@networkpro/blog 1.2.3 → 1.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@networkpro/blog",
3
- "version": "1.2.3",
3
+ "version": "1.2.4",
4
4
  "description": "The official blog of Network Pro Strategies (Network Pro™).",
5
5
  "keywords": [
6
6
  "advisory",
@@ -58,7 +58,7 @@
58
58
  "globals": "^16.2.0",
59
59
  "markdownlint": "^0.38.0",
60
60
  "markdownlint-cli2": "^0.18.1",
61
- "postcss": "^8.5.4",
61
+ "postcss": "^8.5.5",
62
62
  "prettier": "3.5.3",
63
63
  "stylelint": "^16.20.0",
64
64
  "stylelint-config-html": "^1.1.0",
Binary file
Binary file
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  date:
3
3
  created: 2025-05-29
4
- updated: 2025-06-08
4
+ updated: 2025-06-12
5
5
  title: FOSS Spotlight - HeliBoard
6
6
  summary:
7
7
  Say hello to HeliBoard – your privacy-first, open-source keyboard built just
@@ -59,7 +59,7 @@ might feature it next!
59
59
   
60
60
 
61
61
  <figure class="poster-figure">
62
- <img src="/img/heliboard-promo.png" alt="FOSS Spotlight: HeliBoard">
62
+ <img src="/img/heliboard-promo.png" alt="FOSS Spotlight: HeliBoard" style="width: 512px; height: 768px;">
63
63
  <figcaption>FOSS Spotlight: HeliBoard – featured visual</figcaption>
64
64
  </figure>
65
65
 
@@ -1,6 +1,7 @@
1
1
  ---
2
2
  date:
3
3
  created: 2025-05-29
4
+ updated: 2025-06-12
4
5
  title: Microsoft Authenticator Users - Major Change Incoming
5
6
  summary:
6
7
  Microsoft Authenticator is phasing out its password autofill sync feature by
@@ -53,7 +54,7 @@ Check the link below for full details:
53
54
  &nbsp;
54
55
 
55
56
  <figure class="poster-figure">
56
- <img src="/img/msauth-promo.png" alt="Microsoft Authenticator Users: Major Change Incoming">
57
+ <img src="/img/msauth-promo.png" alt="Microsoft Authenticator Users: Major Change Incoming" style="width: 540px; height: 675px;">
57
58
  <figcaption>Microsoft Authenticator Changes Incoming – featured visual</figcaption>
58
59
  </figure>
59
60
 
