mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-10 00:12:09 +00:00
Another typo
there is no god
This commit is contained in:
parent
988dd888a0
commit
a113963de4
2 changed files with 2 additions and 2 deletions
|
@ -132,7 +132,7 @@ The most common amnesiac technique is clearing cookies. A more thorough techniqu
|
|||
|
||||
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
|
||||
|
||||
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful the TR/TE framework’s limitations.
|
||||
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful of the TR/TE framework’s limitations.
|
||||
|
||||
## How to make privacy recommendations
|
||||
|
||||
|
|
|
@ -201,7 +201,7 @@ Goodness enumeration
|
|||
Amnesia
|
||||
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
|
||||
|
||||
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful the TR/TE framework's limitations.
|
||||
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful of the TR/TE framework's limitations.
|
||||
|
||||
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
|
||||
----------------------------------------
|
||||
|
|
Loading…
Reference in a new issue