<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Security in a Box Blog]]></title><description><![CDATA[Security-related content for human rights defenders.]]></description><link>https://securityinabox.org/</link><generator>metalsmith-feed</generator><lastBuildDate>Sat, 06 Dec 2025 13:59:21 GMT</lastBuildDate><atom:link href="https://securityinabox.org/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Windows 10 support ends soon - what you can do to stay safe]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/endof10.jpg" alt=""></p>
<p>Windows 10 is going to reach the <a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281">end of support on October 14, 2025</a>. Following that date, technical assistance, feature updates and security updates will no longer be provided. And while <a href="https://blogs.windows.com/windowsexperience/2024/10/31/how-to-prepare-for-windows-10-end-of-support-by-moving-to-windows-11-today/">Windows Defender</a> will continue getting support on Windows 10, the lack of security updates will expose your computer to a heightened risk even if your antivirus software is still working.</p>
<p><a href="https://support.microsoft.com/en-us/windows/getting-ready-for-the-windows-11-upgrade-eb50813f-c7da-4cf8-89a3-6ba0d33b2773#bkmk_install_windows">Upgrading to Windows 11</a> is the most straightforward way to keep your computer safe, but if you have an older device, this option may not be immediately available as Windows will consider your hardware unsupported. This post includes a series of solutions to keep your computer safe if you can't install Windows 11 through the standard updating procedure.</p>
<p><strong>Before your proceed with any of the solutions recommended in this post, it is crucial that you <a href="https://www.microsoft.com/en-us/windows/learning-center/back-up-files">back up your data</a>, as some of the steps you will take might make it impossible to access the content of your hard drive, or even erase it.</strong></p>
<p>If Windows 10 has already reached the end of support, you can buy some time to consider thoroughly which solution is best for you by enabling <a href="https://learn.microsoft.com/en-us/windows/whats-new/extended-security-updates">Extended Security Updates</a>, a paid service to keep receiving important security updates on Windows 10.</p>
<h2 id="find-a-workaround-to-install-windows-11-on-unsupported-hardware">Find a workaround to install Windows 11 on "unsupported hardware"</h2>
<p>Even if the PC Health Check app tells you that your PC "doesn't meet the minimum requirements for Windows 11", you might still find a way of switching to Windows 11. Here's a few steps you can follow:</p>
<ol>
<li>Try to fix the issue:<ul>
<li>Check for updates: the error message might disappear after you update your drivers and BIOS.<ul>
<li>Learn how to update software in your computer in <a href="https://support.microsoft.com/en-us/windows/update-drivers-through-device-manager-in-windows-ec62f46c-ff14-c91d-eead-d7126dc1f7b6">Microsoft's support page on how to update drivers through Device Manager in Windows</a>.</li>
<li>Learn how to update your BIOS in <a href="https://www.ninjaone.com/blog/how-to-update-your-pcs-bios/">Makenzie Buenning, How to Update BIOS on Your Windows PC</a>.</li>
</ul>
</li>
<li>Check if you can enable <a href="https://support.microsoft.com/en-us/windows/enable-tpm-2-0-on-your-pc-1fd5a332-360d-4f46-a1e7-ae6b0c90645c#bkmk_enable_tpm">TPM</a> and <a href="https://support.microsoft.com/en-us/windows/windows-11-and-secure-boot-a8ff1202-c0d9-42f5-940f-843abef64fad#ID0EDF">Secure Boot</a> in your BIOS.</li>
<li>Consider upgrading the hardware of your computer. If your hardware doesn’t meet the requirements, upgrading components like the RAM or graphics card could resolve the issue.</li>
<li>Read more on these steps in <a href="https://computercity.com/software/windows/how-to-fix-this-pc-doesnt-meet-the-minimum-requirements-for-windows-11">Jacob Bergman's post on how to fix "This PC Doesn’t Meet the Minimum Requirements for Windows 11"</a>.</li>
</ul>
</li>
<li>If none of the steps above work or are possible, you can still bypass the requirements for installing Windows 11. This approach might lead to instability though, so it's best to avoid this solution if you use your computer for crucial tasks.<ul>
<li>Learn more on this option in <a href="https://www.tomshardware.com/how-to/bypass-windows-11-tpm-requirement">Les Pounder and Avram Piltch's post on how to bypass Windows 11's TPM, CPU and RAM requirements</a>.</li>
</ul>
</li>
</ol>
<h2 id="install-linux">Install Linux</h2>
<p>If your computer is perfectly functioning and you don't need specific software that only runs on Windows, this is the perfect time to switch to a different operating system, ideally to Linux.</p>
<ul>
<li>If you are interested in this option but need someone to support you, check out the <a href="https://endof10.org/places/">Linux support page in the End of 10 website</a>.</li>
<li>Linux comes in many different flavors. To choose the one that works best for your needs, read <a href="https://linuxconfig.org/best-linux-distro-how-to-choose-guide-for-every-user">Lucas Rees' Best Linux Distro: How to Choose Guide for Every User</a>. We recommend <a href="https://ubuntu.com/">Ubuntu</a>, <a href="https://linuxmint.com/">Linux Mint</a> and <a href="https://www.debian.org/">Debian</a> for their stability, security and user-friendliness.</li>
<li><a href="https://securityinabox.org/en/phones-and-computers/linux/">Read our guide on how to set up a Linux computer more securely</a>.</li>
<li>If you need increased security, consider installing <a href="https://www.qubes-os.org/">Qubes OS</a> and configuring it based on <a href="https://github.com/freedomofpress/securedrop-workstation">the SecureDrop guide for journalists and human rights workers</a>.</li>
</ul>
<h2 id="get-a-new-computer">Get a new computer</h2>
<p>If your computer running Windows 10 is older and not very functional, you could consider buying a new computer.</p>
<ul>
<li>The cheapest option would be to get a computer without any operating system and then <a href="https://securityinabox.org/en/blog/2025-10-windows10-eol/index.html#install-linux">install Linux</a> on it.</li>
<li>If you work for a nonprofit organization or a public library in the U.S., you can get a discount on <a href="https://www.techsoup.org/microsoft/microsoft-desktop-operating-systems">a Windows 11 license</a>, or even on <a href="https://www.techsoup.org/computers-and-electronics">a laptop</a>, through <a href="https://www.techsoup.org/">TechSoup</a>.</li>
<li>If you need to get a cheaper computer that is ready to use, consider getting a <a href="https://www.google.com/intl/en_us/chromebook/">Chromebook</a>, a laptop that runs ChromeOS, a proprietary operating system developed by Google.</li>
<li>If you have enough funding for it, you can also consider buying a new computer with Windows 11 (possibly Pro) installed on it, or a Mac.</li>
</ul>
<hr>
<p><em>Image:</em> <a href="https://www.flickr.com/photos/mitchgroff/28790134/"><em>The end of 10. No more 10.</em></a>, by <a href="https://www.flickr.com/people/mitchgroff/">Mitch Groff</a>, released under the <a href="https://creativecommons.org/licenses/by-nc-sa/2.0/deed.en">Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Generic license</a>.</p>
]]></description><link>https://securityinabox.org/en/blog/2025-10-windows10-eol/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/2025-10-windows10-eol/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Thu, 25 Sep 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[What to do when you risk being arrested]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/Aleff-Blockhead-LA-2017.jpg" alt=""></p>
<p>In some regions, prominent human rights defenders, activists, journalists and lawyers have to choose between going into exile or risking to be arrested and legally prosecuted, often in unfair conditions.</p>
<p>This is a situation that <a href="https://www.frontlinedefenders.org/en/programme/digital-protection">the Front Line Defenders Digital Protection team</a> has been frequently observing especially in Central American countries like Guatemala, El Salvador and Mexico.</p>
<p>To help people at risk protect their activities, information and contact networks, we have developed a series of guidelines and recommendations that can make it harder to extract data from their personal and work devices.</p>
<p>If you are preparing to go into exile or to travel in riskier situations, read <a href="https://securityinabox.org/en/assess-plan/safer-travel">our guide on how to protect your information and devices while traveling</a>.</p>
<h2 id="assess-your-situation">Assess your situation</h2>
<h3 id="talk-to-a-lawyer">Talk to a lawyer</h3>
<ul>
<li>Assess your legal situation: how likely is it that you will be detained?<ul>
<li>If you work with a group, the recommendations in this post are not necessary for the whole staff of your organization, but they are essentials for those most at risk.</li>
</ul>
</li>
<li>Know your rights. In particular you may want to know if:<ul>
<li>you can refuse to provide the passwords or codes to unlock your phone and computer;</li>
<li>the agents need a warrant from a judge to seize your devices;</li>
<li>they need a warrant that specifies which devices (brand and model) they can take;</li>
<li>you can refuse to provide the passwords to access your social media accounts and other online services;</li>
<li>you can make one or more phone calls after you have been arrested;</li>
<li>you can call a lawyer before you provide any information to the authorities.</li>
</ul>
</li>
<li>Remember: if violent interrogation or torture are a possible scenario, it is better to have empty devices, so you can provide your passwords without exposing yourself or others to higher risks.</li>
</ul>
<h3 id="map-your-data">Map your data</h3>
<p>As a first step to prepare for a possible detention, take an inventory of the most important information in your devices (phones, computers, external hard drives, USB sticks, SD cards, etc.). Include in your inventory all information you store online (on online storage platforms, mailboxes, etc.)</p>
<ul>
<li>You can find recommendations on how to proceed in <a href="https://holistic-security.tacticaltech.org/exercises/explore/information-ecosystem.html">the Holistic Security Manual</a>.</li>
<li>Don't forget to go through all your devices and make a digital inventory of any sensitive information: pictures, text documents, PDFs, chats, attachments, login credentials, etc.</li>
</ul>
<h2 id="prepare-for-potential-detention">Prepare for potential detention</h2>
<p>When you have a clear vision of what your devices contain, you can proceed to:</p>
<ol>
<li>deleting what you don't need;</li>
<li><a href="https://securityinabox.org/en/blog/2025-09-detentions/index.html#back-up-important-information">backing up what you want to keep</a>;</li>
<li><a href="https://securityinabox.org/en/blog/2025-09-detentions/index.html#minimize-data-in-your-devices">deleting what you've backed up from your computer and phone</a>;</li>
<li>disconnecting your devices from online storage platforms and mailboxes where you keep sensitive information;</li>
<li>(if possible) uninstalling any apps that you use to access online services and only accessing them through a browser.</li>
</ol>
<h3 id="back-up-important-information">Back up important information</h3>
<ul>
<li><a href="https://securityinabox.org/en/files/backup/">Learn how to back up your data more securely</a>.</li>
<li>You can choose to back up important information on an encrypted external storage device and/or on a secure online storage platform.<ul>
<li>When making this choice, consider: could the authorities decide to seize your external storage devices and force you to give them the password to decrypt it, or try to crack the password? If so, consider backing up on a <a href="https://securityinabox.org/en/files/backup/#encrypted-cloud-services">secure online storage platform</a> and access this platform only through a browser so you can better hide that you have account on that platform.</li>
</ul>
</li>
<li>If you keep producing content in your devices, repeat the backup process regularly and then delete all information again.</li>
</ul>
<h3 id="minimize-data-in-your-devices">Minimize data in your devices</h3>
<p>Try to reduce the data in your phone and computer to a bare minimum: what is not stored on your devices can not be breached by any tool or person.</p>
<ul>
<li>Once you have completed your backup, delete all data, or at least the most sensitive ones, from your devices.<ul>
<li><a href="https://securityinabox.org/en/files/destroy-sensitive-information/">Read our guide on how to securely destroy sensitive information</a>.</li>
