![]() Rule 3: Know the risks and keep your activities separate.Ĭomputer experts note that is has become almost impossible for non-professionals to secure their data permanently and it would be counter-productive to encrypt all one’s communications, as this might in fact attract the attention of some authorities. Familiarise yourself with a range of simple cryptographic tools and also encourage your sources to encrypt their messages. Note that those you communicate with must use the same tools for them to work. Phone calls or online video: Firefox Hello or Qtox (more secure that Skype, whose data can theoretically be decrypted by Microsoft).Instant messaging: OTR, CryptoCat, Pidgin, Adium.Install cryptographic software and applications that you can use on assignment to encrypt emails, chat and SMS messages, making them indecipherable to anyone except the sender and recipient: Install the Tor Browser, which will allow you to browse sensitive sites anonymously via an encrypted Internet connection. NB: never connect to a Wi-Fi network without VPN. Reporters Without Borders, with help from French Data Network, a French non-profit organisation, has its own VPN server, which is available, free of charge to journalists and netizens who request it. This means they cannot be read by anyone else, making them secure against interception or hacking and will allow you to access sites that are blocked or censored in the country you are visiting. Install a Virtual Private Network (VPN) that will encrypt your Internet connections. If necessary, use a password manager such as LastPass, 1Password or KeyPass. ![]() NB: it is advisable to use different pass phrases for different applications. For example: “spider in pyjamas knitting bandanas”. Prefer longer “pass phrases”, combining random words that can be easily memorised but could not be easily deciphered by software. Lock you sessions and strengthen your passwords. Using a password each time you log in will reduce the chances of opportunistic surveillance, but a more determined hacker will be able to take control of your disk and unlock it. You are strongly advised not to carry out any updates once you are in the field because of the risk of inadvertently downloading malicious software or spyware.Įncrypt your entire hard disk, using FileVault for Mac, or TrueCrypt or BitLocker for Windows. Rule 2: On this clean slate, install your digital safety tools.Ĭarry out all recommended updates so that your operating system, browser and your anti-virus software (such as ClamXav, ClamTk, Avast, MSE, McAfee or Norton) are as secure as possible when you set off. Back up the content on another medium, which you can leave behind, and restore the phone to its factory settings.
0 Comments
Leave a Reply. |