Image for post
Image for post
Don’t let email overwhelm you. The more you know about the privacy and security of email, the better off you and your sources will be. Source: Xavier Verges/Flickr, CC-BY 2.0

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original piece here.

For journalists, email is a ubiquitous form of communication. In the face of today’s proliferation of messaging platforms, email remains a common tool in every reporter’s repertoire. Of its many applications in newsmaking, email often plays an essential role in connecting journalists to their sources.

But just because email is one of the first ways a source might reach out, that doesn’t mean we should always use it. …


Image for post
Image for post
Photo by gajman. CC-BY-2.0

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original article here.

What is Mailvelope?

Mailvelope is a tool that works in Firefox or Chrome to facilitate end-to-end encrypted email. When you send an end-to-end encrypted email, that means that only you and your contact can read your messages, and no one else — not your email provider, your contact’s email provider, or any network snoopers.

Mailvelope makes sending and receiving end-to-end encrypted email on your computer simple: Sign in to your existing email service from your web browser, compose an encrypted message in Mailvelope’s integrated browser experience, and click “Send.” …


Image for post
Image for post
Photo from Pexels. CC-BY 2.0.

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original article here.

Donald Trump is the president of the United States, which has prompted deep concerns from many over the constraints his administration may place on our ability to connect, express, and spread information safely.

Trump, a longstanding adversary of the free press, has expressed support for expanded surveillance powers, insulted and blacklisted both individual journalists and entire news organizations, selected an Attorney General appointee who actively eschews commitments to protecting a free press, and has called for leak investigations that would ensnare both sources and journalists. …


Image for post
Image for post
Photo by Marco Verch. CC BY 2.0.

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original article here.

Before following the step-by-step instructions in this guide, check out our general introduction to encryption for media makers for pro-tips and a technical glossary.

Looking for our guide to encrypting external storage devices and containers on Disk Utility? You can find it here.

What is VeraCrypt? How can I use it?

VeraCrypt is an open source volume management tool compatible with macOS, Windows, and Linux systems.

If you’re not already a VeraCrypt user, download the software from the developer’s website. Just like a physical signature, the developer leaves files that only they can sign using cryptographic keys on their website. To ensure we have a legitimate installation file (and not one that’s been tampered with) we should confirm that these files correspond to their encryption keys and signatures. It’s easier than it sounds.


Image for post
Image for post
Photo by Marco Verch. CC BY 2.0.

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original article here.

Before following the step-by-step instructions in this guide, check out our general introduction to encryption for media makers for pro-tips and a technical glossary.

Looking for our guide to encrypting external storage devices and containers on VeraCrypt? You can find it here.

What is Disk Utility? How can I use it?

macOS users can use Disk Utility to wipe and encrypt external storage devices, and create encrypted disk images on a computer’s local file system. …


Image for post
Image for post
Photo by Marco Verch. CC BY 2.0.

This piece has been cross-posted from Freedom of the Press Foundation. You can read the original article here.

No matter who we are, each of us has information to keep secure and private. For media makers working in film, journalism, and the arts, data protection is essential. Audio, video, image, and text files make up the bulk of their work, and thus, their livelihoods. The stakes to keep these files from falling into the wrong hands are extremely high.

We rely on encryption to protect our data as we browse the web and communicate. When media makers require additional protection and fine-tuned control over access to project data throughout the production process, encryption is key. Encryption gives media makers the power to restrict access to their video archive to a single key, or to password-protect folders containing contracts and scripts sitting on a computer. …

About

Olivia Martin

Digital Security Trainer at Freedom of the Press Foundation. Coming at you from the intersection of media and digital security.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store