diff --git a/.github/contributing.md b/.github/contributing.md index a7c5b9e..56582f8 100644 --- a/.github/contributing.md +++ b/.github/contributing.md @@ -112,4 +112,4 @@ One-liners to fix-up some common formatting mistakes. Use with great caution and $ sed -i 's/`$/`\./g' ./readme.md ``` -[Other one-liners are available](https://kevin.deldycke.com/2006/12/text-date-document-processing-commands/) on my blog. +[Other one-liners are available](https://kevin.deldycke.com/2006/text-date-document-processing-commands/) on my blog. diff --git a/readme.md b/readme.md index 9c23ecf..958d22e 100644 --- a/readme.md +++ b/readme.md @@ -459,7 +459,7 @@ The old *OpenID* is dead; the new *OpenID Connect* is very much not-dead. - [OAuth in one picture](https://mobile.twitter.com/kamranahmedse/status/1276994010423361540) - A nice summary card. -- [How to Implement a Secure Central Authentication Service in Six Steps](https://engineering.shopify.com/blogs/engineering/implement-secure-central-authentication-service-six-steps) - Got multiple legacy systems to merge with their own login methods and accounts? Here is how to merge all that mess by the way of OIDC. +- [How to Implement a Secure Central Authentication Service in Six Steps](https://shopify.engineering/implement-secure-central-authentication-service-six-steps) - Got multiple legacy systems to merge with their own login methods and accounts? Here is how to merge all that mess by the way of OIDC. - [Open-Sourcing BuzzFeed's SSO Experience](https://increment.com/security/open-sourcing-buzzfeeds-single-sign-on-process/) - OAuth2-friendly adaptation of the Central Authentication Service (CAS) protocol. You'll find there good OAuth user flow diagrams. @@ -581,7 +581,7 @@ Most businesses do not collect customer's identity to create user profiles to se - [Statistically Likely Usernames](https://github.com/insidetrust/statistically-likely-usernames) - Wordlists for creating statistically likely usernames for use in username-enumeration, simulated password-attacks and other security testing tasks. -- [Facebook Dangerous Individuals and Organizations List](https://theintercept.com/document/2021/10/12/facebook-dangerous-individuals-and-organizations-list-reproduced-snapshot/) - Some groups and content are illegal in some juridictions. This is an example of a blocklist. +- [Facebook Dangerous Individuals and Organizations List](https://theintercept.com/document/facebook-dangerous-individuals-and-organizations-list-reproduced-snapshot/) - Some groups and content are illegal in some juridictions. This is an example of a blocklist. - [Ballerine](https://github.com/ballerine-io/ballerine) - An open-source infrastructure for user identity and risk management. @@ -607,8 +607,6 @@ Any online communities, not only those related to gaming and social networks, re - [You either die an MVP or live long enough to build content moderation](https://mux.com/blog/you-either-die-an-mvp-or-live-long-enough-to-build-content-moderation/) - “You can think about the solution space for this problem by considering three dimensions: cost, accuracy and speed. And two approaches: human review and machine review. Humans are great in one of these dimensions: accuracy. The downside is that humans are expensive and slow. Machines, or robots, are great at the other two dimensions: cost and speed - they're much cheaper and faster. But the goal is to find a robot solution that is also sufficiently accurate for your needs.” -- [Keep out the bad apples: How to moderate a marketplace](https://www.twosided.io/p/keep-out-the-bad-apples-how-to-moderate) - “With great power comes great responsibility. Some of my tips and tricks to make your marketplace a safer place.” - - [The despair and darkness of people will get to you](https://restofworld.org/2020/facebook-international-content-moderators/) - Moderation of huge social networks is