@networkpro/blog 1.2.3 → 1.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +2 -2
- package/src/img/backdoor-promo.png +0 -0
- package/src/img/backdoor-promo.webp +0 -0
- package/src/posts/2025-05-29-heliboard.md +2 -2
- package/src/posts/2025-05-29-msauth.md +2 -1
- package/src/posts/2025-06-03-gemini.md +2 -1
- package/src/posts/2025-06-03-surveillance.md +2 -1
- package/src/posts/2025-06-08-squircle.md +2 -1
- package/src/posts/2025-06-12-backdoor.md +61 -0
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@networkpro/blog",
|
|
3
|
-
"version": "1.2.
|
|
3
|
+
"version": "1.2.4",
|
|
4
4
|
"description": "The official blog of Network Pro Strategies (Network Pro™).",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"advisory",
|
|
@@ -58,7 +58,7 @@
|
|
|
58
58
|
"globals": "^16.2.0",
|
|
59
59
|
"markdownlint": "^0.38.0",
|
|
60
60
|
"markdownlint-cli2": "^0.18.1",
|
|
61
|
-
"postcss": "^8.5.
|
|
61
|
+
"postcss": "^8.5.5",
|
|
62
62
|
"prettier": "3.5.3",
|
|
63
63
|
"stylelint": "^16.20.0",
|
|
64
64
|
"stylelint-config-html": "^1.1.0",
|
|
Binary file
|
|
Binary file
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
date:
|
|
3
3
|
created: 2025-05-29
|
|
4
|
-
updated: 2025-06-
|
|
4
|
+
updated: 2025-06-12
|
|
5
5
|
title: FOSS Spotlight - HeliBoard
|
|
6
6
|
summary:
|
|
7
7
|
Say hello to HeliBoard – your privacy-first, open-source keyboard built just
|
|
@@ -59,7 +59,7 @@ might feature it next!
|
|
|
59
59
|
|
|
60
60
|
|
|
61
61
|
<figure class="poster-figure">
|
|
62
|
-
<img src="/img/heliboard-promo.png" alt="FOSS Spotlight: HeliBoard">
|
|
62
|
+
<img src="/img/heliboard-promo.png" alt="FOSS Spotlight: HeliBoard" style="width: 512px; height: 768px;">
|
|
63
63
|
<figcaption>FOSS Spotlight: HeliBoard – featured visual</figcaption>
|
|
64
64
|
</figure>
|
|
65
65
|
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
date:
|
|
3
3
|
created: 2025-05-29
|
|
4
|
+
updated: 2025-06-12
|
|
4
5
|
title: Microsoft Authenticator Users - Major Change Incoming
|
|
5
6
|
summary:
|
|
6
7
|
Microsoft Authenticator is phasing out its password autofill sync feature by
|
|
@@ -53,7 +54,7 @@ Check the link below for full details:
|
|
|
53
54
|
|
|
54
55
|
|
|
55
56
|
<figure class="poster-figure">
|
|
56
|
-
<img src="/img/msauth-promo.png" alt="Microsoft Authenticator Users: Major Change Incoming">
|
|
57
|
+
<img src="/img/msauth-promo.png" alt="Microsoft Authenticator Users: Major Change Incoming" style="width: 540px; height: 675px;">
|
|
57
58
|
<figcaption>Microsoft Authenticator Changes Incoming – featured visual</figcaption>
|
|
58
59
|
</figure>
|
|
59
60
|
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
date:
|
|
3
3
|
created: 2025-06-03
|
|
4
|
+
updated: 2025-06-12
|
|
4
5
|
title: "Google Gemini Now Reads Your Emails? Here's Why You Should Switch"
|
|
5
6
|
summary:
|
|
6
7
|
Google’s Gemini AI will now automatically scan and summarize your
|
|
@@ -48,7 +49,7 @@ Full article on TechCrunch:
|
|
|
48
49
|
<figure class="poster-figure">
|
|
49
50
|
<picture>
|
|
50
51
|
<source srcset="/img/gemini-promo.webp" type="image/webp" />
|
|
51
|
-
<img src="/img/gemini-promo.png" alt="Google Gemini Now Reads Your Emails?" style="width:
|
|
52
|
+
<img src="/img/gemini-promo.png" alt="Google Gemini Now Reads Your Emails?" style="width: 60%; height: 60%">
|
|
52
53
|
<figcaption>
|
|
53
54
|
Google Gemini Now Reads Your Emails? Here's Why You Should Switch – featured visual
|
|
54
55
|
</figcaption>
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
date:
|
|
3
3
|
created: 2025-06-03
|
|
4
|
+
updated: 2025-06-12
|
|
4
5
|
title: 'Digital Identity: A Trojan Horse for Surveillance?'
