More Signalgate than we can tolerate

Photos and how we share them can present risks to the people and sensitive information that’s been captured in the process. In this guide, we discuss how to safely redact photos on the go.By and large, the most-used cameras in people’s hands are the ones built into their smartphones. …
Something exciting is happening at Signal: Through novel encryption techniques and architecture, we may be moving away from phone numbers as user IDs.
Learn about the security, privacy, and anti-abuse measures of the Whereby video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Jitsi Meet video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Zoom video chat platform.
Learn about the security, privacy, and anti-abuse measures of the Google Meet video chat platform.
Learn about which video chat tools are secure and practical for your situation.
Nearly everyone’s sent private photos at some point. But who else is able to see them, beyond your conversational partner? When sent over text messages and apps, who else gets a copy?If you send a photo over text message, the service provider (e.g., Verizon) can usually read the message …
Before potentially burning a source or tipping off a target before you're ready, journalists should know the privacy and security constraints of email — who can see your emails, and when?
Once upon a time, Microsoft Office provided a small suite of applications on your computer, including Word for writing, Excel for spreadsheets, and PowerPoint for presentations. But increasingly, modern newsrooms use Office 365 to access these tools over the web, alongside remote storage and team management software. While working on the web offers obvious advantages, many reporters also wonder about the privacy and security of this data. What about our most sensitive, unpublished details when reporting? What can Microsoft see?
This guide is an overhaul of a previous piece, entitled "Encrypting email with Mailvelope: A beginner's guide."
Thinking about securely leaking information to news organizations? This guide will show you how.
If you work in a newsroom, there’s a good chance you work with colleagues on Google Docs, Slides, Sheets, and more. Google Workspace software is simple and powerful. But anyone working in a newsroom has probably asked themselves: What can Google see? What about our most sensitive conversations and documents? What about documents that concern our own unreleased reporting, or information on our sources?
Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?
This guide is intended for readers familiar with using PGP who want to take an extra step in fortifying the security around their private key. Some of these steps also utilize a command-line interface, and it may be helpful to get comfortable with that interface before diving in. For a …
They are tethered to wireless networks, and we are tethered to them. We spend so much time with smartphones, yet most of us devote little of it contemplating our small computers. We often treat these valuable devices more like everyday household items, as opposed to curated archives of our lives. …
Proton Mail is a Switzerland-based email client that offers end-to-end encryption between its users by default. This means that communication between anyone whose email is managed by Proton Mail can only be viewed by members of that party; No outside parties, including Proton Mail itself, can view the content of …
This year we're gifting simple security guidance, which I think we can all agree is better than another internet-connected kitchen appliance.
Most sources don’t reach out with terribly sensitive information. But sometimes they do.
Also available in Spanish.
Learn who else could be on the line when making a call on your cell.
The app's easy-to-use "disappearing messages" feature can prevent sensitive conversations from getting into the wrong hands — when used as a part of a larger practice of secure communications.
Many fear how the Trump admin will use surveillance to stifle dissent. Here's a beginner's guide to upping your privacy and security game.
For journalists covering political movements, reporting on protests is crucial, but these events come with unique security challenges. Here's how you can better protect your privacy and security.