
How technology is changing the harassment of journalists — and what newsrooms can do about it
A study of mob censorship of journalists, and how media organizations and platforms are responding.
A study of mob censorship of journalists, and how media organizations and platforms are responding.
If you use Signal, the secure messaging app, you may have thought about getting a second account. The good news is you don’t need another phone plan to use a second Signal account, and you may be able to set it up on a range of devices.We’ll walk …
Journalistic work often depends on transcription services for creating written logs of recorded audio to assist in research, caption videos, and publish interviews. But uploading audio to a transcription service means giving a copy of that — sometimes sensitive — recording over to a company
In journalistic work, email introduces needless risk. But it's also tough to avoid. We must think through when and how to switch to different channels.
How do most U.S. journalism schools instruct on digital security? Our research suggests there's a long way to go.
When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …
Also available in Spanish.
Freedom of the Press Foundation recently released a report detailing a record number of arrests throughout 2020 based on comprehensive data gathered by the U.S. Press Freedom Tracker, a project in collaboration with the Committee to Protect Journalists.Harlo Holmes, Olivia Martin, David Huerta, and Martin …
While there is now little evidence of U.S. election malfeasance, there's still so much more we can do.
How journalists can safely make the most of their confidential tip pages.
Learn about how to tighten your home Wi-Fi router's security settings.
Learn about the security, privacy, and anti-abuse measures of the Slack video chat platform.
Learn how to blur faces in photos with Signal, the encrypted messaging app.
Something exciting is happening at Signal: Through novel encryption techniques and architecture, we may be moving away from phone numbers as user IDs.
Learn about the security, privacy, and anti-abuse measures of the Zoom video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Google Meet video chat platform.
Learn about which video chat tools are secure and practical for your situation.
The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.
Nearly everyone’s sent private photos at some point. But who else is able to see them, beyond your conversational partner? When sent over text messages and apps, who else gets a copy?If you send a photo over text message, the service provider (e.g., Verizon) can usually read the message …
Also available in Spanish.Passwords are the brittle wall that keeps unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available.Two-factor authentication, or 2FA for short, strengthens login security by requiring a second piece of information …
Once upon a time, Microsoft Office provided a small suite of applications on your computer, including Word for writing, Excel for spreadsheets, and PowerPoint for presentations. But increasingly, modern newsrooms use Office 365 to access these tools over the web, alongside remote storage and team management software. While working on the web offers obvious advantages, many reporters also wonder about the privacy and security of this data. What about our most sensitive, unpublished details when reporting? What can Microsoft see?
If you work in a newsroom, there’s a good chance you work with colleagues on Google Docs, Slides, Sheets, and more. Google Workspace software is simple and powerful. But anyone working in a newsroom has probably asked themselves: What can Google see? What about our most sensitive conversations and documents? What about documents that concern our own unreleased reporting, or information on our sources?
Journalism schools have been slow to offer comprehensive security education to students. What's getting in the way?
They are tethered to wireless networks, and we are tethered to them. We spend so much time with smartphones, yet most of us devote little of it contemplating our small computers. We often treat these valuable devices more like everyday household items, as opposed to curated archives of our lives. …
This year we're gifting simple security guidance, which I think we can all agree is better than another internet-connected kitchen appliance.