Upgrading WhatsApp security
Also available in Spanish.
Also available in Spanish.
At the close of 2019 in Wuhan, China, local doctor Li Wenliang began to notice an uptick in patients experiencing flu-like symptoms, many reportedly feeling ill after visiting the Huanan seafood market. Concerned about the possibility of a SARS-like outbreak, he shared his observations with his medical school alumni group …
This piece is a part of a series of guides about encryption for media makers; take a look at the full collection. We recommend you review our introduction to encryption piece for pro-tips and a technical glossary before proceeding with the step-by-step instructions below.Bitlocker To Go not the …
Photos and how we share them can present risks to the people and sensitive information that’s been captured in the process. In this guide, we discuss how to safely redact photos on the go.By and large, the most-used cameras in people’s hands are the ones built into their smartphones. …
Nearly everyone’s sent private photos at some point. But who else is able to see them, beyond your conversational partner? When sent over text messages and apps, who else gets a copy?If you send a photo over text message, the service provider (e.g., Verizon) can usually read the message …
Also available in Spanish.Passwords are the brittle wall that keeps unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available.Two-factor authentication, or 2FA for short, strengthens login security by requiring a second piece of information …
This guide is an overhaul of a previous piece, entitled "Encrypting email with Mailvelope: A beginner's guide."
If you work in a newsroom, there’s a good chance you work with colleagues on Google Docs, Slides, Sheets, and more. Google Workspace software is simple and powerful. But anyone working in a newsroom has probably asked themselves: What can Google see? What about our most sensitive conversations and documents? What about documents that concern our own unreleased reporting, or information on our sources?
An ever increasing amount of traffic flows through our devices, turning web browsers from our primary gateway to the web into our primary gateway to the rest of the world.In the early months of the COVID-19 pandemic Google Chrome delayed expected browser updates, as employees quickly transitioned to …
This guide is intended for readers familiar with using PGP who want to take an extra step in fortifying the security around their private key. Some of these steps also utilize a command-line interface, and it may be helpful to get comfortable with that interface before diving in. For a …