<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Blog</title>
        <link>https://privacyforjournalists.org.au/blog.rss</link>
        <description>Privacy for Journalists RSS feed</description>
        <language>en-us</language>
        <atom:link href="https://privacyforjournalists.org.au/blog.rss" rel="self" type="application/rss+xml"/>
                        <item>
            <title>Secure Team Chat with Semaphor</title>
            <link>https://privacyforjournalists.org.au/blog/secure-team-chat-with-semaphor</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/3/2/2/5/3/32253a2dc4fca86ba5efe78773739475bc63c0c0-banner.jpeg" />
                                <p>When it comes to developing stories, you may need to collaborate with your peers. If you ever used Slack, you know how conventient it is. But what about security?</p>

<p>Unfortunately, not every tool is made equal. Apps like <a href="https://slack.com" target="_blank" rel="noopener noreferrer" class="external-link no-image">Slack</a> and <a href="https://rocket.chat" target="_blank" rel="noopener noreferrer" class="external-link no-image">Rocket</a> does not feature <a href="https://en.wikipedia.org/wiki/End-to-end_encryption" target="_blank" rel="noopener noreferrer" class="external-link no-image">end-to-end encryption</a>. It means that a third-party somewhere along the way may hand over the chat logs to the authorities when a warrant is produced.</p>
<p>SpiderOak Semaphor is a zero-knowledge collaboration tool that features end-to-end encryption. You can chat and share files with multiple partners on this platform privately, as messages can only be decrypted by your partners.</p>
<p>By following this guide, you will be able to install Sempahor on your PC. <a href="/guides/secure-team-chat-with-semaphor">Click here</a> to access the instructions</p>
<p><em>Image courtesy of <a href="https://www.flickr.com/photos/rpmarks/23011184260/" rel="nofollow noopener noreferrer" target="_blank" class="external-link no-image">R~P~M</a></em></p>
                ]]>
            </description>
            <category>windows,chat,end-to-end encryption</category>
            <guid>https://privacyforjournalists.org.au/blog/secure-team-chat-with-semaphor</guid>
            <pubDate>Thu, 25 Aug 2016 08:00:00 +1000</pubDate>
        </item>
                        <item>
            <title>Storing Files Privately in the Cloud</title>
            <link>https://privacyforjournalists.org.au/blog/storing-files-privately-in-the-cloud</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/6/5/5/8/e/6558e1b20882c6a9a78a4c07a8296eae9728379e-cover-image.png" />
                                <p>Not every cloud-based file storage solutions are made equal. Although almost each of them uses encryption to transmit and store your files, the devil is in the details. </p>
<p>Popular file storage services, such as Dropbox, have access to the file decryption keys. In other words, staff can and do access your files for things like <a href="http://www.wired.co.uk/article/dropbox-dmca-position" target="_blank" rel="noopener noreferrer" class="external-link no-image">detecting pirated media</a> in your folders, or <a href="https://www.dropbox.com/transparency" target="_blank" rel="noopener noreferrer" class="external-link no-image">fulfiling law encforcement requests</a> when being served with a warrant.</p>

<p>Fortunately, zero-knowledge, end-to-end encryption solves this problem. <a href="/guides/storing-files-privately-in-the-cloud">Our new guide</a> will walk you through the process of setting up sync.com. It is an easy-to-use, zero-knowledge file storage solution that keeps your files secure and private.</p>
<p><a href="/guides/storing-files-privately-in-the-cloud">Click here</a> to access our latest guide</p>
<p><em>Image courtesy of <a href="https://www.flickr.com/photos/8123185@N02/3659676928/in/photolist-6zoNs5-kqF23b-E2idm-nmDgh6-8nVMLr-bkL8-i532Po-nmmFK5-4PBfbk-nmmTJV-irVU66-8eMHsK-o54g8R-EQ8MR-cZyLWY-p6b1ry-d363cw-6rZYic-6eLY3J-6FhrpX-aPLo64-bUGofJ-8612dY-fBBjbK-6nBi8g-C8YWQ-fxnRxA-6u1S61-mA679z-4BmBJc-pnxSs-fpWeFp-5ucGwU-8qhkUt-dY2oAN-ffJZqK-5gueQb-5KD4i1-cpSFgN-4EjNsR-6gpV7j-5MDZUX-5fmatB-d36395-573CHc-3FZSQ2-aad8bn-mA5bdZ-7DiA7z-7R8x6j" rel="nofollow noopener noreferrer" target="_blank" class="external-link no-image">Alex Weber</a></em></p>
                ]]>
            </description>
            <category>windows,storage,end-to-end encryption</category>
            <guid>https://privacyforjournalists.org.au/blog/storing-files-privately-in-the-cloud</guid>
            <pubDate>Wed, 10 Aug 2016 23:29:00 +1000</pubDate>
        </item>
                        <item>
            <title>Choosing a Safe Search Engine</title>
            <link>https://privacyforjournalists.org.au/blog/choosing-a-safe-search-engine</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/0/c/5/7/f/0c57ffb754c4c7e8db26bc18b2736e6e82252cc4-cover.jpeg" />
                                <p>The current legislation in Australia requires service provides to retain metadata for two years. In parallel, everything you type into the search bar on Google or Bing is retained along with your IP address and other relevant details. Therefore, your Internet browsing activity can be reconstructed and linked back to you by correlating the different datasets with each other. </p>
<p>To avoid these data correlation issues, you can switch to a search engine that promises  not to retain any logs of your search queries. Read <a href="/guides/choosing-a-safe-search-engine">our latest guide</a> for search engines that does not collect and retain anything of your search activity.</p>

<p><em>Photo courtesy of <a href="https://www.flickr.com/photos/mamboman/2955720318/in/photolist-5vbQF9-cTw6Pm-7JL774-8wgoGJ-73z3EZ-8wdpfF-b58f7i-a7HwLj-cpGUM-dkTzmX-7ZWhda-9w2Uv4-7USbHd-5P2tgm-cBs75w-brwRwT-oxmngX-96D8bd-akTSR4-qctQcR-HPC7Ct-64wafZ-xt9DKA-fAjoGS-5jMEqX-ffNda9-7KWUjS-7WErzq-4GwXti-mF2gd2-6PZKZv-6b6uUm-7TUCeK-9sAzoX-dhhGjq-9KWhs8-8F4FDp-7UNW2e-6oz3KY-rxybXh-6mPiQc-fZjt2k-67MoiA-fUpqJ-91niW8-6GjiaU-68ievw-h1FPhJ-fp5n1K-4WdfTG" rel="nofollow noopener noreferrer" target="_blank" class="external-link no-image">Rainer Hungershausen</a></em></p>
                ]]>
            </description>
            <category>no metadata,storage</category>
            <guid>https://privacyforjournalists.org.au/blog/choosing-a-safe-search-engine</guid>
            <pubDate>Fri, 22 Jul 2016 12:42:00 +1000</pubDate>
        </item>
                        <item>
            <title>Encrypt your USB Drives on Windows</title>
            <link>https://privacyforjournalists.org.au/blog/encrypt-your-usb-drives-on-windows</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/a/b/0/5/4/ab054d2f0e29f88ccbbc7abb322b431ba5c7e5e1-cover.jpeg" />
                                <p>Tiny USB drives are forgotten in cafés, and prone to pickpocketing. By encrypting your portable devices, your files - and ultimately your sources - can remain safe and secure, in case your USB device vanishes into thin air.</p>
<p>BitLocker is an easy way to encrypt external USB sticks and hard disks. It is built-into Windows and super-easy to enable.</p>
<p>Follow our latest guide on <a href="/guides/encrypt-your-usb-drives-with-bitlocker-on-windows">USB drive encryption</a> to encrypt your devices today</p>

<p><em>Photo courtesy of <a href="https://www.flickr.com/photos/williamhook/3468484351/in/photolist-6huTyk-959hYV-6vCGR7-GaSBix-doB3zn-eMma9J-aQ4eg-5LtjoZ-5rgbKN-y1GPL-8Es2xt-65ae1u-61EpY7-48vv5w-8FvSqR-5Lxu61-2mLSK6-5owhpA-614eXo-6iMxve-6fE9Re-6iRHuY-5Lxu7G-6teu4j-48dBDS-6uT36D-7Dr5cQ-6R41Y7-4kKP24-5ZZ3iK-8hkNUX-okhy56-614g5y-5Lxu57-5LxzR5-8DNFZb-5ZZ3hz-5ZZ3W8-5ZZ4at-FMS7s-dfbk9R-61E6wo-6vCGEq-8DNG4L-doBaLh-99yD5H-8FvSNt-5LtjW4-8fRVuF-5hrRvx" rel="nofollow noopener noreferrer" target="_blank" class="external-link no-image">William Hook</a></em></p>
                ]]>
            </description>
            <category>encryption,windows</category>
            <guid>https://privacyforjournalists.org.au/blog/encrypt-your-usb-drives-on-windows</guid>
            <pubDate>Tue, 19 Jul 2016 10:10:00 +1000</pubDate>
        </item>
                        <item>
            <title>Encrypt your Hard Drive on Windows</title>
            <link>https://privacyforjournalists.org.au/blog/encrypt-your-hard-drive-on-windows</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/e/6/5/d/3/e65d3dd1cbb0e6c94c6c6e48645dcc1d840c595f-cover.jpeg" />
                                <p>Hard drive encryption protects from two things. Firstly, nobody can tamper with your computer (e.g. install backdoors) if you leave it unattended. Secondly, your files remain secure in case the laptop is stolen.</p>

<p>There are many situations these could happen:</p>
<ul>
<li>You are staying in a hotel and the laptop is left in your room unattended</li>
<li>Someone breaks into your apartment or office</li>
<li>The laptop is left in the trunk of the car and someone breaks into it</li>
<li>Someone snatches the device from your hands, or robs you</li>
<li>You are deliberately put into a situation that separates you from your device. For example a thorough security check at the airport</li>
</ul>
<p>Check out our latest guide on <a href="/guides/encrypt-your-hard-drive-with-bitlocker-windows">configuring full disk encryption on your Windows PC</a></p>
<p><em>Photo courtesy of <a href="https://www.flickr.com/photos/kubina/326628676/in/photolist-uS4jU-RuRJQ-pSNtAB-5K5E2k-8barTQ-uS4aw-8fgZ8a-cUqxm9-6SCgsW-5K5DbM-9WT2xB-dZa5QS-7dVtAy-f3qh8-bQSyVv-sESH1N-kHnXz-eawrQf-9mKCgk-D93MfU-8VdPPg-iJXpA4-sERPxC-jVg7DH-9BLgz-6vywui-c4g6G5-4HTgd1-rLsqRa-99Pj8a-aC3AqV-fuMvt3-66eN63-a2iA6W-9d9JB2-uS4us-dFLgaj-nAbCjW-f33vU-cQoPPY-cpba8h-BGJap-uS4zk-uS4J9-hbXubC-cZYsqf-8fkg2m-5t3dPH-8kcpkK-uS4cz" rel="nofollow noopener noreferrer" target="_blank" class="external-link no-image">Jeff Kubina</a></em></p>
                ]]>
            </description>
            <category>windows,storage</category>
            <guid>https://privacyforjournalists.org.au/blog/encrypt-your-hard-drive-on-windows</guid>
            <pubDate>Sat, 16 Jul 2016 15:22:00 +1000</pubDate>
        </item>
                        <item>
            <title>End-to-End Encrypted Video Calls</title>
            <link>https://privacyforjournalists.org.au/blog/end-to-end-encrypted-video-calls</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/c/2/c/3/1/c2c31b26fc160e98f986c1684594448f384220f2-cover.jpeg" />
                                <p>Using Skype for video calls is a bad idea. It used to be encrypted, but since Microsoft purchased them they broke the crypto. In fact, the company is willing to hand over the voice and video recordings to various law enforcement agencies <a href="https://en.wikipedia.org/wiki/Skype_security#Eavesdropping_by_design" title="Skype security" target="_blank" rel="noopener noreferrer" class="external-link no-image">without a warrant</a>.</p>
<p>The solution to this problem is end-to-end encryption again. <a href="https://wire.com" target="_blank" rel="noopener noreferrer" class="external-link no-image">Wire</a> is an easy to use app that encrypts video calls just like that. It is super easy to use and they are <a href="https://wire.com/privacy/" target="_blank" rel="noopener noreferrer" class="external-link no-image">relatively open</a> about the underlying technology.</p>
<p>Check out our latest addition to the <a href="/guides/end-to-end-encrypted-video-calls">guides here on secure video calls</a></p>

