Wrote the correct info in about page
This commit is contained in:
parent
c5abac2029
commit
e42cc2a97e
2 changed files with 63 additions and 5 deletions
|
|
@ -1,5 +1,45 @@
|
|||
<template>
|
||||
<div>
|
||||
<h1>This is an about page</h1>
|
||||
</div>
|
||||
<article>
|
||||
<h1 class="mb-8 text-primary">About YDIOY</h1>
|
||||
|
||||
<p class="mb-4 text-justify">
|
||||
Local data storage offers significant advantages over cloud-based solutions,
|
||||
particularly when it comes to maintaining control and privacy over sensitive
|
||||
information. When data remains on local devices, individuals and organizations
|
||||
retain complete ownership and jurisdiction over their information, eliminating
|
||||
concerns about third-party access, government surveillance, or compliance with
|
||||
foreign data protection laws. This local approach ensures that personal files,
|
||||
business documents, and confidential information never leave the user's direct
|
||||
control, providing peace of mind that data won't be accessed, analyzed, or
|
||||
monetized by cloud service providers or their partners.
|
||||
</p>
|
||||
|
||||
<p class="mb-4 text-justify">
|
||||
Privacy concerns are substantially reduced with local storage since data breaches
|
||||
at major cloud providers cannot expose locally stored information. Users avoid
|
||||
the risk of their data being swept up in large scale security incidents that have
|
||||
affected millions of cloud users in recent years. Additionally, local storage
|
||||
eliminates the constant data collection and profiling that many cloud services
|
||||
engage in, where user behavior, file contents, and usage patterns are analyzed for
|
||||
advertising or other commercial purposes. This means sensitive documents, photos,
|
||||
and communications remain truly private rather than being subject to automated
|
||||
scanning, indexing, or AI analysis by cloud providers.
|
||||
</p>
|
||||
|
||||
<p class="mb-4 text-justify">Local data storage also provides enhanced security through reduced attack surfaces
|
||||
and elimination of transmission vulnerabilities. Data stored locally cannot be
|
||||
intercepted during internet transmission or compromised through cloud infrastructure
|
||||
weaknesses.
|
||||
</p>
|
||||
|
||||
<p class="mb-4 text-justify">
|
||||
YDIOY uses under the hood
|
||||
<a class="text-decoration-none text-primary" href="https://dexie.org/" target="_blank" rel="noopener">
|
||||
dexie.js
|
||||
</a>
|
||||
which is a minimalistic wrapper for IndexedDB. dexie.js is the creation of David Fahlander and managed
|
||||
by Awarica AB.
|
||||
</p>
|
||||
|
||||
</article>
|
||||
</template>
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue