{"id":498,"date":"2020-09-28T22:08:55","date_gmt":"2020-09-28T21:08:55","guid":{"rendered":"https:\/\/coneixement.info\/blog\/?p=498"},"modified":"2021-02-04T11:25:57","modified_gmt":"2021-02-04T10:25:57","slug":"zebra-zebra-crossing-an-easy-to-use-digital-safety-checklist","status":"publish","type":"post","link":"https:\/\/coneixement.info\/blog\/zebra-zebra-crossing-an-easy-to-use-digital-safety-checklist\/","title":{"rendered":"Zebra Crossing: an easy-to-use digital safety checklist"},"content":{"rendered":"\r\n<h5 class=\"wp-block-heading\">Note from mine (Daniel Alomar)<\/h5>\r\n<p>I will recommend to use andOTP (Android) or freeOTP\u00a0 (iOS) as a OTP app manager instead Google Authenticator\u00a0 and Authy. B<span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">oth have telemetry. AndOTP is an opensource OTP app that contains no tracker, furthermore, it has PIN protection..<\/span><\/p>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f914.png\" alt=\"thinking\" width=\"20\" height=\"20\" \/> Who this guide is for<\/h3>\r\n<ul>\r\n<li>You use the internet on a day-to-day basis \u2013 for work, social media, financial transactions, etc.<\/li>\r\n<li>You feel you could be doing more to ensure your digital safety and privacy, but you&#8217;re not in immediate danger. (If you are, seek out an expert for a one-on-one consult.)<\/li>\r\n<li>You&#8217;re comfortable with technology. For example, you&#8217;re comfortable going into the settings section of your computer\/smartphone.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f331.png\" alt=\"seedling\" width=\"20\" height=\"20\" \/> How to use this guide<\/h3>\r\n<ul>\r\n<li>Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!<\/li>\r\n<li><em>Everyone should follow the recommendations in levels one and two.<\/em> They will protect you from the widely-used (yet simple) attacks. Going through them shouldn&#8217;t take more than 1-2 hours.<\/li>\r\n<li>Level three is a bit more involved in terms of time and money and may not be 100% necessary. But if you&#8217;re worried at all and can afford to, we recommend going through that list too. Depending on the amount of digital housekeeping you have to do, it may take anywhere from an hour to an afternoon.<\/li>\r\n<li>The scenarios listed after are for higher-stakes situations \u2014 scan them to see if any of them apply to you. (Because the stakes are higher, they assume that you&#8217;ve done everything in levels 1-3.)<\/li>\r\n<li>This guide is a living document \u2013 please feel free to submit a pull request or fork your own version of this guide on GitHub.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f5e3.png\" alt=\"speaking_head\" width=\"20\" height=\"20\" \/> This guide in other languages<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/github.com\/narwhalacademy\/zebra-crossing\/blob\/master\/README-%E7%B9%81%E9%AB%94%E4%B8%AD%E6%96%87.md\">\u7e41\u9ad4\u4e2d\u6587 (Traditional Chinese)<\/a><\/li>\r\n<li><a href=\"https:\/\/github.com\/narwhalacademy\/zebra-crossing\/blob\/master\/README-%E6%97%A5%E6%9C%AC%E8%AA%9E.md\">\u65e5\u672c\u8a9e<\/a> (Japanese, a work-in-progress)<\/li>\r\n<li><a href=\"https:\/\/github.com\/narwhalacademy\/zebra-crossing\/blob\/master\/README-Italiano.md\">Italiano<\/a> (Italian, a work-in-progress)<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f552.png\" alt=\"clock3\" width=\"20\" height=\"20\" \/> Last updated<\/h3>\r\n<ul>\r\n<li>20 January 2021<\/li>\r\n<\/ul>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f9d0.png\" alt=\"monocle_face\" width=\"20\" height=\"20\" \/> Theory &amp; science<\/h2>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f3af.png\" alt=\"dart\" width=\"20\" height=\"20\" \/> Threat modeling<\/h3>\r\n<ul>\r\n<li>What kind of danger are you in? E.g. credit card hack, corporate espionage, online harassment\/doxxing.<\/li>\r\n<li>What kind of assets are you protecting? E.g. confidential documents, private photos.<\/li>\r\n<li>We&#8217;re all in a little bit of danger (otherwise we wouldn&#8217;t bother putting a password on our computer or phone) but it&#8217;s important to think about what&#8217;s at stake before dismissing concerns or becoming paranoid.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f517.png\" alt=\"link\" width=\"20\" height=\"20\" \/> Weakest link<\/h3>\r\n<ul>\r\n<li>Remember the weakest link is all that matters! E.g. if password recovery is linked to email, then hackers only need to get access to your email.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f521.png\" alt=\"abcd\" width=\"20\" height=\"20\" \/> Encryption levels<\/h3>\r\n<ol>\r\n<li>No encryption: Any third party who intercepts the data can read it as-is.<\/li>\r\n<li>Regular encryption: Data is encrypted so that third parties cannot read them. But the platform (e.g. Google or Facebook) still has access, and may hand the data over to law enforcement if they are required to do so by the courts.<\/li>\r\n<li>End-to-end encryption: the data can only be read by the original sender and receiver. This means not even the platform has access. So if the courts call, the service provider can&#8217;t hand over the messages because they don&#8217;t have them either.<\/li>\r\n<\/ol>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f9e9.png\" alt=\"jigsaw\" width=\"20\" height=\"20\" \/> Metadata<\/h3>\r\n<ul>\r\n<li>Data about your data \u2013 e.g. what number you called, and for how long (but not the contents of the call). With enough metadata, hackers can piece together a pretty good picture of who you are, who you know, where you&#8217;re going, etc. Plus legal protections around metadata are generally weaker.<\/li>\r\n<\/ul>\r\n<hr \/>\r\n<h2>\u00a0<\/h2>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/> Level 1 recommendations<\/h2>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/2705.png\" alt=\"white_check_mark\" width=\"20\" height=\"20\" \/> Things to do now<\/h3>\r\n<h4>Strengthen passwords<\/h4>\r\n<ul>\r\n<li>Any password less than 10 characters is bad, but it&#8217;s also okay-to-string-together-non-sequitur-words.<\/li>\r\n<li>Double check the security questions for your key online services (email, bank, Facebook, etc.) and make sure that they&#8217;re not easy to answer by friends or by anyone looking you up on Google.<\/li>\r\n<li>Start using a different password for every service, because password leaks happen all the time. To make this easy, use a password manager (<a href=\"https:\/\/www.nytimes.com\/wirecutter\/reviews\/best-password-managers\/\" rel=\"nofollow\">see Wirecutter&#8217;s picks here<\/a>) to store\/autofill\/generate them. For now, make sure you use a unique password for essential services (email, social media, banking, cloud storage).<\/li>\r\n<li>Use a non-common\/obvious unlock code for your phone with at least 9 digits.<\/li>\r\n<\/ul>\r\n<h4>Double lock important accounts<\/h4>\r\n<p>Use two-factor authentication (also known as 2FA and two-step verification) to add an extra lock on top of a typed password. Usually this takes the form of a short code that&#8217;s sent to your phone via a specialized app or SMS.<\/p>\r\n<ul>\r\n<li>Download an authenticator app like <a href=\"https:\/\/authy.com\/\" rel=\"nofollow\">Authy<\/a> or <a href=\"https:\/\/duo.com\/product\/multi-factor-authentication-mfa\/duo-mobile-app\" rel=\"nofollow\">Duo Mobile<\/a>. Apps are far more secure than SMS so use one if it&#8217;s available.<\/li>\r\n<li>Turn on 2FA on your:\r\n<ul>\r\n<li>Email service. See instructions for <a href=\"https:\/\/support.google.com\/accounts\/answer\/185839?hl=en\" rel=\"nofollow\">Gmail<\/a>, <a href=\"https:\/\/protonmail.com\/support\/knowledge-base\/two-factor-authentication\/\" rel=\"nofollow\">Protonmail<\/a>, or find instructions for your email provider <a href=\"https:\/\/twofactorauth.org\/#email\" rel=\"nofollow\">here<\/a>.<\/li>\r\n<li>Frequently used social media accounts. See instructions for <a href=\"https:\/\/help.twitter.com\/en\/managing-your-account\/two-factor-authentication\" rel=\"nofollow\">Twitter<\/a>, <a href=\"https:\/\/www.facebook.com\/help\/148233965247823\/\" rel=\"nofollow\">Facebook<\/a>, <a href=\"https:\/\/help.instagram.com\/566810106808145\" rel=\"nofollow\">Instagram<\/a>, and <a href=\"https:\/\/twofactorauth.org\/#social\" rel=\"nofollow\">other services<\/a>.<\/li>\r\n<li>Consider turning on 2FA on any other online accounts where losing access would be catastrophic. Look up instructions on <a href=\"https:\/\/twofactorauth.org\/\" rel=\"nofollow\">Two Factor Auth<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Turn on cloud backup for your authenticator app in case you ever lose your phone. See instructions for <a href=\"https:\/\/authy.com\/features\/backup\/\" rel=\"nofollow\">Authy<\/a> and <a href=\"https:\/\/guide.duo.com\/duo-restore\" rel=\"nofollow\">Duo Mobile<\/a>.<\/li>\r\n<\/ul>\r\n<h4>Email<\/h4>\r\n<ul>\r\n<li>If you&#8217;re on a webmail service, check that you&#8217;re logging into it using an <code>https:\/\/<\/code> URL. And if there isn&#8217;t one, find a new email provider.<\/li>\r\n<li>After turning on two-factor authentication, see if your email service supports backup codes (a single-use code in case you lose your phone). <a href=\"https:\/\/support.google.com\/accounts\/answer\/1187538?hl=en\" rel=\"nofollow\">See Gmail instructions<\/a>.<\/li>\r\n<\/ul>\r\n<h4>Encrypt your devices<\/h4>\r\n<ul>\r\n<li>Encrypt your computer hard drive:\r\n<ul>\r\n<li>Mac: <a href=\"https:\/\/support.apple.com\/en-us\/HT204837\" rel=\"nofollow\">See Apple&#8217;s instructions<\/a>.