<p><em>Image courtesy of <a href="https://www.flickr.com/photos/fatherhinie/4243211124/in/photolist-7sXyQu-rpTH7v-fMTGj-b68k88-M2ad-dWSPb1-ExgZM6-6178MJ-eetrtZ-8oAvEj-5gdfsQ-CLnNvv-9d76h8-6RPYeC-PzxQm-pJVXNM-2GbdLs-8pjabh-M2ac-9AtCXB-9yhkwC-6uMWpR-drocdu-9swGgw-mjy3sP-fNepWo-hjv6rx-9BdqdR-eE8S73-5PSHzg-b1BRbt-qG33no-FNqvYL-7G7dwD-64aWQ4-8Raa52-9aNh8W-95ie4p-7Gbbdo-oDFk5S-9Awwkh-8s7QPK-M2aa-8FW4gk-sX5KsS-9AKsCq-FE9tDG-e8NU8p-qtoCJ-LZTz" target="_blank" rel="noopener noreferrer" class="external-link no-image">Father Hinie</a></em></p>
                ]]>
            </description>
            <category>chat</category>
            <guid>https://privacyforjournalists.org.au/blog/end-to-end-encrypted-video-calls</guid>
            <pubDate>Fri, 08 Jul 2016 15:30:00 +1000</pubDate>
        </item>
                        <item>
            <title>Protecting Yourself from Backdoors on your PC</title>
            <link>https://privacyforjournalists.org.au/blog/defending-against-backdoors-on-your-pc</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/8/e/d/7/5/8ed75ffc97e4189e5e5dc9a1617196aed8b50b14-backdoor.jpeg" />
                                <p>One method to monitor your activities online as well as your computer is backdoors on your computer. Since the breaches of the <a href="https://en.wikipedia.org/wiki/Hacking_Team" target="_blank" rel="noopener noreferrer" class="external-link no-image">Hacking Team</a> and <a href="https://en.wikipedia.org/wiki/FinFisher" target="_blank" rel="noopener noreferrer" class="external-link no-image">FinFisher</a>, or news from the <a href="http://www.newsweek.com/supreme-court-allows-fbi-hack-any-computer-anywhere-if-warrant-454278" target="_blank" rel="noopener noreferrer" class="external-link no-image">FBI</a>, we know that certain governmental organisations are willing to exploit computers and smartphones to install backdoors on them.</p>
<p>Check out the <a href="/guides/protect-your-pc-from-backdoors-windows">latest addition to the guides</a> on anti-malware and anti-exploit software.</p>
                ]]>
            </description>
            <category>windows,malware,backdoor,exploit,virus</category>
            <guid>https://privacyforjournalists.org.au/blog/defending-against-backdoors-on-your-pc</guid>
            <pubDate>Thu, 07 Jul 2016 17:40:00 +1000</pubDate>
        </item>
                        <item>
            <title>Launching &#039;Privacy for Journalists&#039;</title>
            <link>https://privacyforjournalists.org.au/blog/launching-the-privacy-for-journalists-website</link>
            <description>
                <![CDATA[
                                <img alt="" src="https://privacyforjournalists.org.au/images/9/9/5/8/9/9958921a80885b485ae7532a4235469b8f06e77e-logo.jpeg" />
                                <p>Reporters are one of the bastions of democracy, as they could expose the wrongdoings of governments, corporates or well-connected individuals affecting the many. We would have never learned about the <a href="https://en.wikipedia.org/wiki/Watergate_scandal" target="_blank" rel="noopener noreferrer" class="external-link no-image">Watergate</a>, the <a href="https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance" target="_blank" rel="noopener noreferrer" class="external-link no-image">NSA's mass surveillance program</a> or the <a href="https://www.theguardian.com/commentisfree/2013/jun/11/detention-logs-open-journalism" target="_blank" rel="noopener noreferrer" class="external-link no-image">detention camps of Australia</a> without them.</p>

<p>Journalists rely on various sources of information to build a story of public interest. At this very moment, an army of them are relentlessly crunching open data, obtaining documents and interviewing whistleblowers for the greater good. </p>
<h3>Circumvention of Legal Protections</h3>
