Phishing means that adversaries try to get a user's credentials, such as log-in information, without the user's consent. This can, for example, be ...
Read More
Two Factor Authentication
The term Two-Factor Authentication (2FA) means that you need a second credential to log-in to your account in addition to your password. This is ...
Read More
Passwords and password management
The most important things about passwords you need to know are: Every password should only be used for one service, and should be strong ...
Read More
How to hide your identity
Staying anonymous on the internet is a tough challenge – some say, it is impossible nowadays. There are in fact a lot of things journalists ...
Read More
What anonymisation means – and what it doesn’t
The internet only works with data, and the data may be linked to an identity. There will never be an internet without data – so there will never ...
Read More
Factors that can compromise anonymity
There are several kinds of data that may compromise users' anonymity online. The most important are as follows, but are not limited to ...
Read More
Key questions for anonymisation tools
Is the product Open Source? Open Source means that the code of a programme is publicly available. Everybody can review it, search for ...
Read More
Encryption: How to secure communication?
Encryption can be a powerful technique to protect your communication. In that chapter, we explain what types of encryption exist, what questions ...
Read More
Encryption tools and communication services
Reporters Without Borders does not recommend specific tools and services. Digital security is complex. Individual needs have to be identified in a ...
Read More
Key questions about encryption tools
It is not easy to decide whether a tool is useful or not. As encryption can be essential for journalists and their sources, the questions as follows ...
Read More