{"id":202196,"date":"2017-06-29T10:50:58","date_gmt":"2017-06-29T14:50:58","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/brazilian-site-teaches-journalists-how-to-protect-sources-and-personal-data-from-digital-attacks-knight-center-for-journalism-in-the-americas-blog\/"},"modified":"2017-06-29T10:50:58","modified_gmt":"2017-06-29T14:50:58","slug":"brazilian-site-teaches-journalists-how-to-protect-sources-and-personal-data-from-digital-attacks-knight-center-for-journalism-in-the-americas-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/brazilian-site-teaches-journalists-how-to-protect-sources-and-personal-data-from-digital-attacks-knight-center-for-journalism-in-the-americas-blog\/","title":{"rendered":"Brazilian site teaches journalists how to protect sources and personal data from digital attacks &#8211; Knight Center for Journalism in the Americas (blog)"},"content":{"rendered":"<p><p>    Metadata? Encryption? Backdoor? Tor Browser? VPN? PGP? When it    comes to digital security for journalists, the amount of    technical terms and acronyms can be scary. But tools to ensure    online privacy can be crucial to protecting sources, which is    why the site Privacidade para    Jornalistas (Privacy for Journalists) has been launched in    Brazil.  <\/p>\n<p>    On the site, a threat analysis helps you understand the best    ways to combat surveillance, hacking, and the collection and    retention of data from various adversaries, from governments to    casual gossipers, to corporations and criminals. The initiative    is based on Australias Privacy for    Journalists, a project from the non-profit organization    CryptoAustralia.  <\/p>\n<p>    Since Brazilian journalist Raphael Hernandes launched his    platform on March 6, 2017, he has been sought by colleagues in    the newsroom who need tips on how to protect themselves in    their investigations. Hernandes is data journalist at Folha de    S. Paulo, where he offered a small workshop on the subject.    According to him, the issue of privacy has aroused interest    among colleagues.  <\/p>\n<p>    \"You can see that whoever accesses [the site] is interested.    They spend a lot of time on pages and sees multiple pages per    visit (average of 6), which shows interest in content. There    are a lot of things we do not look at everyday, at how exposed    we are,\" Hernandes told the Knight Center.  <\/p>\n<p>    The site that served as inspiration for Hernandes came from the    personal initiative of information security specialist Gabor    Szathmari, president of CryptoAustralia. He worked with the        Walkley Foundation at CryptoParty Sydney, an event to teach    digital safety rules to journalists.  <\/p>\n<p>    I thought if I had to develop the training materials for the    workshop, why I should not publish them for the benefit of the    whole journalist community in Australia and beyond? I have    looked around, and although I found heaps of valuable materials    online, I did not find any privacy and security tutorials that    were addressing the specifics in Australia, Szathmari told the    Knight Center.  <\/p>\n<p>    Raphael Hernandes explained to the Knight    Center that it is important to understand what    protection to use in each case.  <\/p>\n<p>    The secrecy of our sources is one of the most important things    we have. If its a person we talk to every day, theres no need    to hide him or her, but maybe the source is sending something    sensitive and its important to encrypt. We should not live in    paranoia, but think about our sources and what they need. Its    treating a cold with cold medicine, not with a cannonball, he    said.  <\/p>\n<p>    According to Hernandes, the discussion is especially relevant    in Brazil. In the countrys Civil Framework for the Internet,    providers are supposed to collect and retain navigation data    for one year. A court order is required to access these    metadata, but     a bill in the Chamber of Deputies wants to remove this    requirement.  <\/p>\n<p>    For Hernandes, this scenario leaves a situation where    journalists and individuals should leave as few traces as    possible  which he assures is not a difficult task.  <\/p>\n<p>    In fact, there are things that are more advanced, such as    setting up     GlobaLeaks (a secure file and message exchange tool). But    were here to help. And apart from that, most are tools we can    use at home anytime. It may seem difficult at first, but more    so because it has words that we do not use every day, such as    back door (software that allows remote access to the    computer), he said.  <\/p>\n<p>    According to Szathmari, the most basic security measures    include replacing messaging programs like Messenger and Skype    for encrypted platforms, like Signal and Wire. In more    sensitive cases, other measures are necessary. Finally, leave    your smartphone home if you are meeting with the source, as it    is a spying machine. I suggest avoiding a computer altogether    and dusting off that good old reporters notebook for very    sensitive notes, he said.  <\/p>\n<p>    Concerns about digital security are not unique to Brazil or    Australia. Several journalism organizations around the world,    such as the Committee    to Protect Journalists (CPJ), have sections dedicated to    the topic. Other organizations dedicated to digital security,    such as the Electronic    Frontier Foundation, offer specific tips and guides for    journalists and their sources.  <\/p>\n<p>    Here are some basic protection tools, according to    Raphael Hernandes:  <\/p>\n<p>        Encryption of HD and flash drives - Encryption places a    password on hard drives and USB devices, which protect sources    and personal files in case the equipment is lost or stolen.  <\/p>\n<p>    Two-Step    Authentication - Used for online banking access, it can be    configured in your email and social networks. Login is done    with something you know (your password) and something you have    (a code sent to your smartphone, for example). This avoids    problems even if you have compromised passwords.  <\/p>\n<p>        Signal - Application available for encrypted message    smartphones. If the cell phone is intercepted, no one can    understand what was written there.  <\/p>\n<p>    Sync.com - Free cloud    storage system. It uses the zero-knowledge protocol, meaning it    stores information but does not know what is being stored. As a    rule, the websites we use commonly scan the files and pass    reports to the authorities. Sync is encrypted and more secure,    very simple to use.  <\/p>\n<p>        PGP - Pretty Good Privacy acronym. It's a way to encrypt    emails. Like a kind of chest, but with two keys: one to lock    and the other to unlock. You give the key that locks the chest    so people can send you files and messages. But only you have    the keys to unlock the content.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/knightcenter.utexas.edu\/blog\/00-18527-brazilian-site-teaches-journalists-how-protect-sources-and-personal-data-digital-attac\" title=\"Brazilian site teaches journalists how to protect sources and personal data from digital attacks - Knight Center for Journalism in the Americas (blog)\">Brazilian site teaches journalists how to protect sources and personal data from digital attacks - Knight Center for Journalism in the Americas (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Metadata? Encryption? Backdoor <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/brazilian-site-teaches-journalists-how-to-protect-sources-and-personal-data-from-digital-attacks-knight-center-for-journalism-in-the-americas-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-202196","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202196"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=202196"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202196\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=202196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=202196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=202196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}