To protect your sources, protect your address book
Surveillance triage for medical whistleblowers
Our Digital Security Team discusses arrests of U.S. journalists in 2020
Freedom of the Press Foundation recently released a report detailing a record number of arrests throughout 2020 based on comprehensive data gathered by the U.S. Press Freedom Tracker, a project in collaboration with the Committee to Protect Journalists.Harlo Holmes, Olivia Martin, David Huerta, and Martin …
Encryption toolkit for media makers: BitLocker To Go guide
This piece is a part of a series of guides about encryption for media makers; take a look at the full collection. We recommend you review our introduction to encryption piece for pro-tips and a technical glossary before proceeding with the step-by-step instructions below.Bitlocker To Go not the …
What we know about video conferencing with Microsoft Teams
Learn about the security, privacy, and anti-abuse measures of the Microsoft Teams video chat platform.
Redacting photos on the go: A field guide
Photos and how we share them can present risks to the people and sensitive information that’s been captured in the process. In this guide, we discuss how to safely redact photos on the go.By and large, the most-used cameras in people’s hands are the ones built into their smartphones. …
What we know about video conferencing with Whereby
Learn about the security, privacy, and anti-abuse measures of the Whereby video chat platform.
What about antivirus?
Antivirus software is one of the oldest offerings available from the now-billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?
We ran over some security keys with a car and some still worked
One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.
Leaking on the clock: What your sources need to know
Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?
Pretty great privacy with PGP smart cards
This guide is intended for readers familiar with using PGP who want to take an extra step in fortifying the security around their private key. Some of these steps also utilize a command-line interface, and it may be helpful to get comfortable with that interface before diving in. For a …
The story inside your software updates
If your web browser is asking you to install software updates, it may also be asking you to protect itself from getting hacked.