<\/li>\r\n<li>Windows: <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/device-encryption-in-windows-10-ad5dcf4b-dbe0-2331-228f-7925c2a3012d\" rel=\"nofollow\">See Microsoft&#8217;s instructions<\/a> (we recommend BitLocker if it&#8217;s available)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Encrypt your phone storage:\r\n<ul>\r\n<li>iOS: Automatically encrypt.<\/li>\r\n<li>Android: Recent versions automatically encrypt. Double check by going to <code>Settings \u2192 Security \u2192 Encryption<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Secure your backups too!\r\n<ul>\r\n<li>Encrypt your backup hard drives:\r\n<ul>\r\n<li>Mac: If you use Time Machine, <a href=\"https:\/\/support.apple.com\/en-ca\/guide\/mac-help\/mh21241\/mac\" rel=\"nofollow\">see Apple&#8217;s instructions here<\/a>.<\/li>\r\n<li>Windows: <a href=\"https:\/\/techjury.net\/blog\/how-to-encrypt-your-hard-drive\/\" rel=\"nofollow\">See instructions here<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Pick an online backup storage solution that offers end-to-end encryption (which neither iCloud or Google Drive support) like <a href=\"https:\/\/tresorit.com\/\" rel=\"nofollow\">Tresorit<\/a> or <a href=\"https:\/\/spideroak.com\/one\/\" rel=\"nofollow\">Spideroak One<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>N.B. Remember encryption is only fully effective when the device is off!<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>Setup up a pin code for your mobile phone SIM card:\r\n<ul>\r\n<li><a href=\"https:\/\/support.apple.com\/en-hk\/HT201529\" rel=\"nofollow\">See iPhone instructions<\/a>.<\/li>\r\n<li><a href=\"https:\/\/www.maketecheasier.com\/change-sim-pin-android\/\" rel=\"nofollow\">See Android instructions<\/a>.<\/li>\r\n<li>Search your phone provider&#8217;s website to find out what their default password is (it varies from carrier to carrier).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Turn on the firewall on your computer:\r\n<ul>\r\n<li>Mac: <code>System Preferences \u2192 Security &amp; Privacy \u2192 Firewall<\/code>.<\/li>\r\n<li>Windows: <code>Control Panel \u2192 System and Security \u2192 Windows Firewall<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Turn off remote access on your computer:\r\n<ul>\r\n<li>Mac: <code>System Preferences \u2192 Sharing \u2192 Remote Login, Remote Management1<\/code>.<\/li>\r\n<li>Windows: <code>Control Panel \u2192 System and Security \u2192 System: Allow remote access \u2192 Don't Allow Remote connections to this computer<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Set up basic anti-virus software on your computer:\r\n<ul>\r\n<li>Mac: None required. (<a href=\"https:\/\/www.nytimes.com\/wirecutter\/blog\/best-antivirus\/\" rel=\"nofollow\">Read Wirecutter&#8217;s explanation<\/a>)<\/li>\r\n<li>Windows: Make sure Microsoft Defender Antivirus is on <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\" rel=\"nofollow\">see Microsoft&#8217;s instructions here<\/a>) and <a href=\"https:\/\/lifehacker.com\/why-you-should-use-windows-defenders-ransomware-prevent-1837311176\" rel=\"nofollow\">turn on the extra <code>ransomware protection<\/code> feature<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Turn off app-specific passwords that bypass two-factor authentication (e.g. <a href=\"https:\/\/www.lifewire.com\/revoke-an-application-password-for-gmail-1171889\" rel=\"nofollow\">instructions for Gmail<\/a>).<\/li>\r\n<li>Turn off automatically add(ed) invitations on <a href=\"https:\/\/calendar.google.com\/calendar\/r\/settings\" rel=\"nofollow\">Google Calendar settings<\/a> (<a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/06\/11\/new-security-warning-issued-for-googles-1-5-billion-gmail-and-calendar-users\/#3605ff0565e5\" rel=\"nofollow\">here&#8217;s why<\/a>).<\/li>\r\n<li><a href=\"https:\/\/www.facebook.com\/settings?tab=security\" rel=\"nofollow\">Turn on Login Alerts on Facebook<\/a>.<\/li>\r\n<li><a href=\"https:\/\/support.office.com\/en-us\/article\/enable-or-disable-macros-in-office-files-12b036fd-d140-4e74-b45e-16fed1a7e5c6\" rel=\"nofollow\">Disable macros within Microsoft Office<\/a>.<\/li>\r\n<li>iOS: Don&#8217;t allow USB accessories to control a locked device. Turn off <code>Settings \u2192 Face ID &amp; Passcode \u2192 Allow Access When Locked: USB Accessories<\/code>.<\/li>\r\n<\/ul>\r\n<h3>?? Habits to cultivate<\/h3>\r\n<h4>Email<\/h4>\r\n<ul>\r\n<li>Be on the lookout for phishing scams: where possible double check the <em>From<\/em> email address and the domains that outbound links go to.<\/li>\r\n<li>Don&#8217;t open unnecessary email attachments. Where possible, open or preview them first in an online document reader. Ask colleagues to use a filesharing service (Dropbox, Google Drive, Tresorit, SpiderOak), which tend to be a little harder to hack into.<\/li>\r\n<li>You can upload a suspicious attachment to <a href=\"http:\/\/www.virustotal.com\" rel=\"nofollow\">VirusTotal<\/a> for a check-up (but keep in mind files submitted to VirusTotal are available to security researchers so don\u2019t submit sensitive information).<\/li>\r\n<\/ul>\r\n<h4>Update all the things<\/h4>\r\n<ul>\r\n<li>When you get a notification to update your operating system (on your mobile or computer), do it as soon as you can.<\/li>\r\n<li>Update your apps (on mobile or computer) similarly.<\/li>\r\n<li>Check occasionally for firmware updates for your router (and other Internet-connected devices).<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>Change important passwords (e.g. email, computer login, password manager master) every year or two.<\/li>\r\n<li>Wipe your devices properly before donating\/giving away. If you&#8217;ve encrypted all of your phones and computers (as suggested above), a normal factory reset will do the job for almost all use cases. If you want an extra layer of security for your computer hard drives, see <a href=\"https:\/\/www.wired.co.uk\/article\/securely-wipe-android-iphone-hard-disk\" rel=\"nofollow\">Wired&#8217;s guide on this topic<\/a>.<\/li>\r\n<li>Don&#8217;t charge your phone at public charging stations\/ports \u2013 they may steal your data. Consider charging your portable battery instead.<\/li>\r\n<\/ul>\r\n<hr \/>\r\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f44d.png\" alt=\"+1\" width=\"20\" height=\"20\" \/> Great job! You&#8217;ve covered the basics. <img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f44d.png\" alt=\"+1\" width=\"20\" height=\"20\" \/> Treat yourself to a cup of tea and a stretch.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f44d.png\" alt=\"+1\" width=\"20\" height=\"20\" \/> Now, ready for the next level?<\/strong><\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/> Level 2 recommendations<\/h2>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/2705.png\" alt=\"white_check_mark\" width=\"20\" height=\"20\" \/> Things to do now<\/h3>\r\n<h4>Enhance your privacy<\/h4>\r\n<ul>\r\n<li>Review the privacy settings on social networks you frequent: who can see your content, who can comment on it, and who can see your location.\r\n<ul>\r\n<li>Limit Facebook tracking by turning off Off-Facebook Activity (follow <a href=\"https:\/\/www.eff.org\/deeplinks\/2020\/01\/how-change-your-facebook-activity-settings\" rel=\"nofollow\">these EFF&#8217;s instructions<\/a>).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Review the privacy settings on messaging apps you normally use: read receipts, time stamps for &#8220;last seen,&#8221; and whether your phone number\/profile picture are public.<\/li>\r\n<li>Install these protective web browsers add-ons on your computer (and make sure they&#8217;re on even during private\/incognito mode):\r\n<ul>\r\n<li>An ad blocker (e.g. <a href=\"https:\/\/github.com\/gorhill\/uBlock\/\">uBlock Origin<\/a>, <a href=\"https:\/\/www.ghostery.com\/\" rel=\"nofollow\">Ghostery<\/a>).<\/li>\r\n<li>A tracker blocker (<a href=\"https:\/\/www.eff.org\/privacybadger\" rel=\"nofollow\">Privacy Badger<\/a>).<\/li>\r\n<li><a href=\"https:\/\/www.eff.org\/https-everywhere\" rel=\"nofollow\">HTTPS Everywhere<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Review which apps on your smartphone have access to your location data. Turn off access if the app doesn&#8217;t need it, and minimize the number of apps that track your location all the time.\r\n<ul>\r\n<li>iOS: <code>Settings \u2192 Privacy \u2192 Location Services<\/code>.<\/li>\r\n<li>Android: <code>Settings \u2192 Apps &amp; notifications \u2192 App permissions<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>On your smartphone, delete any third-party keyboards you might have installed ( they often share what you type with the software maker). On both iOS and Android, they are installed as apps so just delete that. If you really need to use a third-party keyboard, make sure that it is an open source project where others have verified that it does not share your data with third parties.<\/li>\r\n<li>If you use smart speakers, turn off its recording function:\r\n<ul>\r\n<li>Google Home: go to <a href=\"https:\/\/myaccount.google.com\/activitycontrols\/audio\" rel=\"nofollow\">Activity Controls<\/a> and uncheck <code>Include audio recordings<\/code>.<\/li>\r\n<li>Amazon Alexa: <a href=\"https:\/\/www.digitaltrends.com\/home\/how-to-stop-amazon-from-listening-to-your-alexa-recordings\/\" rel=\"nofollow\">Follow these instructions<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Set up your home wifi router<\/h4>\r\n<ul>\r\n<li>Login to the administration and settings dashboard (check your router&#8217;s instructions but it&#8217;s often at <code>http:\/\/192.168.0.1<\/code>)<\/li>\r\n<li>If the password to login to this dashboard is really simple, then update it.<\/li>\r\n<li>Look through what devices are connected to the network right now (click around until you find the <code>access control<\/code>) and make sure you know what every device on the list is.<\/li>\r\n<li>If you see these options, turn them off. Look for them under <code>advanced settings<\/code> or <code>gateway functions<\/code>:\r\n<ul>\r\n<li>UPnP (universal plug and play)<\/li>\r\n<li>WPS (wi-fi protected setup)<\/li>\r\n<li>Remote management<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>Set up tracking apps for your devices so you can remotely find and wipe your devices from a website if you ever lose them:\r\n<ul>\r\n<li>iOS &amp; Mac: <a href=\"https:\/\/support.apple.com\/en-us\/HT210400\" rel=\"nofollow\">Instructions for setting up Find My<\/a>.<\/li>\r\n<li>Android: <a href=\"https:\/\/support.google.com\/android\/answer\/6160491?hl=en\" rel=\"nofollow\">Instructions for setting up Find My Device<\/a>.<\/li>\r\n<li>Multi-platform (including iOS, Mac, Android if you want everything under one umbrella): <a href=\"https:\/\/www.preyproject.com\" rel=\"nofollow\">Download and install Prey<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Review the <code>Third-Party Apps<\/code> or <code>Connected Apps<\/code> on your main email\/social media accounts. These are services that might have access to, say, your Facebook data and even permission to make posts automatically there. (<a href=\"https:\/\/www.online-tech-tips.com\/computer-tips\/check-google-facebook-connected-apps\/\" rel=\"nofollow\">Here are the instructions for checking for them on Facebook and Gmail<\/a>.)<\/li>\r\n<li>Review the extensions\/add-ons\/plug-ins that have been installed within your computer web browser \u2013 delete any that you haven&#8217;t used in a while or don&#8217;t remember installing.<\/li>\r\n<\/ul>\r\n<h3>?? Habits to cultivate<\/h3>\r\n<h4>Enhance your privacy<\/h4>\r\n<ul>\r\n<li>Post less personal information online \u2013 especially information that can be used to identify\/track\/scam you (addresses, phone numbers, birthday, etc.). Remember almost everything you say online is logged somewhere and that even if your setup is secure, your recipient&#8217;s setup may not be.<\/li>\r\n<li>If you own domains, use WHOIS privacy services and stick with it (they&#8217;re worth the money). But note that with WHOIS lookup\/history tools, if you&#8217;ve ever put in your real address, it&#8217;s very difficult to remove from the logs.<\/li>\r\n<\/ul>\r\n<h4>Watch what you say in online groups<\/h4>\r\n<p>Don&#8217;t say anything you&#8217;d regret on in a &#8220;private&#8221; Slack group, Facebook page, WhatsApp group chat or Telegram channel because:<\/p>\r\n<ul>\r\n<li>Any one member can leak all of the data.<\/li>\r\n<li>Administrators usually have access to everything within the group, including that private direct message between two people, and sometimes even deleted messages.<\/li>\r\n<li>Even if you&#8217;re not using your real name or photo, what you say can often be traced back to your phone number or email (that is linked to the account).\r\n<ul>\r\n<li>To prevent this in Telegram, go into <code>Settings \u2192 Privacy and Security \u2192 Phone Number<\/code>, and then set:\r\n<ul>\r\n<li><code>Who can see my phone number<\/code> to <code>Nobody<\/code>.<\/li>\r\n<li><code>Who can find me by my number<\/code> to <code>My Contacts<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>When you download new mobile apps, double check to make sure it&#8217;s the right one \u2014 there are a lot of fake apps that try to trick people by using a slightly modified name or icon of an existing, popular app.<\/li>\r\n<li>Check what apps you have installed on your phone once in a while, and delete the ones you&#8217;re not using anymore.<\/li>\r\n<li>If you ever need to send someone a password, split it in half and send via two different channels (e.g. email + voice call).<\/li>\r\n<li>Put a sticker (or webcam cover) over your laptop&#8217;s front-facing camera.<\/li>\r\n<li>Don&#8217;t use Google\/Twitter\/Facebook to sign up\/login to other services \u2013 each service should have its own account.<\/li>\r\n<\/ul>\r\n<hr \/>\r\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f389.png\" alt=\"tada\" width=\"20\" height=\"20\" \/> Congratulations! You&#8217;re now reasonably<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f389.png\" alt=\"tada\" width=\"20\" height=\"20\" \/> secure, which is more than most :)<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f389.png\" alt=\"tada\" width=\"20\" height=\"20\" \/> Take the rest of the day off, and<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f389.png\" alt=\"tada\" width=\"20\" height=\"20\" \/> come back tomorrow for Level 3.<\/strong><\/p>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/> Level 3 recommendations<\/h2>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/2705.png\" alt=\"white_check_mark\" width=\"20\" height=\"20\" \/> To do<\/h3>\r\n<h4>Lock up sensitive files<\/h4>\r\n<ul>\r\n<li>Identify files that you don&#8217;t want others to access (e.g. private photos, passport documents).<\/li>\r\n<li>Use <a href=\"https:\/\/cryptomator.org\/\" rel=\"nofollow\">Cryptomator<\/a> or <a href=\"https:\/\/www.veracrypt.fr\/en\/Home.html\" rel=\"nofollow\">Veracrypt<\/a> to create an encrypted, password-protected vault for them.<\/li>\r\n<li>Set them up on both your computer and your phone.<\/li>\r\n<li>Move your files into these secure vaults. Make sure they&#8217;re not still hanging around on an old folder or on your phone.<\/li>\r\n<\/ul>\r\n<h4>Upgrade your gear<\/h4>\r\n<ul>\r\n<li>Use a paid VPN service when on public networks (e.g. cafe wifi) and even at home if you don&#8217;t want your service provider to know where you&#8217;re going. Free VPN services are bad because operators don&#8217;t have enough incentive to protect you\/your data. See recommendations from <a href=\"https:\/\/thewirecutter.com\/reviews\/best-vpn-service\/\" rel=\"nofollow\">Wirecutter<\/a> and <a href=\"https:\/\/freedom.press\/training\/choosing-a-vpn\/\" rel=\"nofollow\">Freedom of the Press<\/a>.<\/li>\r\n<li>Buy a privacy screen (prevents onlookers from seeing your screen, see <a href=\"https:\/\/www.3m.com\/3M\/en_US\/company-us\/all-3m-products\/~\/All-3M-Products\/Privacy-Screen-Protectors\/Privacy-Products\/Black-Privacy\/\" rel=\"nofollow\">this 3M example<\/a>) for your laptop and phone.<\/li>\r\n<\/ul>\r\n<h4>Revisit old passwords<\/h4>\r\n<ul>\r\n<li>Store all of your online service passwords in a password manager. (If you have the right browser add-on\/plugin installed, it will capture all the relevant details during a login process.)<\/li>\r\n<li>Using your password manager&#8217;s analysis feature, see which accounts\/services have weak passwords and update the ones that might have any personal information about you or that you would really hate to lose.<\/li>\r\n<\/ul>\r\n<h3>?? Habits to cultivate<\/h3>\r\n<ul>\r\n<li>Start using <a href=\"https:\/\/signal.org\/\" rel=\"nofollow\">Signal<\/a>, an end-to-end encrypted mobile messaging app that&#8217;s generally agreed to be safe\/secure\/robust. (Beyond Signal, there is little consensus on what&#8217;s secure and people tend to get very emotional about their choice of mobile messaging apps.)<\/li>\r\n<li>When making voice or video calls, use an end-to-end encrypted app (e.g. Signal, Jitsi, Wire).<\/li>\r\n<li>Buy a harder-to-hack mobile phone <img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4b0.png\" alt=\"moneybag\" width=\"20\" height=\"20\" \/>. Typically, this is an iPhone or Android phone that implements a &#8220;pure&#8221; Google version of Android.<\/li>\r\n<\/ul>\r\n<hr \/>\r\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f632.png\" alt=\"astonished\" width=\"20\" height=\"20\" \/> Wow, you completed all three levels!<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f632.png\" alt=\"astonished\" width=\"20\" height=\"20\" \/> Well done! Now quickly look below<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f632.png\" alt=\"astonished\" width=\"20\" height=\"20\" \/> to see if any apply to you.<\/strong><\/p>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/2757.png\" alt=\"exclamation\" width=\"20\" height=\"20\" \/> Scenario-based recommendations<\/h2>\r\n<h3>??\u200d? Hosting a public event on a video calling platform (e.g. Zoom)<\/h3>\r\n<ul>\r\n<li>Set a password to enter the meeting to prevent random people from wandering in via a meeting ID generator. Consider setting up an RSVP system so that you don&#8217;t have to give out the meeting link and password publicly.<\/li>\r\n<li>Familiarize yourself with the platform&#8217;s settings and minimize the amount of control (e.g. screen sharing) that non-hosts have. (E.g. <a href=\"https:\/\/blog.zoom.us\/wordpress\/2020\/03\/20\/keep-uninvited-guests-out-of-your-zoom-event\/\" rel=\"nofollow\">settings on Zoom<\/a>)<\/li>\r\n<li>Create a plan of action for what you would do if a malicious troll gains access to your call.<\/li>\r\n<li>Don&#8217;t say what you wouldn&#8217;t say in a public forum. Encourage your attendees to do the same. Most commercial platforms have access to your audio\/video data and are mining your metadata to create consumer profiles.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f6eb.png\" alt=\"flight_departure\" width=\"20\" height=\"20\" \/> Crossing an international border<\/h3>\r\n<ul>\r\n<li>Turn off your devices because:\r\n<ul>\r\n<li>Storage\/hard drives are only encrypted when they&#8217;re off, <strong>not<\/strong> when they&#8217;re just in sleep mode<\/li>\r\n<li>This will also ensure that your mobile devices require a pin when they are turned on, which is protected by freedom of speech laws in some jurisdictions.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Store less information on your devices \u2013 in case they&#8217;re seized, what you don&#8217;t have they can&#8217;t take.<\/li>\r\n<li>Be mindful of what stickers you put on your devices \u2013 a border agent could mistake them for something suspicious.<\/li>\r\n<li>Notify your people about your flight number and arrival time. Check in with one of them at regular points in your journey. Have them contact a lawyer\/relevant organization if you do not show up.<\/li>\r\n<li>For extreme situations (some of these practices might raise suspicions and backfire):\r\n<ul>\r\n<li>Set up alternate photo albums, email addresses and social media accounts full of harmless content.<\/li>\r\n<li>&#8220;Forget&#8221; half of your password: Password lock your device\/account so that only a trusted friend has the second half of the password.<\/li>\r\n<li>Log out of all important accounts (or simply leave your devices at home).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>For more information, see Wired&#8217;s <a href=\"https:\/\/www.wired.com\/2017\/02\/guide-getting-past-customs-digital-privacy-intact\/\" rel=\"nofollow\">Guide to Getting Past Customs With Your Digital Privacy Intact<\/a> and <a href=\"http:\/\/boingboing.net\/2017\/02\/12\/how-to-cross-a-us-or-other-b.html\" rel=\"nofollow\">BoingBoing&#8217;s addendum<\/a> about filing for attorney privileges at the US border.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f62d.png\" alt=\"sob\" width=\"20\" height=\"20\" \/> Somebody took my phone\/computer!<\/h3>\r\n<ul>\r\n<li>Wipe your phone remotely:\r\n<ul>\r\n<li>iOS, Mac: Instructions for using <a href=\"https:\/\/support.apple.com\/en-us\/HT210515#erasedevice\" rel=\"nofollow\">Find My<\/a>.<\/li>\r\n<li>Android: Instruction for <a href=\"https:\/\/support.google.com\/accounts\/answer\/6160491?hl=en\" rel=\"nofollow\">Find My Device<\/a>.<\/li>\r\n<li>If you installed Prey: <a href=\"https:\/\/panel.preyproject.com\" rel=\"nofollow\">Login to the dashboard<\/a>, select a device and then <code>remote wipe<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Log out of all important accounts from another device.<\/li>\r\n<li>If this happened at an international border: Ask for a seizure receipt (available in some jurisdictions, e.g. <a href=\"https:\/\/bccla.org\/wp-content\/uploads\/2018\/10\/Electronic-Devices-Privacy-Handbook-BCCLA_2.0.pdf\" rel=\"nofollow\">Canada<\/a>)<\/li>\r\n<li>Get a new SIM card.<\/li>\r\n<li>If you get it back, reset your phone\/computer back to its factory settings. Then run some anti-virus and anti-spyware programs just in case.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f47e.png\" alt=\"space_invader\" width=\"20\" height=\"20\" \/> I think my computer has been hacked!<\/h3>\r\n<ul>\r\n<li>Download an application that will notify you when data is being sent out from your computer. E.g. <a href=\"https:\/\/www.obdev.at\/products\/littlesnitch\/index.html\" rel=\"nofollow\">Little Snitch for Mac<\/a>.<\/li>\r\n<li>Run Activity Monitor on Mac or Process Explorer on Windows to look at what processes\/applications are running. Google any suspicious names.<\/li>\r\n<li>Login to important online accounts to see if there have been any suspicious logins \u2013 see <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/bjeznz\/how-do-you-know-when-youve-been-hacked-gmail-facebook\" rel=\"nofollow\">this Motherboard guide for details<\/a>.<\/li>\r\n<li>Setup a spare smartphone using <a href=\"https:\/\/guardianproject.github.io\/haven\/\" rel=\"nofollow\">Haven<\/a> as a room monitor to detect unwanted intrusions.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f346.png\" alt=\"eggplant\" width=\"20\" height=\"20\" \/> Sexting &amp; non-consensual image sharing<\/h3>\r\n<ul>\r\n<li>See <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/mb3nd4\/how-to-sext-securely-safely-what-apps-to-use-sexting\" rel=\"nofollow\">The Motherboard Guide to Sexting Securely<\/a>.<\/li>\r\n<\/ul>\r\n<h3>\u270a? Attending a protest<\/h3>\r\n<h4>In case of emergency<\/h4>\r\n<ul>\r\n<li>Draft a message to a trusted friend (not at protest) or legal hotline. Be ready to hit send if you are arrested\/there is an emergency.<\/li>\r\n<li>Write the phone number of the trusted friend\/hotline on your arm with permanent marker as a backup.<\/li>\r\n<li>Bring a spare battery for your phone.<\/li>\r\n<li>If you use your fingerprint or face to unlock your phone, turn it off for now. In some places, <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2016\/05\/iphone-fingerprint-search-warrant\/480861\/\" rel=\"nofollow\">officers can compel you to provide your fingerprint but not your passcode<\/a>.<\/li>\r\n<li>Immediately power off your phone if you think you&#8217;ll be arrested (disk encryption works better if it&#8217;s off).<\/li>\r\n<li>Consider using a burner phone (<a href=\"https:\/\/theintercept.com\/2020\/06\/15\/protest-tech-safety-burner-phone\/\" rel=\"nofollow\">instructions for the US<\/a>) with a burner SIM card.<\/li>\r\n<\/ul>\r\n<h4>Store less share less<\/h4>\r\n<ul>\r\n<li>Keep as little sensitive personal information on your phone as possible. Delete any photos, chat logs and notes that can be used against you.<\/li>\r\n<li>Use a messaging app that lets you create disappearing messages (e.g. <a href=\"https:\/\/signal.org\/\" rel=\"nofollow\">Signal<\/a>). Turn on the timer when discussing the protest.<\/li>\r\n<li>Don&#8217;t take any photos or videos where people&#8217;s faces are clearly visible. Taking a photo of people&#8217;s backs is okay. (The one exception is if you&#8217;re filming a video of a conflict or arrest where documentation is key.)<\/li>\r\n<li>Wear a face mask so you are not easily caught on camera.<\/li>\r\n<li>When sharing photos\/videos:\r\n<ul>\r\n<li>Blur the faces of any protesters. (Use Everest Pipkin&#8217;s <a href=\"https:\/\/everestpipkin.github.io\/image-scrubber\/\" rel=\"nofollow\">Image Scrubber<\/a> or <a href=\"https:\/\/signal.org\/blog\/blur-tools\/\" rel=\"nofollow\">Signal&#8217;s blur tool<\/a> for photos, and Youtube&#8217;s <a href=\"https:\/\/youtube-eng.googleblog.com\/2017\/08\/blur-select-faces-with-updated-blur.html\" rel=\"nofollow\">blur faces tool<\/a> for videos.)<\/li>\r\n<li>If need be, erase the location metadata using <a href=\"https:\/\/www.maketecheasier.com\/best-apps-remove-exif-data-from-images\/\" rel=\"nofollow\">these apps<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Minimize location tracking<\/h4>\r\n<ul>\r\n<li>Turn off location history:\r\n<ul>\r\n<li>iOS: <code>Settings \u2192 Privacy \u2192 Location Services \u2192 System Services \u2192 Significant Locations<\/code>.<\/li>\r\n<li>Android: <code>Settings \u2192 Google \u2192 Google Account \u2192 Data &amp; \r\npersonalization \u2192 Location History \u2192 Manage setting \u2192 Your account &amp;\r\n all your devices \u2192 Use Location History Off<\/code>.<\/li>\r\n<li>Google Maps: <code>Settings \u2192 Maps history \u2192 Web &amp; App Activity<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Delete past location history:\r\n<ul>\r\n<li>iOS: <code>Settings \u2192 Privacy \u2192 Location Services \u2192 System Services \u2192 Significant Locations \u2192 Clear History<\/code>.<\/li>\r\n<li><a href=\"https:\/\/support.google.com\/accounts\/answer\/3118687?hl=en#delete\" rel=\"nofollow\">Android<\/a><\/li>\r\n<li><a href=\"https:\/\/support.google.com\/maps\/answer\/3137804?hl=en\" rel=\"nofollow\">Google Maps<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Consider turning off all location services temporarily:\r\n<ul>\r\n<li>iPhone: <code>Settings \u2192 Privacy \u2192 Location Services \u2192 Location Services Off<\/code>.<\/li>\r\n<li>Android: <code>Security &amp; location \u2192 Location \u2192 Use location Off<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>Double check your messaging apps&#8217; privacy settings.<\/li>\r\n<li>Turn off message previews in your notifications:\r\n<ul>\r\n<li>iOS: <code>Settings \u2192 Notifications \u2192 Show Previews: When Unlocked<\/code>.<\/li>\r\n<li>Android: <code>Settings \u2192 Apps &amp; notifications \u2192 Notifications \u2192 On lock screen: Hide sensitive content<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Remember to make voice calls through end-to-end encrypted apps like <a href=\"https:\/\/signal.org\/\" rel=\"nofollow\">Signal<\/a>.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4f0.png\" alt=\"newspaper\" width=\"20\" height=\"20\" \/> I&#8217;m a journalist working on a sensitive topic<\/h3>\r\n<p>Below are some basics that all journalists should consider. If you&#8217;re working on\/in a particularly sensitive story\/region (e.g. a whisteblower story), you and your team should get an tailored training session from an expert.<\/p>\r\n<h4>Be prepared<\/h4>\r\n<ul>\r\n<li>To remotely wipe the contents of your devices using a tracking app (e.g. <a href=\"https:\/\/www.apple.com\/icloud\/find-my\/\" rel=\"nofollow\">Find My<\/a> on iOS, <a href=\"https:\/\/support.google.com\/accounts\/answer\/6160491?hl=en\" rel=\"nofollow\">Find My Device<\/a> on Android, <a href=\"https:\/\/www.preyproject.com\" rel=\"nofollow\">Prey<\/a>, <a href=\"https:\/\/www.lookout.com\/\" rel=\"nofollow\">Lookout Security<\/a>).<\/li>\r\n<li>To be on the receiving end of an email phishing campaign (as journalist emails are usually more public than others).<\/li>\r\n<\/ul>\r\n<h4>Protect yourself<\/h4>\r\n<ul>\r\n<li>If you&#8217;re traveling, review the <code>Crossing an international border<\/code> scenario above.<\/li>\r\n<li>If you&#8217;re covering a protest, review the <code>Attending a protest<\/code> scenario above and decide which parts apply to you (if you have special journalist rights\/protections where you&#8217;re working).<\/li>\r\n<li>Use a VPN if you&#8217;re browsing the internet at the office (website administrators can usually see that you&#8217;re coming from, say, the New York Times network)<\/li>\r\n<\/ul>\r\n<h4>Protect your sources<\/h4>\r\n<ul>\r\n<li>Use email less, as <a href=\"https:\/\/freedom.press\/training\/blog\/how-reporters-emails-get-got-case-studies-legal-request-hacking\/\" rel=\"nofollow\">even end-to-end encrypted email leaves a trail of metadata<\/a>.<\/li>\r\n<li>To exchange messages, use an end-to-end encrypted messaging app that doesn&#8217;t store metadata like <a href=\"https:\/\/www.signal.org\/\" rel=\"nofollow\">Signal<\/a>. (Don&#8217;t use Twitter DMs!)<\/li>\r\n<li>Use <a href=\"https:\/\/www.signal.org\/\" rel=\"nofollow\">Signal<\/a> or <a href=\"https:\/\/jitsi.org\/\" rel=\"nofollow\">Jitsi<\/a> for end-to-end encrypted voice and video calls.<\/li>\r\n<li>Use the security features in Signal and Whatsapp \u2013 see Martin Shelton&#8217;s articles on <a href=\"https:\/\/medium.com\/@mshelton\/locking-down-signal-d71678f653d3\" rel=\"nofollow\">Locking Down Signal<\/a> and <a href=\"https:\/\/medium.com\/@mshelton\/upgrading-whatsapp-security-386c8ce496d3\" rel=\"nofollow\">Upgrading WhatsApp security<\/a>.<\/li>\r\n<li>Have your organization set up <a href=\"https:\/\/securedrop.org\/\" rel=\"nofollow\">SecureDrop<\/a>. Failing that, encourage people to use <a href=\"https:\/\/onionshare.org\/\" rel=\"nofollow\">OnionShare<\/a>.<\/li>\r\n<li>Blur faces from photos and videos (e.g. Android <a href=\"https:\/\/guardianproject.info\/apps\/obscuracam\/\" rel=\"nofollow\">ObscuraCam<\/a>, Youtube <a href=\"https:\/\/technology.witness.org\/2016\/02\/how-to-use-youtubes-new-blurring-feature-to-protect-identities\/\" rel=\"nofollow\">instructions<\/a>).<\/li>\r\n<li>Erase media metadata using <a href=\"https:\/\/www.maketecheasier.com\/best-apps-remove-exif-data-from-images\/\" rel=\"nofollow\">these apps<\/a>.<\/li>\r\n<li>See Ted Han and Quinn Norton&#8217;s <a href=\"https:\/\/source.opennews.org\/articles\/how-protect-your-sources-when-releasing-sensitive-\/\" rel=\"nofollow\">Protecting Your Sources When Releasing Sensitive\u00a0Documents<\/a>.<\/li>\r\n<li>See Martin Shelton&#8217;s <a href=\"https:\/\/source.opennews.org\/articles\/opening-secure-channels-confidential-tips\/\" rel=\"nofollow\">Opening Secure Channels for Confidential\u00a0Tips<\/a>.<\/li>\r\n<\/ul>\r\n<h4>Protect your data<\/h4>\r\n<ul>\r\n<li>Make sure you&#8217;re using an email\/storage provider that&#8217;s not owned\/linked to an organization that you&#8217;re reporting on.<\/li>\r\n<li>Be aware that <a href=\"https:\/\/medium.com\/@tinfoilpress\/newsrooms-lets-talk-about-g-suite-1672a36eb235\" rel=\"nofollow\">courts can compel Google to hand over all of your data<\/a>.<\/li>\r\n<li>Move all of your work onto end-to-end encrypted platforms. (E.g. <a href=\"https:\/\/protonmail.com\/\" rel=\"nofollow\">Protonmail<\/a> or <a href=\"https:\/\/tutanota.com\/\" rel=\"nofollow\">Tutanota<\/a> for email, store documents in a <a href=\"https:\/\/tresorit.com\/\" rel=\"nofollow\">Tresorit<\/a> or <a href=\"https:\/\/spideroak.com\/\" rel=\"nofollow\">SpiderOak<\/a> cloud.)<\/li>\r\n<li>Store sensitive data in a password-protected cloud or external storage device as much as possible. See the <code>Lock up sensitive files<\/code> section above.<\/li>\r\n<li>Remember to permanently erase sensitive files from your computer: use <a href=\"https:\/\/eraser.heidi.ie\/\" rel=\"nofollow\">Eraser for Windows<\/a> and <a href=\"https:\/\/apps.apple.com\/us\/app\/fileshredder\/id418094085?mt=12\" rel=\"nofollow\">File Shredder for Mac<\/a>.<\/li>\r\n<\/ul>\r\n<h4>For more information<\/h4>\r\n<ul>\r\n<li>If you&#8217;re in an unconventional region, jurisdiction or situation, see Gr\u00e9goire Pouget of Nothing2Hide&#8217;s <a href=\"https:\/\/gijn.org\/2019\/07\/16\/digital-security-for-journalists-requires-an-adaptable-toolkit\/\" rel=\"nofollow\">Digital Security for Journalists Requires an Adaptable Toolkit<\/a> guide.<\/li>\r\n<li>If you&#8217;re running a newsroom, see Ontheline Newsrooms&#8217; see <a href=\"https:\/\/newsrooms-ontheline.ipi.media\/\" rel=\"nofollow\">Measures for Newsrooms and Journalists to Address Online Harassment<\/a>.<\/li>\r\n<\/ul>\r\n<h3>??\u200d\u2642\ufe0f Online harassment &amp; doxxing<\/h3>\r\n<p>Harassment and doxxing can get very specific and complicated based on the attacker, your position, the overall cultural context, etc. While we have some general suggestions below, we implore you to think about whether your situation has escalated sufficiently and whether it&#8217;s time to find professional, one-on-one help.<\/p>\r\n<h4>Recruit a trusted friend<\/h4>\r\n<ul>\r\n<li>Do not force yourself into a corner by going at this alone!\r\n<ul>\r\n<li>Baseline: Ask a trusted friend to hold space for your situation and be your sounding board on analyzing how bad the threat is.<\/li>\r\n<li>Preferred: Ask a trusted friend to help you investigate, record, report and block harassers \u2014 see Take Back The Tech&#8217;s <a href=\"https:\/\/www.takebackthetech.net\/know-more\/heyfriend\" rel=\"nofollow\">Hey Friend!<\/a> guide for more details about this. In some cases, it may be healthier to hand over your phone\/social media\/accounts over to them so that you&#8217;re not constantly triggered.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Alternately, reach out to online communities you&#8217;re an active member of and ask for help. See PEN America&#8217;s article on <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/deploying-supportive-cyber-communities\/\" rel=\"nofollow\">Deploying Your Supportive Cyber Communities<\/a>.<\/li>\r\n<li>If no one is available right now, Heartmob has a list of <a href=\"https:\/\/iheartmob.org\/resources\/supportive_organizations\" rel=\"nofollow\">supportive organizations<\/a>, some of which have 24\/7 hotlines.<\/li>\r\n<\/ul>\r\n<h4>Monitor updates &amp; collect receipts<\/h4>\r\n<ul>\r\n<li>Run keyword searches for your name, nickname, and address to see what&#8217;s out there. Also run an image search on your most-used profile pictures.<\/li>\r\n<li>Monitor your name\/username using these services: <a href=\"https:\/\/www.talkwalker.com\/alerts\" rel=\"nofollow\">Talkwalker<\/a>, <a href=\"https:\/\/www.google.com\/alerts\" rel=\"nofollow\">Google Alerts<\/a> and\/or <a href=\"https:\/\/mention.com\" rel=\"nofollow\">Mention<\/a> <img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4b0.png\" alt=\"moneybag\" width=\"20\" height=\"20\" \/>.<\/li>\r\n<li>Monitor and archive webpages that mention you using <a href=\"https:\/\/changetower.com\/\" rel=\"nofollow\">ChangeTower<\/a>.<\/li>\r\n<li>Start logging (date, time, description, screenshot) incidents in whatever program\/app that&#8217;s easiest for you.<\/li>\r\n<li>If future legal action is likely, pay <a href=\"https:\/\/www.page-vault.com\" rel=\"nofollow\">Page Vault<\/a> to capture a snapshot of a website and ask a lawyer to file an <a href=\"https:\/\/onlinesos.org\/blog\/evidence-preservation-i-e-litigation-hold-request\" rel=\"nofollow\">evidence preservation request<\/a> with the relevant online platform.<\/li>\r\n<li>Remember to take care of yourself as much as you can \u2014 eat, sleep, exercise. Call in friends to help share a meal, take a break or watch your cats for a few days.<\/li>\r\n<\/ul>\r\n<h4>Remove information about you off of the internet<\/h4>\r\n<ul>\r\n<li>Follow the instructions in the section\/scenario that follows this one.<\/li>\r\n<\/ul>\r\n<h4>Ignore\/reply\/report\/block your harassers<\/h4>\r\n<ul>\r\n<li>Together with your support person\/friend and the log of receipts, decide on your course of action (these aren&#8217;t mutually exclusive):\r\n<ul>\r\n<li>Ignore: Sometimes harassers will walk away if they don&#8217;t get attention.<\/li>\r\n<li>De-escalate: In some contexts, you can defuse the situation with some calm words before it gets worse.<\/li>\r\n<li>Report: Report the harasser to the relevant online platform and\/or your local law enforcement.<\/li>\r\n<li>Mute on social media: Allows for peace of mind.<\/li>\r\n<li>Block on social media: Maximizes peace of mind as the harasser won&#8217;t be able to see your posts. But they will notice and see it as a sign of escalation.<\/li>\r\n<li>Go public: Can be dangerous, but sometimes shaming them publicly or rallying people to your support will make them go away.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>For Twitter users:\r\n<ul>\r\n<li>Block previously-identified offenders using <a href=\"https:\/\/theblockbot.com\/\" rel=\"nofollow\">Block Together<\/a> \u2014 ask around in your communities for shared block lists.