<p>The protection of information sources <a href="https://en.wikipedia.org/wiki/Protection_of_sources" target="_blank" rel="noopener noreferrer" class="external-link no-image">is a privilege of journalists</a> all around the world. Legislations assure that authorities cannot reveal the sources, so these articles will not be suppressed. Unfortunately, there is a worrying trend of these legal safeguards are being circumvented. The FBI apparently has its ways to <a href="https://theintercept.com/2016/06/30/secret-rules-make-it-pretty-easy-for-the-fbi-to-spy-on-journalists/" target="_blank" rel="noopener noreferrer" class="external-link no-image">work around laws protecting sources</a>, and Australia also has a precedent of bending the rules.</p>
<h3>Technical Challenges</h3>
<p>With the advent of computers and smartphones, it is getting more and more challenging to keep our secrets. <a href="https://theintercept.com/2016/06/28/he-was-a-hacker-for-the-nsa-and-he-was-willing-to-talk-i-was-willing-to-listen/" target="_blank" rel="noopener noreferrer" class="external-link no-image">Governments</a> are heavily investing in surveillance programmes to get the information they need.</p>
<p>With the legal protections shrinking and the technical disparity widening, the protection of information sources is more challenging than ever.</p>
<h3>Giving the Control Back</h3>
<p>The only person who can ultimately protect them is <strong>You</strong>, the reporter. </p>
<p><img alt="Smokey Bear" src="/images/c/f/7/8/0/cf78097fdec5c3f558f788bc3ee426f90d444824-smokey.jpeg" /></p>
<p>Luckily, a growing selection of applications is available at your disposal to do so. On the other hand, it can be confusing to choose the right tool, in addition to installing and using them.</p>
<p>We, a couple of information security experts, recognised these problems. So we thought a website dedicated just for reporters could help you to select the best tools and practices matching your situation. We named the website as <strong>Privacy for Journalists</strong> and our goal is to help the Australian journalist community with defending their information sources.</p>
<h4>Privacy for Journalists Website</h4>
<p>On the main website (<a href="https://privacyforjournalists.org.au">privacyforjournalists.org.au</a>), we provide a simple-to-understand threat modeling to help you select the appropriate tools and practices. We have numerous illustrated guides for helping you install and use these tools. We also provide a collection of links pointing to security tips, legislations, Meetups, associations and other events aiming to defend your privacy.</p>
<p>The blog on (<a href="https://privacyforjournalists.org.au/blog">privacyforjournalists.org.au/blog</a>) will announce changes to existing and new content to the site. Make sure you subscribe to the <a href="https://privacyforjournalists.org.au/blog.rss">RSS feed</a> to not miss any changes.</p>
<h4>Community</h4>
<p>The site features a Wiki (<a href="https://wiki.privacyforjournalists.org.au" target="_blank" rel="noopener noreferrer" class="external-link no-image">wiki.privacyforjournalists.org.au</a>) for community-generated content. We aim to collect the various metadata legislations and their practical effects on you. Also, we have a section with real-life scenarios from real journalists and matching recommendations made by technical experts.</p>
<p>The community is getting together on Slack, where we can discuss best practices with each other. Head on to <a href="https://slack.privacyforjournalists.org.au" target="_blank" rel="noopener noreferrer" class="external-link no-image">slack.privacyforjournalists.org.au</a> for joining the conversation with other journalists and information security experts.</p>
                ]]>
            </description>
            <category></category>
            <guid>https://privacyforjournalists.org.au/blog/launching-the-privacy-for-journalists-website</guid>
            <pubDate>Wed, 06 Jul 2016 13:00:00 +1000</pubDate>
        </item>
            </channel>
</rss>
