mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-27 14:12:09 +00:00
Another typo
there is no god
This commit is contained in:
parent
988dd888a0
commit
a113963de4
2 changed files with 2 additions and 2 deletions
|
@ -132,7 +132,7 @@ The most common amnesiac technique is clearing cookies. A more thorough techniqu
|
||||||
|
|
||||||
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
|
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
|
||||||
|
|
||||||
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful the TR/TE framework’s limitations.
|
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful of the TR/TE framework’s limitations.
|
||||||
|
|
||||||
## How to make privacy recommendations
|
## How to make privacy recommendations
|
||||||
|
|
||||||
|
|
|
@ -201,7 +201,7 @@ Goodness enumeration
|
||||||
Amnesia
|
Amnesia
|
||||||
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
|
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
|
||||||
|
|
||||||
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful the TR/TE framework's limitations.
|
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful of the TR/TE framework's limitations.
|
||||||
|
|
||||||
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
|
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
|
||||||
----------------------------------------
|
----------------------------------------
|
||||||
|
|
Loading…
Reference in a new issue