</ul>
</li>
<li>Go through our <a href="https://securityinabox.org/en/assess-plan/safer-travel/">guide on how to protect your information and devices while traveling</a> for more recommendations on how to clean up your devices before agents search through them.</li>
<li>Consider keeping all your data and work in a <a href="https://securityinabox.org/en/files/backup/#encrypted-cloud-services">secure cloud storage service</a>.<ul>
<li>Try to access the online storage platform through a browser rather than through an app.</li>
<li>Make sure to <a href="https://securityinabox.org/en/internet-connection/safer-browsing/#delete-your-browsing-history">delete all browsing history</a> at the end of each session. This way you can keep working without storing data in your device.</li>
<li>Consider accessing the online storage platform through <a href="https://securityinabox.org/en/blog/2025-09-detentions/index.html#optional-but-recommended-use-tails-on-your-computer">Tails</a> to reduce the risk of leaving traces of your activities in your devices.</li>
</ul>
</li>
</ul>
<h4 id="store-sensitive-files-in-a-secure-app">Store sensitive files in a secure app</h4>
<ul>
<li>If you really need to keep some files in your computer, consider storing them in a secure app.<ul>
<li>Consider storing sensitive information in <a href="https://veracrypt.io/en/Plausible%20Deniability.html">a hidden Veracrypt volume</a> if you're using a computer.</li>
<li>Consider using <a href="https://tella-app.org/">Tella</a> if you're storing sensitive data in a phone. On Android, you can also <a href="https://tella-app.org/video-tutorials/#camouflaging-tella">camouflage Tella</a> so it looks like a functional calculator.</li>
</ul>
</li>
</ul>
<h3 id="protect-your-devices-against-malware-infections">Protect your devices against malware infections</h3>
<p>If you think there might be an ongoing investigation on you, be sure to protect your devices against the risk of surveillance through spyware.</p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/malware/">Read our guide on preventing malware infections</a>.</li>
</ul>
<h3 id="prepare-your-phone">Prepare your phone</h3>
<h4 id="for-all-phones">For all phones</h4>
<ul>
<li>If you can, avoid linking your phone to your personal Google or iCloud account; if you really need Google or iCloud services, create a new account.</li>
<li>Avoid biometrics to lock your phone. Instead, use at least a 6-digit PIN, or even better a password with a minimum of 8 characters.</li>
<li>Make sure automatic updates are enabled.</li>
<li>Remove all the apps that contain private or sensitive information or that connect to online services including personal, sensitive or valuable information and/or your contacts network, as most likely the authorities will be able to access them through forensics tools.<ul>
<li>If you don't want or cannot delete these apps, consider <a href="https://securityinabox.org/en/assess-plan/safer-travel/#advanced-hide-your-sensitive-apps-in-your-mobile-device">hiding them</a>.</li>
</ul>
</li>
<li>Use your phone only for less sensitive purposes.</li>
<li>Read our guides on how to use <a href="https://securityinabox.org/en/phones-and-computers/android/">Android</a> or <a href="https://securityinabox.org/en/phones-and-computers/ios/">iOS</a> more securely.</li>
<li>On iPhone, <a href="https://support.apple.com/en-gb/guide/iphone/iph049680987/ios">enable Lockdown Mode</a>.</li>
<li>On Android, enroll in <a href="https://support.google.com/android/answer/16339980">Google's Advanced Protection program</a>.</li>
</ul>
<h4 id="optional-but-recommended-install-graphene-os">[Optional but recommended] Install Graphene OS</h4>
<ul>
<li>If you can, buy a new or used Google Pixel (ideally an <a href="https://store.google.com/us/product/pixel_8a">8a</a> or a more recent model).</li>
<li>Get a trusted technologist to remove the default operating system by installing <a href="https://grapheneos.org/">Graphene OS</a>.<ul>
<li>We recommend you follow <a href="https://www.anarsec.guide/posts/grapheneos/">the instructions in the anarsec guide on how to install and configure Graphene OS</a>.</li>
<li>Once Graphene OS is installed in your phone, use the <a href="https://attestation.app/about">Auditor App</a> to ensure that your device is running a verified operating system with a locked bootloader and that you will be able to check in the future that no tampering has occurred..</li>
</ul>
</li>
<li>Create different profiles on the phone (admin, work, bank, social media, etc.).<ul>
<li>We recommend to create (at least) a second user profile on Graphene OS. Use the first profile (owner profile), the one that you created when installing the operating system, only to install apps and for administration purposes. Use the other profile(s) for communications, data storage, etc. This will ensure even better protection of your data.</li>
</ul>
</li>
<li>Use the default browser and PDF reader built into Graphene OS.<ul>
<li>In Graphene OS, the PDF reader and Vanadium browser are specially hardened to cover several attack vectors.</li>
</ul>
</li>
</ul>
<h3 id="prepare-your-computer">Prepare your computer</h3>
<ul>
<li>Follow our guides to use <a href="https://securityinabox.org/en/phones-and-computers/mac/">macOS</a>, <a href="https://securityinabox.org/en/phones-and-computers/windows/">Windows</a> or <a href="https://securityinabox.org/en/phones-and-computers/linux/">Linux</a> more securely.</li>
<li>If you really need to keep information in your computer, make sure to <a href="https://securityinabox.org/en/files/secure-file-storage/#consider-encrypting-your-whole-device">encrypt your hard drive</a>.</li>
</ul>
<h4 id="optional-but-recommended-use-tails-on-your-computer">[Optional but recommended] Use Tails on your computer</h4>
<p>Tails is an operating system that runs on a USB stick or an SD card. Once you turn off your computer, no traces of your work stay in the hard drive or RAM. Also, Tails only connects to the internet through <a href="http://torproject.org/">the Tor network</a>, so your online traffic is also anonymized.</p>
<p>By using Tails, you can avoid leaving any traces of your most sensitive activities in your computer, so if your device is seized nobody will be able to find out what you had been doing with it.</p>
<ul>
<li><a href="https://tails.net/about/index.en.html">Read more about Tails</a>.</li>
<li><a href="https://tails.net/install/index.en.html">Learn how to install Tails in a USB stick or SD card</a>.</li>
<li><a href="https://tails.net/doc/first_steps/index.en.html">Learn how to start using Tails</a>.</li>
</ul>
<p>If you need, you can also create a persistent storage volume inside your Tails stick and store sensitive information inside this encrypted container.</p>
<ul>
<li><a href="https://tails.net/doc/persistent_storage/index.en.html">Read more on persistent storage</a>.<ul>
<li>Note that the persistent storage is not hidden. An attacker in possession of your USB stick can know that there is a persistent storage volume and force you or trick you to give out its passphrase. If you need to hide sensitive data, consider using <a href="https://veracrypt.io/en/Plausible%20Deniability.html">a VeraCrypt hidden volume</a> in an external storage device instead.</li>
</ul>
</li>
</ul>
<h4 id="optional-install-qubes-os-to-protect-your-data-from-online-attacks">[Optional] Install Qubes OS to protect your data from online attacks</h4>
<p>If you need to protect your data from online attacks, consider installing Qubes OS and configuring it based on <a href="https://github.com/freedomofpress/securedrop-workstation">the SecureDrop guide for journalists and human rights workers</a>.</p>
<ul>
<li><a href="https://www.qubes-os.org/">Qubes OS</a> is an operating system developed to increase security by isolating different compartments (called <em>qubes</em>) inside your computer. You can assign some of these compartments to less sensitive purposes while completely isolating from the internet other qubes containing more sensitive information.</li>
<li>Qubes OS will not necessarily protect your data from someone who can use forensic tools to search your computer, but it can protect sensitive information from remote attempts at hacking into your computer.</li>
</ul>
<h3 id="review-your-password-strategy">Review your password strategy</h3>
<p>The weakest point of any encryption, secure tool or service is the password you use to protect it with - if your passwords are not strong enough, it won't take a lot of effort to crack them and decrypt your sensitive data or access your online platforms and communication tools.</p>
<ul>
<li><a href="https://securityinabox.org/en/passwords/passwords">Make sure you are using strong and unique passwords</a>.</li>
<li><a href="https://securityinabox.org/en/passwords/password-managers">Save your passwords in a secure password manager</a>.<ul>
<li>If you are using an offline password manager like <a href="https://securityinabox.org/en/passwords/tools/#keepassxc">KeePassXC</a>, <a href="https://securityinabox.org/en/files/backup/">back up your password database securely</a>.</li>
</ul>
</li>
<li><a href="https://securityinabox.org/en/passwords/2fa">Use 2-factor authentication for all your online accounts</a>.<ul>
<li>When you enable 2-factor authentication make sure to <a href="https://securityinabox.org/en/passwords/2fa/#keep-2fa-backup-codes-safe-and-separate">download backup codes and save them in your password manager together with your password for that account</a>.</li>
</ul>
</li>
<li>If you use a 2-factor-authentication app, make sure to back it up somewhere safe. To make sure you can back up your codes, consider using one of the following apps:<ul>
<li><a href="https://proton.me/authenticator">Proton Authenticator</a> (for Android, iOS, Windows, macOS and Linux) lets you back up your 2FA codes to iCloud on Apple devices or to a location of your choice on Android devices. If you're using an Android device, you can also choose the frequency of your backups.<ul>
<li><a href="https://proton.me/support/back-up-2fa-codes">Learn how backups work on Proton Authenticator</a></li>
</ul>
</li>
<li><a href="https://github.com/beemdevelopment/Aegis">Aegis for Android</a> backs up your codes automatically.</li>
<li><a href="https://raivo-otp.com/">Raivo for iOS</a> syncs your one-time passwords to iCloud.</li>
</ul>
</li>
</ul>
<h3 id="chat-more-securely">Chat more securely</h3>
<ul>
<li><a href="https://securityinabox.org/en/communication/secure-chat">Read our recommendations on using messaging apps more securely</a>.<ul>
<li>In particular, make sure to <a href="https://securityinabox.org/en/communication/secure-chat/#protect-your-sensitive-chat-communications-with-end-to-end-encryption">protect your sensitive chats with end-to-end encryption</a> and <a href="https://securityinabox.org/en/communication/secure-chat/#set-messages-to-automatically-disappear-or-delete-your-chat-history-regularly">enable disappearing messages in all your chat apps</a>.</li>
</ul>
</li>
<li>Use a messaging app that protects your communications through end-to-end encryption by default, ideally <a href="https://securityinabox.org/en/communication/tools/#more-secure-text-voice-and-video-chat-applications">Signal or another secure messaging app</a>.<ul>
<li><a href="https://securityinabox.org/en/tools/signal">Learn how to use Signal more securely</a>.</li>
</ul>
</li>
</ul>
<h3 id="protect-your-connections">Protect your connections</h3>
<p>If you think there might be an ongoing investigation on you, be sure to protect your connections from online surveillance.</p>
<ul>
<li><a href="https://securityinabox.org/en/internet-connection/safer-browsing">Learn how to browse the web more securely</a>.</li>
<li>Only connect to the internet through <a href="https://securityinabox.org/en/internet-connection/circumvention/#choose-a-vpn-service">a trusted VPN</a>.<ul>
<li>If you need to be sure that nobody can trace your online activities back to you, consider <a href="https://securityinabox.org/en/internet-connection/anonymity/#anonymize-all-your-connections">anonymizing all your connections through Tor</a>.</li>
</ul>
</li>
</ul>
<h3 id="possibly-dont-use-apps-to-access-online-services">Possibly don't use apps to access online services</h3>
<ul>
<li>If you need to access your sensitive emails or online cloud service, use a browser to log in and then log out when you're done. Avoid using apps for your online accounts whenever possible: this will reduce the traces of your activities you leave in your devices.<ul>
<li>After logging out from your accounts, make sure to set your browser to <a href="https://securityinabox.org/en/internet-connection/safer-browsing/#delete-your-browsing-history">delete all your browsing history</a> at the end of every session and close the browser.</li>