|
|
5
6
|
summary:
|
|
6
7
|
What if the tools meant to protect your identity are the very ones exposing
|
|
@@ -48,7 +49,7 @@ Read the full article at the below link:
|
|
|
48
49
|
<figure class="poster-figure">
|
|
49
50
|
<picture>
|
|
50
51
|
<source srcset="/img/digital-id-promo.webp" type="image/webp" />
|
|
51
|
-
<img src="/img/digital-id-promo.png" alt="Digital Identity: A Trojan Horse for Surveillance?" style="width:
|
|
52
|
+
<img src="/img/digital-id-promo.png" alt="Digital Identity: A Trojan Horse for Surveillance?" style="width: 60%; height: 60%">
|
|
52
53
|
<figcaption>
|
|
53
54
|
Digital Identity: A Trojan Horse for Surveillance? – featured visual
|
|
54
55
|
</figcaption>
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
date:
|
|
3
3
|
created: 2025-06-08
|
|
4
|
+
updated: 2025-06-12
|
|
4
5
|
title: FOSS Spotlight - Squircle CE
|
|
5
6
|
summary:
|
|
6
7
|
Looking for a lightweight, open-source text editor that actually respects your
|
|
@@ -62,7 +63,7 @@ we might feature it next!
|
|
|
62
63
|
<figure class="poster-figure">
|
|
63
64
|
<picture>
|
|
64
65
|
<source srcset="/img/squircle-promo.webp" type="image/webp" />
|
|
65
|
-
<img src="/img/squircle-promo.png" alt="FOSS Spotlight: Squircle CE" style="width:
|
|
66
|
+
<img src="/img/squircle-promo.png" alt="FOSS Spotlight: Squircle CE" style="width: 60%; height: 60%">
|
|
66
67
|
<figcaption>
|
|
67
68
|
FOSS Spotlight: Squircle CE – featured visual
|
|
68
69
|
</figcaption>
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
---
|
|
2
|
+
date:
|
|
3
|
+
created: 2025-06-12
|
|
4
|
+
title: What’s a Backdoor in Encryption?
|
|
5
|
+
summary:
|
|
6
|
+
What's a Backdoor in Encryption? Why It Matters to Everyone Using the Internet
|
|
7
|
+
authors:
|
|
8
|
+
- team
|
|
9
|
+
categories:
|
|
10
|
+
- Security
|
|
11
|
+
- Privacy
|
|
12
|
+
tags:
|
|
13
|
+
- security
|
|
14
|
+
- privacy
|
|
15
|
+
- encryption
|
|
16
|
+
- e2ee
|
|
17
|
+
---
|
|
18
|
+
|
|
19
|
+
# 🔐 What’s a Backdoor in Encryption?
|
|
20
|
+
|
|
21
|
+
## Why It Matters to Everyone Using the Internet
|
|
22
|
+
|
|
23
|
+
Most people think of end-to-end encryption as a digital lock that keeps their
|
|
24
|
+
messages, data, and personal information safe. But what if someone installed a
|
|
25
|
+
secret door behind that lock?
|
|
26
|
+
|
|
27
|
+
That’s what a “backdoor" is — and here’s why it’s a _big_ deal. 👇
|
|
28
|
+
|
|
29
|
+
<!-- more -->
|
|
30
|
+
|
|
31
|
+
🔸 A backdoor gives external parties (like governments or other entities)
|
|
32
|
+
special access to encrypted communication.
|
|
33
|
+
🔸 While it’s often proposed for safety reasons, introducing such access makes
|
|
34
|
+
everyone’s data less secure — even yours.
|
|
35
|
+
🔸 Hackers can exploit the same "secret door," putting your identity, finances,
|
|
36
|
+
and privacy at risk.
|
|
37
|
+
🔸 You can’t create a "secure" backdoor — once it exists, it breaks the
|
|
38
|
+
fundamental promise of encryption: only the sender and receiver can read the
|
|
39
|
+
data.
|
|
40
|
+
|
|
41
|
+
🔁 Once trust is lost in digital platforms, it’s hard to rebuild.
|
|
42
|
+
|
|
43
|
+
In a world where our lives are increasingly digital, strong encryption isn’t
|
|
44
|
+
just a feature — **it’s a requirement for freedom, security, and trust**.
|
|
45
|
+
|
|
46
|
+
Read the full article from the Internet Society for a breakdown of how this
|
|
47
|
+
works and why it matters:
|
|
48
|
+
🔗 [internetsociety.org/blog/2025/05/what-is-an-encryption-backdoor/](https://www.internetsociety.org/blog/2025/05/what-is-an-encryption-backdoor/)
|
|
49
|
+
|
|
50
|
+
|
|
51
|
+
|
|
52
|
+
<figure class="poster-figure">
|
|
53
|
+
<picture>
|
|
54
|
+
<source srcset="/img/backdoor-promo.webp" type="image/webp" />
|
|
55
|
+
<img src="/img/backdoor-promo.png" alt="What's a Backdoor in Encryption?" style="width: 60%; height: 60%">
|
|
56
|
+
<figcaption>
|
|
57
|
+
What's a Backdoor in Encryption? – featured visual
|
|
58
|
+
</figcaption>
|
|
59
|
+
</figure>
|
|
60
|
+
|
|
61
|
+
<!-- cspell:ignore internetsociety -->
|