@@ -1,6 +1,7 @@
1
1
  ---
2
2
  date:
3
3
  created: 2025-06-03
4
+ updated: 2025-06-12
4
5
  title: "Google Gemini Now Reads Your Emails? Here's Why You Should Switch"
5
6
  summary:
6
7
  Google’s Gemini AI will now automatically scan and summarize your
@@ -48,7 +49,7 @@ Full article on TechCrunch:
48
49
  <figure class="poster-figure">
49
50
  <picture>
50
51
  <source srcset="/img/gemini-promo.webp" type="image/webp" />
51
- <img src="/img/gemini-promo.png" alt="Google Gemini Now Reads Your Emails?" style="width: 50%; height: 50%">
52
+ <img src="/img/gemini-promo.png" alt="Google Gemini Now Reads Your Emails?" style="width: 60%; height: 60%">
52
53
  <figcaption>
53
54
  Google Gemini Now Reads Your Emails? Here's Why You Should Switch – featured visual
54
55
  </figcaption>
@@ -1,6 +1,7 @@
1
1
  ---
2
2
  date:
3
3
  created: 2025-06-03
4
+ updated: 2025-06-12
4
5
  title: 'Digital Identity: A Trojan Horse for Surveillance?'
5
6
  summary:
6
7
  What if the tools meant to protect your identity are the very ones exposing
@@ -48,7 +49,7 @@ Read the full article at the below link:
48
49
  <figure class="poster-figure">
49
50
  <picture>
50
51
  <source srcset="/img/digital-id-promo.webp" type="image/webp" />
51
- <img src="/img/digital-id-promo.png" alt="Digital Identity: A Trojan Horse for Surveillance?" style="width: 50%; height: 50%">
52
+ <img src="/img/digital-id-promo.png" alt="Digital Identity: A Trojan Horse for Surveillance?" style="width: 60%; height: 60%">
52
53
  <figcaption>
53
54
  Digital Identity: A Trojan Horse for Surveillance? – featured visual
54
55
  </figcaption>
@@ -1,6 +1,7 @@
1
1
  ---
2
2
  date:
3
3
  created: 2025-06-08
4
+ updated: 2025-06-12
4
5
  title: FOSS Spotlight - Squircle CE
5
6
  summary:
6
7
  Looking for a lightweight, open-source text editor that actually respects your
@@ -62,7 +63,7 @@ we might feature it next!
62
63
  <figure class="poster-figure">
63
64
  <picture>
64
65
  <source srcset="/img/squircle-promo.webp" type="image/webp" />
65
- <img src="/img/squircle-promo.png" alt="FOSS Spotlight: Squircle CE" style="width: 50%; height: 50%">
66
+ <img src="/img/squircle-promo.png" alt="FOSS Spotlight: Squircle CE" style="width: 60%; height: 60%">
66
67
  <figcaption>
67
68
  FOSS Spotlight: Squircle CE – featured visual
68
69
  </figcaption>
@@ -0,0 +1,61 @@
1
+ ---
2
+ date:
3
+ created: 2025-06-12
4
+ title: What’s a Backdoor in Encryption?
5
+ summary:
6
+ What's a Backdoor in Encryption? Why It Matters to Everyone Using the Internet
7
+ authors:
8
+ - team
9
+ categories:
10
+ - Security
11
+ - Privacy
12
+ tags:
13
+ - security
14
+ - privacy
15
+ - encryption
16
+ - e2ee
17
+ ---
18
+
19
+ # 🔐 What’s a Backdoor in Encryption?
20
+
21
+ ## Why It Matters to Everyone Using the Internet
22
+
23
+ Most people think of end-to-end encryption as a digital lock that keeps their
24
+ messages, data, and personal information safe. But what if someone installed a
25
+ secret door behind that lock?
26
+
27
+ That’s what a “backdoor" is — and here’s why it’s a _big_ deal. 👇
28
+
29
+ <!-- more -->
30
+
31
+ 🔸 A backdoor gives external parties (like governments or other entities)
32
+ special access to encrypted communication.
33
+ 🔸 While it’s often proposed for safety reasons, introducing such access makes
34
+ everyone’s data less secure — even yours.
35
+ 🔸 Hackers can exploit the same "secret door," putting your identity, finances,
36
+ and privacy at risk.
37
+ 🔸 You can’t create a "secure" backdoor — once it exists, it breaks the
38
+ fundamental promise of encryption: only the sender and receiver can read the
39
+ data.
40
+
41
+ 🔁 Once trust is lost in digital platforms, it’s hard to rebuild.
42
+
43
+ In a world where our lives are increasingly digital, strong encryption isn’t
44
+ just a feature — **it’s a requirement for freedom, security, and trust**.
45
+
46
+ Read the full article from the Internet Society for a breakdown of how this
47
+ works and why it matters:
48
+ 🔗 [internetsociety.org/blog/2025/05/what-is-an-encryption-backdoor/](https://www.internetsociety.org/blog/2025/05/what-is-an-encryption-backdoor/)
49
+
50
+ &nbsp;
51
+
52
+ <figure class="poster-figure">
53
+ <picture>
54
+ <source srcset="/img/backdoor-promo.webp" type="image/webp" />
55
+ <img src="/img/backdoor-promo.png" alt="What's a Backdoor in Encryption?" style="width: 60%; height: 60%">
56
+ <figcaption>
57
+ What's a Backdoor in Encryption? – featured visual
58
+ </figcaption>
59
+ </figure>
60
+
61
+ <!-- cspell:ignore internetsociety -->