
What we know about video conferencing with BigBlueButton
Learn about the security, privacy, and anti-abuse measures of the BigBlueButton video chat platform.
Learn about the security, privacy, and anti-abuse measures of the BigBlueButton video chat platform.
BitLocker To Go is part of the larger BitLocker suite of encryption tools available in Windows 11 Pro, Enterprise, and Education. Unfortunately, it is not available on Windows 11 Home edition, which is the version most Windows computers ship with. However, it is possible to pay for an upgrade to a version that does support it, like Windows 11 Pro. Although BitLocker itself can be used to encrypt your computer’s entire hard drive, you can also use the BitLocker To Go feature to encrypt separate external drives with a strong passphrase, which we’ll cover in this guide.
It's time to rethink your privacy on Slack.
Freedom of the Press Foundation's Digital Security Training intern speaks to the experience of deploying Signal in his student newsroom.
Learn about how to tighten your home Wi-Fi router's security settings.
Learn about the security, privacy, and anti-abuse measures of the Microsoft Teams video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Slack video chat platform.
Learn how to blur faces in photos with Signal, the encrypted messaging app.
Photos and how we share them can present risks to the people and sensitive information that’s been captured in the process. In this guide, we discuss how to safely redact photos on the go.By and large, the most-used cameras in people’s hands are the ones built into their smartphones. …
Something exciting is happening at Signal: Through novel encryption techniques and architecture, we may be moving away from phone numbers as user IDs.
Learn about the security, privacy, and anti-abuse measures of the Whereby video chat platform.
We outline some of the questions we think about when critically assessing video conferencing tools, and how journalists can determine what’s right for them.
Learn about the security, privacy, and anti-abuse measures of the Jitsi Meet video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Google Meet video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Zoom video chat platform.
Learn about which video chat tools are secure and practical for your situation.
Antivirus software is one of the oldest offerings available from the now-billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?
The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.
Nearly everyone’s sent private photos at some point. But who else is able to see them, beyond your conversational partner? When sent over text messages and apps, who else gets a copy?If you send a photo over text message, the service provider (e.g., Verizon) can usually read the message …
Before potentially burning a source or tipping off a target before you're ready, journalists should know the privacy and security constraints of email — who can see your emails, and when?
Also available in Spanish.Passwords are the brittle wall that keeps unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available.Two-factor authentication, or 2FA for short, strengthens login security by requiring a second piece of information …
One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.
Once upon a time, Microsoft Office provided a small suite of applications on your computer, including Word for writing, Excel for spreadsheets, and PowerPoint for presentations. But increasingly, modern newsrooms use Office 365 to access these tools over the web, alongside remote storage and team management software. While working on the web offers obvious advantages, many reporters also wonder about the privacy and security of this data. What about our most sensitive, unpublished details when reporting? What can Microsoft see?
Freedom of the Press Foundation and the University of Southern California Annenberg School for Communication and Journalism are excited to announce an innovative partnership to develop comprehensive digital security education for journalism and communication students. Additionally, Yubico, a leading provider of hardware authentication security keys, will be providing YubiKey …
This guide is an overhaul of a previous piece, entitled "Encrypting email with Mailvelope: A beginner's guide."