants to read the message, the server will show it to them.
We live in a world where almost everything is connected to the internet. Our messages, emails, and social interactions are typically stored on a server, somewhere. Generally, when you send someone a message, it's then stored on a server; when your friend wants to read the message, the server will show it to them.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I disagree, but this is the same issue as #1836 (comment) I think?

docs/basics/common-threats.en.md Outdated Show resolved Hide resolved
@dngray dngray temporarily deployed to preview October 15, 2022 08:57 Inactive
@dngray dngray temporarily deployed to preview October 15, 2022 08:59 Inactive
@KaiTebay KaiTebay temporarily deployed to preview October 15, 2022 12:37 Inactive
@dngray dngray temporarily deployed to preview October 15, 2022 14:42 Inactive
Co-authored-by: Jonah Aragon <github@aragon.science>
Signed-off-by: Daniel Gray <dng@disroot.org>
Signed-off-by: matchboxbananasynergy <107055883+matchboxbananasynergy@users.noreply.github.com>
@dngray dngray added the t:correction content corrections or errors label Oct 15, 2022
@dngray dngray merged commit 812558d into privacyguides:main Oct 15, 2022
@dngray dngray temporarily deployed to preview October 15, 2022 14:44 Inactive
@privacyguides-bot privacyguides-bot temporarily deployed to github-pages October 15, 2022 15:09 Inactive
@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.org/t/v2-27/1084/1

@KaiTebay KaiTebay deleted the pr-common-threats-review branch October 15, 2022 19:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
t:correction content corrections or errors
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants