Ask a security trainer: What about NSA surveillance?
Two tech tips that can help keep your communications shielded from government surveillance
Two tech tips that can help keep your communications shielded from government surveillance
In this guide, we break down the privacy and security considerations of AI advances to current tools and platforms.
In this guide, we break down the privacy and security considerations of these integrations.
In this guide, we break down the privacy and security considerations of services like Claude, ChatGPT, or Otter.
Independent and freelance journalists working without institutional support face unique risks when filming federal agents. We share the gear, in-field security tactics, and digital security considerations used by two journalists on the ground to stay safe and to secure their footage.
Thinking of switching to Linux? Here are some distributions to consider for security
Court documents show how investigators can track digital activities, and reveal ways to harden journalists’ devices
What can journalists do if they expect someone might take devices with sensitive information?
Following the search of Washington Post reporter Hannah Natanson’s home, here are concrete steps to take to safeguard yourself and your sources
Read on for suggestions for staying safe while on the road
The answer may surprise you
Explore some options for backing up your phone privately and securely.
Yes, but before implementing steps to mitigate it, take a moment to ask: Who’s at risk, when does it matter, and what’s at stake?
This article was republished with permission from the Education Writers Association. It has been lightly edited for style and consistency.A question many journalists are asking themselves in today’s shifting digital landscape: How can I protect myself and my information online? That was also the focus of a session …
Before journalists hit the ‘record’ button to capture interviews, it’s critical for them to think through the potential risks associated with recording and storing audio or video
Definitely use a strong password on your password manager. But it’s also a good move to have backup plans
Planning to travel soon? Protect your passwords with these tips from FPF’s digital security training team!
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I’ve been seeing this story …
Virtual private networks are a useful tool for our digital security kit, but what exactly do they protect us from?
There are some great uses for time-saving AI transcription tools, but it’s important to also know when to avoid uploading to a cloud provider
Our digital security team examines the security risks to journalists if a prominent person targets them online, and what can be done to prepare
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I have some sensitive data …
Happy Valentine’s Day! Like love itself, digital security is all about trust, confidentiality, and compatibility, so we worked with our friends at Calyx Institute on this set of valentines.Please feel free to choose your favorites, download them, print them if you like, and send them along to anyone …
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I’m concerned about using biometrics …
FPF's digital security advice column today answers, how can I tell my device isn’t infected with malware or spyware?