update webring

This commit is contained in:
Amolith 2019-12-24 10:02:58 -05:00
parent 0c66b0afca
commit 301211be6c
Signed by: Amolith
GPG Key ID: CA3EFC40662C19BA
1 changed files with 14 additions and 14 deletions

View File

@ -4,13 +4,24 @@
<div class="article">
<h4 class="title">
<a href="https://kevq.uk/librem-5-my-thoughts/" target="_blank" rel="noopener">Librem 5 My Thoughts</a>
<a href="https://kevq.uk/privacy-security-are-different-round-2/" target="_blank" rel="noopener">Privacy &amp; Security Are Different Round 2</a>
</h4>
<p class="summary">Purism recently announced that they were ready to start shipping their long awaited Librem 5 phone. The phone was originally priced at $649, then it was increased to $699, then $749. It now stands at a whopping $799! Purism talk about the price increase o</p>
<p class="summary">I recently wrote a post explaining that I think Privacy &amp; Security Are Different. Following that post Ive received some feedback questioning my rationale. This post is a response to some of that feedback. Privacy is part of security A lot of the feed</p>
<small class="source">
via <a href="https://kevq.uk">Kev Quirk</a>
</small>
<small class="date">December 18, 2019</small>
<small class="date">December 24, 2019</small>
</div>
<div class="article">
<h4 class="title">
<a href="https://infosec-handbook.eu/blog/yubico-security-key-nitrokey-fido2/" target="_blank" rel="noopener">Yubico Security Key vs. Nitrokey FIDO2</a>
</h4>
<p class="summary">WebAuthn, Web Authentication: An API for accessing Public Key Credentials Level 1, is a W3C Recommendation released in March 2019. It defines creation and use of strong, attested, scoped, public key-based credentials by web applications. It is very simila…</p>
<small class="source">
via <a href="https://infosec-handbook.eu/blog/">Blogs on InfoSec Handbook information security blog</a>
</small>
<small class="date">December 22, 2019</small>
</div>
<div class="article">
@ -27,17 +38,6 @@ LTE requires some hacks, and everyt…</p>
<small class="date">December 18, 2019</small>
</div>
<div class="article">
<h4 class="title">
<a href="https://infosec-handbook.eu/blog/gdpr-myths-part2/" target="_blank" rel="noopener">European GDPR myths Part 2</a>
</h4>
<p class="summary">In May 2018, we debunked 3 GDPR myths. In this article, we discuss three additional myths.</p>
<small class="source">
via <a href="https://infosec-handbook.eu/blog/">Blogs on InfoSec Handbook information security blog</a>
</small>
<small class="date">December 15, 2019</small>
</div>
</section>
<p class="attribution">
Generated by