From a113963de44823b18f1527d588f3ddae4667fbf5 Mon Sep 17 00:00:00 2001 From: Rohan Kumar Date: Sun, 26 Jun 2022 01:00:43 -0700 Subject: [PATCH] Another typo there is no god --- content/posts/two-types-of-privacy.gmi | 2 +- content/posts/two-types-of-privacy.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/posts/two-types-of-privacy.gmi b/content/posts/two-types-of-privacy.gmi index 7e8ba6b..09c1f45 100644 --- a/content/posts/two-types-of-privacy.gmi +++ b/content/posts/two-types-of-privacy.gmi @@ -132,7 +132,7 @@ The most common amnesiac technique is clearing cookies. A more thorough techniqu => https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables -The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful the TR/TE framework’s limitations. +The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful of the TR/TE framework’s limitations. ## How to make privacy recommendations diff --git a/content/posts/two-types-of-privacy.md b/content/posts/two-types-of-privacy.md index 26206b2..0c13b27 100644 --- a/content/posts/two-types-of-privacy.md +++ b/content/posts/two-types-of-privacy.md @@ -201,7 +201,7 @@ Goodness enumeration Amnesia : The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses. -The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful the TR/TE framework's limitations. +The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful of the TR/TE framework's limitations. How to make privacy recommen­dations {#how-to-make-privacy-recommendataions} ----------------------------------------