<\/li>\r\n<li>Block troll bots using <a href=\"https:\/\/botsentinel.com\" rel=\"nofollow\">Bot Sentinel<\/a>.<\/li>\r\n<li>Reduce dogpiling by blocking all followers of a certain profile using <a href=\"https:\/\/github.com\/gaeulbyul\/RedBlock\">Red Block<\/a> or <a href=\"https:\/\/github.com\/satsukitv\/twitter-block-chain\">Twitter Block Chain<\/a> (only available on Chrome).<\/li>\r\n<li>See what lists you&#8217;ve been added to by going to <code>Profile \u2192 Lists \u2192 \u00b7\u00b7\u00b7 \u2192 Lists<\/code> you&#8217;re on. If you see a suspicious list or list owner, tap the three dots on the top right to report the list and leave the list by blocking the creator.<\/li>\r\n<li>Filter unwanted mentions and replies using <a href=\"https:\/\/www.blockpartyapp.com\/\" rel=\"nofollow\">Block Party<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Notify other parties<\/h4>\r\n<ul>\r\n<li>If your physical safety is under threat, notify law enforcement or someone in your community with crisis experience for protection.<\/li>\r\n<li>If the situation escalates, consider informing your employer, communities and family about what is going on, in case you might need their help at some point or so that they are not caught off-guard.<\/li>\r\n<\/ul>\r\n<h4>For more information<\/h4>\r\n<ul>\r\n<li>See Kat Fukui&#8217;s <a href=\"https:\/\/www.tinykat.cafe\/guide-for-handling-online-harassment\" rel=\"nofollow\">Guide for handling online harassment<\/a>.<\/li>\r\n<li>See OnlineSOS&#8217; <a href=\"https:\/\/onlinesos.org\/action-center\/category:identify\" rel=\"nofollow\">Action Center<\/a>.<\/li>\r\n<li>See PEN America&#8217;s <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/\" rel=\"nofollow\">Online Harassment Field Manual<\/a>.<\/li>\r\n<li>See Feminist Frequency&#8217;s <a href=\"https:\/\/onlinesafety.feministfrequency.com\/en\/\" rel=\"nofollow\">Speak Up &amp; Stay Safe(r)<\/a>.<\/li>\r\n<li>See TrollBusters&#8217; <a href=\"https:\/\/yoursosteam.wordpress.com\/what-to-do-infographic\/\" rel=\"nofollow\">What to Do? Where to Go?\u00a0Infographic<\/a>.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f440.png\" alt=\"eyes\" width=\"20\" height=\"20\" \/> Remove information about you off of the internet<\/h3>\r\n<p>If you&#8217;re about to become a public figure or are experiencing harassment, consider some of the suggestions below.<\/p>\r\n<h4>Clean up your social media presences<\/h4>\r\n<p>You might not need to delete your entire account, but consider deleting (or making private) posts that are old and\/or reveal too much about where you live, where you go, and who you&#8217;re with.<\/p>\r\n<ul>\r\n<li>Facebook:\r\n<ul>\r\n<li>See what your public profile looks and remove\/restrict things as you see fit.\r\n<ul>\r\n<li>On desktop, go to your profile and click the <img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f441.png\" alt=\"eye\" width=\"20\" height=\"20\" \/> button next to the right of the Edit Profile button.<\/li>\r\n<li>On mobile, go to your proflie, tap the three dots on the right of Add Story and tap View As.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Make it so only friends can see your past posts.\r\n<ul>\r\n<li>On desktop, go to <code>Settings \u2192 Privacy \u2192 Limit Past Posts<\/code>.<\/li>\r\n<li>On mobile, go to <code>Settings &amp; Privacy \u2192 Settings \u2192 Privacy Settings \u2192 Limit who can see past posts<\/code>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>To bulk delete past posts, <a href=\"https:\/\/www.pcmag.com\/how-to\/how-to-quickly-delete-old-facebook-posts\" rel=\"nofollow\">see this article in PC Magazine<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Whatsapp:\r\n<ul>\r\n<li>Swipe to delete individual conversations.<\/li>\r\n<li>Delete chat content but keep the chat groups: <code>Settings \u2192 Chats \u2192  Clear All Chats<\/code>.<\/li>\r\n<li>Delete all chats including the chat groups: <code>Settings \u2192 Chats \u2192 Delete All Chats<\/code>.<\/li>\r\n<li>Turn off chat backups on WhatsApp (<code>Settings \u2192 Chats \u2192 Chat backup<\/code>) and delete your previous backups (instructions for <a href=\"https:\/\/www.wikihow.com\/Delete-Backups-on-WhatsApp-on-iPhone-or-iPad\" rel=\"nofollow\">iOS<\/a>, <a href=\"https:\/\/faq.whatsapp.com\/en\/android\/30030306\" rel=\"nofollow\">Android<\/a>).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Instagram:\r\n<ul>\r\n<li>Look through your profile and manually delete posts (tap the three dots above upper-right corner of a photo).<\/li>\r\n<li>If need be, bulk delete using <a href=\"https:\/\/upleap.com\/blog\/how-to-delete-an-instagram-post\/\" rel=\"nofollow\">third-party tools<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Twitter:\r\n<ul>\r\n<li>Use a third-party service to filter for tweets you want to save, and bulk delete the rest. We recommend <a href=\"https:\/\/semiphemeral.com\" rel=\"nofollow\">Semiphemeral<\/a> (free + open source, but beta), <a href=\"https:\/\/tweetdelete.net\/\" rel=\"nofollow\">TweetDelete<\/a> (free + paid options), or <a href=\"https:\/\/martani.github.io\/Twitter-Archive-Eraser\/\" rel=\"nofollow\">Twitter Archive Eraser<\/a> (free + paid options).<\/li>\r\n<li>Alternately, manually locate and delete individual posts using <a href=\"https:\/\/twitter.com\/search-advanced\" rel=\"nofollow\">Twitter&#8217;s Advanced search<\/a>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Reddit and other forums:\r\n<ul>\r\n<li>There&#8217;s often no easy solution. Sometimes you have to delete your entire account, or in the case of Reddit, you have to <a href=\"https:\/\/social.techjunkie.com\/how-to-delete-all-reddit-posts\/\" rel=\"nofollow\">use third-party scripts<\/a> because deleting your account still leaves your posts up.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4>Remove your information from other people&#8217;s accounts or websites<\/h4>\r\n<ul>\r\n<li><a href=\"https:\/\/support.google.com\/websearch\/answer\/9554939?hl=en\" rel=\"nofollow\">Ask Google<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-ca\/concern\/bing\" rel=\"nofollow\">Bing<\/a> to remove search results pointing to pages with your personal information on them.<\/li>\r\n<li>Follow the Cyber Civil Rights Initiative&#8217;s <a href=\"https:\/\/www.cybercivilrights.org\/online-removal\" rel=\"nofollow\">guide to get policy-violating posts\/media removed from social networks<\/a>.<\/li>\r\n<li>If you&#8217;re willing to pay <img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4b0.png\" alt=\"moneybag\" width=\"20\" height=\"20\" \/>, <a href=\"https:\/\/github.com\/yaelwrites\/Big-Ass-Data-Broker-Opt-Out-List#paid-options\">Yael Grauer<\/a> recommends using <a href=\"https:\/\/joindeleteme.com\/\" rel=\"nofollow\">DeleteMe<\/a> and <a href=\"https:\/\/www.thekanary.com\/\" rel=\"nofollow\">Kanary<\/a> to remove your information from English-language public and paywalled sites.<\/li>\r\n<li>If you want to do it yourself, check out Yael Grauer&#8217;s <a href=\"https:\/\/github.com\/yaelwrites\/Big-Ass-Data-Broker-Opt-Out-List\">Big Ass Data Broker Opt-Out List<\/a> and <a href=\"https:\/\/www.privacyduck.com\/resources\/\" rel=\"nofollow\">PrivacyDuck&#8217;s guides<\/a>). (To be 100% thorough, use these on top of paid services.)<\/li>\r\n<li>Remember that information removal requests takes time to process and often require repeated attempts.<\/li>\r\n<\/ul>\r\n<h4>Obscure your personal information<\/h4>\r\n<ul>\r\n<li>Use <a href=\"http:\/\/www.burnerapp.com\/\" rel=\"nofollow\">Burner<\/a> or <a href=\"https:\/\/hushed.com\" rel=\"nofollow\">Hushed<\/a> to set up burner phone numbers for calling\/texting.<\/li>\r\n<li>Get a PO box at a post office or use <a href=\"https:\/\/travelingmailbox.com\/\" rel=\"nofollow\">Traveling Mailbox<\/a> (USA only) to hide your home address.<\/li>\r\n<li>Delete old accounts to eliminate traces of personal information on the Internet. Use <a href=\"https:\/\/justdeleteme.xyz\/\" rel=\"nofollow\">JustDeleteMe<\/a> to accelerate this process.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f494.png\" alt=\"broken_heart\" width=\"20\" height=\"20\" \/> I think my partner is spying on me through my phone (stalkerware)<\/h3>\r\n<h4>If you&#8217;re not sure and things between you and your partner aren&#8217;t that bad yet:<\/h4>\r\n<ul>\r\n<li>Keep a hidden, pen-and-paper log of suspicious incidents.<\/li>\r\n<li>Make sure your partner is not getting information from previously shared accounts or because you left the <a href=\"https:\/\/support.google.com\/maps\/answer\/7326816?co=GENIE.Platform%3DAndroid&amp;hl=en\" rel=\"nofollow\">location share on within Google Maps<\/a>.<\/li>\r\n<li>Review and redo the items in Levels 1-3 of this guide. Reset your passwords, check your privacy\/data sharing permissions, and look up any apps you don&#8217;t recognize on your computer and phone.<\/li>\r\n<li>Keep an eye out for other signs. E.g. your phone battery doesn&#8217;t last very long anymore, or your laptop internet connection is slow. Review the Coalition Against Stalkerware&#8217;s <a href=\"https:\/\/stopstalkerware.org\/get-help\/\" rel=\"nofollow\">full of list of indicators<\/a>.<\/li>\r\n<li><strong>Don&#8217;t delete suspicious apps immediately<\/strong> \u2014 you may need to keep them as evidence. Plus, deletion may also cause the situation with your partner to escalate.