Feb 27, 2021Bitwarden for BeginnersPasswords are often the only thing standing between a hacker and your online accounts. This guide will introduce you to using Bitwarden to create strong, unique passwords. As a bonus, we’ll show how password managers can also help you save time when filling out login screens and online forms. It’s…Security6 min readSecurity6 min read
Nov 9, 2018Locking Down Signal: A Guide for JournalistsThe encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. …Privacy11 min readPrivacy11 min read
Jul 25, 2018Two-Factor Authentication for BeginnersPasswords are the brittle wall that keep unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available. Two-factor authentication (or 2FA, for short) strengthens login security by requiring a second piece of information — a second factor beyond…Security8 min readSecurity8 min read
Jul 5, 2018What Does Private Browsing Mode Do?Most popular web browsers support two types of windows: ordinary windows and “private browsing” mode. Sometimes private browsing goes by a different name, such as InPrivate mode in Microsoft Edge, or Incognito mode in Google Chrome, but we’ll just call it private browsing. I research how people understand the web…Privacy6 min readPrivacy6 min read
Jul 3, 2018How to GIFWe love animated GIFs because they let us communicate so much with so little. They’re visual, cyclical, and easy to share — powerful features for communicating unfamiliar concepts to an unfamiliar audience. This is why we think it’s important to learn how GIFs can be used strategically in education. …GIF6 min readGIF6 min read
Jan 19, 2018Wire for BeginnersIn the crowded world of encrypted messaging apps, few tools stand out. Wire gives you encrypted voice calls, video calls, and messaging. It uses wireless data (through a mobile plan or wi-fi), which can help save money on phone calls and SMS charges. This is great for those of us…Privacy8 min readPrivacy8 min read
Dec 1, 2017In the Face of Supply Chain Attacks, Stay the CourseWe’re witnessing the growth of attacks on supply chains — trusted distribution channels for delivering software and hardware. I want to tell you a bit about these attacks, because you’re going to hear more reporting about them in the future. Supply chain attacks typically turn trusted websites into hosts for…Security5 min readSecurity5 min read
Sep 19, 2017Using Signal Without Giving Your Phone NumberEncrypted messaging apps like Signal, as well as WhatsApp and Viber, use your phone number as your main username. This means that if I want to chat with someone on these apps, I have to give them my phone number. But we may have many reasons — both practical and…Security7 min readSecurity7 min read
Aug 18, 2017How Reporters Can Prepare for Malicious SoftwareComputers are fragile things. You have to take care of them. When you don’t, their powers can be borrowed or stolen. Malware lets an unauthorized third party access or take control of your device. In practice, it’s become a catch-all term for a huge variety of malicious software. That could…Security8 min readSecurity8 min read
Jul 14, 2017How to Lose Friends and Anger Journalists with PGPA few years ago I began sending hundreds of emails to strangers — many, encrypted. I was launching into my graduate research on the security habits of investigative reporters, and I wanted to hear from journalists with a variety of backgrounds. If I wanted to meet technologically savvy reporters, I…Security8 min readSecurity8 min read