From 40bc63ebfec4eeadd49e7a6c39d6175f0f1b8cb1 Mon Sep 17 00:00:00 2001 From: ff00ff-security <195214694+ff00ff-security@users.noreply.github.com> Date: Thu, 16 Jan 2025 00:09:57 +0000 Subject: [PATCH] Update User_Privacy_Protection_Cheat_Sheet.md inclusive/neutral terminology Updated wording to use inclusive/neutral terminology. --- cheatsheets/User_Privacy_Protection_Cheat_Sheet.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cheatsheets/User_Privacy_Protection_Cheat_Sheet.md b/cheatsheets/User_Privacy_Protection_Cheat_Sheet.md index 7f2579fa00..a81eacd062 100644 --- a/cheatsheets/User_Privacy_Protection_Cheat_Sheet.md +++ b/cheatsheets/User_Privacy_Protection_Cheat_Sheet.md @@ -98,7 +98,7 @@ For more information about anonymity networks, and the user protections they pro Preventing leakage of user IP addresses is of great significance when user protection is in scope. Any application that hosts external third-party content, such as avatars, signatures or photo attachments; must take into account the benefits of allowing users to block third-party content from being loaded in the application page. -If it was possible to embed 3rd-party, external domain images, for example, in a user's feed or timeline; an adversary might use it to discover a victim's real IP address by hosting it on his domain and watch for HTTP requests for that image. +If it was possible to embed 3rd-party, external domain images, for example, in a user's feed or timeline; an adversary might use it to discover a victim's real IP address by hosting it on their domain and watch for HTTP requests for that image. Many web applications need user content to operate, and this is completely acceptable as a business process; however web developers are advised to consider giving users the option of blocking external content as a precaution. This applies mainly to social networks and forums, but can also apply to web-based e-mail, where images can be embedded in HTML-formatted emails.