<\/li>\r\n<\/ul>\r\n<h4>If you&#8217;re pretty sure they&#8217;re spying on you and you&#8217;re scared:<\/h4>\r\n<ul>\r\n<li>Seek help. You should not go through this alone:\r\n<ul>\r\n<li>Find a public or friend&#8217;s computer\/phone to contact the organizations in <a href=\"https:\/\/stopstalkerware.org\/get-help\/resources\/\" rel=\"nofollow\">this global resource list compiled by the Coalition Against Stalkerware<\/a>. Some of them can even help you collect evidence and remove stalkerware safely.<\/li>\r\n<li>Reach out to a trusted friend (through a public device\/line) and ask them to hold space for your situation and be your sounding board on analyzing how bad the situation is.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Keep digital and printed records of relevant texts, emails, calls, etc. See the NNEDV&#8217;s <a href=\"https:\/\/www.womenslaw.org\/about-abuse\/abuse-using-technology\/evidence-issues-cases-involving-technology\/digital-evidence\" rel=\"nofollow\">guide on documenting\/saving evidence<\/a>.<\/li>\r\n<li>When you no longer need evidence anymore, remove the suspicous apps\/stalkerware yourself either by deleting them one by one, or by performing a full factory reset on your computer\/phone. (Buying brand new device is even safer of course.) Remember to reinstall apps and import data manually, lest you restore a backup with stalkerware in it.<\/li>\r\n<\/ul>\r\n<h4>For more information<\/h4>\r\n<ul>\r\n<li>See Wirecutter&#8217;s <a href=\"https:\/\/thewirecutter.com\/blog\/domestic-abusers-can-control-your-devices-heres-how-to-fight-back\/\" rel=\"nofollow\">Protect Your Devices Against Domestic Abusers<\/a><\/li>\r\n<li>See Coalition Against Stalkerware&#8217;s <a href=\"https:\/\/stopstalkerware.org\/get-help\/\" rel=\"nofollow\">Safety Toolkit<\/a><\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f464.png\" alt=\"bust_in_silhouette\" width=\"20\" height=\"20\" \/> I don&#8217;t want to give out my real phone number for online dating\/networking\/organizing<\/h3>\r\n<p>For messaging apps that use phone numbers as the primary identifier\/username (e.g. Signal, WhatsApp, Telegram), get a secondary number from:<\/p>\r\n<ul>\r\n<li><a href=\"https:\/\/www.twilio.com\" rel=\"nofollow\">Twilio<\/a> (1 USD\/month, but complicated setup \u2013 see the Twilio section <a href=\"https:\/\/medium.com\/@geminiimatt\/creating-an-online-persona-deb4cd8c7f46\" rel=\"nofollow\">here<\/a> and <a href=\"https:\/\/source.opennews.org\/articles\/shields-using-signal-without-your-phone-number\/\" rel=\"nofollow\">this guide<\/a>)<\/li>\r\n<li><a href=\"https:\/\/voice.google.com\/about\" rel=\"nofollow\">Google Voice<\/a> (free but only available in the US)<\/li>\r\n<li><a href=\"https:\/\/www.burnerapp.com\/\" rel=\"nofollow\">Burner<\/a> or <a href=\"https:\/\/hushed.com\" rel=\"nofollow\">Hushed<\/a> (5 and 4 USD\/month respectively + other prepaid plans for short-term use, US\/Canada numbers)<\/li>\r\n<li>A phone company: get a prepaid or cheap SIM card plan (rates vary)<\/li>\r\n<\/ul>\r\n<p>For sites and services that use email as the primary identifier\/username, get a separate, new email address.<\/p>\r\n<p>Keep in mind:<\/p>\r\n<ul>\r\n<li>If you lose\/unsubscribe to your secondary phone number, other people can buy it and impersonate you.<\/li>\r\n<li>Courts can still compel companies to hand over your information in most cases.<\/li>\r\n<\/ul>\r\n<h4>For true anonymity \u2013 create an untraceable online persona under a pseudonymn<\/h4>\r\n<ul>\r\n<li>If you&#8217;re a public figure, consider working under a persistent pseudonymn or collective identity \u2013 this <a href=\"https:\/\/gendersec.tacticaltech.org\/wiki\/index.php\/Complete_manual#Creating_and_managing_identities_online\" rel=\"nofollow\">Tactical Tech manual<\/a> has more details on why.<\/li>\r\n<li>To operate online under a truly safe pseudonymn, follow this guide on <a href=\"https:\/\/medium.com\/@geminiimatt\/creating-an-online-persona-deb4cd8c7f46\" rel=\"nofollow\">creating untraceable online accounts and protecting your real identity<\/a>.<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f910.png\" alt=\"zipper_mouth_face\" width=\"20\" height=\"20\" \/> Traveling to a place with weak data protection laws or internet censorship<\/h3>\r\n<ul>\r\n<li>Be aware that the phone companies there might share your location data and personal info with others without permission.<\/li>\r\n<li>Setup a VPN beforehand so you can a) access services uninterrupted, and b) to minimize the amount of data collected about you. Avoid VPNs that are free or have opaque ownership. See recommendations from <a href=\"https:\/\/thewirecutter.com\/reviews\/best-vpn-service\/\" rel=\"nofollow\">Wirecutter<\/a> and <a href=\"https:\/\/freedom.press\/training\/choosing-a-vpn\/\" rel=\"nofollow\">Freedom of the Press<\/a>.<\/li>\r\n<li>Consider traveling with a burner phone while leaving your laptop at home. This will be especially useful if you need to install new\/untested software for work that might violate data privacy policies.<\/li>\r\n<li>Re-evaluate which online services are safe to use:\r\n<ul>\r\n<li>If available, see how often your favorite service hands over its data by looking up their transparency reports:\r\n<ul>\r\n<li><a href=\"https:\/\/transparencyreport.google.com\/user-data\/overview\" rel=\"nofollow\">Google Transparency Report: Request for user information<\/a><\/li>\r\n<li><a href=\"https:\/\/transparency.facebook.com\/\" rel=\"nofollow\">Facebook Transparency Report: Government Requests for User Data<\/a><\/li>\r\n<li><a href=\"https:\/\/www.apple.com\/legal\/transparency\/\" rel=\"nofollow\">Apple Transparency Report<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Look up where the service&#8217;s headquarters are and think about how that affects its privacy policies.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f623.png\" alt=\"persevere\" width=\"20\" height=\"20\" \/> I need help now, my systems are under attack!<\/h3>\r\n<p>If you work as part of a civil society group, contact:<\/p>\r\n<ul>\r\n<li>Access Now&#8217;s <a href=\"https:\/\/www.accessnow.org\/help\/\" rel=\"nofollow\">Digital Security Helpline<\/a><\/li>\r\n<li>Front Line Defender&#8217;s <a href=\"https:\/\/www.frontlinedefenders.org\/emergency-contact\" rel=\"nofollow\">Emergency Contact<\/a><\/li>\r\n<li>If you have a bit more time, apply for a Digital Defenders Partnership <a href=\"https:\/\/www.digitaldefenders.org\/funding\/incident-emergency-funding\/\" rel=\"nofollow\">Incident Emergency Grant<\/a>.<\/li>\r\n<\/ul>\r\n<p>If you are being harassed online, contact:<\/p>\r\n<ul>\r\n<li>The <a href=\"https:\/\/gameshotline.org\/\" rel=\"nofollow\">Games and Online Harassment Hotline<\/a>, a US-based, text message-based, confidential emotional support hotline for members of the gaming community.<\/li>\r\n<li>The Digital Rights Foundation&#8217;s Pakistan-based <a href=\"https:\/\/digitalrightsfoundation.pk\/contact\/\" rel=\"nofollow\">Cyber Harassment Hotline<\/a>.<\/li>\r\n<\/ul>\r\n<p>Alternately, hotlines that don&#8217;t focus on digital\/online safety may still be able to help:<\/p>\r\n<ul>\r\n<li><a href=\"https:\/\/stopstalkerware.org\/\" rel=\"nofollow\">The Coalition Against Stalkerware<\/a> has three hotlines (one in Germany, two in the US) listed at the bottom of their website.<\/li>\r\n<li>The <a href=\"https:\/\/www.cybercivilrights.org\/contact-us\/\" rel=\"nofollow\">Cyber Civil Rights Initiative has a crisis helpline<\/a> for victims of nonconsensual pornography or other forms of online abuse.<\/li>\r\n<li>Freemuse offers <a href=\"https:\/\/freemuse.org\/artist-assistance\/\" rel=\"nofollow\">artist assistance<\/a> to artists at risk of threats, attacks, imprisonments, or exile.<\/li>\r\n<\/ul>\r\n<p>If someone else has taken control of your accounts:<\/p>\r\n<ul>\r\n<li>See Consumer Reports Security Planners&#8217; <a href=\"https:\/\/securityplanner.consumerreports.org\/tool\/regain-control-of-hacked-accounts\" rel=\"nofollow\">list of instructions on regaining access<\/a>.<\/li>\r\n<\/ul>\r\n<p>If you&#8217;ve been a victim of an online scam, fraud or ransomware:<\/p>\r\n<ul>\r\n<li>See Microsoft&#8217;s <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3\" rel=\"nofollow\">list of government fraud and scam reporting websites<\/a> (scroll down to &#8220;What to do if you already paid&#8221;).<\/li>\r\n<\/ul>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4a6.png\" alt=\"sweat_drops\" width=\"20\" height=\"20\" \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/2753.png\" alt=\"question\" width=\"20\" height=\"20\" \/> Other recommendations<\/h2>\r\n<p>This section is a catch-all for difficult or esoteric practices that do not fall under any of our scenarios above and might not lead to an immediate payoff for the casual user.<\/p>\r\n<h4>Emails<\/h4>\r\n<ul>\r\n<li>Sign up for a <a href=\"https:\/\/protonmail.com\/\" rel=\"nofollow\">Protonmail<\/a> or <a href=\"https:\/\/tutanota.com\/\" rel=\"nofollow\">Tutanota<\/a> end-to-end encrypted email account.<\/li>\r\n<li>Use PGP to secure your emails.<\/li>\r\n<\/ul>\r\n<h4>File storage &amp; sharing<\/h4>\r\n<ul>\r\n<li>Use an end-to-end encrypted cloud storage service (not Dropbox): <a href=\"https:\/\/tresorit.com\/\" rel=\"nofollow\">Tresorit<\/a>, <a href=\"https:\/\/spideroak.com\/\" rel=\"nofollow\">SpiderOak<\/a>.<\/li>\r\n<li>Use encrypted external USB\/hard drives from companies like <a href=\"https:\/\/www.apricorn.com\/\" rel=\"nofollow\">Apricorn<\/a>.<\/li>\r\n<li>If you want to send a file anonymously, use a special sharing service like <a href=\"https:\/\/onionshare.org\/\" rel=\"nofollow\">OnionShare<\/a>.