</ul>
</li>
</ul>
<h3 id="choose-trusted-contacts-you-can-inform-in-case-you-are-arrested">Choose trusted contacts you can inform in case you are arrested</h3>
<ul>
<li>Consider securely giving your trusted contacts passwords to your most sensitive accounts and to your Google or iCloud accounts and asking them to suspend your social media accounts and wipe your phone remotely in case you are arrested.<ul>
<li>When sharing a password with someone, only do this in person or through <a href="https://securityinabox.org/en/assess-plan/private-communication/">secure communication tools</a> protected by end-to-end encryption. Ideally, share with them a KeePassXC database rather than the passwords in an unencrypted document.</li>
<li><a href="https://securityinabox.org/en/passwords/passwords/#if-you-need-to-share-passwords">Read our recommendations on how to share passwords more securely</a>.</li>
</ul>
</li>
<li>Make a list of digital security helplines to support your contacts in suspending your accounts more quickly.<ul>
<li>Among the helplines that can help, consider <a href="https://www.accessnow.org/help/">Access Now Digital Security Helpline</a> and <a href="https://www.frontlinedefenders.org/emergency-contact">Front Line Defenders' emergency contact</a>.</li>
<li>Also review <a href="https://digitalfirstaid.org/support/">the Digital First Aid Kit support page</a> to look for help desks that may support your contacts for specific needs.</li>
</ul>
</li>
</ul>
<h3 id="set-emergency-apps-to-inform-your-trusted-contacts-and-delete-sensitive-data">Set emergency apps to inform your trusted contacts and delete sensitive data</h3>
<ul>
<li>On Android, you can set the <a href="https://support.google.com/android/answer/9319337">Personal Safety app</a> to start <a href="https://support.google.com/android/answer/9319337#zippy=%2Cuse-emergency-sos-to-call-for-help-alert-your-contacts-record-videos">emergency actions like calling for help, sharing your location with your emergency contacts or recording video</a>.<ul>
<li>If you have an Android device, you can also install <a href="https://guardianproject.info/apps/info.guardianproject.ripple">Ripple and set it to delete all sensitive data and apps in case of an emergency</a>.</li>
</ul>
</li>
<li>If you have an iPhone, you can use <a href="https://support.apple.com/guide/personal-safety/emergency-call-text-iphone-apple-watch-ips4f0cd709b">Emergency SOS to alert your emergency contacts about your arrest and share live video or existing photos with them</a>.</li>
</ul>
<h2 id="during-the-detention">During the detention</h2>
<ul>
<li>If possible, keep all your devices off.</li>
<li>Only turn on your phone to call your trusted contacts (if you are allowed to do so). After calling them, switch off your phone again and do not unlock it.</li>
</ul>
<h2 id="once-you-are-released-from-detention">Once you are released from detention</h2>
<ul>
<li>If the authorities give you back your devices, do not use them until an expert can run a forensics analysis and make sure they're clean from malware.</li>
<li>Consider that it might be impossible to confirm your devices have been infected and that you might have to replace them entirely.</li>
</ul>
<h2 id="resources">Resources</h2>
<ul>
<li><a href="https://coping-with-prison.org/">Coping with Prison</a></li>
<li><a href="https://www.frontlinedefenders.org/sites/default/files/flds_workbook.pdf">Front Line Defenders, Workbook on Security: Practical Steps for Human Rights Defenders at Risk</a>, Appendix 9, Check list: Detention / Arrest / Abduction / Kidnap, pp. 78-80, 2011.</li>
<li><a href="https://ssd.eff.org/playlist/human-rights-defender">EFF Surveillance Self-Defense, Security Scenarios - Human rights defender? Recipes for organizations who need to keep safe from government eavesdroppers</a></li>
<li><a href="https://iboninternational.org/download/a-quick-guide-on-security-for-human-rights-defenders2/">IBON International, <em>A Quick Guide on Security for Human Rights Defenders</em></a> (last updated: February 14, 2025)</li>
<li><a href="https://holistic-security.tacticaltech.org/media/sections/chapterpdfs/original/HS_Complete_HiRes.pdf">Craig Higson Smith, Daniel Ó Cluanaigh, Ali G. Ravi, Peter Steudtner, <em>Holistic Security Manual</em></a>, "Creating Security Plans and Agreements", p. 134 ff., 2016.</li>
</ul>
<hr>
<p><em>Image:</em> <a href="https://www.flickr.com/photos/ffela/40846821561/"><em>Blockhead, Los Angeles 2017</em></a>, by <a href="http://www.aleff.photography/">Hans-Jörg Aleff</a>, released under the <a href="https://creativecommons.org/licenses/by-nc-sa/2.0/deed.en">Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Generic license</a>.</p>
]]></description><link>https://securityinabox.org/en/blog/2025-09-detentions/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/2025-09-detentions/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Wed, 10 Sep 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[Security in a Box updates in the first half of 2025]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/IDEO-CVC-2019-Thomas_Grimer7.jpg" alt=""></p>
<p>After almost 6 months from our latest blog post announcing news on Security in a Box, here's one more update on what's new in the website, starting with the announcement that at this point all the content in the guides linked from the home page has been completely updated in the past year and a half, and keeps being continuously updated and reviewed also thanks to the suggestions for improvement we receive through emails and Gitlab issues. Thanks to all the people who have taken the time to <a href="https://gitlab.com/securityinabox/securityinabox.gitlab.io/-/blob/main/readme.md#how-to-give-feedback">give us feedback</a>!</p>
<p>But there is more: we have created new guides, added new features, updated some more tool guides and kept translating all the new and updated content into twelve languages: Arabic, Burmese, Chinese, Farsi, French, Indonesian, Pashto (with the help of <a href="https://www.unwomen.org/en">UN Women</a>), Portuguese, Russian, Spanish, Turkish and Vietnamese.</p>
<p>Here's a complete list of what we added and updated in Security in a Box during the first quarter of 2025:</p>
<h2 id="new-features">New features</h2>
<ul>
<li>Security in a Box has now a search engine. This means that you don't have to explore the whole website to find answers to your questions: just click the lens icon in the top right corner of the website and a pop-up window will open where you can enter your key words and find the resources you are looking for.</li>
<li>This blog has now an RSS feed that will allow you to keep yourself updated on everything we write here. If you use an RSS reader, click the RSS icon above the list of posts in the home page or just copy <a href="https://securityinabox.org/rss.xml">this RSS feed link</a> and add it to the RSS feeds in your reader.</li>
<li>We have added new <a href="https://securityinabox.org/en/assess-plan/">Assess &amp; Plan section</a>, which include guides on how to assess your needs and threats and get ready for protecting yourself against potential threats. The Assess &amp; Plan section currently includes the guides on <a href="https://securityinabox.org/en/assess-plan/physical-security">physical security</a> and on <a href="https://securityinabox.org/en/assess-plan/private-communication">safer communications</a> that were previously located in different sections of the website, as well as the new <a href="https://securityinabox.org/en/assess-plan/safer-travel">guide on how to Protect your information and devices while traveling</a>.</li>
</ul>
<h2 id="new-guides-in-security-in-a-box">New guides in Security in a Box</h2>
<p>In the first quarter of the year, we added these new resources to Security in a Box:</p>
<ul>
<li><a href="https://securityinabox.org/en/assess-plan/safer-travel/">Protect your information and devices while traveling</a> - a guide we felt was highly needed, especially given the current restrictions in border security controls around the world.</li>
<li><a href="https://securityinabox.org/en/tools/tiktok/">Protect your data when using TikTok</a> - another guide that was long overdue, given how this platform is being used more and more as a communication channel by journalists, activists and media outlets.</li>
</ul>
<h2 id="guides-updated-in-2025">Guides updated in 2025</h2>
<p>In the past 5 months, we have also completely reviewed the following guides:</p>
<ul>
<li><a href="https://securityinabox.org/en/communication/">The whole section on safer communications</a></li>
<li><a href="https://securityinabox.org/en/tools/instagram/">Protect yourself and your data when using Instagram</a></li>
<li><a href="https://securityinabox.org/en/tools/x-twitter/">Protect yourself and your data when using X</a></li>
<li><a href="https://securityinabox.org/en/assess-plan/private-communication">Protect the privacy of your online communication</a></li>
</ul>
<h2 id="whats-next">What's next</h2>
<p>In the next few months, we will keep updating, expanding and restructuring Security in a Box. If you are curious about what we are planning to do, have a look at <a href="https://gitlab.com/securityinabox/securityinabox.gitlab.io/-/issues/237">this Gitlab issue in particular</a>, where we have defined our general update plan and are keeping track of our progress.</p>
<h2 id="how-to-contribute">How to contribute</h2>
<p>Security in a Box is an open-source resource, and we always welcome comments and suggestions. You can find instructions on how to give us feedback in <a href="https://gitlab.com/securityinabox/securityinabox.gitlab.io/-/blob/main/readme.md#how-to-give-feedback">our README page</a>. We look forward to hearing from you, and to make Security in a Box always a bit more useful thanks to your input!</p>
<p><em>Image:</em> <a href="https://commons.wikimedia.org/wiki/File:IDEO-CVC-2019-Thomas_Grimer7.jpg"><em>Illustration to promote cybersecurity submitted in the Cybersecurity Visuals Challenge 2019 hosted by OpenIDEO, by Thomas Grimer</em></a>, licensed under the <a href="https://creativecommons.org/licenses/by/4.0/deed.en">Creative Commons Attribution 4.0 International license</a>.</p>
]]></description><link>https://securityinabox.org/en/blog/2025-Q1-Q2-updates/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/2025-Q1-Q2-updates/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Thu, 05 Jun 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[Considering an X-odus? Here are some tips]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/murmuration.jpg" alt=""></p>
<p>Human rights defenders and civil society members probably started using Twitter in the moment it was created, and <a href="https://web.archive.org/web/20131114102313/https://securityinabox.org/en/twitter_main">at least by 2013</a> Security in a Box acknowledged this trend by publishing a guide on how to use Twitter securely. After recurrent updates, <a href="https://securityinabox.org/en/tools/x-twitter/">that guide still exists</a>, although the name of the platform has since changed to X.</p>
<p>Over the years, Twitter has been used to distribute news quickly and to engage in open debates with selected communities of people sharing similar interests. Being mostly accessible to anyone without the need to create an account, it could be used to follow both what was happening in the world or in a certain sphere and what people were saying about it. A platform to follow individuals and organizations focusing on specific topics and sectors, Twitter helped make connections, and sometimes even friends, across the globe.</p>
<p>But like all centralized platforms, what Twitter allowed us to do largely depended on its terms of service and on the choices its owners were making. So after Elon Musk bought it in 2022, its policies and management changed together with its name, which became X after few months, in July 2023.</p>
<p>X is now <a href="https://xcancel.com/about">mostly</a> accessible only to people who have an account, it <a href="https://www.reuters.com/technology/twitter-exec-says-moving-fast-moderation-harmful-content-surges-2022-12-03/">hardly moderates any abuse or disinformation</a>, and has <a href="https://www.reuters.com/technology/twitter-dissolves-trust-safety-council-2022-12-13/">dissolved its Trust and Safety Council</a>, the advisory group of independent civil, human rights and other organizations that used to address hate speech, child exploitation, suicide, self-harm and other problems on the platform. Furthermore, the company now <a href="https://techround.co.uk/news/musk-limiting-external-links-x/">reduces the reach of posts containing links</a> (especially to news websites) and <a href="https://www.washingtonpost.com/technology/2024/10/29/elon-musk-x-republican-democrat-twitter-election/">is generally showing an increase in the popularity of right-leaning users</a>.</p>
