{"id":202660,"date":"2017-06-30T16:54:27","date_gmt":"2017-06-30T20:54:27","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/here-brazilian-journalists-learn-privacy-for-themselves-and-their-sources-brazzil-com\/"},"modified":"2017-06-30T16:54:27","modified_gmt":"2017-06-30T20:54:27","slug":"here-brazilian-journalists-learn-privacy-for-themselves-and-their-sources-brazzil-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/here-brazilian-journalists-learn-privacy-for-themselves-and-their-sources-brazzil-com\/","title":{"rendered":"Here Brazilian Journalists Learn Privacy for Themselves and Their Sources &#8211; Brazzil.com"},"content":{"rendered":"<p><p>    Metadata? Encryption? Backdoor? Tor Browser? VPN? PGP? When it    comes to digital security for journalists, the amount of    technical terms and acronyms can be scary. But tools to ensure    online privacy can be crucial to protecting sources, which is    why the site Privacidade para Jornalistas (Privacy for    Journalists) has been launched in Brazil.  <\/p>\n<p>    On the site, a threat analysis helps you understand the best    ways to combat surveillance, hacking, and the collection and    retention of data from various adversaries, from governments to    casual gossipers, to corporations and criminals. The initiative    is based on Australias Privacy for Journalists, a project from    the non-profit organization CryptoAustralia.  <\/p>\n<p>    Since Brazilian journalist Raphael Hernandes launched his    platform on March 6, 2017, he has been sought by colleagues in    the newsroom who need tips on how to protect themselves in    their investigations. Hernandes is data journalist at Folha de    S. Paulo, where he offered a small workshop on the subject.    According to him, the issue of privacy has aroused interest    among colleagues.  <\/p>\n<p>    You can see that whoever accesses [the site] is interested.    They spend a lot of time on pages and sees multiple pages per    visit (average of 6), which shows interest in content. There    are a lot of things we do not look at everyday, at how exposed    we are, Hernandes told the Knight Center.  <\/p>\n<p>    The site that served as inspiration for Hernandes came from the    personal initiative of information security specialist Gabor    Szathmari, president of CryptoAustralia. He worked with the    Walkley Foundation at CryptoParty Sydney, an event to teach    digital safety rules to journalists.  <\/p>\n<p>    I thought if I had to develop the training materials for the    workshop, why I should not publish them for the benefit of the    whole journalist community in Australia and beyond? I have    looked around, and although I found heaps of valuable materials    online, I did not find any privacy and security tutorials that    were addressing the specifics in Australia, Szathmari told the    Knight Center.  <\/p>\n<p>    Raphael Hernandes explained to the Knight Center that it is    important to understand what protection to use in each case.  <\/p>\n<p>    The secrecy of our sources is one of the most important things    we have. If its a person we talk to every day, theres no need    to hide him or her, but maybe the source is sending something    sensitive and its important to encrypt. We should not live in    paranoia, but think about our sources and what they need. Its    treating a cold with cold medicine, not with a cannonball, he    said.  <\/p>\n<p>    According to Hernandes, the discussion is especially relevant    in Brazil. In the countrys Civil Framework for the Internet,    providers are supposed to collect and retain navigation data    for one year. A court order is required to access these    metadata, but a bill in the Chamber of Deputies wants to remove    this requirement.  <\/p>\n<p>    For Hernandes, this scenario leaves a situation where    journalists and individuals should leave as few traces as    possible  which he assures is not a difficult task.  <\/p>\n<p>    In fact, there are things that are more advanced, such as    setting up GlobaLeaks (a secure file and message exchange    tool). But were here to help. And apart from that, most are    tools we can use at home anytime. It may seem difficult at    first, but more so because it has words that we do not use    every day, such as back door (software that allows remote    access to the computer), he said.  <\/p>\n<p>    According to Szathmari, the most basic security measures    include replacing messaging programs like Messenger and Skype    for encrypted platforms, like Signal and Wire. In more    sensitive cases, other measures are necessary.  <\/p>\n<p>    Finally, leave your smartphone home if you are meeting with    the source, as it is a spying machine. I suggest avoiding a    computer altogether and dusting off that good old reporters    notebook for very sensitive notes, he said.  <\/p>\n<p>    Concerns about digital security are not unique to Brazil or    Australia. Several journalism organizations around the world,    such as the Committee to Protect Journalists (CPJ), have    sections dedicated to the topic. Other organizations dedicated    to digital security, such as the Electronic Frontier    Foundation, offer specific tips and guides for journalists and    their sources.  <\/p>\n<p>    Here are some basic protection tools, according to Raphael    Hernandes:  <\/p>\n<p>    Encryption of HD and flash drives  Encryption places a    password on hard drives and USB devices, which protect sources    and personal files in case the equipment is lost or stolen.  <\/p>\n<p>    Two-Step Authentication  Used for online banking access, it    can be configured in your email and social networks. Login is    done with something you know (your password) and something you    have (a code sent to your smartphone, for example). This avoids    problems even if you have compromised passwords.  <\/p>\n<p>    Signal  Application available for encrypted message    smartphones. If the cell phone is intercepted, no one can    understand what was written there.  <\/p>\n<p>    Sync.com  Free cloud storage system. It uses the    zero-knowledge protocol, meaning it stores information but does    not know what is being stored. As a rule, the websites we use    commonly scan the files and pass reports to the authorities.    Sync is encrypted and more secure, very simple to use.  <\/p>\n<p>    PGP  Pretty Good Privacy acronym. Its a way to encrypt    emails. Like a kind of chest, but with two keys: one to lock    and the other to unlock. You give the key that locks the chest    so people can send you files and messages. But only you have    the keys to unlock the content.  <\/p>\n<p>    This article appeared originally in Journalism in the Americas     <a href=\"https:\/\/knightcenter.utexas.edu\/\" rel=\"nofollow\">https:\/\/knightcenter.utexas.edu\/<\/a>  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/brazzil.com\/brazilian-journalists-learn-privacy-sources\/\" title=\"Here Brazilian Journalists Learn Privacy for Themselves and Their Sources - Brazzil.com\">Here Brazilian Journalists Learn Privacy for Themselves and Their Sources - Brazzil.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Metadata? Encryption? Backdoor?  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/here-brazilian-journalists-learn-privacy-for-themselves-and-their-sources-brazzil-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-202660","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202660"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=202660"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202660\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=202660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=202660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=202660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}