replaced pleroma with akkoma

This commit is contained in:
muppeth 2022-12-17 15:18:54 +01:00
parent 992b6aa1d8
commit 9dddb37bc7
Signed by: muppeth
GPG Key ID: 0EBC7B9848D04031
2 changed files with 6 additions and 6 deletions

View File

@ -28,7 +28,7 @@ Any translation of this **Privacy Statement** is a community effort to make the
- **Disroot, Disroot.org, we** or **us**: Stichting Disroot.org
- **Platform**: the set of services provided by **Disroot.org** and that are hosted on our servers.
- **Disroot credentials**: they are the username and password created and used by the user to log in to the services provided by us.
- **Federated services**: services that operate on the basis of so-called **federation protocols** which enable users who signed up at different services providers to interact with each other. Examples of these services are **Nextcloud**, **Email**, **Pleroma** and **XMPP**.
- **Federated services**: services that operate on the basis of so-called **federation protocols** which enable users who signed up at different services providers to interact with each other. Examples of these services are **Nextcloud**, **Email**, **Akkoma** and **XMPP**.
- **Brute-force attack**: is a cryptographic attack that consists of submitting many passwords or passphrases, hoping to eventually find the right ones.
<br>
@ -217,14 +217,14 @@ We store all data in **our own servers**, located in a data center in the **Neth
- All documents created or uploaded to the server are **end-to-end encrypted** which means no one with access to the server can decrypt/read the data.
- Documents expire after three months and are then removed from the server, except if an account was created, in which case documents uploaded to the server are wiped based on the retention period set by the user upon upload/creation.
<a name="pleroma"></a>
<a name="akkoma"></a>
<br>
## 4.15 - **Disroot Pleroma** (https://fe.disroot.org)
## 4.15 - **Disroot Akkoma** (https://fe.disroot.org)
- This service requires login with **Disroot** credentials.
- Everything is stored on the server in plain-text.
- Everything is stored on the server in it's original form (plain-text).
- Server logs, which store information such as, but not limited to, your IP address and your username are stored for a period of 24 hours after which they are deleted from the server. No backup of log files is created. Logs are kept to prevent brute-force attacks on accounts and to provide quick insight when debugging issues.
- All pleroma data such as, but not limited to, messages, files, etc., are stored on the server in the database as is (plain-text).
- All akkoma data such as, but not limited to, messages, files, etc., are stored on the server in the database as is (plain-text).
- Given that ActivityPub is a **federated** protocol, when interacting with users hosted on third party servers, data is sent to other independently operated and owned servers in the network over which we have no control.
<a name="rights"></a>

View File

@ -28,7 +28,7 @@ Toute traduction de la présente **Déclaration de confidentialité** est un eff
- **Disroot, Disroot.org, nous** ou **nous** : Stichting Disroot.org
- **Plateforme** : l'ensemble des services fournis par **Disroot.org** et qui sont hébergés sur nos serveurs.
- **Identifiants Disroot** : il s'agit du nom d'utilisateur et du mot de passe créés et utilisés par l'utilisateur pour se connecter aux services que nous fournissons.
- **Services fédérés** : services qui fonctionnent sur la base de protocoles dits **fédérés** qui permettent aux utilisateurs qui se sont inscrits chez différents fournisseurs de services d'interagir entre eux. Des exemples de ces services sont **Nextcloud**, **Email**, **Pleroma** et **XMPP**.
- **Services fédérés** : services qui fonctionnent sur la base de protocoles dits **fédérés** qui permettent aux utilisateurs qui se sont inscrits chez différents fournisseurs de services d'interagir entre eux. Des exemples de ces services sont **Nextcloud**, **Email**, **Akkoma** et **XMPP**.
- **Attaque par force brute** : est une attaque cryptographique qui consiste à soumettre de nombreux mots de passe ou phrases de passe, en espérant trouver éventuellement les bons.
<br>