1
0
mirror of https://github.com/PrivSec-dev/privsec.dev synced 2024-12-22 12:51:34 -05:00

Lighter images

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2022-07-19 01:37:11 -04:00 committed by tommytran732
parent 587f62c2aa
commit 3e28f85a5e
No known key found for this signature in database
GPG Key ID: 060B29EB996BD9F2
6 changed files with 1 additions and 5 deletions

View File

@ -8,7 +8,7 @@ The first task a person should do when taking steps to protect their privacy and
## Defining a threat ## Defining a threat
![Cameras in Trees](/cameras-in-trees.jpg) ![Camera Drawing](/camera-drawing.png)
To make a threat model, we must first define a threat. A common mistake made by people who are just getting into the privacy space is to define the threat as "big-tech companies." There is a fundamental problem with this definition: To make a threat model, we must first define a threat. A common mistake made by people who are just getting into the privacy space is to define the threat as "big-tech companies." There is a fundamental problem with this definition:
@ -27,8 +27,6 @@ For whistleblowers, the threat model is much more extreme. Beyond what is mentio
## Privacy from service providers ## Privacy from service providers
![Camera Drawing](/camera-drawing.jpg)
In most setups, our "private" messages, emails, social interactions are typically stored on a server somewhere. The obvious problem with this is that the service provider (or a hacker who has compromised the server) can look into your "private" conversations whenever and however they want, without you ever knowing. This applies to many common services like SMS messaging, Telegram, Discord, and so on. In most setups, our "private" messages, emails, social interactions are typically stored on a server somewhere. The obvious problem with this is that the service provider (or a hacker who has compromised the server) can look into your "private" conversations whenever and however they want, without you ever knowing. This applies to many common services like SMS messaging, Telegram, Discord, and so on.
With end-to-end encryption, you can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, so long as the service provider does not have access to the private keys of either party. With end-to-end encryption, you can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, so long as the service provider does not have access to the private keys of either party.
@ -43,8 +41,6 @@ Even with end-to-end encryption, service providers can still profile you based o
## Protection from cross site/service tracking ## Protection from cross site/service tracking
![Surveillance Room](/surveillance-room.jpg)
You can be tracked across websites and services using some form of identifiers. These are typically: You can be tracked across websites and services using some form of identifiers. These are typically:
- Your IP address - Your IP address

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.2 MiB

BIN
static/camera-drawing.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.6 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.6 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.2 MiB

After

Width:  |  Height:  |  Size: 539 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.1 MiB