TLDR and Titleize all blog titles

TLDR means the title should summarize the content of each paragraph, so people just glancing over the post still understand the essence of what we're saying

Titleize defines when a word should start with uppercase, used guide: https://www.grammar-monster.com/lessons/capital_letters_title_case.htm#exam
This commit is contained in:
davegson 2020-08-19 14:23:30 +02:00
parent 93f11f9205
commit 6491752094
5 changed files with 38 additions and 38 deletions

View file

@ -8,25 +8,25 @@ cover_image_source: https://unsplash.com/photos/66O6CE7QvwI
_Sidenote: shoutout to [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/), this would not have happened without him!_
## The Grant
## First, We Applied for a Big Grant
Back in June we applied for our biggest grant so far. If it was successful, we would receive a grant of around 160.000€ with an additional 150.000€ loan which we would need to pay back in the next years. This meant - with over 300K to work with - we could hire our first employees, pay a code audit, pay our lawyer and even pay us founders our first salaries - which we'd see as a very welcome change indeed. So after weeks and months of preparation and work, on the 5th of June 2019 we sent off our application.
## The long Wait
## A Long and Uncertain Wait
So off it went, and even though finishing an application was relieving, we knew this did not mean much. It was only a _chance_ of getting this money. And on top of that, we knew we would have to wait until September to get the notice. So we still had to count with a negative and it was with this mentality we went into the next few months.
## The Gamble
## We Decided to Gamble
Then August came around. We were invited to an official review of our application. This meant we made it to the second round - 🎉 (but still no certainty). In the application we already mentioned we would hire three employees, but only one of them we already had a candidate for. As a result, they told us *if* we received the grant, we would have to fill one of the positions until they would send us the first batch. Hiring is no easy feat, and we were beginners at that. Was it worth taking the risk of investing a lot of hours into hiring a person if we may not even get the grant in the end? We would waste our time and the time of applicants. We made a leap of faith and just went for it.
## Hiring rounds
## The Hiring Process Starts
The next days I worked on our job description. A big shoutout to ghost.org - [their style and structure](https://careers.ghost.org/visual-designer/en) was great inspiration! After we distributed it through a few channels we for a responses. Raphael pre-filtered many of the applications and with a few we set up a video call. The grant was restricted to Austria 🇦🇹, so even though we are open for remote workers, this position needed to be filled anywhere in Austria.
It was fun getting to dive into this area from an employers perspective. So far we've only sat on the other side of the table. One thing I learned was that you really get much more interested if an application sticks out from standard, generic descriptions. And then in our situation you _really_ stick out if you are already into privacy and burning for our mission. We had two applicants who restricted their work to _only_ privacy projects. One of them could not move to Austria, which was a dealbreaker, and the other one was Luke.
## Luke
## Then Luke Appeared on the Scene
_Sidenote: [Luke talks all about his side of the story in the podcast]({{ site.podcast_url }}2019/11/29/hiring-a-designer-from-the-privacy-community/)_
@ -36,13 +36,13 @@ The even crazier thing about this was, Luke found out about us and the job via T
After plenty of interviews and rounds we had the two most promising candidates remaining. The other applicant lived nearby, so we could meet in person, but Luke we only meat digitally.
## Flying him in
## Flying Him In
Since it's easy to pull off a show for a few hours online, we really wanted to get to know Luke in person before making our decision. We offered him to fly in over the weekend, which he accepted after some suspicion.
We booked the flight the day before we received the result about the grant, which increased the gamble, but hey: [the next day we got it]({{ site.ownership_url }}#influences) 🎉
## His weekend in Austria
## His Weekend in Austria
The weekend was very fun! For me at least - I know Luke rather very nervous in the beginning. He arrived Friday evening, and all of us met on Saturday for lunch at a pizza place. Luke accidentally ordered a pizza, which turned out to be rather complicated to eat, which made him stress out even more. Imagine his situation: You're going to an interview for a job you're excited about. You know you and another candidate are the only ones left. And then all three founders and you go grab some lunch. All eyes on you - and then you're having troubles eating your pizza.
@ -52,11 +52,11 @@ Luke had to be sure about this too, since it meant he would have to move to anot
The next day we dropped him off at the airport. And that Sunday evening all involved knew: the big decision would be made the next day.
## The decision
## His Burning for Privacy Was the Dealbreaker
It is rather obvious by now that we decided to hire Luke. But both candidates were promising: both had strengths and weaknesses in different areas and both were outspoken. Being blunt turns out to be especially helpful when us founders are rather hardheaded. So what was the dealbreaker? **Luke is burning for privacy.** He has a personal privacy project which [you should check out too](https://latestprivacy.org/).
It is rather obvious by now that we decided to hire Luke. But both candidates were promising: both had strengths and weaknesses in different areas and both were outspoken. Being blunt turns out to be especially helpful when us founders are rather hardheaded. So what was the dealbreaker? Luke is burning for privacy. He has a personal privacy project which [you should check out too](https://latestprivacy.org/).
## His work so far
## Starting out in Austria
It took Luke a few weeks to pack up his things and move to Austria, but soon enough, at the beginning of October he became our lead designer. We are very grateful for his work so far and see him as a perfect fit for the job.
@ -64,7 +64,7 @@ He made us reconsider [our old designs]({{ site.img_url }}/archive/previous_desi
_Sidenote: [Luke talks all about his side of the story in the podcast]({{ site.podcast_url }}2019/11/29/hiring-a-designer-from-the-privacy-community/). Also, you can [follow him on Twitter.](https://twitter.com/LukeSeers/)_
## Wrap up
## Wrap Up
Again, this would not have been possible without [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/)! It was a pleasure talking to him and if you don't know him already, check out his videos. They're a great resource for privacy and related topics.

