Commit 93ec9069 by Jun Matsushita

Linked practices subsections, some langauge work.

parent 995132f6
section.header
h1.title Open Integrity Initiative
h2.title Data Driven Security and Privacy
h1.title Open Integrity
h2.title Security and Privacy Software Metrics
.row
input(type="email",placeholder="your@email.com",style="text-align:center")
.row
......
---
layout: page
title: Join
title: Contribute
---
# Support us
- Follow us
- Give us some feedback
- Follow us
- Give us some feedback
[twitter](https://twitter.com/openintegrity)
[email](mailto://contact@openintegrity.org)
......@@ -28,6 +28,6 @@ Consulted partners will help ensure that Open Integrity is focused on how **end-
### Measurement Partnerships
> Are you a **researcher**, a **team** or an **organisation** surveying or **collecting data on security and privacy best practices**? Do you use **free and open source software** collector agents, or **open data workflows** to collect qualitative data? Do you publish your data with an **open data licence**.
> Are you a **researcher**, a **team** or an **organisation** surveying or **collecting data on security and privacy best practices**? Do you use **free and open source software** collector agents, or **open data workflows** to collect qualitative data? Do you publish your data with an **open data licence**.
Then [**read on to find out more about becoming an Open Integrity Measurement Partner**](framework/partnerships).
\ No newline at end of file
Then [**read on to find out more about becoming an Open Integrity Measurement Partner**](framework/partnerships).
......@@ -3,12 +3,12 @@ layout: page
header: hero
---
## The Open Integrity Initiative is [booting up](blog/booting-up).
## Open Integrity is [booting up](blog/booting-up).
We provide **reliable and evidence based** answers to questions such as:
- Which tools are open source?
- Which provide end-to-end encryption or support two factor authentication?
- Which can be downloaded securely and verified to be authentic?
- Which tools can be downloaded securely and verified to be authentic?
- Which tools provide end-to-end encryption by default?
- Which terms of service protect your private data?
You can read more [about the project](about).
......@@ -21,19 +21,19 @@ If you're collecting data or doing research on security and privacy then we'd li
<div class="row">
<div class="one-third column category">
#### Technology
#### [Technology](/practices/technology)
- [**Dependency Management**](# "Current Focus"){.focus}
- Architecture
- Vulnerabilities
</div>
<div class="one-third column category">
#### Policy
#### [Policy](/practices/policy)
- [**Terms of Service**](# "Current Focus")
- Corporate Accountability
- Transparency reporting
</div>
<div class="one-third column category">
#### Design
#### [Design](/practices/design)
- [**Default Settings**](# "Current Focus")
- User Experience
- Translations
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or sign in to comment