-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnewPrivacyPage.html
93 lines (79 loc) · 5.01 KB
/
newPrivacyPage.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Educational site about online privacy and scams">
<title>Fight for Privacy</title>
<link rel="stylesheet" href="styles.css">
</head>
<body>
<header>
<h1>Fight-4-Privacy
<hr>
<b style="color: #8C9091;">Ƚᴉმμϝ-ત-bʁᴉʌɑcλ</b>
</h1>
<nav>
<ul>
<li><a href="#home">Home</a></li>
<li><a href="Risks.html">Privacy Risks</a></li>
<li><a href="#scams">Types of Scams</a></li>
<li><a href="#resources">Resources</a></li>
</ul>
</nav>
</header>
<section id="home">
<h2>ꜛᴀ͎ꜜꜛʀ͎ꜜꜛᴇ͎ꜜ ꜛʏ͎ꜜꜛᴏ͎ꜜꜛᴜ͎ꜜ ꜛs͎ꜜꜛᴀ͎ꜜꜛꜰ͎ꜜꜛᴇ͎ꜜ</h2>
<p>You think you’re safe. Behind your screen, behind your keyboard. But in the digital world, safety is nothing more than an illusion. Right now, as you’re reading this, you’ve already made yourself vulnerable. In fact, you may have already been compromised.
Look around. Does everything seem normal? Are you sure? The site you're on, the address bar, even the text you're reading—what if none of it is what it seems? What if, without you knowing, a single line of code has changed what you’re seeing, leading you into a carefully crafted trap?
You clicked a link to get here. Harmless, right? But what if that one click gave someone access to your information, your browsing habits, even your personal details? You wouldn’t know until it was too late.
</br><center><i style="color: #777688;">Ⱦⱥҟē ⱥ ȼłꝋꞩēɍ łꝋꝋҟ.</i></center></br> Does the URL look slightly off? Maybe a letter changed, maybe it’s an entirely different site—but you wouldn’t notice. Not until everything started to fall apart. And by then, your privacy would be in someone else’s hands. They wouldn’t even need to be particularly skilled—just patient, waiting for you to let your guard down.
Now the real question: What’s happening right now, as you read this? Is this really the site you thought you’d come to? Or have you already stepped into something far more dangerous than you ever imagined?
The frightening reality is that technology and AI have blurred the line between real and fake. In an instant, a trusted website can become a tool to steal everything from you, without you even knowing it. The risks aren’t just hypothetical—they’re already here, and they’re closer than you think.
</br>
</br>
<hr>
</br>
<center><b style="color: #777688;">₮ⱧɆ ⱤɆVɆ₳Ⱡ</b></center>
</br>
As you’ve been reading, a single doubt has crept into your mind. That’s all it takes. Cybercriminals exploit this doubt, this uncertainty, to manipulate and trick you. Every seemingly innocent click, every “safe” site, can be a gateway to a devastating breach of your privacy.
</br>
</br>
What you just experienced is a subtle example of a phishing or spoofing attack—where something you trust is manipulated to deceive you. This type of attack is one of the most common ways cybercriminals trick individuals into giving away personal information. The website, the link, the email—everything can look legitimate until it’s too late.
Want to know how to protect yourself? Click here to learn about phishing and spoofing attacks and how to recognize the signs before you fall into the trap.</p>
</section>
<section id="privacy">
<h2>How Your Privacy Can Be <i>₵Ø₥₱ⱤØ₥ł₴ɆĐ</i></h2>
<ul>
<li>Tracking cookies</li>
<li>Unsecured connections</li>
<li>Phishing attacks</li>
<li>Data breaches</li>
<!-- Add more content as needed -->
</ul>
</section>
<section id="scams">
<h2>Common Online Scams</h2>
<ul>
<li>Phishing emails</li>
<li>Fake tech support</li>
<li>Romance scams</li>
<li>Lottery fraud</li>
<!-- Add more scam types as needed -->
</ul>
</section>
<section id="resources">
<h2>Useful Resources</h2>
<p>Here are some trusted sources to help you stay informed and protected online:</p>
<ul>
<li><a href="https://www.ftc.gov" target="_blank">FTC: Federal Trade Commission</a></li>
<li><a href="https://www.aarp.org/money/scams-fraud/">AARP Fraud Watch Network</a></li>
<!-- Add more resource links as needed -->
</ul>
</section>
<footer>
<p>© 2024 Sterling All rights reserved.
</br><img src="https://i.ibb.co/bQ2sCxZ/stercod-BGYEA-removebg-preview.png" alt="Sterling Code Logo" style="width: auto; height: auto;">
</footer>
</body>
</html>