<p>As a consequence, X has become a more toxic environment where harassers have the upper hand, and many important users and organizations have started leaving this platform. Among the media outlets and organizations that have recently left X there are, <a href="https://www.escape-x.org/-Those-media-organisations-and-people-are-quitting-X-.html">just to name a few</a>, <a href="https://www.theguardian.com/media/2024/nov/13/why-the-guardian-is-no-longer-posting-on-x">The Guardian</a>, <a href="https://www.npr.org/2023/04/12/1169269161/npr-leaves-twitter-government-funded-media-label">NPR</a>,<a href="https://edri.org/our-work/why-edri-is-leaving-x-and-where-to-find-us/">EDRi</a> and <a href="https://www.statewatch.org/news/2025/january/why-statewatch-is-leaving-x/">Statewatch</a>.</p>
<p>While X does not offer the same experience Twitter used to provide, some people and organizations still use it to distribute news, stay in touch with their contacts and participate in debates. It is certainly possible to keep doing so on other platforms, but some can reach a wider audience on X than on its alternatives.</p>
<p>Yet <a href="https://www.escape-x.org/">a campaign to kickstart a massive exodus from X</a> has started, and there are <a href="https://securityinabox.org/en/blog/2025-03-x-odus/index.html#some-useful-tools">some tools</a> that allow you to stay in touch with your X network elsewhere and to troubleshoot other issues that may arise by moving to Mastodon or Bluesky. What follows is a few suggestions on what to consider when deciding where to move and what tools to use to make your move smoother.</p>
<h2 id="what-to-consider-before-you-leave-x">What to consider before you leave X</h2>
<p>If you are considering to leave X, it's a good idea to ask yourself some questions that will help you decide which alternative platforms or tools you can switch to. The first thing to note on this regard is that nothing will ever replace the experience you had on Twitter until 2022: X has replaced Twitter and has changed its dynamics for good, and although its number of users is still impressive, the open discussion platform it offered in the past has disappeared with its new policies and nothing has replaced that (yet).</p>
<p>In order to decide what alternative platforms you can switch to, ask yourself what you are using X for and what your needs are. Some reasons why people have been using Twitter and X are, for example:</p>
<ul>
<li>Distributing updates on one's activities</li>
<li>Getting updates on news and current events</li>
<li>Participating in political discourse</li>
<li>Joining discussions on specific topics</li>
<li>Entertainment</li>
<li>Sharing videos</li>
<li>Networking with like-minded people</li>
<li>Brand promotion</li>
</ul>
<p>Also ask yourself what communities you need to connect to: is it a wider audience or a specific niche? Do you want to follow celebrities, a group of people specializing on a topic, affinity groups or a group of friends? Do you just need to send updates to people who want to follow you or would you like to participate in conversations?</p>
<h2 id="alternatives-to-x">Alternatives to X</h2>
<p>Depending on the answers you give to the questions above, you can make a plan for moving to one or more of the following alternatives:</p>
<ol>
<li><a href="https://bsky.app/">Bluesky</a></li>
</ol>
<p>Bluesky is currently the most popular alternative to X, and many people leaving X are moving to this platform.</p>
<p>Founded by Twitter co-creator Jack Dorsey, Bluesky makes it possible to tailor your user experience and to decide how your conversations are moderated. The down side is that Bluesky also belongs to a company, so if the company is sold to someone else its policies might change again. And while Bluesky is supposed to be based on a decentralized network, at the moment no other instance is connected to that network (although <a href="https://freeourfeeds.com/">efforts are underway to change this situation</a>).</p>
<ol start="2">
<li><a href="https://joinmastodon.org/about">Mastodon</a></li>
</ol>
<p>The second most used alternative to X, Mastodon is a federated social networking platform that respects users' privacy and is based on free and open-source software.</p>
<p>It requires some more planning to start using it because you will have to choose the server you want to use, based on its community, code of conduct, moderation rules and content policies. You can choose your home server in <a href="https://joinmastodon.org/servers">the list of all Mastodon servers on joinmastodon.org</a>, or also by checking where people and organizations you follow on X have been migrating to.</p>
<p>If you would like to start a Mastodon account, you can start from <a href="https://fedi.tips/">Fedi.Tips</a>, an unofficial non-technical guide to using Mastodon and the Fediverse.</p>
<ol start="3">
<li><a href="https://www.threads.net/">Threads</a> (and other Meta platforms)</li>
</ol>
<p>Threads is Meta’s microblogging platform. Some people are moving to it, and it can be a good idea to use it if you are focusing on advertising a brand and already are using other Meta platforms. However, Threads doesn't have as many users as other platforms and is not actively used by many people or entities. As for all other commercial social networking platforms, we suggest you to be cautious when deciding to create an account there.</p>
<p>Besides Threads, you may consider also moving your X activities to Instagram and Facebook, especially if they are used by many of your X followers already. If you decide to use these platforms, check out the Security in a Box guides on how to use <a href="https://securityinabox.org/en/tools/instagram">Instagram</a> and <a href="https://securityinabox.org/en/tools/facebook">Facebook</a> more securely.</p>
<ol start="4">
<li>A social media management tool that lets you use multiple different platforms at once</li>
</ol>
<p>Another choice you can make, even without the need to leave X completely, is to start using a social media management tool that allows you to post on all the existing platforms at the same time. You can have a look at the <a href="https://www.topsocialtools.com/">topsocialtools website</a> to choose the solution that works best for your needs.</p>
<ol start="6">
<li><a href="https://www.reddit.com/">Reddit</a></li>
</ol>
<p>If your need is to follow and join conversations on specific issues, you can consider moving to Reddit, where you can follow topics of every possible kind, often without even the need to log in and with a focus on relevance given by the platform's upvote and comment system.</p>
<ol start="7">
<li><a href="https://www.linkedin.com/">LinkedIn</a></li>
</ol>
<p>If you use X as a professional, to network with colleagues, look for work and follow your industry, you can consider LinkedIn as an alternative to X.</p>
<ol start="10">
<li>An RSS feed reader</li>
</ol>
<p>If you are using X to keep up-to-date on news, consider using an RSS feed reader to follow blogs, news outlets and most websites.</p>
<ul>
<li><a href="https://help.socialbee.com/hc/en-us/articles/29979142036759-How-Can-I-Find-the-RSS-Feed-of-a-Website">Follow instructions on SocialBee to learn how to find the RSS feed of almost any site</a>.</li>
<li><a href="https://blog.thunderbird.net/2022/05/thunderbird-rss-feeds-guide-favorite-content-to-the-inbox/">Learn how to read your RSS feed on Thunderbird</a>.</li>
<li>On Firefox, you can use an RSS feed reader add-on like <a href="https://addons.mozilla.org/en-US/firefox/addon/feedbroreader/">Feedbro</a>.</li>
</ul>
<ol start="11">
<li>Your own blog or website</li>
</ol>
<p>If you are using X to distribute updates on your activities, and you have capacity to manage your own site, consider setting up a blog or website. You can also publish your RSS feed and accept comments to get feedback and have conversations about the news you publish.</p>
<ol start="12">
<li>A newsletter or a Telegram channel</li>
</ol>
<p>If you need to keep your audience up-to-date on your activities, consider curating a newsletter or a Telegram channel. This will allow you freedom of choice regarding the content you publish and you can also choose to monetize this activity by using a newsletter tool like <a href="https://substack.com/">Substack</a> or <a href="https://mailchimp.com/">Mailchimp</a>, or a <a href="https://telegram.org/faq_premium">premium account on Telegram</a>.</p>
<h2 id="some-useful-tools">Some useful tools</h2>
<p>Once you have planned your X-odus, you will find it useful to know that there are some tools that will make your move easier.</p>
<ul>
<li><a href="https://cyd.social/">Cyd</a> helps you create a local, private backup of your data — like all of your tweets, retweets, likes, bookmarks, and direct messages. Once you've done this, Cyd helps you delete all your tweets. If you subscribe to the premium version, you can also choose what data you want to delete from your X account and you can use Cyd to migrate your data from X to Bluesky.<ul>
<li><a href="https://cyd.social/want-to-quit-x-in-2025-heres-how-to-do-it-the-right-way-with-cyd/">Read Cyd's step-by-step instructions on how to close down your X account while keeping your username and telling your followers where they can find you</a>.
Want to quit X in 2025? Here's how to do it the right way with Cyd .</li>
</ul>
</li>
<li><a href="https://openportability.org/en/auth/signin">OpenPortability</a> helps you migrate your data and contacts from X to Bluesky and Mastodon.</li>
<li>If you move to Bluesky, <a href="https://bluenotify.app/">BlueNotify</a> will let you get notifications on new posts by the people you follow (a feature Bluesky does not offer at the moment).</li>
<li><a href="https://xcancel.com/about">Xcancel</a> lets you read posts on X without having to log in to the platform.</li>
</ul>
<h2 id="would-you-like-a-new-security-guide-on-one-of-these-alternatives">Would you like a new security guide on one of these alternatives?</h2>
<p>If you would like Security in a Box to curate a guide on one of the alternatives to X, we would like to know! Reach out to us by writing an email to siab @ frontlinedefenders . org.</p>
<p><a href="https://www.geograph.org.uk/photo/1065181"><em>Image by Walter Baxter licensed for reuse under a CC BY-SA 2.0 Creative Commons Licence</em></a></p>
]]></description><link>https://securityinabox.org/en/blog/2025-03-x-odus/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/2025-03-x-odus/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[On the latest Security in a Box updates]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/Cybersecurity_Visuals_Challenge_2019_-_Rebecca_Wang.jpg" alt=""></p>
<p>Security in a Box was initially created <a href="https://web.archive.org/web/20060209174038/http://security.ngoinabox.org/">in 2005 as NGO in a Box - Security edition</a>, with its title changing to the current one <a href="https://web.archive.org/web/20090522065822/http://security.ngoinabox.org:80/">in 2009</a>. Over these 20 years, it has been developed on different platforms and has repeatedly changed its structure and content, with one fundamental goal in mind: offering useful strategies and tools for human rights defenders, journalists, activists and civil society members to protect themselves against the most widespread digital threats they face in their everyday life.</p>
<p>At the beginning of each page, immediately after the title, you can check when a guide has been last updated, to make sure that the recommendations you are going to read still apply to the current situation.</p>
<p>In 2024 most of the guides in Security in a Box have been reviewed and updated and some more have been created from scratch. All this new and updated content has been completely translated into French, Indonesian, Portuguese, Russian, Spanish, Turkish and Vietnamese, and is being translated into Arabic, Burmese, Chinese, Farsi and Pashto (this latter translation has been funded by <a href="https://www.unwomen.org/en">UN Women</a>).</p>
<p>Here's a list of what is new and what is updated in the entire website:</p>
<h2 id="new-guides-on-security-in-a-box">New guides on Security in a Box</h2>
<ul>
<li><a href="https://securityinabox.org/en/communication/multiple-identities/">Create and protect multiple online identities</a></li>
<li><a href="https://securityinabox.org/en/communication/secure-email/">Secure your email communications</a></li>
<li><a href="https://securityinabox.org/en/internet-connection/safer-browsing/">Browse the web more securely</a></li>
<li><a href="https://securityinabox.org/en/internet-connection/anonymity/">Anonymize your connections and communications</a></li>
<li><a href="https://securityinabox.org/en/files/destroy-identifying-information/">Destroy identifying information</a></li>
<li><a href="https://securityinabox.org/en/tools/youtube/">Protect your data when using YouTube</a></li>
</ul>
<h2 id="guides-updated-in-2024">Guides updated in 2024</h2>
<ul>
<li><a href="https://securityinabox.org/en/passwords/">The whole section on passwords</a></li>
<li><a href="https://securityinabox.org/en/phones-and-computers/">The whole section on phones and computers security</a></li>
<li><a href="https://securityinabox.org/en/files">The whole section on protecting files and information</a></li>
<li>The following guides:<ul>
<li><a href="https://securityinabox.org/en/internet-connection/how-the-internet-works/">How the internet works and how it can be censored</a></li>
<li><a href="https://securityinabox.org/en/internet-connection/circumvention/">Circumvent internet blockages and monitoring</a></li>
<li><a href="https://securityinabox.org/en/tools/google/">Protect your data and communications when using Google services</a></li>
<li><a href="https://securityinabox.org/en/tools/youtube/">Protect your data when using YouTube</a></li>
<li><a href="https://securityinabox.org/en/blog/2024-security-in-a-box-updates/(https://securityinabox.org/en/tools/facebook/">Protect yourself and your data when using Facebook</a></li>
</ul>
</li>
</ul>
<h2 id="future-plans">Future plans</h2>
<p>In the next few months, we will keep updating and expanding Security in a Box, and in 2025 we are going to restructure it a bit more. If you are curious about what we are planning to do, have a look at <a href="https://gitlab.com/securityinabox/securityinabox.gitlab.io/-/issues/237">this Gitlab issue in particular</a>.</p>
<p>Security in a Box is an open-source resource, and we always welcome comments and suggestions. You can find instructions on how to give us feedback in <a href="https://gitlab.com/securityinabox/securityinabox.gitlab.io/-/blob/main/readme.md#how-to-give-feedback">our Gitlab repository</a>. We look forward to hearing from you, and to make Security in a Box always a bit more useful together with you!</p>
<p><em>Image:</em> <a href="https://commons.wikimedia.org/wiki/File:Cybersecurity_Visuals_Challenge_2019_-_Rebecca_Wang.jpg"><em>Illustration to promote cybersecurity submitted in the Cybersecurity Visuals Challenge 2019 hosted by OpenIDEO, by Rebecca Wang</em></a>, licensed under the <a href="https://creativecommons.org/licenses/by/4.0/deed.en">Creative Commons Attribution 4.0 International license</a>.</p>
]]></description><link>https://securityinabox.org/en/blog/2024-security-in-a-box-updates/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/2024-security-in-a-box-updates/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Tue, 18 Feb 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[The Dim Sum Guide - digital security advice for Chinese-speaking readers]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/dim-sum.png" alt=""></p>
<p><em>Access the Dim sum Guide on <a href="https://yummydimsum.github.io/">https://yummydimsum.github.io/</a>.</em></p>
<p>Some countries and regions experience more complex censorship and cyber-attacks against human rights defenders than others, and the advice provided by Security in a Box needs to be combined with guidance that addresses threats specific to those regions. People from China are one of the groups in need of contextualised digital protection. This is why our team, with the support of Front Line Defenders, completed the Dim Sum guide. It builds on the content of Security in a Box and provides more specific instructions and guidance for Chinese-speaking readers from China, focusing on particular aspects as detailed in the following paragraphs. Ideally one should read both guides together.</p>
<h2 id="restrictions-and-problems-with-the-use-of-iphones-and-ipads-in-china">Restrictions and problems with the use of iPhones and iPads in China</h2>
<p>The Dim Sum guide devotes a section to the restrictions applied to the usage of iOS devices in China, including the lack of eSIM, FaceTime being only available for video but not for audio calls and heavy censorship of books, music, movies and other content which is available for consumption on these devices elsewhere in the world.</p>
<p>During the "Sitongqiao Protests" and the "White Paper Movement" in 2022, many Chinese people used AirDrop on iPhones to share images and videos related to the protests. But in early 2024 the Beijing authorities were apparently able to trace the mobile phone numbers and email accounts of those who sent these messages. Given the risk of tracing the identity of people who share files through AirDrop, the Dim Sum manual recommends not to use AirDrop at all.</p>
<h2 id="safer-chinese-input-methods">Safer Chinese input methods</h2>
<p>Chinese input methods are mandatory software for Chinese language readers, and there is a risk of exposing sensitive information if one uses inappropriate and unsafe apps. It has been widely proved that Chinese input methods by some Chinese companies have security issues or even backdoors. Therefore the Dim Sum guide has a section dedicated to more secure Chinese input methods and their usage in different operating systems.</p>
<h2 id="secure-vpns-available-in-china">Secure VPNs available in China</h2>
<p>China has one of the strictest Internet filtering regimes in the world, and using a VPN to "go over the [Great Fire-]wall" has become a daily routine for many Chinese people. However, not all VPNs can work stably and are secure enough, and according to some reports the Chinese police force has even developed some VPNs with the specific intent of phishing the data of people who use them. The Dim sum guide recommends some more secure censorship circumvention solutions, and the team behind the manual constantly monitors and updates this section to provide the most current and relevant information on the topic.</p>
<h2 id="confronting-the-police-in-case-of-mobile-phone-searches">Confronting the police in case of mobile phone searches</h2>
<p>In the wake of the "White Paper Movement" at the end of 2022, police in many Chinese cities have been randomly questioning passers-by on the street to check whether they have installed VPNs, Telegram and similar tools on their devices. The Dim Sum guide explains how ordinary people can respond to police checks of their mobile phones, both from a digital security perspective and from a legal perspective.</p>
<h2 id="conclusions">Conclusions</h2>
<p>We sincerely hope that the Dim Sum guide will help Chinese readers, especially Chinese human rights defenders, to protect their activities as well as their data and devices. However, we also know that the digital landscape is constantly shifting and that no resource can guarantee 100% security in any given context.</p>
<p>We will continue to monitor and update the Dim Sum guide and Security in a Box, to provide the latest and most appropriate digital security recommendations, and we very much welcome comments and suggestions from our readers. Send us feedback by <a href="https://github.com/YummyDimsum/yummydimsum.github.io/issues">adding an issue to the Github where we developed the guide</a> or by writing an email to secure.resistance @ proton . me.</p>
<p>The Dim Sum guide can be accessed on:</p>
<ul>
<li><a href="https://yummydimsum.github.io/">https://yummydimsum.github.io/</a></li>
</ul>
<p>The Dim Sum guide is also frequently shared on social media, so feel free to follow along:</p>
<ul>
<li><a href="https://mstdn.social/@dimsum">Mastodon</a></li>
<li><a href="https://www.instagram.com/yummydimsumcook/">Instagram</a></li>
</ul>
]]></description><link>https://securityinabox.org/en/blog/dim-sum-guide/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/dim-sum-guide/index.html</guid><dc:creator><![CDATA[Haven]]></dc:creator><pubDate>Wed, 12 Feb 2025 00:00:00 GMT</pubDate></item><item><title><![CDATA[Quick security recommendations for your devices]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/polygonal-hand-holding-smartphone.png" alt=""></p>
<h1 id="quick-security-recommendations-for-your-devices">Quick security recommendations for your devices</h1>
<p>People often ask us where they can start, what are minimum steps they should consider taking in an effort to better protect their devices. In this post we share what we are recommending as the first, often most effective and most important items.</p>
<h2 id="general">General</h2>
<ol>
<li>Use <a href="https://securityinabox.org/en/passwords/passwords">unique and strong passwords</a> for each account, using a <a href="https://securityinabox.org/en/passwords/password-managers/">password manager</a> to safely store them.</li>
<li>Use <a href="https://securityinabox.org/en/passwords/2fa">two-factor authentication (2FA)</a> on <a href="https://2fa.directory/">supported accounts</a>. As a first choice, consider using <a href="https://securityinabox.org/en/blog/quick-security-recommendations-for-your-devices/index.html#hardware">hardware devices (also called security keys)</a>. Otherwise you can also use apps or programs that generate time-based one-time passwords (TOTP). Avoid using SMS for 2FA if you can.</li>
<li>Avoid using biometrics (face ID, fingerprint scan) as an authentication method. <a href="https://securityinabox.org/en/passwords/passwords/#avoid-fingerprint-or-face-unlock-biometrics">We explain why in the guide on passwords</a>.</li>
<li>Delete old files, documents, pictures, screenshots and chat history that you do not need on your device. Securely <a href="https://securityinabox.org/en/files/backup/">back up</a> as necessary before removal.</li>
<li>If you can, avoid installing social media apps: you can use them by accessing their website with your browser instead.</li>
<li>Restart your device frequently. This ensures updates are applied properly and reduces the risk for cases of non-persistent malware.</li>
</ol>
<p><a name="hardware" href="https://securityinabox.org/en/blog/quick-security-recommendations-for-your-devices/undefined"></a></p>
<ul>
<li><p>2FA hardware token recommendations:</p>
<ul>
<li><a href="https://www.yubico.com/products/">Yubikey</a></li>
<li><a href="https://www.nitrokey.com/products/nitrokeys">Nitrokey</a></li>
<li><a href="https://solokeys.com/">Solokeys</a></li>
<li><a href="https://thetis.io/">Thetis Key</a></li>
<li><a href="https://cloud.google.com/security/products/titan-security-key">Google Titan Key</a></li>
</ul>
</li>
<li><p>2FA TOTP recommendations:</p>
<ul>
<li>Computers: <a href="https://keepassxc.org/">KeePassXC</a></li>
<li>Android: <a href="https://getaegis.app/">Aegis</a></li>
<li>iOS/iPhone: <a href="https://github.com/raivo-otp/ios-application/blob/master/README.md">Raivo OTP</a></li>
<li>Android and iOS: <a href="https://freeotp.github.io/">FreeOTP</a></li>
</ul>
</li>
</ul>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://ssd.eff.org/module/creating-strong-passwords">Creating Strong Passwords</a></li>
<li><a href="https://www.privacyguides.org/en/basics/threat-modeling/">Privacy Guides - Threat modeling article</a></li>
<li><a href="https://securityplanner.consumerreports.org/recommendations">Security Planner recommendations</a></li>
<li><a href="https://openbriefing.gitbook.io/defenders-protocol/digital">Open Brienfing - Digital security guidance</a></li>
<li><a href="https://ssd.eff.org/module/your-security-plan">Surveillance Self-defense - Security plan</a></li>
</ul>
<h2 id="android">Android</h2>
<ol>
<li>Check that your <a href="https://support.google.com/android/answer/7680439">Android is up to date</a> and that both your <a href="https://endoflife.date/android">version of Android</a> and your device are still supported (check <a href="https://security.samsungmobile.com/workScope.smsb">Samsung</a>, <a href="https://support.google.com/pixelphone/answer/4457705">Google Pixel</a>, <a href="https://www.hmd.com/en_int/security-updates">Nokia</a> or <a href="https://en-us.support.motorola.com/app/software-security-update">Motorola</a>. For other models, see <a href="https://www.androidauthority.com/phone-update-policies-1658633/">C. Scott Brown's article on the phone update policies from every major Android manufacturer</a>).</li>
<li>Automatically <a href="https://support.google.com/googleplay/answer/113412">update your apps</a>.</li>
<li>Enable <a href="https://support.google.com/googleplay/answer/2812853">Play protect</a>.</li>
<li><a href="https://support.google.com/android/answer/9431959">Review the permissions</a> your apps have access to.</li>
