-
Notifications
You must be signed in to change notification settings - Fork 1
/
link_map2.json
113 lines (113 loc) · 14.5 KB
/
link_map2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
[
{"name":"ssd.eff.org/en/playlist/journalist-move","size":100,"imports":["securityinabox.org/en/guide/jitsi/linux","securityinabox.org/en/guide/jitsi/windows","securityinabox.org/en/guide/jitsi/os-x","freedom.press/training/choosing-a-vpn"]},
{"name":"securityinabox.org/en/guide/jitsi/linux","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/jitsi/windows","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/jitsi/os-x","size":100,"imports":[]},
{"name":"freedom.press/training/choosing-a-vpn","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/malware","size":100,"imports":["ssd.eff.org/en/module/how-avoid-phishing-attacks"]},
{"name":"ssd.eff.org/en/module/how-avoid-phishing-attacks","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-06-Passwords.html","size":100,"imports":["securityinabox.org/en/guide/passwords"]},
{"name":"securityinabox.org/en/guide/passwords","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-08-Phishing.html","size":100,"imports":["freedom.press/training/email-security-tips"]},
{"name":"freedom.press/training/email-security-tips","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-Overview-LoggingIn-and-Authentication.html","size":100,"imports":["docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit#","securityinabox.org/en/guide/passwords","securitytraining.opennews.org/en/latest/Chapter02-06-Passwords..html"]},
{"name":"docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit#","size":100,"imports":["ssd.eff.org","cpj.org/reports/2012/04/journalist-security-guide.php"]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-06-Passwords..html","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter03-01-Resources.html","size":100,"imports":["onlineharassmentfieldmanual.pen.org","ssd.eff.org","docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit","cpj.org/reports/2012/04/technology-security.php","saferjourno.internews.org/pdf/SaferJourno_Guide.pdf","rorypecktrust.org/resources/digital-security","securityplanner.org","freedom.press/training/email-security-tips"]},
{"name":"onlineharassmentfieldmanual.pen.org","size":100,"imports":["docs.google.com/document/d/1ud1ILFkIG0BeLX9jlzJMxCPm8-cSeqPjU60nkhUPYA8/edit","securityplanner.consumerreports.org","ssd.eff.org","ssd.eff.org/en/module-categories/tool-guides","ssd.eff.org/en/module/creating-strong-passwords","www.law.cornell.edu/wex/fighting_words#:~:targetText=Fighting%20words%20are%2C%20as%20first"]},
{"name":"ssd.eff.org","size":100,"imports":[]},
{"name":"docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit","size":100,"imports":[]},
{"name":"cpj.org/reports/2012/04/technology-security.php","size":100,"imports":[]},
{"name":"saferjourno.internews.org/pdf/SaferJourno_Guide.pdf","size":100,"imports":[]},
{"name":"rorypecktrust.org/resources/digital-security","size":100,"imports":[]},
{"name":"securityplanner.org","size":100,"imports":[]},
{"name":"cpj.org/reports/2012/04/journalist-security-guide.php","size":100,"imports":[]},
{"name":"guides.accessnow.org/safer_travel_guide.html#the-risks","size":100,"imports":["securityinabox.org/en/guide/malware","ssd.eff.org/en/module/choosing-vpn-thats-right-you","securityinabox.org/en/guide/smartphones","securityinabox.org/en/guide/veracrypt/windows/#creating-a-hidden-volume","securityinabox.org/en/guide/veracrypt/mac/#creating-a-hidden-volume","securityinabox.org/en/guide/veracrypt/linux/#creating-a-hidden-volume","ssd.eff.org/en/module/things-consider-when-crossing-us-border"]},
{"name":"securityinabox.org/en/guide/malware","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/choosing-vpn-thats-right-you","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/smartphones","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/windows/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/mac/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/linux/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/things-consider-when-crossing-us-border","size":100,"imports":[]},
{"name":"ijnet.org/en/story/digital-security-tips-and-resources-journalists","size":100,"imports":["ssd.eff.org/en","ssd.eff.org/en/module/seven-steps-digital-security","securityinabox.org/en","freedom.press/training","www.cpj.org/reports/2012/04/information-security.php#3","digitaldefenders.org/digitalfirstaid"]},
{"name":"ssd.eff.org/en","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/seven-steps-digital-security","size":100,"imports":[]},
{"name":"securityinabox.org/en","size":100,"imports":[]},
{"name":"freedom.press/training","size":100,"imports":[]},