View file

@ -1,12 +1,12 @@
---
title: The next 5 steps for Safing
title: The next 5 Steps for Safing
date: 2019-12-06
author: davegson
custom_thumbnail_name: the-next-5-steps-for-safing
cover_image_source: https://pixabay.com/photos/architecture-stone-blocks-block-3481302/
---
## Intro
## A Rough Estimate of What Might Happen in 2020
With our Kickstarter around the corner - launching on the 2nd of January 2020 - we thought this might be a good time to communicate what our next steps are going to be. These are no far fetched, crazy dreams, but instead executable plans. In 2020, we will surely finish several of these steps. And if the campaign goes well enough, we could gain sufficient resources to hire additional talent, helping us complete them all!
@ -38,7 +38,7 @@ As we already intercept your connections, why not enable you to block the faulty
And the best it will be totally free to use. We totally get that not everyone will be able to pay for the SPN and its servers - but why not enable them to get stealthy privacy too? There is no reason not to!
## Stage 1. completed & future plans
## Our Dream for Stage 1. and further Plans
That will complete the first stage of our plans. At this point we can finally give away an open source, powerful application firewall. Free for anyone to use, supporting all desktop operating systems. And those who like what we do and can afford it, can then pay for the SPN to support us. We truly cannot wait!

View file

@ -5,7 +5,7 @@ author: davegson
custom_thumbnail_name: spn-tor
---
## Different Missions
## Tor's Mission is Broad, Safing Focuses on Easy of Use
**Tor project's mission**
@ -34,7 +34,7 @@ We mean *everyone*. We want my mom and your mom to be able to conveniently withs
Tor was released in 2002, while the SPN will launch in June 2020. It goes without saying that Tor is the far maturer project of the two. The SPN is still in its early days.
## Scope of Protection
## The SPN Protects Your Whole Computer
The Tor browser has great coverage, supporting all major operating systems. It protects the browser habits of its users and is a breeze to set up. When one additionally wants to safeguard the whole computer via the Tor network one has to use the [operating system tails](https://tails.boum.org/install/index.en.html), which is great at what it does, but hard and technical to set up and use.
@ -42,7 +42,7 @@ This is one key difference to the SPN. With it, it's a simple plug and play. You
Another detail is that Tor does not transport everything, notably UDP traffic. The SPN will support TCP and UDP (+ variants) from the get go and we will see if we will need and implement anything else.
## Handling Circuits
## The SPN Minimizes Travel through the Open Web
Both Tor and the SPN provide privacy by decoupling the person (ip-address) from the destination. This prevents your Internet Service Provider and everyone else from logging your Internet activities. When no other identification is provided you even arrive at the destination anonymously, meaning the visited server cannot know who you are.
@ -62,14 +62,14 @@ With the SPN however, every connection is calculated individually and leaves the
## Minor comments
**The Dark Web**
Tor's mission for anonymity also enables people to host content anonymously through onion domains. This is a non goal for Safing.
**The Dark Web Is a Non-Goal for Safing**
**SPN enforces DoT**
While the open source SPN app sits at the kernel, it can do all sorts of amazing stuff. It will enforce all your DNS queries to use DNS over TLS (DoT), which also prevents your router from snooping on you. Later, it will also block malicious connections via an integrated Application Firewall.
**SPN Enforces DoT and Blocks Ads/Trackers**
**Free vs Paid product**
**The SPN Costs Money**
Both the SPN and Tor are FOSS. But Tor is free to use while you have to subscribe to the SPN in order to use it. Be aware you are not only paying for the SPN, but also supporting us to develop the free application firewall and enabling us to continue fighting for a brighter future.
## Conclusion
## Conclusion: It Depends on Your Threat Model
Tor is a great project which has pioneered privacy technology and is a firm player in the space while the SPN has fresh, innovative solutions which tackle uncharted ground and focuses on ease of use before all. Depending on your threat model, the SPN may be an alternative to Tor. Or it might not.

View file

@ -1,23 +1,23 @@
---
title: How the SPN compares to VPNs
title: How the SPN Compares to VPNs
date: 2020-01-22
author: davegson
custom_thumbnail_name: how-the-spn-compares-to-vpns
cover_image_source: https://pixabay.com/vectors/the-globe-globe-the-internet-free-4790044/
---
## Introduction into VPN Technology
## Overview of VPN Technology
### What is a VPN here for?
### VPNs Were Built for Security, NOT for Privacy
The VPN technology was developed to allow remote workers to securely connect to a corporate network to virtually check into the office and access internal resources. It does this by establishing a secure tunnel between the worker and the company. The VPN shields the whole route from the worker to the office, never entering the "open Internet".
### What do commercial VPNs do?
Naturally, they do something very similar. As an example, let's say you want to connect to "google.com" via a VPN. The VPN client first creates a safe tunnel to the VPN server, which then calls upon "google.com". So a VPN safeguards your connections up until the VPN server, then unpacks their protection and routes it back into the open Internet.
### Commercial VPNs Are just Proxy Servers
### VPNs do not protect your privacy
### VPNs do NOT Protect Your Privacy
There are many legitimate use cases for a VPN, like securely connecting to your corporate network or "beaming" into another country to enjoy different content or cheaper prices. But VPNs do *not* protect your privacy.
## Meta Data Collection
## The SPN Truly Protects Your Meta Data
A VPN does protect you from your Internet Service Provider (ISP) to collect and process you browsing activities. But this just delegates the problem: now the VPN that can collect and sell all your data, which many of them do.
@ -29,7 +29,7 @@ The SPN however decouples the person from the destination, resulting in true pri
![SPN community](https://safing.io/assets/img/spn/spn-community-web.png)
## Scope of Protection
## VPN Technology is More Widespread (for now)
The VPN technology is widespread and almost every computer and mobile phone supports connecting to a VPN natively.
@ -37,12 +37,12 @@ When launching in June, the SPN will support Windows, with Linux following short
The VPN and SPN both tunnel connections from your whole computer, not only from your browser.
## Open Source
## SPN ♥ Open Source - Everybody Can Inspect
Many commercial VPN providers use bold and misleading marketing claims without any evidence to back it up. The code on their servers and mostly on their clients cannot be investigated. They demand your trust but give little to no proof in return.
The SPN however is open source / FOSS. We do not believe users should simply 'trust' companies when it comes to their privacy. Instead they should be able to inspect vendors and hold them accountable publicly. So feel free to check out [our Github](https://github.com/Safing/).
## Extra Mileage
## The SPN Minimizes Travel through the Open Web
After a connection arrives at the VPN server it still has to travel to the desired website. Depending on where your VPN is located, this may lead to a slower Internet experience. As an example, a person who is located in Europe may be connected to a US VPN server while loading a European website. This means the connection has to cross the Atlantic twice (EU -> US -> EU).
@ -56,15 +56,15 @@ With the SPN however, every connection is calculated individually and leaves the
## Minor comments
**SPN enforces DoT**
While the open source SPN app sits at the kernel, it can do all sorts of amazing stuff. It will enforce all your DNS queries to use DNS over TLS (DoT), which also prevents your router from snooping on you. Later, it will also block malicious connections via an integrated Application Firewall.
**SPN Enforces DoT and Blocks Ads/Trackers**
**VPN - a Very Precarious Narrative**
There is [a great write up by Dennis Schubert](https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html) showcasing the problem of todays commercial VPNs, both from a privacy and security perspective. Feel free to check it out, it also shows the valid use cases of VPNs.
**Pricing**
**The SPN Costs more Because it is a New Product**
While VPN providers basically rebrand the same basic technologies widely available, we built every aspect of the network from the ground up, by hand. This is a huge investment and will require lots of resources to properly maintain and improve. But this is the only way to achieve real privacy. Thank you for enabling us to continue fighting for a brighter future!
## Conclusion
## Conclusion: SPN > VPN
The VPN technology was built to securely connect two company locations. However, the SPN was developed from the ground up to protect user privacy. As a result the SPN can easily outperform VPNs in every aspect.

