Start protecting your security and privacy in the age of mass surveillance with how-to guides and resources. Want to learn more? Reach out to set up a training workshop with our digital security experts.

handshake

From FPF

Verifying open source software

In this guide, we walk you through verifying the legitimacy of an open source software package before installation. As the old adage goes, "Check yo sigs before you wreck yo gigs."

Assymetric Love

From the EFF

Surveillance self defense

Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

emailphish

From FPF

Phishing prevention and email hygiene

Journalists and newsrooms are increasingly being targeted through their email. Virtually every "sophisticated" hack of an individual reporter or entire news organization starts with a relatively simple attack: phishing and spear phishing. Prepare yourself for this eventuality with our e-mail hygiene guide.

metadatacamera

From FPF

Everything you wanted to know about media metadata, but were afraid to ask

Take a crash course in some of the tools you can use to analyze, manipulate, and scrub media metadata.

mailvelope2.0

From FPF

Encrypting email with Mailvelope: A beginner's guide

The browser extension Mailvelope provides users with a simple and accessible introduction to email encryption.

Photo of a "UFED Touch," a forensic device for pulling data off of popular mobile phones.

From FPF

What to do if your phone is seized by police

So, you’ve been arrested at an event. You’re taken to the police station and your phone is confiscated. When you’re let out, you realize someone has gone through your digital belongings. What now?

Diceware at CryptoParty Red Hook

From FPF

Three types of passphrases

From song lyrics to rolling dice, here's a quick reference guide for making it easier to choose a safe passphrase based on the devices and applications you're using.

MAD Exception

From FPF

An in-depth guide to choosing a VPN

A Virtual Private Network (VPN) is an essential tool for protecting your online activity. Figuring out which VPN to use and finding security among the snake oil can be a challenge. This guide will show you what to look for when shopping for a VPN.

MobilePrevention

An FPF Graphic

Mobile security prevention tips

Need to bring your phone to a protest, but worried it may be confiscated? Our infographic lists eight steps you can take to secure your mobile phone before you walk out the door.

MobileSeized

An FPF Graphic

Rapid responses for compromised phones

While attending an organized action, your mobile device is at risk of being tampered with by authorities. You can minimize the consequences of a mobile phone confiscation by following the steps in our visual guide.

title_image.png

An FPF Guide

Locking down Signal

Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.

toolkit-encryption-INTRO

An FPF Series

Encryption toolkit for media makers: An introduction

For media makers working in film, journalism, and the arts, data protection is essential. Learn how you can use encryption to build up your defenses, and protect your work.

toolkit-encryption-DU

An FPF Series

Encryption toolkit for media makers: Disk Utility guide

DiskUtility, available exclusively on macOS machines, is optimized to create encrypted spaces on both your computer and external storage devices.

toolkit-encryption-vc

An FPF Series

Encryption toolkit for media makers: A VeraCrypt guide

VeraCrypt, an open source tool available on all major operating systems, is well-suited to meet the data encryption needs of virtually any media team.

Two climbers on the Swiss Alps

An FPF Guide

Protonmail like a pro

ProtonMail is a Switzerland-based email client that offers end-to-end encryption between its users by default. We cover some of its more advanced uses and configurations, and tackle some of its main issues head-on.

top-passwords-print

An FPF Guide

Responding to a password breach while preparing for the next one

If you've ever been notified of a data breach involving your credentials for a website or app, you may already know that you need to change your password for that account. In this guide, we'll dive into why your password needs to change and what to change it to in order to prepare for the next breach.

woman_using_smartphone

An FPF Guide

Your smartphone and you: A handbook to modern mobile maintenance

If there’s one item in your possession housing the most information about you, it’s probably your phone. Keeping your information safe depends on learning a little more about how to choose your small computer, and how to care for it long term.

Request Training Information

We offer in-person training on various privacy and security tools for media organizations and individual journalists. If you're interested in getting some help, please put in a request through this form.

Request a training

Security Blog

How to shop for a journalist: A security gift-giving guide

Sometimes I need gifts for my journalist friends. Most people don’t get into this line of work for the overwhelming paycheck, so journalists don’t typically treat themselves to gadgets and ...

Newsrooms, let’s talk about G Suite

If you work in a newsroom, there’s a good chance you work with colleagues on Google Docs, Slides, Sheets, and more. G Suite software is simple and powerful. In fact, ...

Leaking on the clock: What your sources need to know

Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenthold’s emails, it should ...