diff --git a/articles/example.html b/articles/example.html
index b8a3a9a..3362250 100644
--- a/articles/example.html
+++ b/articles/example.html
@@ -27,7 +27,7 @@
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on Codeberg.
- All contributions must be licensed under the CC0 licensed to be accepted.
+ All contributions must be licensed under the CC0 license to be accepted.
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on Codeberg.
- All contributions must be licensed under the CC0 licensed to be accepted.
+ All contributions must be licensed under the CC0 license to be accepted.
Online Spyware Watchdog
-
It is goal of this website is to classify spyware programs, so that users can be more aware that they are installing spyware.
+
It is the goal of this website is to classify spyware programs, so that users can be more aware that they are installing spyware.
Many "everyday" applications are actually spyware. We take an expansive and strict stance on what constitutes spyware. We define spyware as anything that includes "telemetry, information collection, phoning home, automatic updates, or is listening in".
This website contains articles on popular programs and internet services explaining spyware features, so that potential users can be aware of the information they may be giving away by downloading or using spyware, using easy to understand ratings, detailed explanations, and proof, of how features of these programs can spy on the user.
+ The goal of this website is to classify spyware programs, so that users can be aware that they are installing spyware.
+
+ Most modern programs that people use today contain malicious spyware features, such as any form of telemetry or information collection of users. This website contains articles on popular programs and internet services explaining spyware features, so that potential users can be aware of the information they may be giving away by downloading or using spyware, using easy to understand ratings and detailed explanations and proofs of how the features of these programs can spy on the user.
+