How to limit exposing your location
This guide walks you through concrete steps to mitigate the risk of your location being tracked or identified by unwanted actors
This guide walks you through concrete steps to mitigate the risk of your location being tracked or identified by unwanted actors
This module focuses on how to prepare and what to expect for those traversing the U.S. southern border, centering journalists serving border communities.Unlike most modules in the J-school digital security curriculum, it begins with a somewhat distinct perspective on risk assessment, adding further emphasis on individual attributes (e.g., nationality) …
US border searches of electronic devices put journalists’ work at risk. But there’s a lot you can do to be prepared
We’ve heard some questions about the difference between Signal usernames, phone numbers, profile names, profiles, and nicknames. Let’s talk about it.
No need to break the bank when your newsroom sets up its first tipline or drop box.
Protecting sources from harm should be the top priority of any newsroom. Whistleblowers risk identification when sending confidential files over mainstream email and messaging services. Although there are many secure file-sharing applications, they vary in cost and technical expertise.OnionShare, a free file-sharing application, makes it easy to send and …
Most note-taking applications have limited security and privacy features. Here are some alternatives you could adopt for your newsroom.
Even if we encrypt our chats, they yield metadata — data about our conversations. Let’s talk about why it matters.
To be curious is to be human — including about what’s on that USB drive. But first, let’s think through how to access it safely.
Learn about the basics of media metadata — the information hidden inside of your files.
With Signal’s new username and discoverability features, we’re done giving away phone numbers
October is cybersecurity awareness month and Martin Shelton, principal researcher at Freedom of the Press Foundation (FPF), explores Meta’s new AI chatbot features. What he finds is security news that’s creepier than any ghost and a tool that bleeds more than fake vampire fangs.With Meta releasing AI chatbot abilities …
We outline important decisions for newsrooms when setting up Signal tiplines
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
Also available in Spanish.
Also available in Spanish.
One of the most common ways people get hacked is through phishing — when an attacker impersonates a trusted website to trick you into entering your credentials. But what if you never had to type in a password? Passwordless logins — known as passkeys — reduce your risk by enabling …
By the end of 2021, TikTok reached one billion monthly users, becoming one of the most popular social media platforms globally. In the United States, the platform was one of the few that significantly increased its share of users who said they regularly use the platform to get their …
If you use Signal, the secure messaging app, you may have thought about getting a second account. The good news is you don’t need another phone plan to use a second Signal account, and you may be able to set it up on a range of devices.We’ll walk …
When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …
We're thrilled that you are reading this, because it means you're taking a step toward equipping your students to protect themselves and the people around them, while they work on the web. We put together this README to let you know what's in the curriculum, how it all fits together, …