PrivacyWiki:Article ideas: Difference between revisions

Nothing to hide, but nothing to show you either.
Jump to navigation Jump to search
Content added Content deleted
No edit summary
No edit summary
 
Line 3: Line 3:
! Article title or subject !! Description !! Status
! Article title or subject !! Description !! Status
|-
|-
| [[Dealing with abusive relationships]] || Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy [[w:stalkerware]] and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. ||Started. [[Guide:Resisting technological domestic abuse]]
| [[Dealing with abusive relationships]] || Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy [[w:stalkerware]] and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. ||Minimum viable article complete. [[Guide:Resisting technological domestic abuse]]
|-
|-
|| [[Operating Systems]] || A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons. ||
|| [[Operating Systems]] || A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons. ||
|-
|-
||[[Guide:DNA Privacy]]|| Overview of issues relating to DNA privacy.||
|}
|}

Latest revision as of 20:15, 12 July 2021

Article title or subject Description Status
Dealing with abusive relationships Measures that an individual can take to restore control of their privacy when in an abusive relationship (romantic or otherwise). Primarily, this article would assume that the reader is dealing with somebody who has (or has had) physical access to their devices, knows great deal about the reader's personal life, is willing to deploy w:stalkerware and may possess other levers of control, such as controlling the internet access (router) or the phone carrier account. Minimum viable article complete. Guide:Resisting technological domestic abuse
Operating Systems A short explanation of what an operating system is, how it works, and some of the most commons ones. Might include pros and cons.
Guide:DNA Privacy Overview of issues relating to DNA privacy.