VPN surveillance: Time for transparency and limits on spy powers
A recent letter from our lawmakers raises the question: What does the intelligence community do with the data of VPN users in the United States?
A recent letter from our lawmakers raises the question: What does the intelligence community do with the data of VPN users in the United States?
Two tech tips that can help keep your communications shielded from government surveillance
In this guide, we break down the privacy and security considerations of these integrations.
In this guide, we break down the privacy and security considerations of AI advances to current tools and platforms.
In this guide, we break down the privacy and security considerations of services like Claude, ChatGPT, or Otter.
Independent and freelance journalists working without institutional support face unique risks when filming federal agents. We share the gear, in-field security tactics, and digital security considerations used by two journalists on the ground to stay safe and to secure their footage.
Thinking of switching to Linux? Here are some distributions to consider for security
Court documents show how investigators can track digital activities, and reveal ways to harden journalists’ devices
Larger groups come with more risk to your privacy, but you can make decisions about how to navigate groups safely
What can journalists do if they expect someone might take devices with sensitive information?
Following the search of Washington Post reporter Hannah Natanson’s home, here are concrete steps to take to safeguard yourself and your sources
Read on for suggestions for staying safe while on the road
The answer may surprise you
This guide walks you through concrete steps to mitigate the risk of your location being tracked or identified by unwanted actors
Explore some options for backing up your phone privately and securely.
Yes, but before implementing steps to mitigate it, take a moment to ask: Who’s at risk, when does it matter, and what’s at stake?
This article was republished with permission from the Education Writers Association. It has been lightly edited for style and consistency.A question many journalists are asking themselves in today’s shifting digital landscape: How can I protect myself and my information online? That was also the focus of a …
Before journalists hit the ‘record’ button to capture interviews, it’s critical for them to think through the potential risks associated with recording and storing audio or video
Definitely use a strong password on your password manager. But it’s also a good move to have backup plans
Planning to travel soon? Protect your passwords with these tips from FPF’s digital security training team!
This module focuses on how to prepare and what to expect for those traversing the U.S. southern border, centering journalists serving border communities.Unlike most modules in the J-school security curriculum, it begins with a somewhat distinct perspective on risk assessment, adding further emphasis on individual attributes (e.g., nationality) and …
US border searches of electronic devices put journalists’ work at risk. But there’s a lot you can do to be prepared
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I’ve been seeing this story …
Virtual private networks are a useful tool for our digital security kit, but what exactly do they protect us from?
There are some great uses for time-saving AI transcription tools, but it’s important to also know when to avoid uploading to a cloud provider