View file

@ -14,7 +14,7 @@ This is that story. And the story of shortcuts.
## Step 1: Creating a Product
### Grinding it out with R & D
### Grind it out with R & D
There's one question that every company answers before starting out: "What problem are you trying to solve?"
@ -22,7 +22,7 @@ Then you go to the drafting board, you research deep into the issue, you think t
This process is called Research & Development. Nothing novel out there 'just happened', instead, an idea was cultivated and progressed through plenty of trials and errors until it matured into a workable solution.
### The Shortcut
### The Shortcut: Just Copy Work
But what if you do not have the time for all that? It's rather easy actually, you just copy a current solution. Or you only slightly add functionality to an existing product. The devil's advocate would call this stealing, the marketer would simply describe it as rebranding.
@ -34,7 +34,7 @@ With a novel or rebranded product, you're ready to move ahead. But nothing is ga
## Step 2: Marketing and Growth
### Putting in the honest work
### Listen and Put in Honest Work
If you have the perfect solution to a problem but nobody knows about it, was the problem really solved? Was your solution really any good? Honestly, no. This is the reason why marketing is *necessary*.
@ -44,7 +44,7 @@ But talking to your market has become difficult. In today's information overflow
For generic growth, there is no way around listening to your audience, being honest and open, and ultimately building a relationship with your customers. Only time, genuine effort and persistence will get you there.
### The Shortcut
### The Shortcut: Just Buy Attention
Oh yeah, there is a way around this too. Instead of putting in the work, just buy yourself into the game: With todays ad industry, you can simply spend hundreds of thousands of dollars to buy people's attention and hopefully convert enough of them into customers.
@ -54,7 +54,7 @@ The catch with this however is that you normally have to turn to venture capital
Marketing is the act of talking and promoting your product to the market. As a result, growth is *only* possible through good marketing. The ethics behind it all is another story, but I assume you can guess my stance on that topic ;)
## Convergence
## Failing One Step Results in Overall Failure
Think about different companies and their approach in both these steps. What about those who chose to copy old technology but market it in an honest way? What about those that took the shortcut in both cases? What about the geniuses who researched a break-through solution but failed to present and market it to the world?