Skip to content

Commit

Permalink
text changes, holding new upgrade
Browse files Browse the repository at this point in the history
  • Loading branch information
beyond9thousand committed Mar 24, 2024
1 parent 8df8052 commit aff4043
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 7 deletions.
15 changes: 10 additions & 5 deletions docs/guides/privacy.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Every individual should be able to uphold their right to privacy online, includi

## <FontAwesomeIcon icon="fa-solid fa-magnifying-glass" /> Search Engines

Popular search engines provided by proprietary companies are known for [tracking user data](https://link.springer.com/article/10.1007/s10618-017-0524-z) and using this information to then throw targeted advertisements at the user. Using a good search engine is the difference between constant intrusion of privacy, favoring [confirmation biases](https://en.wikipedia.org/wiki/Algorithmic_bias) and an uncensored, non-intrusive, informative search experience.
Many popular search engines collect user data to personalize advertisements. This can limit your exposure to diverse viewpoints and potentially create confirmation bias. Privacy-focused search engines offer an alternative, prioritizing user privacy and delivering uncensored, informative search results.

<expand title="Searx" >

Expand Down Expand Up @@ -94,10 +94,10 @@ Work in progress

## <FontAwesomeIcon icon="fa-solid fa-lock" /> Password manager

A password manager is a an application designed to store and manage online credentials. Passwords are generally stored in an [encrypted database](https://www.geeksforgeeks.org/store-password-database/) and locked behind a master password. Most applications also offer an in-built password generator. User created passwords are prone to [brute-force attacks](https://en.wikipedia.org/wiki/Brute-force_attack) and inconvenient to maintain across a large number of accounts.
Password managers securely store and manage online login credentials. These applications encrypt passwords in a central vault, accessible only with a master password. They also often generate strong, unique passwords to prevent brute-force attacks and eliminate the burden of remembering numerous credentials.

:::info
Most modern browsers will also offer password generators and offer to save your login information. Google offers this on Android devices to make the experience more integrated. However, this should not be preferred over [standalone solutions](https://www.zdnet.com/article/is-it-ok-to-use-your-browsers-built-in-password-manager/)
While many browsers offer built-in password managers and login saving, these features may not be ideal for optimal security. Standalone password managers often provide stronger encryption, multi-device access, and additional security features not found in browsers.
:::

### Stateless generator
Expand Down Expand Up @@ -143,10 +143,15 @@ Setup cloud syncing with a service of your choice or host database files locally

## <FontAwesomeIcon icon="fa-solid fa-fingerprint" /> Two-factor authentication

[Two-factor authentication](https://en.wikipedia.org/wiki/Help:Two-factor_authentication) or **2FA** is a secondary code in addition to your account password. The code can either be a 6-digit [OTP](https://en.wikipedia.org/wiki/One-time_password) shared with you through your registered phone number. It can also be periodically generated on your mobile device using a [TOTP authenticator](https://www.twilio.com/docs/glossary/totp). A fallback method is usually provided known as [backup codes](https://support.authy.com/hc/en-us/articles/1260803525789-What-is-a-Recovery-or-Backup-Code-) in the event of loss of access to other, more preferable 2FA options.
Two-factor authentication (2FA) adds an extra layer of security to your online accounts. It requires a second code, in addition to your password, to log in. This code can be:

- A 6-digit one-time password (OTP) sent to your registered phone number.
- Generated periodically on your mobile device using a Time-based One-Time Password (TOTP) authenticator app.

Backup codes are usually provided as a recovery method in case you lose access to your preferred 2FA methods.

:::danger
Using private messaging services, including social media platforms without activating 2FA is extremely dangerous. You are practically asking to get **hacked, impersonated and doxxed online.** It is highly advised against turning-off 2FA for convenience purposes even for general use.
Disabling 2FA on private messaging services and social media platforms significantly weakens your account security. This increases the risk of unauthorized access, impersonation, and exposure of private information. For optimal protection, enabling 2FA is highly recommended.
:::

### TOTP applications
Expand Down
15 changes: 13 additions & 2 deletions docs/guides/utility.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,13 @@ Remember to comply with copyright laws and respect the intellectual property rig

## <FontAwesomeIcon icon="fa-solid fa-arrow-right-arrow-left" /> File transfer

In the realm of digital connectivity, a network file transfer app serves as the linchpin for effortless and secure file sharing among interconnected devices. Packed with features such as robust encryption, cross-platform versatility, and the ability to resume interrupted transfers, it transforms the data exchange experience into a streamlined and reliable process.
Network file transfer applications streamline the process of sharing files between devices on a network. Packed with features like:

- Robust encryption: Ensures secure data transmission.
- Cross-platform versatility: Works seamlessly across different operating systems.
- Resume interrupted transfers: Picks up where you left off in case of connection issues.

These capabilities transform file exchange into a reliable and efficient experience.

<visit link="https://github.com/schollz/croc" title="croc">

Expand All @@ -74,7 +80,12 @@ In the realm of digital connectivity, a network file transfer app serves as the

## <FontAwesomeIcon icon="fa-solid fa-universal-access" /> Accessibility

Software accessibility involves intentional design for inclusive applications, incorporating features like alternative input methods, screen reader compatibility, and adjustable text sizes to cater to diverse user needs and preferences, promoting usability for individuals with various requirements.
Software accessibility ensures applications are usable by a wide range of users with diverse needs. By incorporating features like:

- Alternative input methods (e.g., voice control, screen reader compatibility): Cater to users with varying physical abilities.
- Adjustable text sizes and color contrast: Improve readability for users with visual impairments.

These considerations promote usability and ensure everyone can benefit from technology.

<visit link="https://github.com/xanderfrangos/twinkle-tray" title="Twinkle Tray">

Expand Down

0 comments on commit aff4043

Please sign in to comment.