Skip to content

Latest commit

 

History

History
69 lines (45 loc) · 4.4 KB

index.md

File metadata and controls

69 lines (45 loc) · 4.4 KB
layout title
page
Introduction

Update 2022

In short: If you are a professional dealing with sensitive information, such as a journalist, doctor, lawyer, counselor, political activist:

  1. Use an iPhone in Lockdown Mode.

  2. Use Signal for end-to-end encrypted messaging and voice calls.

  3. Use a password manager and 2FA, or Apple's Passkeys.

  4. Disable JavaScript in your Browser. For further anonymity, use Tor (The Onion Router).

The remainder of this page is obsolete, but left for reference.

Overview

This is an introduction to basic information security practices ("InfoSec101") for professionals dealing with sensitive information, such as journalists, doctors, lawyers, counselors, political activists, and so forth. Contents:

Resources (partially obsolete)

  1. InfoSec101. How can you keep your information private and secure? An introduction (covering more secure passwords, browsing, chatting, etc.), including a curated, commented list of recommended software.

  2. What to do next. A concrete list of some quick and simple steps, for users of computers (OS X, Windows), and smart phones (iOS, Android), and a list of further guides.

  3. If you're not yet convinced that one ought to care about Information Security, there is some background, motivation, examples, and quotes.

  4. If you wish, you can read more on the technical background.

Presentation

This short presentation was given to the Foreign Correspondents Club in HK in February 2015. Here is an alternative version, somewhat drier, but more comprehensive.

Updates

Meta-Notes

These documents are intended as a supplement to an introductory talk on Information Security for (non-IT) professionals.

Thus:

  • They're not necessarily elaborate enough to be fully self-contained.
  • They're not meant to elucidate every aspect comprehensively and objectively, but to give some opionated advice on "the best" tool to use for users with
    • average technical IT background, and
    • somewhat above average need for privacy and security of information.

Thanks

Feedback from Joseph Bonneau, Dr Melanie Bryan, Silkie Carlo, Nan-Hie In, Michael Lee, Pete Membrey, Larry Salibra, Max Veytsman, Leonhard Weese gratefully acknowledged.