{"name":"www.cpj.org/reports/2012/04/information-security.php#3","size":100,"imports":[]},
{"name":"digitaldefenders.org/digitalfirstaid","size":100,"imports":[]},
{"name":"www.eff.org/deeplinks/2020/06/digital-security-advice-journalists-covering-protests-against-police-killings","size":100,"imports":["freedom.press/training/mobile-security-protest-preparation-tips-activists"]},
{"name":"freedom.press/training/mobile-security-protest-preparation-tips-activists","size":100,"imports":[]},
{"name":"www.icij.org/inside-icij/2018/01/five-digital-security-tools-to-protect-your-work-and-sources","size":100,"imports":["securityplanner.org/#/tool/signal","securityplanner.org/#/tool/mac-encryption","securityplanner.org/#/tool/windows-encryption","securityplanner.org/#/tool/password-manager","ssd.eff.org/en/module/assessing-your-risks","securityplanner.org/#"]},
{"name":"securityplanner.org/#/tool/signal","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/mac-encryption","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/windows-encryption","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/password-manager","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/assessing-your-risks","size":100,"imports":[]},
{"name":"securityplanner.org/#","size":100,"imports":[]},
{"name":"docs.google.com/document/d/1ud1ILFkIG0BeLX9jlzJMxCPm8-cSeqPjU60nkhUPYA8/edit","size":100,"imports":[]},
{"name":"securityplanner.consumerreports.org","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module-categories/tool-guides","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/creating-strong-passwords","size":100,"imports":[]},
{"name":"www.law.cornell.edu/wex/fighting_words#:~:targetText=Fighting%20words%20are%2C%20as%20first","size":100,"imports":[]},
{"name":"digitalfirstaid.org/en/index.html","size":100,"imports":["accessnowhelpline.gitlab.io/community-documentation/166-full-disk_encryption.html","accessnowhelpline.gitlab.io/community-documentation/234-faq-online_harassment.html","accessnowhelpline.gitlab.io/community-documentation/295-password_managers.html","accessnowhelpline.gitlab.io/community-documentation/343-report_domain_impersonation_cloning.html","accessnowhelpline.gitlab.io/community-documentation/352-report_fake_domain_hosting_provider.html","communitydocs.accessnow.org/182-secure_backup.html","communitydocs.accessnow.org/243-pgp_keysigning.html#comments","guides.accessnow.org/self-doxing.html","onlineharassmentfieldmanual.pen.org/self-care","securityinabox.org/en/guide/backup","securityinabox.org/en/guide/malware","securityinabox.org/en/guide/secure-file-storage","ssd.eff.org/en/glossary/distributed-denial-service-attack","ssd.eff.org/en/module/animated-overview-using-password-managers-stay-safe-online","ssd.eff.org/en/module/creating-strong-passwords","ssd.eff.org/en/module/how-avoid-phishing-attacks","ssd.eff.org/en/module/how-use-keepassxc","ssd.eff.org/en/module/keeping-your-data-safe#1","ssd.eff.org/en/module/protecting-yourself-social-networks","www.accessnow.org/cms/assets/uploads/2017/09/choose-the-best-mfa-for-you.png","www.accessnow.org/need-talk-sms-based-two-step-authentication"]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/166-full-disk_encryption.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/234-faq-online_harassment.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/295-password_managers.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/343-report_domain_impersonation_cloning.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/352-report_fake_domain_hosting_provider.html","size":100,"imports":[]},
{"name":"communitydocs.accessnow.org/182-secure_backup.html","size":100,"imports":[]},
{"name":"communitydocs.accessnow.org/243-pgp_keysigning.html#comments","size":100,"imports":[]},
{"name":"guides.accessnow.org/self-doxing.html","size":100,"imports":[]},
{"name":"onlineharassmentfieldmanual.pen.org/self-care","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/backup","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/secure-file-storage","size":100,"imports":[]},
{"name":"ssd.eff.org/en/glossary/distributed-denial-service-attack","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/animated-overview-using-password-managers-stay-safe-online","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-keepassxc","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/keeping-your-data-safe#1","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/protecting-yourself-social-networks","size":100,"imports":[]},
{"name":"www.accessnow.org/cms/assets/uploads/2017/09/choose-the-best-mfa-for-you.png","size":100,"imports":[]},
{"name":"www.accessnow.org/need-talk-sms-based-two-step-authentication","size":100,"imports":[]},
