Open in app

Sign In

Write

Sign In

Martin Shelton
Martin Shelton

1.5K Followers

Home

About

Feb 27, 2021

Bitwarden for Beginners

Passwords are often the only thing standing between a hacker and your online accounts. This guide will introduce you to using Bitwarden to create strong, unique passwords. As a bonus, we’ll show how password managers can also help you save time when filling out login screens and online forms. It’s…

Security

6 min read

Bitwarden for Beginners
Bitwarden for Beginners
Security

6 min read


Nov 9, 2018

Locking Down Signal: A Guide for Journalists

The encrypted messaging app, Signal, is quickly becoming a newsroom staple for communicating with sources, accepting tips, talking to colleagues, and for regular old voice calls and messages. While it’s a practical tool for anyone concerned with the security and privacy of their conversations, people working in newsrooms are particularly…

Privacy

11 min read

Locking Down Signal: A Guide for Journalists
Locking Down Signal: A Guide for Journalists
Privacy

11 min read


Jul 25, 2018

Two-Factor Authentication for Beginners

Passwords are the brittle wall that keep unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available. Two-factor authentication (or 2FA, for short) strengthens login security by requiring a second piece of information — a second factor beyond…

Security

8 min read

Two-Factor Authentication for Beginners
Two-Factor Authentication for Beginners
Security

8 min read


Jul 5, 2018

What Does Private Browsing Mode Do?

Most popular web browsers support two types of windows: ordinary windows and “private browsing” mode. Sometimes private browsing goes by a different name, such as InPrivate mode in Microsoft Edge, or Incognito mode in Google Chrome, but we’ll just call it private browsing. I research how people understand the web…

Privacy

6 min read

What Does Private Browsing Mode Do?
What Does Private Browsing Mode Do?
Privacy

6 min read


Jul 3, 2018

How to GIF

We love animated GIFs because they let us communicate so much with so little. They’re visual, cyclical, and easy to share — powerful features for communicating unfamiliar concepts to an unfamiliar audience. This is why we think it’s important to learn how GIFs can be used strategically in education. …

GIF

6 min read

How to GIF
How to GIF
GIF

6 min read


Jan 19, 2018

Wire for Beginners

In the crowded world of encrypted messaging apps, few tools stand out. Wire gives you encrypted voice calls, video calls, and messaging. It uses wireless data (through a mobile plan or wi-fi), which can help save money on phone calls and SMS charges. This is great for those of us…

Privacy

8 min read

Wire for Beginners
Wire for Beginners
Privacy

8 min read


Dec 1, 2017

In the Face of Supply Chain Attacks, Stay the Course

We’re witnessing the growth of attacks on supply chains — trusted distribution channels for delivering software and hardware. I want to tell you a bit about these attacks, because you’re going to hear more reporting about them in the future. Supply chain attacks typically turn trusted websites into hosts for…

Security

5 min read

In the Face of Supply Chain Attacks, Stay the Course
In the Face of Supply Chain Attacks, Stay the Course
Security

5 min read


Sep 19, 2017

Using Signal Without Giving Your Phone Number

Encrypted messaging apps like Signal, as well as WhatsApp and Viber, use your phone number as your main username. This means that if I want to chat with someone on these apps, I have to give them my phone number. But we may have many reasons — both practical and…

Security

7 min read

Using Signal Without Giving Your Phone Number
Using Signal Without Giving Your Phone Number
Security

7 min read


Aug 18, 2017

How Reporters Can Prepare for Malicious Software

Computers are fragile things. You have to take care of them. When you don’t, their powers can be borrowed or stolen. Malware lets an unauthorized third party access or take control of your device. In practice, it’s become a catch-all term for a huge variety of malicious software. That could…

Security

8 min read

How Reporters Can Prepare for Malicious Software
How Reporters Can Prepare for Malicious Software
Security

8 min read


Jul 14, 2017

How to Lose Friends and Anger Journalists with PGP

A few years ago I began sending hundreds of emails to strangers — many, encrypted. I was launching into my graduate research on the security habits of investigative reporters, and I wanted to hear from journalists with a variety of backgrounds. If I wanted to meet technologically savvy reporters, I…

Security

8 min read

How to Lose Friends and Anger Journalists with PGP
How to Lose Friends and Anger Journalists with PGP
Security

8 min read

Martin Shelton

Martin Shelton

1.5K Followers

Writing about security for journalists, as well as beginners. Principal researcher at @freedomofpress. freedom.press/training

Following
  • Cory Doctorow

    Cory Doctorow

  • United States Digital Service

    United States Digital Service

  • Simon Rogers

    Simon Rogers

  • Hunter Walk

    Hunter Walk

  • Nick Diakopoulos

    Nick Diakopoulos

See all (463)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech