Skip to content

Commit 58343b1

Browse files
lexidngray
lexi
authored andcommitted
Update recommendation card design (#1316)
Signed-off-by: Daniel Gray <dng@disroot.org>
1 parent 8b1d9cd commit 58343b1

28 files changed

+892
-616
lines changed

docs/android.en.md

Lines changed: 57 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,11 @@ We recommend installing one of these custom Android operating systems on your de
2727

2828
GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported.
2929

30-
[Homepage](https://grapheneos.org/){ .md-button .md-button--primary } [Privacy Policy](https://grapheneos.org/faq#privacy-policy){ .md-button }
30+
[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary }
31+
[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" }
32+
[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation}
33+
[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" }
34+
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
3135

3236
GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific work profile or user [profile](android/overview.md#user-profiles) of your choice.
3337

@@ -41,7 +45,11 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw
4145

4246
**CalyxOS** is a system with some privacy features on top of AOSP, including [Datura](https://calyxos.org/docs/tech/datura-details) firewall, [Signal](https://signal.org) integration in the dialer app, and a built in panic button. CalyxOS also comes with firmware updates and signed builds, so verified boot is fully supported.
4347

44-
[Homepage](https://calyxos.org/){ .md-button .md-button--primary } [Privacy Policy](https://calyxinstitute.org/legal/privacy-policy){ .md-button }
48+
[:octicons-home-16: Homepage](https://calyxos.org/){ .md-button .md-button--primary }
49+
[:octicons-eye-16:](https://calyxinstitute.org/legal/privacy-policy){ .card-link title="Privacy Policy" }
50+
[:octicons-info-16:](https://calyxos.org/docs/){ .card-link title=Documentation}
51+
[:octicons-code-16:](https://github.com/CalyxOS){ .card-link title="Source Code" }
52+
[:octicons-heart-16:](https://members.calyxinstitute.org/donate){ .card-link title=Contribute }
4553

4654
For people who need Google Play Services, CalyxOS optionally includes [microG](https://microg.org/). CalyxOS also includes alternate location services, [Mozilla](https://location.services.mozilla.com/) and [DejaVu](https://github.com/n76/DejaVu).
4755

@@ -56,7 +64,11 @@ CalyxOS only [supports](https://calyxos.org/docs/guide/device-support/) Google P
5664
**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/).
5765
DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices.
5866

59-
[Homepage](https://divestos.org){ .md-button .md-button--primary } [Privacy Policy](https://divestos.org/index.php?page=privacy_policy){ .md-button }
67+
[:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary }
68+
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" }
69+
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
70+
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" }
71+
[:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute }
6072

6173
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, a custom [hosts](https://divested.dev/index.php?page=dnsbl) file, and [F-Droid](https://www.f-droid.org) as the app store. It includes [UnifiedNlp](https://github.com/microg/UnifiedNlp) for network location. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and includes [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning).
6274

@@ -92,7 +104,7 @@ A few more tips regarding Android devices and operating system compatibility:
92104

93105
Beginning with the **Pixel 6** and **6 Pro**, Pixel devices receive a minimum of 5 years of guaranteed security updates, ensuring a much longer lifespan compared to the 2-4 years competing OEMs typically offer.
94106

95-
[Store](https://store.google.com/category/phones){ .md-button .md-button--primary }
107+
[:material-shopping: Store](https://store.google.com/category/phones){ .md-button .md-button--primary }
96108

97109
Unless you have a need for specific [CalyxOS features](https://calyxos.org/features/) that are unavailable on GrapheneOS, we strongly recommend GrapheneOS over other operating system choices on Pixel devices.
98110

@@ -145,14 +157,16 @@ Fairphone markets their devices as receiving 6 years of support. However, the So
145157

146158
**Orbot** is a free proxy app that routes your connections through the Tor Network.
147159

148-
[Homepage](https://orbot.app/){ .md-button .md-button--primary }
160+
[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary }
161+
[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" }
162+
[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation}
163+
[:octicons-code-16:](https://github.com/guardianproject/orbot){ .card-link title="Source Code" }
164+
[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute }
149165

150166
??? downloads
151167

152-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
153-
- [:pg-f-droid: F-Droid](https://guardianproject.info/fdroid)
154-
- [:fontawesome-brands-github: Source](https://github.com/guardianproject/orbot)
155-
- [:fontawesome-brands-gitlab: Source](https://gitlab.com/guardianproject/orbot)
168+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=org.torproject.android){ .card-link title="Google Play" }
169+
[:pg-f-droid:](https://guardianproject.info/fdroid){ .card-link title=F-Droid }
156170

157171
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings****Network & internet****VPN**:gear:**Block connections without VPN**.
158172

@@ -174,13 +188,14 @@ For resistance against traffic analysis attacks, consider enabling *Isolate Dest
174188

175189
Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)).
176190

177-
[Project Info](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary }
191+
[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary }
192+
[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" }
193+
[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute }
178194

