
Wear a mask, then cover your face with Signal
Learn how to blur faces in photos with Signal, the encrypted messaging app.
Learn how to blur faces in photos with Signal, the encrypted messaging app.
Something exciting is happening at Signal: Through novel encryption techniques and architecture, we may be moving away from phone numbers as user IDs.
We outline some of the questions we think about when critically assessing video conferencing tools, and how journalists can determine what’s right for them.
Learn about the security, privacy, and anti-abuse measures of the Whereby video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Zoom video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Jitsi Meet video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Google Meet video chat platform.
Learn about which video chat tools are secure and practical for your situation.
Antivirus software is one of the oldest offerings available from the now-billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?
The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.
Before potentially burning a source or tipping off a target before you're ready, journalists should know the privacy and security constraints of email — who can see your emails, and when?
One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.
Once upon a time, Microsoft Office provided a small suite of applications on your computer, including Word for writing, Excel for spreadsheets, and PowerPoint for presentations. But increasingly, modern newsrooms use Office 365 to access these tools over the web, alongside remote storage and team management software. While working on the web offers obvious advantages, many reporters also wonder about the privacy and security of this data. What about our most sensitive, unpublished details when reporting? What can Microsoft see?
Freedom of the Press Foundation and the University of Southern California Annenberg School for Communication and Journalism are excited to announce an innovative partnership to develop comprehensive digital security education for journalism and communication students. Additionally, Yubico, a leading provider of hardware authentication security keys, will be providing YubiKey …
Thinking about securely leaking information to news organizations? This guide will show you how.
Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?
Journalism schools have been slow to offer comprehensive security education to students. What's getting in the way?
If your web browser is asking you to install software updates, it may also be asking you to protect itself from getting hacked.
This year we're gifting simple security guidance, which I think we can all agree is better than another internet-connected kitchen appliance.
Learn who else could be on the line when making a call on your cell.
The app's easy-to-use "disappearing messages" feature can prevent sensitive conversations from getting into the wrong hands — when used as a part of a larger practice of secure communications.
Many fear how the Trump admin will use surveillance to stifle dissent. Here's a beginner's guide to upping your privacy and security game.
For journalists covering political movements, reporting on protests is crucial, but these events come with unique security challenges. Here's how you can better protect your privacy and security.