<li>Review <a href="https://securityinabox.org/en/phones-and-computers/android/#remove-apps-that-you-do-not-need-and-do-not-use">installed apps</a> and uninstall any unneeded/unknown ones.</li>
<li>Ensure apps can only be installed from <a href="https://securityinabox.org/en/phones-and-computers/android/#use-apps-from-trusted-sources">trusted sources</a>.</li>
<li>Set a longer password (not a PIN or a pattern) to <a href="https://support.google.com/android/answer/9079129#zippy=%2Cstandard-locks">protect access to your device</a>.</li>
<li>Consider enrolling in <a href="https://support.google.com/android/answer/16339980">Google's Advanced Protection program</a>.</li>
</ol>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/android/">Protect your Android device</a></li>
</ul>
<h2 id="iosiphone">iOS/iPhone</h2>
<ol>
<li>Check that your <a href="https://endoflife.date/ios">iOS version</a> and <a href="https://endoflife.date/iphone">device</a> are still supported and <a href="https://support.apple.com/en-gb/guide/iphone/iph3e504502/ios">up-to-date</a>.</li>
<li>Automatically <a href="https://support.apple.com/en-gb/102629">update your apps</a>.</li>
<li>Review the <a href="https://support.apple.com/en-ie/guide/iphone/iph251e92810/ios">permissions your apps have access to</a>.</li>
<li>Review installed apps and <a href="https://support.apple.com/en-gb/guide/iphone/iph248b543ca/ios">uninstall any unneeded ones</a>.</li>
<li>Switch on the <a href="https://support.apple.com/en-us/105120">lockdown mode</a>, which will also make it harder to compromise your device.</li>
<li>Set a long <a href="https://support.apple.com/en-us/119586">passcode</a> to protect access to your device.</li>
</ol>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/ios/">Protect your iOS device</a></li>
</ul>
<h2 id="windows">Windows</h2>
<ol>
<li>Ensure you are using a <a href="https://endoflife.date/windows">supported version of Windows</a> with <a href="https://support.microsoft.com/en-au/topic/how-to-change-your-automatic-updates-settings-by-using-windows-security-center-804009cd-7931-fc07-5ada-6b157a854201">automatic updates enabled</a>.</li>
<li>Make sure that any software installed via the <a href="https://support.microsoft.com/en-us/windows/turn-on-automatic-app-updates-70634d32-4657-dc76-632b-66048978e51b">Microsoft store is set to automatically update</a>.</li>
<li>Ensure <a href="https://support.microsoft.com/en-us/windows/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963">Windows Defender is turned on</a>. Activate Microsoft Defender rather than using a third-party antivirus.</li>
<li>Consider using <a href="https://github.com/securitywithoutborders/hardentools#readme">Hardentools</a> to disable some often abused features.</li>
<li>Consider using <a href="https://github.com/henrypp/simplewall">Simplewall</a> to monitor where your computer is connecting to.</li>
<li>Ensure <a href="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838">Bitlocker - or Device Encryption - is turned on</a>.</li>
<li>Ensure your computer <a href="https://support.microsoft.com/en-us/windows/change-or-reset-your-windows-password-8271d17c-9f9e-443f-835a-8318c8f68b9c">requires a strong password</a> to log in.</li>
<li><a href="https://support.microsoft.com/en-us/windows/how-to-check-if-an-app-or-program-is-installed-in-windows-10-5af73cea-f875-dfa0-4cd1-72a02aa06436">Review installed programs</a> and <a href="https://securityinabox.org/en/phones-and-computers/windows/#remove-apps-that-you-do-not-need-and-do-not-use">remove any that are no longer needed</a>.</li>
</ol>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/windows/">Protect your Windows computer</a></li>
<li><a href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe">Manage updates in Windows</a></li>
</ul>
<h2 id="macos">macOS</h2>
<ol>
<li>Ensure macOS <a href="https://support.apple.com/guide/mac-help/keep-your-mac-up-to-date-mchlpx1065/mac#aria-mchlpa64b4a7">automatic updates are enabled</a> and that you use a <a href="https://endoflife.date/macos">supported version of macOS</a>.</li>
<li>Consider using <a href="https://objective-see.org/products/lulu.html">LuLu</a> to monitor where you computer is connecting to.</li>
<li>Make sure <a href="https://support.apple.com/en-vn/guide/mac-help/mh11785/mac">FileVault is enabled</a>.</li>
<li>Ensure your computer <a href="https://support.apple.com/en-vn/guide/mac-help/mchlp1550/14.0/mac/14.0">requires a strong password</a> to log in.</li>
<li>Review installed programs and <a href="https://securityinabox.org/en/phones-and-computers/mac/#remove-apps-that-you-do-not-need-and-do-not-use">uninstall any that are  not needed</a>.</li>
</ol>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/mac/">Protect your Mac computer</a></li>
<li><a href="https://support.apple.com/en-us/101591">About background updates in macOS</a></li>
<li><a href="https://support.apple.com/en-ie/guide/mac-help/flvlt003/mac">Set up your Mac to be secure</a></li>
</ul>
<h2 id="ubuntu-linux">Ubuntu Linux</h2>
<ol>
<li>Ensure that your version of Ubuntu is <a href="https://endoflife.date/ubuntu">still supported</a> and that you are keeping it and the <a href="https://wiki.ubuntu.com/SoftwareUpdates">installed software up-to-date</a>.</li>
<li>Enable the <a href="https://help.ubuntu.com/community/Gufw">Firewall</a> or consider using <a href="https://github.com/evilsocket/opensnitch/wiki/Installation">OpenSnitch to monitor</a> where you computer is connecting to.</li>
<li>Ensure <a href="https://www.tecmint.com/encrypt-ubuntu-24-04-installation/">LUKS encryption is enabled</a> when you install the operating system.</li>
<li>Ensure automatic login is disabled and <a href="https://help.ubuntu.com/stable/ubuntu-help/user-changepassword.html">your account is set up with a strong password</a>.</li>
</ol>
<p><strong>Further reading:</strong></p>
<ul>
<li><a href="https://securityinabox.org/en/phones-and-computers/linux/">Protect your Linux Device</a></li>
</ul>
]]></description><link>https://securityinabox.org/en/blog/quick-security-recommendations-for-your-devices/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/quick-security-recommendations-for-your-devices/index.html</guid><dc:creator><![CDATA[Security in a Box]]></dc:creator><pubDate>Thu, 28 Nov 2024 00:00:00 GMT</pubDate></item><item><title><![CDATA[Pegasus Project Questions and Answers]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/black-pegasus-wings.png" alt=""></p>
<p><strong>What happened?</strong></p>
<p>Amnesty International and the media platform Forbidden Stories have published an investigation into the use of an Israeli tool to spy on many people in the world. The investigation was called the <a href="https://forbiddenstories.org/case/the-pegasus-project/">Pegasus Project</a>.</p>
<p><strong>How was this information obtained?</strong></p>
<p>Forbidden Stories and Amnesty International gained access to a leak of more than 50,000 records of phone numbers that were targeted by NSO clients.</p>
<p><strong>Who is the Israeli company and what is the tool used?</strong></p>
<p>The company is <a href="https://en.wikipedia.org/wiki/NSO_Group">NSO</a> and the tool that is used is called Pegasus. NSO claims to sell spyware and tools to governments to target criminals around the world.</p>
<p><strong>Who are the company's clients?</strong></p>
<p>According to the documents, the company sold these programs to dozens of countries, but the countries that were exposed recently and used Pegasus against journalists and HRDs are: the UAE, Saudi Arabia, Bahrain, Morocco, Mexico, Azerbaijan, India, Hungary, Togo and Rwanda.</p>
<p><strong>Who are the victims?</strong></p>
<p>According to the <a href="https://cdn.occrp.org/projects/project-p/#/">documents</a>, the victims are: journalists, human rights defenders, political activists, and politicians in countries and international organizations.</p>
<p><strong>If the number is 50,000, is everyone really infected with malware?</strong></p>
<p>It is impossible to be sure that 50,000 people have been hacked, even if an individual's phone number appears in the list. However, the Amnesty International Security Lab, in partnership with Forbidden Stories, was able to perform technical analysis on dozens of phones and the results showed that at least 67 devices were infected with this software.</p>
<p><strong>How did the hack happen?</strong></p>
<p>NSO has exploited some vulnerabilities in operating systems and applications on both IPhones and Android devices (for example in <a href="https://www.theguardian.com/technology/2020/jul/17/us-judge-whatsapp-lawsuit-against-israeli-spyware-firm-nso-can-proceed">WhatsApp</a>). Malware was distributed by sending links to fake malicious sites (created to look similar to a legitimate site). Clicking on those links would install the malware on the device.</p>
<p>NSO has also recently exploited a vulnerability in the iMessage application available on the iOS operating system.</p>
<p>The so-called <a href="https://en.wikipedia.org/wiki/Zero-day_(computing)">zero-day vulnerabilities</a> are used, which means that the vulnerability that a particular application or program suffers from is not known to developers and is known only to attackers because the vulnerability is not known to developers, no remedy has been developed prior to exploitation.</p>
<p><strong>What can Pegasus malware do?</strong></p>
<p>When a device is infected with Pegasus, attackers can see everything a user does on their device, as if an unlocked phone was given to another person to use, with access to all its information and apps.</p>
<p>The software can be used to look at victims' phone and email messages, look at photos they took, eavesdrop on their calls, track their location and even take a photo.</p>
<p>Pegasus developers are getting better at hiding all traces of the software over time, making it difficult to confirm whether a particular phone has been hacked or not.</p>
<p><strong>Is it possible to check my device to see if I am infected or not?</strong></p>
<p>The Pegasus software is very sophisticated and it is difficult to access accurate information about whether your device is infected with it or not. And it is difficult to detect it using anti-malware programs.</p>
<p>If you think you might be a target, it is advised to contact an expert in order to help you try to check your devices, However, the results might not be definitive.</p>
<p><strong>Amnesty International said that it issued a program to check devices?</strong></p>
<p>Indeed, AI has issued <a href="https://github.com/mvt-project/mvt">important instructions</a> for using a technical method to do this, but this method was intended for technical experts and not the average user.</p>
<p><strong>Are the victims iPhone users only?</strong></p>
<p>No, the victims are users of all devices, Both iPhone or Android.</p>
<p><strong>Has Apple released an update to address these vulnerabilities?</strong></p>
<p>No.</p>
<p>Apple released an important update on 19/July/2021 with iOS version <a href="https://support.apple.com/en-gb/HT212601">14.7</a>, and this update addresses serious security vulnerabilities that were previously discovered, However, new security vulnerabilities being exploited by NSO are not covered by this update</p>
<p>Nonetheless we strongly recommend updating your device immediately. See <a href="https://support.apple.com/en-gb/guide/iphone/iph3e504502/ios">steps for update</a>.</p>
<p><strong>Should I be worried?</strong></p>
<p>We are all worried about the situation, but in the same time we recognise that worrying without taking practical steps to mitigate the risk will not help stop the process of targeting you with malware. So believe that concerns should be turned into motiation to develop digital protection knowledge as well as strengthening the protection of your phones and communications.</p>
<p><strong>What are the practical steps to take?</strong></p>
<p>1- If you believe that you are infected with malware:</p>
<ul>
<li>Sign out of all accounts</li>
<li>Change passwords for all accounts.</li>
<li>Enable two-step verification for accounts</li>
<li>Stop using the device and disconnect the device from any internet network.</li>
<li>Contact an expert in digital protection to get help.</li>
</ul>
<p>2- To protect your device in general:</p>
<ul>
<li>Check Security in-a-Box basic security guides for <a href="https://securityinabox.org/en/guide/basic-security/android/">Android</a> and <a href="https://securityinabox.org/en/guide/basic-security/ios/">iOS</a></li>
<li>We recommend to perform a factory reset of your phone from time to time in order to erase what may have been installed in your device. See steps for <a href="https://support.google.com/android/answer/6088915">Android</a> and <a href="https://support.apple.com/en-us/HT201252">iOS</a>.