{"name":"securityplanner.consumerreports.org/recommendations","size":100,"imports":["freedom.press/training/-depth-guide-choosing-web-browser","freedom.press/training/choosing-a-vpn","freedom.press/training/email-security-tips","freedom.press/training/your-smartphone-and-you-handbook-modern-mobile-maintenance","onlineharassmentfieldmanual.pen.org","ssd.eff.org/en","ssd.eff.org/en/module/choosing-vpn-thats-right-you","ssd.eff.org/en/module/how-avoid-phishing-attacks","ssd.eff.org/en/module/how-use-signal-android","ssd.eff.org/en/module/how-use-signal-ios","ssd.eff.org/en/module/how-use-whatsapp-android","ssd.eff.org/en/module/how-use-whatsapp-ios","ssd.eff.org/en/module/protecting-yourself-social-networks","www.digitaldefenders.org/digitalfirstaid"]},
{"name":"freedom.press/training/-depth-guide-choosing-web-browser","size":100,"imports":[]},
{"name":"freedom.press/training/your-smartphone-and-you-handbook-modern-mobile-maintenance","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-signal-android","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-signal-ios","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-whatsapp-android","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-whatsapp-ios","size":100,"imports":[]},
{"name":"www.digitaldefenders.org/digitalfirstaid","size":100,"imports":[]},
{"name":"SaferJournoGuide_2014-03-21.pdf","size":100,"imports":["en.rsf.org/help-with-the-reporters-without-17-09-2013","www.cpj.org/reports/2012/04/journalist-security-guide.php","securityinabox.org","securityinabox.org/en/avast_main","securityinabox.org/en/ccleaner_main","securityinabox.org/en/chapter_1_4","securityinabox.org/en/chapter_3_1","securityinabox.org/en/chapter-1","securityinabox.org/en/chapter-10","securityinabox.org/en/chapter-11","securityinabox.org/en/chapter-3","securityinabox.org/en/chapter-4","securityinabox.org/en/chapter-7","securityinabox.org/en/chapter-8","securityinabox.org/en/Gibberbot_main","securityinabox.org/en/Orbot_main","securityinabox.org/en/orweb_main","securityinabox.org/en/pidgin_main","securityinabox.org/en/portable_security","securityinabox.org/en/textsecure_main","securityinabox.org/en/textsecure_main#2.2","securityinabox.org/en/textsecure_main#2.4","securityinabox.org/en/thuderbird_encryption","securityinabox.org/en/thuderbird_encryption#4.4","securityinabox.org/en/thunderbird_main","securityinabox.org/en/tor_main","securityinabox.org/en/truecrypt_main","securityinabox.org/en/truecrypt_standardvolumes","securityinabox.org/sbox/programs/gnupg-w32cli-1.4.x.exe","ssd.eff.org/risk","ssd.eff.org/tech/mobile","www.cpj.org/reports/2012/04/journalist-security-guide.php"]},
{"name":"en.rsf.org/help-with-the-reporters-without-17-09-2013","size":100,"imports":[]},
{"name":"www.cpj.org/reports/2012/04/journalist-security-guide.php","size":100,"imports":[]},
{"name":"securityinabox.org","size":100,"imports":[]},
{"name":"securityinabox.org/en/avast_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/ccleaner_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter_1_4","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter_3_1","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-1","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-10","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-11","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-3","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-4","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-7","size":100,"imports":[]},
{"name":"securityinabox.org/en/chapter-8","size":100,"imports":[]},
{"name":"securityinabox.org/en/Gibberbot_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/Orbot_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/orweb_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/pidgin_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/portable_security","size":100,"imports":[]},
{"name":"securityinabox.org/en/textsecure_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/textsecure_main#2.2","size":100,"imports":[]},
{"name":"securityinabox.org/en/textsecure_main#2.4","size":100,"imports":[]},
{"name":"securityinabox.org/en/thuderbird_encryption","size":100,"imports":[]},
{"name":"securityinabox.org/en/thuderbird_encryption#4.4","size":100,"imports":[]},
{"name":"securityinabox.org/en/thunderbird_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/tor_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/truecrypt_main","size":100,"imports":[]},
{"name":"securityinabox.org/en/truecrypt_standardvolumes","size":100,"imports":[]},
{"name":"securityinabox.org/sbox/programs/gnupg-w32cli-1.4.x.exe","size":100,"imports":[]},
{"name":"ssd.eff.org/risk","size":100,"imports":[]},
{"name":"ssd.eff.org/tech/mobile","size":100,"imports":[]}
]