Online survival Kit
Online survival Kit
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices.
Digital security, the basics
Before you even think about making your computer secure or installing software for encrypting communications or data, you should adopt some good habits by following these common sense tips to help you avoid having your email account or computer hacked. You don't need to be an IT specialist to follow these tips.
Secure your browsing
When you access the web on your laptop or computer, you use the http protocol (hyper text transfer protocol). A protocol is a set of rules and requirements that allow two machines to communicate with each other. Https is the secure version of the http protocol.
Fifteen minutes of online anonymity
Making sure that your communications and data are confidential is not easy. Many encryption tools are available but it can take ages to learn how to use them, to learn how to avoid leaving clues or tracks that will allow others to intercept a message or identify who sent it. So that you don’t have to spend the next three years training to become a security expert,
Jean-Marc Manach,a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
Virtual Private Network (VPN)
This technology, widely used in the business world, allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users. Only they will by allowed access (hence the term “private”) and data sent via the tunnel is encrypted. This guarantees that data sent by VPN users will be illegible to any third party in the event of malicious interception such as espionage or intrusion.
Metadata - your files talk for you
Did you know this? When you send a document, a lot of data goes with it. But few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history. The hidden data depend on the file format and the software used to create it.
A practical guide to protecting your identity and security when using mobile phones
Many activists have been tracked via their mobile phones, and some countries conduct surveillance more extensively than others. You need to assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
Using TrueCrypt to protect your data
TrueCrypt is a software application that allows you to encrypt a single file, an entire partition on a hard disk or a storage device such as a USB flash drive. Encrypting data makes information inaccessible to an unauthorized third party. If your computer (or your USB flash drive) is lost or stolen, no one can access the encrypted data without knowing the password you set.
Tails: The amnesic Incognito Live System
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy. It allows you to use the Internet anonymously almost everywhere online and on any computer, but leaves no trace of what you have done, unless you want to.
Sending encrypted emails using Thunderbird and PGP
More than 200 billion e-mails are sent worldwide every day. Although it is a very practical tool for exchanging information, it is also vulnerable and users can encounter problems such as interception, identity theft and monitoring. Yet there are easy ways to ensure your Internet activities remain confidential.
Improve your privacy and security on the Internet using Tor
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network. If you can't find the answer to your question in this document, email firstname.lastname@example.org.
How to blog anonymously
There are number of ways you can hide your identity when using the Internet. Any path towards anonymity needs to consider local conditions, your own tech- nical competence and your level of paranoia. If you're worried that what you're posting could put you at risk and you're capable of installing it, posting to a blog through Tor is a very good idea. If you don' really need to be anonymous, don't be. If your name is associated with your words, people are likely to take your words seriously. But some people are going to need to be anonymous. Don't use these techniques unless you really need to