Note: Factory reset will remove all information stored on the phone, make sure that you have a recent, working backup of all information stored on the phone before performing factory reset.</li>
<li>Immediately update operating systems and all applications when updates become available.</li>
<li>Do not download applications from outside the official application store.</li>
<li>Use a Virtual Private Network (VPN) on mobile phones and computers.</li>
<li>Check links before opening them. Use <a href="https://www.virustotal.com/">VirusTotal.com</a></li>
<li>Use anti-malware software.</li>
<li>Review phone for unneccessary apps and uninstall if possible.  If not possible, try and disable them.</li>
</ul>
]]></description><link>https://securityinabox.org/en/blog/pegasus-project-questions-and-answers/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/pegasus-project-questions-and-answers/index.html</guid><dc:creator><![CDATA[Mohammed Al-Maskati]]></dc:creator><pubDate>Fri, 23 Jul 2021 00:00:00 GMT</pubDate></item><item><title><![CDATA[Digital protection guides - A survey of community resources]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/stanzebla-flickr-gate-lock.jpg" alt=""></p>
<p>Security in a Box has been respected for many years as one of the most detailed, localized training resources in the internet freedom community. In the past fifteen years, the software our community uses for digital security has changed. SiaB has evolved, and the community has been blessed with many other excellent new resources as well. We are currently preparing to update SiaB, and as we do, we are taking into account the landscape of other guides that is now available.</p>
<p>As a community, we have changed our approach to training in the past decade and a half, too. We are more likely to look for tools and strategies that are easy to use. When we are doing our best, we take guidance from the communities who need to stay safe, rather than considering ourselves the experts and dictating what they need to do. We are more aware of gendered experiences of digital security and privacy. And curricula like <a href="https://level-up.cc/">Level Up</a> have helped us better understand the specific needs of adult learners.</p>
<p>When we began to review the existing digital security and privacy guides, we soon realized the list we were compiling could be useful for others. So we are making it available to everyone who would like an overview of the materials the community has developed. We hope this makes it easier for trainers to find the guides that best serve their communities’ needs. We also hope it can help us all better coordinate production of new materials, as needed.</p>
<p><strong><a href="https://docs.google.com/spreadsheets/d/1LOc6SOJGWymaN4P1hc8ln3Zp-aGob_eKSr9B6MJ6ReE/edit#gid=1566213339">View the guide to digital protection guides here.</a></strong></p>
<p><strong>Please note this spreadsheet is presented in Google Sheets.</strong> You do not need a Google account to view it. We do not generally endorse the use of Google products by at-risk populations. Google's business model is selling data about your viewing patterns to other companies, where it may end up in the hands of unethical data brokers or governments. However, in this case Google Sheets allowed us to present this data to you in a format we could not get a comparable open source tools to replicate. The "filter views" on this sheet allow different users to search this sheet for different kinds of guides (for example, translated in Amharic or for a low-literacy audience) and view different results simultaneously. We expect that if you use recommended tracker-blocker plugins (like uBlock Origin), it will help mitigate the potential tracking harm of viewing a Google-based site.</p>
<h2 id="for-digital-security-trainers-and-those-learning-about-digital-security">For digital security trainers and those learning about digital security</h2>
<p>This “guide to the guides” includes materials produced by international digital rights organizations and our colleagues in the civil sphere, but also guides that are produced by individuals outside that sphere but used by trainers we know, as well as materials linked to by other guides. There are digital security and privacy materials in formats that range from short quizzes to tool guides to full lesson plans, meme images to podcasts. They are available in 58 languages, including Amharic, Aymara, Azerbaijani, Igbo, Kiswahili, nasa Yuwe, Pijao, Quechua dialects, Singhalese, Twi, and Yoruba.</p>
<p>You will find materials in here that are peripheral to the topics of privacy and security. As the digital rights movement has grown, we have welcomed related concerns into our tent. There is some material in here on fighting disinformation, a topic of rising concern for many of us. (We can add more of this, if there is interest; there has been a proliferation of work on this since 2015.) Because they overlap a great deal, we have included guides on privacy, sexuality, and relationship violence along with guides on gendered online harassment and defamation. There are also a couple of guides in here that are not exactly about security and privacy, but may be useful to those who need more background or need help explaining technologies or approaches to their colleagues. Those are tagged “research library.” They include Internews’s civicspace.tech guides, XYZ’s work on technology and gender, and some background on internet infrastructure by Womensnet ZA. Those guides contain material on mobile networks, blockchain technologies, artificial intelligence, and machine learning.</p>
<p>We hope to keep this sheet up to date, so if anything on here looks dangerously outdated let us know. Also, if you know of additional relevant guides that should be included—particularly in languages other than English and Spanish!—please let us know. We expect to also update this with information on secure software’s own documentation before too long.</p>
<h2 id="for-security-guide-writers-ngos-and-funders">For security guide writers, NGOs, and funders</h2>
<p>We expect this guide to the guides will be useful to you, too. Here are some observations we made as we put this spreadsheet together.</p>
<p><strong>Thinking about writing a new guide?</strong> Consider localizing, curating and updating existing materials instead, with the goal of meeting a particular community’s threat model. There are currently over forty guides each in Spanish and in English. A majority of them are Crective Commons licensed for re-use. Consider running an event with a local community to localise existing security guide so it speaks the local language and supports the abilities and needs of that community. We all should carefully consider why it is that we are planning to write a new guide rather than update an existing guide and having it localized well.</p>
<p><strong>Maintaining your existing guide?</strong> To make updating easier, consider separating out:</p>
<ul>
<li><p>reasons why particular security advice is given, independent of personal threat model. Example: “don’t re-use passwords because there are lists of passwords floating around on the internet that make it easy for someone to get into more than one of your accounts,”</p>
</li>
<li><p>strategies for specific threats faced by your readers and trainees and</p>
</li>
<li><p>step-by-step guides to tools.</p>
</li>
</ul>
<p>Why do we suggest this? Separating out different kinds of advice may make localization easier. These different parts of security advice need to be updated on different schedules. Separating them will make it easier to focus on what needs updating and when. The “why” of strategies for security generally does not need to be updated often. The reasoning behind using strong encryption to protect your documents hasn't changed much in the past decade, for example, though the tools we recommend for encrypting have. Specific threat models need periodic updating. Events unfold, like evolving government capabilities, new vulnerability disclosures, or groups of people migrating or organizing. Step-by-step guides to using tools need fast, regular updating as tools change all the time. These go out of date faster than any other part of a guide. Tool producers themselves may produce more updated guides than security trainers. Tails and Thunderbird have done an exemplary job with this. If developers aren’t producing usable guides or documentation, how can the community help make that happen?</p>
<p><strong>We should all clearly list when our guides were last updated.</strong> Many guides out there may include outdated material. Outdated material may put users at risk. Also consider when to take down or put a warning on outdated material.</p>
<p><strong>Explain how your guide was localized if versions exist in multiple languages.</strong> There can be a big difference in quality between co-produced guides or formally localized guides and the ones where a volunteer helped with translation. Co-produced guides will be sensitive to local conditions in which technology is used.</p>
<p><strong>Consider using Creative Commons licensing.</strong> We think it does lead to a certain amount of sustainability. Different projects are definitely using each other’s material, or at least linking to it. However, there isn’t much coordination of updates, or awareness of who is using updated material or who is not.</p>
<p><strong>Consider organizing regular community events to update your materials.</strong> A couple of guides currently have easy-to-use feedback options on individual articles, but still it appears people don’t leave feedback. Our most effective strategy for getting feedback was reaching out to individuals directly, and setting aside a specific time when people could work together on commenting.</p>
<p><strong>There is an opportunity to better manage and coordinate security guide production in the internet freedom community.</strong> Because so much material is on GitHub and GitLab, and so much of it is Creative Commons licensed, it would not be difficult for organizations with a stake in training guide production to collaboratively coordinate a repository. This could also include pulling in the documentation produced by tool developers themselves.</p>
<p><strong>Planning to localize/translate into more languages should happen early in your guide development.</strong> Think ahead about how you will localize, and how you will build a “workflow” out of the different pieces of software you will use (including collaborative editing software like office suites, version control software like GitHub or GitLab, and translation-specific software like Transifex). Producers of digital security guides could learn more about industry-standard documentation and localization processes that could make this easier for us.</p>
<p><em>Image: Flickr user stanzebla, "Gate Lock", CC-BY-SA-2.0</em></p>
]]></description><link>https://securityinabox.org/en/blog/digital-protection-guides-survey-community-resources/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/digital-protection-guides-survey-community-resources/index.html</guid><dc:creator><![CDATA[Gus Andrews]]></dc:creator><pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate></item><item><title><![CDATA[How recently was Security In A Box updated? New in 2020]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/flickr-mtl_mauricio-oscar-in-a-box.jpg" alt=""></p>
<p>It can be hard to keep track of which parts of which digital security guides are up to date. Security in a Box has been incrementally updated over the years. To guide you to our most up-to-date content, we wanted to highlight these sections, which have been updated in English in the last six months:</p>
<ul>
<li><a href="https://securityinabox.org/en/passwords/passwords-and-2fa/">Create and Maintain Strong Passwords</a></li>
<li><a href="https://securityinabox.org/en/guide/keepassxc/windows/">KeePassXC - Secure Password Manager for Windows</a></li>
<li><a href="https://securityinabox.org/en/guide/keepassdx/android/">KeePassDX - Mobile Password Manager for Android</a></li>
<li><a href="https://securityinabox.org/en/guide/firefox/">Some sections of Firefox and Security Add-Ons for Windows - Secure Web Browser</a></li>
<li><a href="https://securityinabox.org/en/phones-and-computers/android/">Some sections of Basic security for Android</a></li>
</ul>
<p>Note that translations of these pages into other languages are not necessarily up to date.</p>
<p>We are currently working on dramatic changes to the structure and contents of SiaB. Among other things, we hope to deploy a more effective translation backend to make it easier to keep future versions of the site up to date. </p>
<p>We welcome feedback on Security in a Box! Drop us a note and tell us: Which sections of SiaB do you depend on? What is currently useful to you? What is not so useful?</p>
<p><em>Image: Flickr user mtl_mauricio, "Oscar in a box", CC-BY-2.0</em></p>
]]></description><link>https://securityinabox.org/en/blog/how-recently-was-security-in-a-box-updated/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/how-recently-was-security-in-a-box-updated/index.html</guid><dc:creator><![CDATA[Gus Andrews]]></dc:creator><pubDate>Mon, 01 Feb 2021 00:00:00 GMT</pubDate></item><item><title><![CDATA[Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption]]></title><description><![CDATA[<p>If you're using the latest version of WhatsApp, then you might have noticed the following notification:</p>
<p><img src="https://securityinabox.org/media/en/blog/whatsapp-crypto.png" alt=""></p>
<p>WhatsApp Crypto message</p>
<p>Or you might have read about this when it was all over the <a href="https://www.theguardian.com/technology/2016/apr/05/whatsapp-rolls-out-full-encryption-to-a-billion-messenger-users">news</a>.</p>
<p>WhatsApp's collaboration with Open Whisper Systems recently brought <em>end-to-end encryption</em> to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.</p>
<p>Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the <em>same protocol</em> for end-to-end encryption.</p>
<h2 id="source-code">Source code</h2>
<p>We would like to start off by congratulating WhatsApp, not only for taking significant measures to protect the privacy of their users, but also for choosing to adopt an open encryption protocol that has been vetted by security experts rather than coming up with yet another proprietary encryption scheme with little or no external review.</p>
<p>Crypto is not the only aspect of security, however. Among other factors, the security of an app also depends on how an encryption protocol is integrated. When software is open source, we are able to review it, see how it has been implemented and verify that it does not contain malicious code. Closed source software, on the other hand, requires that we trust the claims of its developers.</p>
<p>While WhatsApp relies on the Signal protocol, which is an open standard, to encrypt its users' communications, the app itself is closed source. We trust Open Whisper Systems to have properly integrated the Signal protocol into WhatsApp, but the closed source nature of the app prevents us from identifying other aspects of the app that could impact our security.</p>
<p>Signal, on the other hand, is open source. As a result, we can verify that our communications are properly encrypted and review the overall security of the app.</p>
<h2 id="secure-data-storage">Secure data storage</h2>
<p>The Signal protocol that was recently integrated into WhatsApp is a <em>communications</em> protocol, which means that it only encrypts data <em>in transit</em>.  It does <em>not</em> encrypt data, such as our messaging history, that is stored on our phones.</p>
