
Locking down Signal
Also available in Spanish.
Also available in Spanish.
Learn who else could be on the line when making a call on your cell.
Verifying software should be your first priority whenever you download a new piece of software. If you are downloading software by verified individual developers or an organization like Apple or Microsoft, the verification process is handled for you. However, you may want to use software built by developers who haven’t …
The app's easy-to-use "disappearing messages" feature can prevent sensitive conversations from getting into the wrong hands — when used as a part of a larger practice of secure communications.
A virtual private network, or VPN, is a useful tool for protecting your online activity. But figuring out which credible, secure VPN to use can be a challenge. This guide will show you what to look for when shopping for a VPN.
What is metadata?Metadata is data about data. Every single digital artifact has it. It describes the who, what, when, where, how, and sometimes even, why, for any document, video, photo, or sound clip. This information comes in handy sometimes, like when you’re flipping through old pictures by date, or …
Many fear how the Trump admin will use surveillance to stifle dissent. Here's a beginner's guide to upping your privacy and security game.
For journalists covering political movements, reporting on protests is crucial, but these events come with unique security challenges. Here's how you can better protect your privacy and security.
Before heading to an event, read our piece about mobile security for activists for detailed context.
Before heading to an event, read our piece about mobile security for activists for detailed context.
So, you’ve been arrested covering an event. You’re taken to the police station, you’re booked, and your phone is confiscated. When you’re let out, after a few hours or even a few days, your phone is handed back to you in a plastic baggie, the SIM card and SD card …
The first step to a healthy digital life is an easy-to-implement strategy for managing your account credentials. You’ll notice that we’re using the term “passphrases” instead of “passwords.” Do you wonder why? In short, because passwords are obsolete. They’re too short, they tend to be unimaginative, and chances are, they’re …
Journalists and newsrooms are increasingly the victims of hacking and malware, and hackers often target them through email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom involves a relatively simple email attack: phishing and spear phishing.Phishing is a social-engineering attack where an adversary crafts an email …