Phishing means that adversaries try to get a user's credentials, such as log-in information, without the user's consent. This can, for example, be ...
Read More
Two Factor Authentication
The term Two-Factor Authentication (2FA) means that you need a second credential to log-in to your account in addition to your password. This is ...
Read More
Passwords and password management
The most important things about passwords you need to know are: Every password should only be used for one service, and should be strong ...
Read More
Dangerous Errors
Digital Security can be a complex thing. Especially if you think you’re doing something securely while the opposite is true. In this section, we ...
Read More
Threat Check
When it comes to digital security, it can be hard to know where to begin. To make it as simple as possible, DW Akademie has created Threat Check, an ...
Read More
How to hide your identity
Staying anonymous on the internet is a tough challenge – some say, it is impossible nowadays. There are in fact a lot of things journalists ...
Read More
What anonymisation means – and what it doesn’t
The internet only works with data, and the data may be linked to an identity. There will never be an internet without data – so there will never ...
Read More
Factors that can compromise anonymity
There are several kinds of data that may compromise users' anonymity online. The most important are as follows, but are not limited to ...
Read More
Key questions for anonymisation tools
Is the product Open Source? Open Source means that the code of a programme is publicly available. Everybody can review it, search for ...
Read More
Encryption: How to secure communication?
Encryption can be a powerful technique to protect your communication. In that chapter, we explain what types of encryption exist, what questions ...
Read More