
Understanding every one of Signal’s identifiers
We’ve heard some questions about the difference between Signal usernames, phone numbers, profile names, profiles, and nicknames. Let’s talk about it.
We’ve heard some questions about the difference between Signal usernames, phone numbers, profile names, profiles, and nicknames. Let’s talk about it.
No need to break the bank when your newsroom sets up its first tipline or drop box.
Protecting sources from harm should be the top priority of any newsroom. Whistleblowers risk identification when sending confidential files over mainstream email and messaging services. Although there are many secure file-sharing applications, they vary in cost and technical expertise.OnionShare, a free file-sharing application, makes it easy to send and …
Most note-taking applications have limited security and privacy features. Here are some alternatives you could adopt for your newsroom.
Even if we encrypt our chats, they yield metadata — data about our conversations. Let’s talk about why it matters.
To be curious is to be human — including about what’s on that USB drive. But first, let’s think through how to access it safely.
Learn about the basics of media metadata — the information hidden inside of your files.
With Signal’s new username and discoverability features, we’re done giving away phone numbers
October is cybersecurity awareness month and Martin Shelton, principal researcher at Freedom of the Press Foundation (FPF), explores Meta’s new AI chatbot features. What he finds is security news that’s creepier than any ghost and a tool that bleeds more than fake vampire fangs.With Meta releasing AI chatbot abilities …
We outline important decisions for newsrooms when setting up Signal tiplines
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
Also available in Spanish.
Also available in Spanish.
One of the most common ways people get hacked is through phishing — when an attacker impersonates a trusted website to trick you into entering your credentials. But what if you never had to type in a password? Passwordless logins — known as passkeys — reduce your risk by enabling …
By the end of 2021, TikTok reached one billion monthly users, becoming one of the most popular social media platforms globally. In the United States, the platform was one of the few that significantly increased its share of users who said they regularly use the platform to get their …
If you use Signal, the secure messaging app, you may have thought about getting a second account. The good news is you don’t need another phone plan to use a second Signal account, and you may be able to set it up on a range of devices.We’ll walk …
When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …
We're thrilled that you are reading this, because it means you're taking a step toward equipping your students to protect themselves and the people around them, while they work on the web. We put together this README to let you know what's in the curriculum, how it all fits together, …
This module begins with a short discussion about information hidden in files, and the potential risks tied to file metadata. It follows with a short exercise to have students find the file metadata embedded in a photo, followed by discussion of risk minimization.PrerequisitesThreat modeling(Good to know) Malware …
This module opens by walking through examples of targeted harassment, followed by a self-doxxing activity, an activity to opt-out of a data broker service, and discussion time. Because some students may have personal experience with harassment and doxxing on the web, if this class environment feels safe enough to do …
Note that you will not use this module if you are not conducting an extended course on this topic.This (optional) conversation may be used to introduce the broader course. It will begin by examining the importance of the topic, additional prompting about what topics are covered, and will include …