Do you know how a VPN works? Do you know what the Tor browser protects you against? Test your knowledge!
Recent Posts
Test 2: Account security
Do you know what a strong password looks like? Do you know what two-factor authentication means? Test your knowledge!
Test 1: Encryption
Do you know what end-to-end encryption means? Can you find out who knows what about your encrypted communication? Test your knowledge!
How to respond appropriately to online hate speech
Hate speech is one of the most common forms of online harassment journalists face. In this article, Reporters Without Borders (RSF) gives advice on how to respond appropriately when confronted with this phenomenon. Hate speech is one of the most prevalent forms of online harassment, whether posted on platforms or […]
Why journalists should stay away from Huawei devices
For the past ten years, connected devices from Chinese manufacturer Huawei have been decried as potentially dangerous for their users due to allegations of espionage. In this article, cybersecurity expert Ben Finn assesses for Reporters Without Borders (RSF) the state of play and gives recommendations for journalists to protect themselves […]
A checklist to prevent surveillance and digital attacks
In this article, digital security experts share with Reporters Without Borders (RSF) a checklist for journalists to protect themselves and their sources against surveillance and digital attacks. Cybersecurity is a critical concern for journalists working on sensitive issues, as they are at heightened risk of having their electronic devices hacked […]
Safely back up your data with the “3, 2, 1 rule”
In this article, cybersecurity expert Ben Finn shares with Reporters Without Borders (RSF) why journalists should always back up their files and data, and explains the simple “3, 2, 1” backup rule designed to prevent disastrous data loss. Electronic devices, crucial to the work of journalists, are vulnerable to technical […]
Biometric authentication does not guarantee a device’s safety
Many journalists wrongly think that biometric authentication features, such as fingerprints or facial recognition, are a sufficient way to protect their digital devices. Although this technology has its benefits, it is not sufficient to replace strong passwords and multi-factor authentication. Biometric authentication seems secure… A booming trend. Biometric authentication features […]
Four safety advice for reporting in a conflict zone
Journalists play an indispensable role in covering zones of conflict, which can range from protests or insurrections to guerilla warfares and all-out wars between countries. In all these situations, reporters may take actions that might endanger themselves or their sources. This article advises journalists on how to safely report in […]
Best practices for interviewing survivors of traumatic events
Many reporters throughout their career will have to interview victims of traumatic events such as wars, natural disasters, physical or moral abuse, which may feel awkward and even take an emotional toll on them. This article provides tips for journalists on how to interview survivors of traumatic events in the […]