-
-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Added a new quickstart guide: Identity Theft Defeense - Made the Mobile Quickstart Guide an actual guide (a collection of relevant pages, really) - Improved wording about planting your flag on the Habits page. - Added affiliate link for Orange Website Hosting.
- Loading branch information
Showing
9 changed files
with
97 additions
and
5 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
[ | ||
{ | ||
"title": "Freeze your credit", | ||
"description": "A credit freeze prevents anyone except you from opening new accounts in your name. This page will tell you how to place credit freezes, fraud alerts, and more advice to stop new accounts from being opened in your name.", | ||
"link": "/guides/most-important/credit" | ||
}, | ||
{ | ||
"title": "Use payment masking services", | ||
"description": "Online shopping and digital payments are common and convenient, but they also make it easy for criminals to swipe your credit card numbers. This page will teach you how to protect your digital finances from theft.", | ||
"link": "/guides/most-important/payments" | ||
}, | ||
{ | ||
"title": "Secure your online accounts", | ||
"description": "The overwhelming majority of compromises are due to bad password and authentication habits and not keeping your apps and devices up-to-date. These pages will teach you what makes a good password, how to generate and remember them, and the different types of 2FA.", | ||
"link": "/guides/most-important/passwords" | ||
}, | ||
{ | ||
"title": "Remove your data from public search websites", | ||
"description": "Much of your life is freely available online: past addresses, family members, even jobs and political affiliations. This information can be used to answer security questions or to trick you into falling for a scam. This page will teach you how to remove much of this information.", | ||
"link": "/guides/moderately-important/public-protections" | ||
}, | ||
{ | ||
"title": "Plant your flag", | ||
"description": "This section discusses how to reduce the data you leak via social media and to ensure that bad guys can't impersonate you on important websites like unemployment, your doctor's web portal, and more.", | ||
"link": "/guides/less-important/habits#account-hygiene" | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
[ | ||
{ | ||
"title": "Introduction", | ||
"description": "This page will cover the importance of hardening your mobile devices, as well as addressing the age-old 'Android vs iOS' debate from the perspective of privacy and security.", | ||
"link": "/most-important/mobile" | ||
}, | ||
{ | ||
"title": "Settings", | ||
"description": "This page offers a list of settings we recommend changing to help reduce the amount of data collected by the device itself, to improve security, and more.", | ||
"link": "/guides/most-important/mobile-settings/" | ||
}, | ||
{ | ||
"title": "Replacement Apps", | ||
"description": "This page suggest privacy-respecting and/or security-focused apps you can use instead of the stock apps that commonly ship with your device. This is includes apps like calendar, email, navigation, notes, photos, and more.", | ||
"link": "/guides/most-important/mobile-apps/" | ||
}, | ||
{ | ||
"title": "Mobile Habits", | ||
"description": "This page covers behavioral changes you can make to make your phone as private as possible including reducing the number of apps you install, using third-party app stores, custom ROMs, and more.", | ||
"link": "/guides/moderately-important/mobile-habits/" | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
--- | ||
layout: "@layouts/guides.astro" | ||
title: Identity Theft Protection Quick Start Guide | ||
draft: false | ||
--- | ||
|
||
import guides from "@assets/data/pages/en/quickstart/Identity.json"; | ||
import Cards from "@components/pages/front-page/Cards.astro"; | ||
|
||
# Identity Theft Protection | ||
|
||
Identity theft is one of the most common causes of anxiety in our digital age. In [2023](https://www.businessinsider.com/personal-finance/doj-identity-theft-victims-report-2023-10) alone, almost 24 million Americans had their identities stolen, totaling $16.4 billion in damages. Nearly a quarter of US residents have experienced identity theft at some point in their lives. I can only assume from anecdotal evidence that this doesn't include simpler forms of the crime that most people don't think of as "identity theft," like having a credit card number stolen. | ||
|
||
Thankfully, **protecting yourself from most common avenues of identity theft is surprisingly easy.** The following pages on this website directly address common identity-theft-related issues and implementing the advice on these pages will dramatically reduce your risk. | ||
|
||
<Cards items={guides} color="secondary" /> | ||
|
||
**Note**: the advice on these pages will not stop a dedicated and well-resourced attacker, but it will make you a difficult enough target that most attackers will simply move on to an easier payday. If you have a significantly large amount of wealth and assets, you may need additional protections. I recommend talking to your lawyer and doing additional research in this case. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
--- | ||
layout: "@layouts/guides.astro" | ||
title: Mobile Device Quick Start Guide | ||
draft: false | ||
--- | ||
|
||
import guides from "@assets/data/pages/en/quickstart/Mobile.json"; | ||
import Cards from "@components/pages/front-page/Cards.astro"; | ||
|
||
# Mobile Devices Quick Start Guide | ||
|
||
Mobile devices are some of the most ubiquitous and important devices in our lives. According to most sources, people are using phones more than desktop computers to participate in the online world (if only by a tiny margin). This is especially pronounced in developing nations where cheap phones may be more easily accessible (and portable) with a longer battery life than even a cheap notebook PC. But this convenience is a double-edged sword: these always-on assistants are hard to modify, resulting in a near-constant stream of data collection and a new attack surface to defend. Because of extensive and complex nature of mobile devices, our quick start guide for mobile devices is actually a collection of pages. | ||
|
||
<Cards items={guides} color="secondary" /> |