performed by an army of outsourced subcontractors. These people are exposed to the worst and generally ends up with PTSD. - [The Cleaners](https://thoughtmaybe.com/the-cleaners/) - A documentary on these teams of underpaid people removing posts and deleting accounts. @@ -751,8 +749,6 @@ The well-known European privacy framework - [GDPR – A Practical guide for Developers](https://techblog.bozho.net/gdpr-practical-guide-developers/) - A one-page summary of the above. -- [GDPR Tracker](https://gdprtracker.io) - Track the GDPR compliance of cloud services and subprocessors. - - [GDPR documents](https://github.com/good-lly/gdpr-documents) - Templates for personal use to have companies comply with "Data Access" requests. - [Dark Patterns after the GDPR](https://arxiv.org/pdf/2001.02479.pdf) - This paper demonstrates that, because of the lack of GDPR law enforcements, dark patterns and implied consent are ubiquitous. diff --git a/readme.zh.md b/readme.zh.md index 649141c..1423c27 100644 --- a/readme.zh.md +++ b/readme.zh.md @@ -429,7 +429,7 @@ IAM 的基础:用户、组、角色和权限的定义和生命周期。 分配和委托授权的巧妙好奇。 -- [五分钟或更短时间内完成 Google 的 Macaroon](https://blog.bren2010.io/blog/googles-macaroons) - 如果给我一个授权我在某些限制下执行某些操作的 Macaroon,我可以非交互地构建第二个具有更严格限制的 Macaroon,然后我可以给你。 +- [五分钟或更短时间内完成 Google 的 Macaroon](https://web.archive.org/web/20240521142227/https://blog.bren2010.io/blog/googles-macaroons) - 如果给我一个授权我在某些限制下执行某些操作的 Macaroon,我可以非交互地构建第二个具有更严格限制的 Macaroon,然后我可以给你。 - [Macaroons: 为云中的分散式授权提供带有上下文警告的Cookies](https://ai.google/research/pubs/pub41892) - 谷歌的原始论文。 @@ -457,7 +457,7 @@ IAM 的基础:用户、组、角色和权限的定义和生命周期。 - [一张图看懂 OAuth](https://mobile.twitter.com/kamranahmedse/status/1276994010423361540) - 一张漂亮的总结卡。 -- [如何通过六个步骤实现安全的中央认证服务](https://engineering.shopify.com/blogs/engineering/implement-secure-central-authentication-service-six-steps) - 有多个遗留系统要与它们自己的登录方式和账户合并?这里是如何通过 OIDC 的方式来合并所有这些混乱的系统。 +- [如何通过六个步骤实现安全的中央认证服务](https://shopify.engineering/implement-secure-central-authentication-service-six-steps) - 有多个遗留系统要与它们自己的登录方式和账户合并?这里是如何通过 OIDC 的方式来合并所有这些混乱的系统。 - [开源 BuzzFeed 的 SSO 体验](https://increment.com/security/open-sourcing-buzzfeeds-single-sign-on-process/) - 中央认证服务 (CAS) 协议的 OAuth2 友好改编。 您会在那里找到很好的 OAuth 用户流程图。 @@ -579,7 +579,7 @@ HSM 是在硬件层面保证秘密管理安全的物理设备。 - [统计学上可能的用户名](https://github.com/insidetrust/statistically-likely-usernames) - 用于创建统计学上可能的用户名的词表,以用于用户名枚举、模拟密码攻击和其他安全测试任务。 -- [Facebook 上的危险个人和组织名单](https://theintercept.com/document/2021/10/12/facebook-dangerous-individuals-and-organizations-list-reproduced-snapshot/) - 一些团体和内容在一些司法管辖区是非法的。这是一个封锁名单的例子。 +- [Facebook 上的危险个人和组织名单](https://theintercept.com/document/facebook-dangerous-individuals-and-organizations-list-reproduced-snapshot/) - 一些团体和内容在一些司法管辖区是非法的。这是一个封锁名单的例子。 - [Ballerine](https://github.com/ballerine-io/ballerine) - 一个用于用户身份和风险管理的开源基础设施。 @@ -605,8 +605,6 @@ HSM 是在硬件层面保证秘密管理安全的物理设备。 - [你要么死于 MVP,要么活到足够长的时间来建立内容节制。](https://mux.com/blog/you-either-die-an-mvp-or-live-long-enough-to-build-content-moderation/) - "你可以通过考虑三个维度来思考这个问题的解决空间:成本、准确性和速度。还有两种方法:人类审查和机器审查。人类在其中一个维度上很出色:准确性。缺点是,人类的成本高,速度慢。机器,或称机器人,在另外两个方面很出色:成本和速度--它们要便宜得多,速度也快。但是,目标是要找到一个机器人解决方案,同时对你的需求有足够的准确性"。 -- [把坏苹果拒之门外:如何调节市场](https://www.twosided.io/p/keep-out-the-bad-apples-how-to-moderate) - “拥有权利的同时也被赋予了重大的责任。 我的一些提示和技巧可以让你的市场变得更安全。” - - [人们的绝望和黑暗会影响到你](https://restofworld.org/2020/facebook-international-content-moderators/) - 大量的外包分包商负责管理庞大的社交网络。 这些人暴露在最坏的情况下,通常最终会患上创伤后应激障碍。 - [The Cleaners](https://thoughtmaybe.com/the-cleaners/) - 一部关于这些薪酬过低的团队删除帖子和删除帐户的纪录片。 @@ -749,8 +747,6 @@ HSM 是在硬件层面保证秘密管理安全的物理设备。 - [GDPR – 开发人员的实用指南](https://techblog.bozho.net/gdpr-practical-guide-developers/) - 上述内容的一页摘要。 -- [GDPR Tracker](https://gdprtracker.io) - 追踪云服务和子处理者的GDPR合规性。 - - [GDPR 文档](https://github.com/good-lly/gdpr-documents) - 供个人使用的模板,让公司遵守 "数据访问 "要求。 - [GDPR 之后的黑暗模式](https://arxiv.org/pdf/2001.02479.pdf) - 本文表明,由于缺乏 GDPR 法律的执行,黑暗模式和默示同意无处不在。