1
0
Fork 0
mirror of https://git.sr.ht/~seirdy/seirdy.one synced 2024-11-14 01:32:11 +00:00

Another typo

there is no god
This commit is contained in:
Rohan Kumar 2022-06-26 01:00:43 -07:00
parent 988dd888a0
commit a113963de4
No known key found for this signature in database
GPG key ID: 1E892DB2A5F84479
2 changed files with 2 additions and 2 deletions

View file

@ -132,7 +132,7 @@ The most common amnesiac technique is clearing cookies. A more thorough techniqu
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables => https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
The list goes on. “TR versus TE” is an important perspective to have, but it isnt the only lens through which we should view privacy-enhancing techniques. Lets be mindful the TR/TE frameworks limitations. The list goes on. “TR versus TE” is an important perspective to have, but it isnt the only lens through which we should view privacy-enhancing techniques. Lets be mindful of the TR/TE frameworks limitations.
## How to make privacy recommendations ## How to make privacy recommendations

View file

@ -201,7 +201,7 @@ Goodness enumeration
Amnesia Amnesia
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses. : The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful the TR/TE framework's limitations. The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful of the TR/TE framework's limitations.
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions} How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
---------------------------------------- ----------------------------------------