From ebc3829b3efda855cd1f2c47c4390c22c20aed3f Mon Sep 17 00:00:00 2001 From: Amir Shokri Date: Tue, 20 Feb 2024 00:29:24 +0330 Subject: [PATCH] #246 make unique `page.identifier` --- blog.html | 1 + post/10-truths-about-online-privacy.html | 2 +- post/101-tips-for-data-care-part1.html | 2 +- post/101-tips-for-data-care-part10.html | 2 +- post/101-tips-for-data-care-part11.html | 2 +- post/101-tips-for-data-care-part12.html | 2 +- post/101-tips-for-data-care-part2.html | 2 +- post/101-tips-for-data-care-part3.html | 2 +- post/101-tips-for-data-care-part4.html | 2 +- post/101-tips-for-data-care-part5.html | 2 +- post/101-tips-for-data-care-part6.html | 2 +- post/101-tips-for-data-care-part7.html | 2 +- post/101-tips-for-data-care-part8.html | 2 +- post/101-tips-for-data-care-part9.html | 2 +- post/12-things-can-do-extra-online-security.html | 2 +- post/3-ways-to-protect-your-data-from-chat-gpt.html | 2 +- post/8-challenging-data-privacy-issues.html | 2 +- post/I-forget-you-note.html | 2 +- post/National-data-protection-authority.html | 2 +- ...antages-of-sharing-personal-information-on-the-internet.html | 2 +- post/anonymity-in-internet.html | 2 +- ...you-familiar-with-the-dangers-of-fake-technical-support.html | 2 +- post/artificial-intelligence-and-the-right-to-be-forgotten.html | 2 +- post/bug-bounty.html | 2 +- post/cjeu.html | 2 +- post/cnil.html | 2 +- post/data-leak.html | 2 +- post/detail-of-right-to-be-forgotten.html | 2 +- ...erent-techniques-for-protecting-privacy-on-the-internet.html | 2 +- post/donate-sfd1400.html | 2 +- post/ethical-and-privacy-concerns.html | 2 +- ...ything-you-need-to-know-about-the-right-to-be-forgotten.html | 2 +- post/family-privacy.html | 2 +- post/five-technical-commands-for-safer-digital-life.html | 2 +- post/gdpr-meta-facebook.html | 2 +- post/gdpr-right-to-be-forgotten.html | 2 +- post/google-fined-for-violating-the-gdpr-law.html | 2 +- ...guide-for-teenagers-dont-get-into-trouble-in-cyberspace.html | 2 +- post/healthy-presence-in-cyberspace.html | 2 +- ...story-and-important-points-of-the-right-to-be-forgotten.html | 2 +- post/how-does-the-right-to-be-forgotten-protect-your-data.html | 2 +- post/how-is-your-personal-information-protected-online.html | 2 +- post/how-to-delete-all-social-media-content.html | 2 +- post/how-to-delete-all-your-data-from-internet.html | 2 +- post/how-to-prevent-the-dangers-of-online-trackers.html | 2 +- post/how-to-protect-your-digital-privacy.html | 2 +- post/i-forget-you-note.html | 2 +- post/information-leak-law-in-iran.html | 2 +- post/information-privacy.html | 2 +- ...-it-possible-to-clear-all-information-from-the-internet.html | 2 +- post/is-the-right-to-be-forgotten-good-or-bad.html | 2 +- post/kidfluencers.html | 2 +- post/live-your-digital-life-safely.html | 2 +- post/national-data-protection-authority.html | 2 +- ...careful-and-concerned-about-the-privacy-of-the-Internet.html | 2 +- ...careful-and-concerned-about-the-privacy-of-the-internet.html | 2 +- post/online-privacy-is-you-human-right.html | 2 +- post/privacy-court-in-india.html | 2 +- post/privacy-dos-and-donts-for-businesses-and-consumers.html | 2 +- post/privacy-for-women-needs-fundamental-change.html | 2 +- post/privacy-heroes.html | 2 +- post/privacy-in-cyberspace-dream-or-reality.html | 2 +- post/privacy-protection-in-different-countries.html | 2 +- post/problems-and-important-issues-of-Internet-privacy.html | 2 +- post/protect-personal-information-in-cyberspace.html | 2 +- post/protect-the-privacy-of-your-information-online.html | 2 +- post/protect-your-internet-privacy.html | 2 +- post/protect-your-online-privacy-in-2021.html | 2 +- post/protect-yourself-in-internet.html | 2 +- post/remove-personal-information-from-the-internet.html | 2 +- .../right-to-be-forgotten-or-limited-access-to-information.html | 2 +- post/right-to-be-forgotten.html | 2 +- post/rtbf-and-unsaid-for-companies.html | 2 +- post/rtbf-fandogh-cloud.html | 2 +- post/rtbf-in-internet.html | 2 +- post/rtbf-in-twitter.html | 2 +- post/rtbf-iran-petition.html | 2 +- post/rtbf-video.html | 2 +- post/safer-virtual-activity.html | 2 +- post/secure-your-digital-life-in-2022.html | 2 +- ...rity-of-the-elderly-to-cognitive-problems-in-cyberspace.html | 2 +- post/soc.html | 2 +- post/story-of-information-theft.html | 2 +- post/the-difference-between-privacy-and-security.html | 2 +- ...f-privacy-in-the-lives-of-our-children-and-the-internet.html | 2 +- post/the-impact-of-privacy-on-peoples-future.html | 2 +- ...impact-of-technology-on-privacy-benefits-and-challenges.html | 2 +- post/the-most-up-to-date-ways-to-stay-safe-from-hackers.html | 2 +- post/top-5-privacy-books.html | 2 +- post/what-is-a-hack.html | 2 +- ...my-information-on-the-internet-for-commercial-companies.html | 2 +- post/what-women-know-about-the-internet.html | 2 +- post/why-is-data-protection-so-important.html | 2 +- post/why-is-online-privacy-important.html | 2 +- post/why-is-the-right-to-be-forgotten-an-essential-right.html | 2 +- post/womens-rights-in-internet.html | 2 +- 96 files changed, 96 insertions(+), 95 deletions(-) diff --git a/blog.html b/blog.html index 49db515..97e3fb4 100644 --- a/blog.html +++ b/blog.html @@ -155,6 +155,7 @@
فهرست: