Signal, the secure messaging app: A guide for beginners
Also available in Spanish.
Also available in Spanish.
Both the newsroom and individual journalists must make some changes to work from home securely.
Also available in Spanish.
One of the most common ways people get hacked is through phishing — when an attacker impersonates a trusted website to trick you into entering your credentials. But what if you never had to type in a password? Passwordless logins — known as passkeys — reduce your risk by enabling …
By the end of 2021, TikTok reached one billion monthly users, becoming one of the most popular social media platforms globally. In the United States, the platform was one of the few that significantly increased its share of users who said they regularly use the platform to get their …
A study of mob censorship of journalists, and how media organizations and platforms are responding.
What journalists can do to better manage digital security for sources when reporting on abortion.
Source protection is a paramount concern for journalists in every beat. Platforms like SecureDrop and apps like Signal allow you the ability to securely and privately speak with whistleblowers to break important stories. Beyond protecting the confidentiality of these conversations, however, is the concern for the metadata, or data about data, that identifies who you’ve been talking to.
If you use Signal, the secure messaging app, you may have thought about getting a second account. The good news is you don’t need another phone plan to use a second Signal account, and you may be able to set it up on a range of devices.We’ll walk …
Journalistic work often depends on transcription services for creating written logs of recorded audio to assist in research, caption videos, and publish interviews. But uploading audio to a transcription service means giving a copy of that — sometimes sensitive — recording over to a company
Today, we're launching an interactive digital security platform and free clinic for filmmakers.
At Freedom of the Press Foundation, we assist journalists on their digital security habits to help them work more safely and sustainably. So we take it a little personally when private spyware companies are actively making journalists less safe by selling their services to repressive governments. We are now learning …
In journalistic work, email introduces needless risk. But it's also tough to avoid. We must think through when and how to switch to different channels.
How do most U.S. journalism schools instruct on digital security? Our research suggests there's a long way to go.
When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …
We're thrilled that you are reading this, because it means you're taking a step toward equipping your students to protect themselves and the people around them, while they work on the web. We put together this README to let you know what's in the curriculum, how it all fits together, …
This module begins with a short discussion about information hidden in files, and the potential risks tied to file metadata. It follows with a short exercise to have students find the file metadata embedded in a photo, followed by discussion of risk minimization.PrerequisitesThreat modeling(Good to know) Malware …
This section is intended to quickly introduce chat safety considerations through some examples of tip channels currently supported by newsrooms, followed by discussion time, and finally, hands-on installation of the Signal app. Students may need time to troubleshoot, so we encourage pairing students, and being prepared to help students if …
Note that you will not use this module if you are not conducting an extended course on this topic.This (optional) conversation may be used to introduce the broader course. It will begin by examining the importance of the topic, additional prompting about what topics are covered, and will include …
Threat modeling is foundational to thinking through security broadly, and we therefore introduce it before several other more technical topics. We first encourage the use of physical metaphors (e.g., choosing how and where to lock a bicycle) before introducing digital applications to help beginners understand how they may already create …
This short module opens with an introduction to the problem space (password reuse), followed by introducing password managers, and optionally having students install one and sign up for an email with a randomized password.PrerequisitesThreat modeling(Good to know) Authentication - Part 1Estimated time20-25 minutes (35-40 minutes …
Because the behavior of telecommunications networks and the internet is so foundational to realistic threat modeling, this section should be used before any subsequent discussion of chat tools designed to protect network-level communication like Signal, or tools that encrypt and tunnel traffic, such as VPNs, or Tor. This section opens …
This module opens with an introduction to common attacks on online accounts, and the need for two-factor authentication. It then moves on to a few activities having students investigate the security of their own passwords, and where they might set up two-factor authentication for their primary email provider. It closes …
This module opens with an introduction to the need for location obfuscation techniques, and what a VPN does. Instructors may then talk through basics of IP addresses, Virtual Private Networks, and the Tor network. Students will be asked to install Tor and navigate to the New York Times SecureDrop .onion …
This module briefly opens with an introduction to the lack of end-to-end encryption in standard cloud and backup services, and closes with an activity to send the instructor a password-protected file over Tresorit Send, an end-to-end encrypted service.Note the Keybase homework assignment will require instructors to sign up for …