<\/li>\r\n<li>Instead of Google Docs or Microsoft Office, use <a href=\"https:\/\/cryptpad.fr\" rel=\"nofollow\">CryptPad<\/a> or <a href=\"https:\/\/standardnotes.org\/\" rel=\"nofollow\">Standard Notes<\/a> (both are open-source and end-to-end encrypted).<\/li>\r\n<\/ul>\r\n<h4>Messaging apps<\/h4>\r\n<ul>\r\n<li>WhatsApp additional settings:\r\n<ul>\r\n<li>To be 100% end-to-end encrypted, turn off chat backups on WhatsApp (<code>Settings \u2192 Chats \u2192 Chat backup<\/code>) and delete your previous backups (instructions for <a href=\"https:\/\/www.wikihow.com\/Delete-Backups-on-WhatsApp-on-iPhone-or-iPad\" rel=\"nofollow\">iOS<\/a>, <a href=\"https:\/\/faq.whatsapp.com\/en\/android\/30030306\" rel=\"nofollow\">Android<\/a>).<\/li>\r\n<li>Turn on security notifications on WhatsApp (<code>Settings \u2192 Account \u2192 Security<\/code>).<\/li>\r\n<li>Set up a pin number (<code>Settings \u2192 Account \u2192 Two-Step Verification<\/code>) and email address (<code>Account \u2192 Two-step verification \u2192 tap Add Email Address<\/code>) to prevent your account from being moved without your permission.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Telegram:\r\n<ul>\r\n<li>Use only the <code>Secret Chat<\/code> function for secure chats (note that this means your messages will not show up in your desktop or web app)<\/li>\r\n<li>Only allow your contacts to add \/ find your account<\/li>\r\n<li>Turn on self-destruct timers for your Secret Chat.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Apple Messages:\r\n<ul>\r\n<li>Auto-delete messages after a year: `Settings \u2192 Messages \u2192 Keep Messages \u2192 1 Year.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Check these two lists of secure messaging apps (<a href=\"https:\/\/www.securemessagingapps.com\/\" rel=\"nofollow\">Secure Messaging Apps Comparison<\/a> and <a href=\"https:\/\/inteltechniques.com\/messaging.html\" rel=\"nofollow\">IntelTechnique&#8217;s Messaging<\/a>) to learn more about security considerations beyond end-to-end encryption and what trade-offs you may be OK with.<\/li>\r\n<\/ul>\r\n<h4>Hosting\/running a website<\/h4>\r\n<ul>\r\n<li>Read <a href=\"https:\/\/edri.org\/ethical-web-dev\/\" rel=\"nofollow\">this EDRi guide on ethical website development and maintenance<\/a>. Pay special attention to its privacy recommendations.<\/li>\r\n<li>Protect your website (from DDOS attacks and other things) by using:\r\n<ul>\r\n<li><a href=\"https:\/\/deflect.ca\/\" rel=\"nofollow\">Deflect<\/a> (has free plan for non-profits).<\/li>\r\n<li><a href=\"https:\/\/www.cloudflare.com\/\" rel=\"nofollow\">Cloudflare<\/a> (has <a href=\"https:\/\/www.cloudflare.com\/galileo\/\" rel=\"nofollow\">free plan<\/a> for arts, human rights, civil society, journalism, or democracy organizations).<\/li>\r\n<li><a href=\"https:\/\/projectshield.withgoogle.com\" rel=\"nofollow\">Project Shield<\/a> from Google: only available for news, human rights and election monitoring sites.<\/li>\r\n<li><a href=\"https:\/\/wordpress.org\/plugins\/wordfence\/\" rel=\"nofollow\">Wordfence<\/a> and <a href=\"https:\/\/wordpress.org\/plugins\/better-wp-security\/\" rel=\"nofollow\">iThemes Security<\/a> plug-ins for WordPress.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<li>Consider switching to a more privacy-oriented hosting service like <a href=\"https:\/\/greenhost.net\/\" rel=\"nofollow\">Greenhost<\/a> or one of these recommendations from <a href=\"https:\/\/www.geckoandfly.com\/32144\/anonymous-offshore-web-hosting\/\" rel=\"nofollow\">Gecko &amp; Fly<\/a> and <a href=\"https:\/\/www.privacytools.io\/providers\/hosting\/\" rel=\"nofollow\">PrivacyTools<\/a>.<\/li>\r\n<li>Set up a <a href=\"https:\/\/securitytxt.org\/\" rel=\"nofollow\">security.txt<\/a> so that researchers have a place to disclose security vulnerabilities.<\/li>\r\n<\/ul>\r\n<h4>Other<\/h4>\r\n<ul>\r\n<li>Buy a <a href=\"https:\/\/www.yubico.com\/products\/\" rel=\"nofollow\">YubiKey<\/a> USB key to use for two-factor authentication. If you work in free speech\/press\/internet, you may qualify for a free <a href=\"https:\/\/www.yubico.com\/about\/about-us\/free-speech-program\/\" rel=\"nofollow\">Yubico for Free Speech<\/a>.<\/li>\r\n<li>Keep less information\/data\/photos on your devices \u2013 you can&#8217;t lose what you don&#8217;t have.<\/li>\r\n<li>Don&#8217;t use smart TVs or smart speakers.<\/li>\r\n<li>Turn suspicious PDFs into safe ones using <a href=\"https:\/\/dangerzone.rocks\/\" rel=\"nofollow\">Dangerzone<\/a>.<\/li>\r\n<li>Search the web anonymously with <a href=\"http:\/\/duckduckgo.com\/\" rel=\"nofollow\">DuckDuckGo<\/a>.<\/li>\r\n<li>Access Facebook with more anonymity and\/or bypass internet filtering by using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Facebookcorewwwi.onion\" rel=\"nofollow\">its onion service<\/a>.<\/li>\r\n<li>If you (or your organization) is really wedded to the Google Suite, consider <a href=\"https:\/\/www.wired.com\/story\/google-advanced-protection\/\" rel=\"nofollow\">Google&#8217;s Advance Protection program<\/a>.<\/li>\r\n<li>Put your smart cards\/passports\/phones in a Faraday bag that blocks signals from going in and out. (See <a href=\"https:\/\/micahflee.com\/2015\/11\/some-thoughts-on-faraday-bags-and-operational-security\/\" rel=\"nofollow\">Micah Lee&#8217;s guide on them<\/a>.)<\/li>\r\n<li>Use <a href=\"https:\/\/onetimesecret.com\/\" rel=\"nofollow\">One Time<\/a> to send a password-protected, self-destructing message.<\/li>\r\n<li>Use a more secure operating system: <a href=\"https:\/\/ssd.eff.org\/en\/module\/keeping-your-data-safe\" rel=\"nofollow\">Tails<\/a> (works off of a USB stick) or <a href=\"https:\/\/www.qubes-os.org\/\" rel=\"nofollow\">Qubes OS<\/a>.<\/li>\r\n<li>For Android users: Download apps using <a href=\"https:\/\/f-droid.org\" rel=\"nofollow\">F-Droid<\/a>, an open-source, security-focused app store.<\/li>\r\n<li>For US residents: Freeze your credit to prevent bad actors from accessing or mis-using your personal information. See IntelTechniques&#8217; <a href=\"https:\/\/inteltechniques.com\/data\/workbook.pdf\" rel=\"nofollow\">Credit Freeze Guide<\/a> for details.<\/li>\r\n<\/ul>\r\n<hr \/>\r\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f3c6.png\" alt=\"trophy\" width=\"20\" height=\"20\" \/> Oh my, you made it this far.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f3c6.png\" alt=\"trophy\" width=\"20\" height=\"20\" \/> You are a true champ!<\/strong><\/p>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f9e0.png\" alt=\"brain\" width=\"20\" height=\"20\" \/> Other resources<\/h2>\r\n<p>We consulted many sources and drew upon our own experiences in creating this resource. If you&#8217;re not finding quite what you want here, we recommend checking out these other resources:<\/p>\r\n<ul>\r\n<li><a href=\"https:\/\/securityplanner.consumerreports.org\/\" rel=\"nofollow\">Consumer Report&#8217;s Security Planner<\/a><\/li>\r\n<li><a href=\"https:\/\/ssd.eff.org\/\" rel=\"nofollow\">The Electronic Frontier Foundation&#8217;s Surveillance Self-Defense<\/a><\/li>\r\n<\/ul>\r\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/unicode\/1f4dd.png\" alt=\"memo\" width=\"20\" height=\"20\" \/> License<\/h2>\r\n<p>This work is licensed under a <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/\" rel=\"nofollow\">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License<\/a>.<\/p>\r\n<h2>?? Special thanks<\/h2>\r\n<p>Special thanks to the students at the School of Journalism and Communication at the Chinese University of Hong Kong, and to <a href=\"https:\/\/github.com\/narwhalacademy\/zebra-crossing\/graphs\/contributors\">our GitHub contributors<\/a>.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">This\u00a0<a href=\"https:\/\/github.com\/narwhalacademy\/zebra-crossing\" target=\"_blank\" rel=\"noreferrer noopener\">article<\/a> originally appeared on <a href=\"https:\/\/github.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-type=\"URL\" data-id=\"https:\/\/github.com\/\">github.com<\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Note from mine (Daniel Alomar) I will recommend to use andOTP (Android) or freeOTP\u00a0 (iOS) as a OTP app manager instead Google Authenticator\u00a0 and Authy. Both have telemetry. AndOTP is an opensource OTP app that contains no tracker, furthermore, it has PIN protection.. Who this guide is for You use the internet on a day-to-day &hellip; <a href=\"https:\/\/coneixement.info\/blog\/zebra-zebra-crossing-an-easy-to-use-digital-safety-checklist\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Zebra Crossing: an easy-to-use digital safety checklist<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[41,1],"tags":[],"class_list":["post-498","post","type-post","status-publish","format-standard","hentry","category-security","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/posts\/498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/comments?post=498"}],"version-history":[{"count":5,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/posts\/498\/revisions"}],"predecessor-version":[{"id":519,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/posts\/498\/revisions\/519"}],"wp:attachment":[{"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/media?parent=498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/categories?post=498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coneixement.info\/blog\/wp-json\/wp\/v2\/tags?post=498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}