PrivacyWiki:Article ideas: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
! Article title or subject !! Description !! Status |
! Article title or subject !! Description !! Status |
||
|- |
|- |
||
| [[Dealing with abusive relationships]] || Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy [[w:stalkerware]] and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. || |
| [[Dealing with abusive relationships]] || Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy [[w:stalkerware]] and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. ||Minimum viable article complete. [[Guide:Resisting technological domestic abuse]] |
||
|- |
|- |
||
|| [[Operating Systems]] || A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons. || |
|| [[Operating Systems]] || A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons. || |
||
|- |
|- |
||
||[[Guide:DNA Privacy]]|| Overview of issues relating to DNA privacy.|| |
|||
|} |
|} |
Latest revision as of 20:15, 12 July 2021
Article title or subject | Description | Status |
---|---|---|
Dealing with abusive relationships | Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy w:stalkerware and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. | Minimum viable article complete. Guide:Resisting technological domestic abuse |
Operating Systems | A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons. | |
Guide:DNA Privacy | Overview of issues relating to DNA privacy. |