Digital Security

From WikiCorporates
Jump to navigation Jump to search


How to share information securely

  1. Signal offers secure digital communication for iOS, Android and Desktop. Contact us with your message or documents on +44 (0) 7404 911 016. Ensure your phone is secured and delete all messages once you've transmitted your information. It is also good practice to turn on the disappearing messages function.
  2. Voice call: you can phone to speak with one of our journalists, either with the Signal number above, or on this unencrypted phone line: (+44) 7522 402 548.
  3. Post: send physical mail to the address below. If you want to include data files, please include it on a USB drive, not in any other formats. openDemocracy, The Print House, 18 Ashwin Street, London, E8 3DL United Kingdom.
    Beware that physical mail, as with other forms, can be intercepted at various points on its journey. You can help to keep your package anonymous by not adding a return address or any identifying information and dropping it in a public post box.
  4. Further resources: if you wish to read more about secure communications practice, the following articles contain more useful information on the methods we have recommended.
  • Dec.2017: For Whistleblowers. Whistleblowers are crucial to exposing wrongdoing. Their information can be the lead that sparks an investigation or provide the key piece of evidence that solidifies existing findings. We are always keen to hear from whistleblowers and will always protect your identity if you want to remain anonymous. The Bureau of Investigative Journalism, '
  • Dec.2017: The Intercept Welcomes Whistleblowers. At the Intercept, we are strongly committed to publishing stories based on confidential material when it is newsworthy and serves the public interest. One of our founding principles is that whistleblowing is vital to holding powerful institutions accountable; in fact, we were launched in part as a platform for journalism arising from unauthorized disclosures by NSA contractor Edward Snowden. The Intercept_, '


Articles

  • Jun.14.2018: What is the revenue generation model for DuckDuckGo? It’s actually a big myth that search engines need to track your personal search history to make money or deliver quality search results. In fact, search advertisers buy search ads by bidding on keywords, not people. This keyword-based advertising is our primary business model. Google also makes most of their money via this same type of keyword-based advertising that doesn’t require any search-history tracking. So why do they track it all then? Because Google is not really a search company; they are an advertising company. On Google, your searches are tracked, mined, and packaged up into a data profile for advertisers to follow you around the Internet through intrusive and annoying ever-present banner ads, using Google’s massive ad networks, embedded across millions of sites and apps.Alarmingly, Google now deploys hidden trackers on 76% of websites across the web to monitor your behavior and Facebook has hidden trackers on about 25% of websites. As a result, these two companies have amassed huge data profiles on individuals, which can include interests, past purchases, search, browsing and location history, and much more. This personal data is stored indefinitely and used for invasive targeted advertising that can follow you around the Internet. The operative question is, though, is all of this tracking necessary to make substantial profits? It is a choice to squeeze every last ounce of profit at the expense of privacy, democracy and society. A choice they don’t have to make. Gabriel Weinberg, Quora.
  • Jan.25.2018: Why Metadata Matters. In the context of digital communications, metadata is the digital equivalent of an envelope—it’s information about the communications you send and receive. The subject line of your emails, the length of your conversations, and your location when communicating (as well as with whom) are all types of metadata. Metadata is often described as everything except the content of your communications. Those who collect or demand access to metadata, such as governments or telecommunications companies, argue that the disclosure (and collection) of metadata is no big deal. Unfortunately, these claims are just not true. ... ... Surveillance Self-Defense, '
  • Jan.27.2018: Privacy, simplified. Seamlessly take control of your personal information, no matter where the Internet takes you. DuckDuckGo, '
  • Jan.20.2018: Want a beginner-friendly weekend activity on learning web browser privacy? Did you know your web browser can be uniquely fingerprinted? See for yourself using EFF's Panopticlick tool from your favorite web browser. Then, try Panopticlick again from Chrome or Firefox after downloading the Privacy Badger browser extension. Twitter, @EFF
  • Jan.08.2018: Happy new year! Do you have goals for teaching about digital security and privacy? Check out our new Security Education Companion post on Your First Training. Twitter, @EFF
  • Jan.02.2018: In 2018, digital security is only going to become more important. Here are steps you can take now to lock down your digital data and protect your privacy (with animations) (1/14). Twitter, @EFF
  • Dec.27.2017: The cybersecurity nightmares of 2017 highlight the need to protect yourself. Here are some resolutions for living a safer digital life this new year. New York Times, Brian X Chen