retain it confidential. Illustration: Guardian Design crew
keep your information secureif in case you have desktop info that you simply need to preserve at ease, shop them under encryption. Most modern laptop working systems have options to encrypt all documents on the laptop — as an instance BitLocker for windows and FileVault for Mac. turn them on.
For actually delicate files, use PGP encryption or on-the-fly encryption utility reminiscent of VeraCrypt. shop the encrypted information on a detachable storage equipment such as a USB stick or external challenging disk, and hold that hidden or locked away.
For all styles of encryption, use lengthy passwords that would be complex to hack, and don't use the equal password for more than one purpose.
come to a decision what computer to make use ofin case you're worried about confidentiality, we advocate that you simply don't contact us from a piece laptop. It's a secure bet that your organization can see the undertaking on its networks and device.
Contacting us from domestic can also be tricky. if you're not the use of Tor (see below), it's possible communications may well be traced back to you by the use of your home IP handle. And if you're already under suspicion, your home community may itself be focused. if you do choose to use your personal desktop, be sure the operating equipment and software is up to this point. Is your desktop operating anti-malware software with the newest definitions? If it has constructed-in firewall application, turn it on.
to hide your identity from prying eyes it may be safer to use a pc in an internet cafe or on a public wifi community. computers in internet cafes might also not have the application you need, and public networks can also be less at ease (technically speaking) than a home or work connection, but their mass use may also assist conceal who you're. believe about whether you may you be on CCTV, or if the time and region that you get online may give a clue to your identity.
some thing desktop you employ, remember that your on-line activity reveals your IP address to the internet, and that e mail and browser utility continually facts a background of what you've been doing. Use the inner most searching or incognito option to deactivate this record. enhanced nevertheless, use Tor.
disguise who you are on-line with TorThe Tor network bounces your internet recreation via a series of relays to hide the supply region. This obfuscates your IP tackle, making it very intricate to confirm where a message or webpage seek advice from got here from. Tor browsers can also be configured to discard your browsing background and to reduce the volume of advice you show about your self whereas on-line. The Guardian's SecureDrop provider can handiest be reached through Tor.
To access the Tor network you could need to install Tor software. It's free and works on windows, Macs, and Linux-style working systems. Use it much such as you would a traditional browser equivalent to Firefox.
Tor helps to disguise you from snoopers on the information superhighway, but if your precise computing device is itself being monitored, Tor can't give protection to you from that. furthermore, below some situations — similar to at work — the very use of Tor utility might attract attention. Go somewhere you gained't be monitored, or guard yourself against being hacked at supply through the use of a comfortable operating equipment corresponding to Tails.
for maximum security, use TailsTails, which is short for The Amnesiac and Incognito live gadget, is a laptop working system designed to keep protection. It connects to the web using the Tor network; it helps safeguard towards local monitoring; and if you sign off, it wipes any unencrypted content, leaving no evidence of what you've been as much as. it's way more comfy than the use of a normal computer or telephone.
You don't need a separate desktop to run Tails. which you could download it and installation it onto a USB stick, and then force a regular laptop to birth up the usage of the USB stick in its place of its internal difficult force.
Getting set up on Tails requires some technical aptitude. find out greater at tails.boum.org.
for the way to contact the Guardian securely, see our book.
No comments: