tech:privacy_and_security_online
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
tech:privacy_and_security_online [2024/10/05] – [TOR network] Mathieu | tech:privacy_and_security_online [2024/10/05] (Version actuelle) – [Backing Up and Managing Personal Data] Mathieu | ||
---|---|---|---|
Ligne 128: | Ligne 128: | ||
If you're looking for an easy replacement for Chrome, Edge, or Safari without worrying about configuration, | If you're looking for an easy replacement for Chrome, Edge, or Safari without worrying about configuration, | ||
- | However, there are reasons you might not want to choose Brave, starting with its integration of a cryptocurrency system((which can easily be disabled)). Some users prefer to avoid Chromium-based solutions, so as not to contribute to the near-monopoly of WebKit((the underlying web rendering engine)) on the web, much like the days of Internet Explorer. | + | However, there are reasons you might not want to choose Brave, starting with its integration of a cryptocurrency system((which can easily be disabled)). Some users prefer to avoid Chromium-based solutions, so as not to contribute to the near-monopoly of Blink((the underlying web rendering engine)) on the web, much like the days of Internet Explorer. |
===== Firefox ===== | ===== Firefox ===== | ||
Ligne 277: | Ligne 277: | ||
* Making backups on **physical media**, such as external hard drives or USB keys. This is a viable approach, but it becomes quite complex when considering the need for regular backups, stored off-site to protect against risks like theft or fire. **This approach requires a lot of discipline and regular rotation of media**, making it a fragile and difficult strategy to implement. | * Making backups on **physical media**, such as external hard drives or USB keys. This is a viable approach, but it becomes quite complex when considering the need for regular backups, stored off-site to protect against risks like theft or fire. **This approach requires a lot of discipline and regular rotation of media**, making it a fragile and difficult strategy to implement. | ||
| | ||
- | * Using an online service, such as those mentioned above, but **encrypting your data** before uploading it to the service. This is a perfectly viable approach, though somewhat complex. You won’t be able to rely on the built-in sync features of mainstream services, and you’ll lose access to features that require unencrypted files (such as sharing or online editing). If you choose this route, it's better to use a " | + | * Using an online service, such as those mentioned above, but **encrypting your data** before uploading it to the service. This is a perfectly viable approach, though somewhat complex. You won’t be able to rely on the built-in sync features of mainstream services, and you’ll lose access to features that require unencrypted files (such as sharing or online editing). If you choose this route, it's better to use a " |
- | + | {{ : | |
+ | |||
* <wrap danger> | * <wrap danger> | ||
tech/privacy_and_security_online.1728151303.txt.gz · Dernière modification : 2024/10/05 de Mathieu