179195
??? downloads
180196

181-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=net.typeblog.shelter)
182-
- [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/net.typeblog.shelter)
183-
- [:fontawesome-brands-github: Source](https://github.com/PeterCxy/Shelter)
197+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=net.typeblog.shelter){ .card-link title="Google Play" }
198+
[:pg-f-droid:](https://f-droid.org/en/packages/net.typeblog.shelter){ .card-link title=F-Droid }
184199

185200
!!! warning
186201

@@ -199,12 +214,16 @@ For resistance against traffic analysis attacks, consider enabling *Isolate Dest
199214

200215
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently it works with GrapheneOS and the device's stock operating system.
201216

202-
[Website](https://attestation.app){ .md-button .md-button--primary }
217+
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
218+
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
219+
[:octicons-info-16:](https://attestation.app/about){ .card-link title=Documentation}
220+
[:octicons-code-16:](https://attestation.app/source){ .card-link title="Source Code" }
221+
[:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribute }
203222

204223
??? downloads
205224

206-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor)
207-
- [:fontawesome-brands-github: Source](https://github.com/GrapheneOS/Auditor)
225+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=app.attestation.auditor){ .card-link title="Google Play" }
226+
[:fontawesome-brands-github:](https://github.com/GrapheneOS/Auditor/releases){ .card-link title=GitHub }
208227

209228
Auditor performs attestation and intrusion detection by:
210229

@@ -228,12 +247,15 @@ To make sure that your hardware and operating system is genuine, [perform local
228247

229248
**Secure Camera** is an camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
230249

231-
[Source Code](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
250+
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
251+
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
252+
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" }
253+
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
232254

233255
??? downloads
234256

235-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play)
236-
- [:fontawesome-brands-github: Source](https://github.com/GrapheneOS/Camera/releases)
257+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play){ .card-link title="Google Play" }
258+
[:fontawesome-brands-github:](https://github.com/GrapheneOS/Camera/releases){ .card-link title=GitHub }
237259

238260
Main privacy features include:
239261

@@ -258,12 +280,14 @@ Main privacy features include:
258280

259281
[Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content.
260282

261-
[App Info](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary }
283+
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary }
284+
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" }
285+
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
262286

263287
??? downloads
264288

265-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play)
266-
- [:fontawesome-brands-github: Source](https://github.com/GrapheneOS/PdfViewer/releases)
289+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play){ .card-link title="Google Play" }
290+
[:fontawesome-brands-github:](https://github.com/GrapheneOS/PdfViewer/releases){ .card-link title=GitHub }
267291

268292
### PrivacyBlur
269293

@@ -273,13 +297,15 @@ Main privacy features include:
273297

274298
**PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online.
275299

276-
[Website](https://privacyblur.app/){ .md-button .md-button--primary }
300+
[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary }
301+
[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" }
302+
[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation}
303+
[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" }
277304

278305
??? downloads
279306

280-
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur)
281-
- [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/de.mathema.privacyblur/)
282-
- [:fontawesome-brands-github: Source](https://github.com/MATHEMA-GmbH/privacyblur)
307+
[:fontawesome-brands-google-play:](https://play.google.com/store/apps/details?id=de.mathema.privacyblur){ .card-link title="Google Play" }
308+
[:pg-f-droid:](https://f-droid.org/en/packages/de.mathema.privacyblur/){ .card-link title=F-Droid }
283309

284310
!!! warning
285311

@@ -324,11 +350,14 @@ To mitigate these problems, we recommend [Neo Store](https://github.com/NeoAppli
324350
**Neo Store** is a modern F-Droid client made with MaterialUI, forked from [Foxy Droid](https://github.com/kitsunyan/foxy-droid).
325351

326352
Unlike the official F-Droid client, Neo Store supports seamless updates on Android 12 and above without the need for a privileged extension. If your Android distribution is on Android 12 or above and does not include the [F-Droid privileged extension](https://f-droid.org/en/packages/org.fdroid.fdroid.privileged/), it is highly recommended that you use Neo Store instead of the official client.
353+
354+
[:octicons-repo-16: Repository](https://github.com/NeoApplications/Neo-Store){ .md-button .md-button--primary }
355+
[:octicons-code-16:](https://github.com/NeoApplications/Neo-Store){ .card-link title="Source Code" }
327356

328357
??? downloads
329358

330-
- [:fontawesome-brands-android: APK Download](https://android.izzysoft.de/repo/apk/com.looker.droidify)
331-
- [:fontawesome-brands-github: Source](https://github.com/NeoApplications/Neo-Store)
359+
[:fontawesome-brands-android:](https://android.izzysoft.de/repo/apk/com.looker.droidify){ .card-link title="IzzyOnDroid (APK)" }
360+
[:fontawesome-brands-github:](https://github.com/NeoApplications/Neo-Store/releases){ .card-link title=GitHub }
332361

333362
### Manually with RSS Notifications
334363

Lines changed: 1 addition & 1 deletion
Loading

docs/assets/img/cloud/cryptee.svg

Lines changed: 1 addition & 1 deletion
Loading
-1.16 KB
Loading

0 commit comments

Comments
 (0)