Download the PDF here. TABLE OF CONTENTS Introduct […]
Recent Posts
The new risks of reporting in Hong Kong
“Encryption at rest”, the key to data privacy
Contrary to popular belief, just using a password […]
Nine ways journalists can improve their password security
A password could be a journalist’s last line of pr […]
ProtonMail vs Tutanota: which secure email software should journalists use?
Cybersecurity expert Ben Finn compares two securit […]
Need to communicate while offline? Try a mesh messaging app
Internet access can become a scarce luxury when re […]
Why journalists must always have their VPNs switched on
Every journalist should use a VPN (virtual private […]
Can I trust this app? A handy checklist for journalists
Can I trust this app? To help journalists answer t […]
How to be safe while using Signal
Following rumours of a cyberattack on encrypted me […]
Tech expert: Journalists must be aware of the dangers of metadata
In an interview conducted by Reporters Without Bor […]
How to escape from the prying eyes of ISPs
Journalists should learn how to protect themselves […]
Build resilience to trauma by focusing on your values
Focusing on oneself and one’s own values is a prov […]
Why journalists should prefer using applications with end-to-end encryption
The presence of end-to-end encryption (E2EE) in me […]