<p>Signal addresses this by providing its users with the option to (encrypt messages stored on their phones with a <a href="https://github.com/WhisperSystems/Signal-Android/wiki/Using-Signal#secure-storage">passphrase</a>, thus protecting those messages from anyone who gains physical access to their device. WhatsApp, on the other hand, <a href="https://www.whatsapp.com/security/">does not currently allow users to secure the messages stored on their phones</a>.</p>
<h2 id="verification">Verification</h2>
<p>An essential component of digital security is the ability to verify that we are actually sending data to, and receiving data from, the person with whom we believe we are communicating. Without this ability, it is possible for someone to sit between us on the network when we first get in touch, decrypt our messages, record them, re-encrypt them and relay them back and forth. This is called a <em>man-in-the-middle</em> attack.</p>
<p>In this scenario, merely recognizing our correspondent's voice is not enough to guarantee that our communication is properly encrypted. For that, we need some kind of cryptographic identity verification mechanism.</p>
<p>Both WhatsApp and Signal support identity verification for messages and voice calls. For messages, they rely on the same mechanism: users compare identity key fingerprints, then flag a contact as verified. For voice calls, however, the two apps work differently. Signal’s voice encryption protocol makes it easy for users to verify each call by reading off two words and making sure they match. WhatsApp’s voice call verification, however, depends on users having previously verified one another for messaging by comparing fingerprints.</p>
<h2 id="business-model">Business model</h2>
<p>WhatsApp is owned by Facebook, while Signal is owned by <a href="https://whispersystems.org/">Open Whisper Systems</a>. They have very different business models.</p>
<p>It's well-known that advertising is at the heart of Facebook's business model, which is fueled by the vast quantities of data that users hand over to the company through its various services. Open Whisper Systems, on the other hand, is a <em>non-profit</em>, grant-funded group of free software developers whose <a href="https://whispersystems.org/">mission</a> is to <em>“advance the state of the art for secure communication, while simultaneously making it easy for everyone to use”</em>.</p>
<p>It’s important to note that while the Signal protocol encrypts the content of our communications, it does not encrypt <em>metadata</em> – information about information - such as who we contact, when and from where. Given Facebook’s willingness to implement end-to-end encryption in WhatsApp, which prevents even the company itself from accessing some of its users’ data, one can't help but wonder if the value has been in the metadata all along.</p>
<p>Unlike content data, which is harder and more expensive to process and retain, metadata is ideally suited to automated analysis by a computer. It can be stored in large quantities and reveals information (such as who you contacted, when and where) that is very difficult – if not impossible – to deny. Using metadata, analysts can map out an individual’s <a href="http://www.theatlantic.com/technology/archive/2013/03/armed-with-facebook-likes-alone-researchers-can-tell-your-race-gender-and-sexual-orientation/273963/">political affiliation, interests, economic background, location and habits</a>, as well as the network of people with whom that individual communicates. This information can be used to create group and individual profiles that are in great demand by an advertising industry desperate to know its audience.</p>
<p>Advertising might seem harmless, but it's important to remember that we are rarely in control of the profiles being created about us. As a result, these profiles may or may not be accurate. And regardless of the accuracy of our profiles, <a href="http://www.newamerica.org/downloads/OTI-Data-an-Discrimination-FINAL-small.pdf">research</a> has shown that profiling can lead to various forms of discrimination. While it's not clear whether and to what extent WhatsApp users' metadata feeds into Facebook's advertising business model, it remains an important question. As Open Whisper Systems is not in the data business, we believe Signal is more likely to protect our metadata.</p>
<p>That said, it’s worth noting that Signal’s reliance on the Google Cloud Messaging platform means that Google — which is, of course, in the data business — does have access to some of the metadata produced by Signal. They know the current <em>IP address</em> of any device that receives a Signal message, for example, but Signal’s architecture hides as much of this metadata as possible. The Signal protocol can be used independently from Google Play Services via <a href="https://libraries.io/github/LibreSignal/LibreSignal">LibreSignal</a>, a fork of Signal, which can be installed from <a href="https://f-droid.org/">F-Droid</a>, a free and open source Android app repository.</p>
<h2 id="using-signal">Using Signal</h2>
<p>Today we are releasing a new <a href="https://securityinabox.org/en/guide/signal/android">tool guide</a> that explains, step-by-step, how to install and use Signal, if you're not already doing so.</p>
]]></description><link>https://securityinabox.org/en/blog/why-we-still-recommend-signal-over-whatsapp/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/why-we-still-recommend-signal-over-whatsapp/index.html</guid><dc:creator><![CDATA[Maria Xynou & Chris Walker]]></dc:creator><pubDate>Mon, 23 May 2016 00:00:00 GMT</pubDate></item><item><title><![CDATA[Lets Encrypt - Moving Towards an Encrypted Web]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/howitworks_certificate.png" alt=""></p>
<p>Do you own a website? If so, as of today <a href="https://letsencrypt.org/">Let's Encrypt</a>, a new non-profit certificate authority (CA), <a href="https://letsencrypt.org/2015/12/03/entering-public-beta.html">entered Public Beta</a> and allows you to add HTTPS to your website for free and more easily than ever before.</p>
<p>If you've ever experienced the hassle of setting up a secure website, you'll be pleased to know that Let's Encrypt automates the entire process and only requires you to manage HTTPS with a few simple <a href="https://letsencrypt.readthedocs.org/en/latest/">commands</a>. This could be a huge step towards an encrypted Web.</p>
<h2 id="why-tls-certificates-are-important">Why TLS certificates are important</h2>
<p>When we access a website, our device makes an HTTP connection to the server that is hosting the website. But as HTTP connections are unencrypted, anyone can potentially intercept our connection and read our traffic or even re-direct us to a malicious server in order to infect our device with malware. To prevent this, it's important that our connections to websites are encrypted and that the websites we visit are secure.</p>
<p>HTTPS was designed for precisely this purpose. Through the use of Transport Layer Security (TLS), it encrypts HTTP connections to websites that support it. This is where digital certificates play an important role; they authenticate websites that support HTTPS so that we know we're communicating with the right servers. Websites that are TLS certified are more secure because they allow you to connect to them via encryption, limiting the probability of interception and increasing the confidentiality of exchanged data.</p>
<h2 id="how-lets-encrypt-helps-us-move-towards-an-encrypted-web">How Let's Encrypt helps us move towards an encrypted Web</h2>
<p>Up until today, obtaining a TLS certificate has been a difficult and expensive process which has discouraged many people from using HTTPS. Starting from today though, Let's Encrypt addresses this problem.</p>
<p>According to the <a href="https://www.eff.org/deeplinks/2014/11/certificate-authority-encrypt-entire-web">EFF</a>: <em>“Switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.”</em></p>
<p>The <a href="http://letsencrypt.org/howitworks/">Let's Encrypt client</a> handles the certificate request and authentication for you and, by default, renews your certificate automatically. It can also configure servers with your new certificate through a simple <a href="https://letsencrypt.org/howitworks/">command</a>. Detailed information on system requirements and on how to use Let's Encrypt's client to request for certificates can be found in its <a href="https://letsencrypt.readthedocs.org/en/latest/">documentation</a>.</p>
<p>That said, it's important to bear in mind that Let's Encrypt just entered <a href="https://letsencrypt.org/2015/12/03/entering-public-beta.html">Public Beta</a>, which means that improvements (particularly on the client side) will still need to be made and it might contain some bugs. Yet, this is still an important step towards a more secure Web for everyone. Not only does Let's Encrypt advance TLS security best practices, but it's also <a href="https://letsencrypt.org/about/">transparent</a> in the sense that all issued or revoked certificates will be publicly recorded and available for anyone to inspect. Furthermore, Let's Encrypt follows <a href="https://letsencrypt.org/about/">open standards</a> by publishing its automatic issuance and renewal protocol.</p>
<p>Help make HTTPS the default across the Internet. Request a TLS certificate and let's encrypt.  </p>
]]></description><link>https://securityinabox.org/en/blog/lets-encrypt-moving-towards-encrypted-web/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/lets-encrypt-moving-towards-encrypted-web/index.html</guid><dc:creator><![CDATA[Maria Xynou]]></dc:creator><pubDate>Thu, 03 Dec 2015 00:00:00 GMT</pubDate></item><item><title><![CDATA[TrueCrypts Security Flaws - What Now?]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/truecrypt_0.png" alt=""></p>
<p>In the last week, <a href="https://thehackernews.com/2015/09/truecrypt-encryption-software.html">critical security flaws</a> have been reported in <a href="https://securityinabox.org/en/guide/truecrypt/windows">TrueCrypt</a>, the open source software for file and disk encryption. As a result, we are reviewing our advice on file and disk encryption and we now recommend users to consider other tools for secure file storage.</p>
<h2 id="whats-wrong-with-truecrypt">What's wrong with TrueCrypt?</h2>
<p>Serious <a href="http://www.pcworld.com/article/2987439/encryption/newly-found-truecrypt-flaw-allows-full-system-compromise.html">vulnerabilities</a> were detected by Google zero-day researcher, James Forshaw, if an attacker has physical access to a device with TrueCrypt installed. While these security flaws don't allow an attacker to decrypt data directly, they can be exploited to compromise a machine, install spyware and to record password keystrokes – ultimately enabling an attacker to figure out a TrueCrypt user's decryption key.</p>
<p>Even though security engineers performed an audit of TrueCrypt which covered the driver code, they missed the following, which were <a href="https://thehackernews.com/2015/09/truecrypt-encryption-software.html">detected by Forshaw</a>:</p>
<ul>
<li>A vulnerability (CVE-2015-7358) which enables an attacker to can gain access to a running process and to get full administrative privileges</li>
<li>A vulnerability (CVE-2015-7359) which enables an attacker to impersonate an authenticated user</li>
</ul>
<h2 id="why-did-we-recommend-truecrypt-in-the-first-place">Why did we recommend TrueCrypt in the first place?</h2>
<p>Up until now, we have recommended TrueCrypt not because it provided perfect security (there's no such thing as “perfect security” anyway), but because it was widely regarded as the best option for file and disk encryption for most users. In particular, <a href="https://securityinabox.org/en/guide/truecrypt/windows">TrueCrypt</a>:</p>
<ul>
<li>is open source (which enabled its audit from professional engineers around the world)</li>
<li>implements strong AES encryption</li>
<li>encrypts whole disks and external disks</li>
<li>creates encrypted volumes and hidden volumes (which are useful features for many users)</li>
</ul>
<p>Last year, however, TrueCrypt developers mysteriously <a href="http://www.theregister.co.uk/2014/05/28/truecrypt_hack">announced</a> an end to the development of this software, quoting “unfixed security issues”. The reasons for this remain unknown and have been subject to some debate and speculation.</p>
<p>We nonetheless continued to recommend TrueCrypt because:</p>
<ul>
<li>there is a lack of clear alternatives that offer Windows users the same features</li>
<li>a recent independent audit found no major security flaws in the source code</li>
<li>there were at least two tools aimed at resurrecting this code and developing it further (CipherShed and VeraCrypt)</li>
</ul>
<p>However, given that TrueCrypt is no longer maintained, the recently discovered bugs won't be fixed directly in the program's code (but will be in <a href="https://veracrypt.codeplex.com/">VeraCrypt</a>, see below). Furthermore, the last version of TrueCrypt is now out of date and getting increasingly awkward to install on current operating systems.</p>
<h2 id="what-now">What now?</h2>
<p>The closest tool to TrueCrypt currently available is one of its forks, VeraCrypt. Like TrueCrypt, VeraCrypt is * open source * and independently audited. <a href="https://veracrypt.codeplex.com/">VeraCrypt 1.15</a> was recently released and addresses the TrueCrypt vulnerabilities that were detected by Forshaw. CipherShed is another project that promises to improve on the TrueCrypt source code, but it is still some way off being released.</p>
<p>Another option is to use encryption built in to your device operating system, such as <a href="http://windows.microsoft.com/en-US/windows-vista/BitLocker-Drive-Encryption-Overview">BitLocker</a> on Windows and <a href="http://osxdaily.com/2013/05/22/filevault-disk-encryption-mac/">FileVault</a> on Mac OS X. These are very simple to use as they can be activated in the settings menu of your operating system. However, BitLocker and FileVault are proprietary tools, they haven't been audited and there is no guarantee that either company's tool has not been compromised by government agencies.</p>
<p>The table below shows some of the features for some TrueCrypt alternatives:</p>
<div class="table-wrapper">

<div class="table-responsive"><table>
<thead>
<tr>
<th><strong>Software</strong></th>
<th><strong>License</strong></th>
<th><strong>Operating System (OS)</strong></th>
<th><strong>Whole disk encryption</strong></th>
<th><strong>Partition encryption</strong></th>
<th><strong>File encryption</strong></th>
</tr>
</thead>
<tbody><tr>
<td>VeraCrypt</td>
<td>Apache License 2.0, TrueCrypt License version 3.0 (legacy code only)</td>
<td>Windows, OS X, Linux</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>BitLocker</td>
<td>Proprietary (Miscrosoft)</td>
<td>Select editions of Windows Vista and later</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>FileVault ('FileVault2', OS X 10.7+)</td>
<td>Proprietary (Apple Inc.)</td>
<td>OS X</td>
<td>Yes</td>
<td>Yes</td>
<td>No</td>
</tr>
<tr>
<td>Disk Utility</td>
<td>Proprietary (Apple Inc.)</td>
<td>OS X</td>
<td>No (external media only)</td>
<td>Yes</td>
<td>Yes</td>
</tr>
</tbody></table></div>
</div>

<p>Depending on their threat model and/or interest in trying out a different operating system, users can also consider switching to <strong>Linux for full disk encryption</strong>. The advantage is that - unlike <a href="http://windows.microsoft.com/en-US/windows-vista/BitLocker-Drive-Encryption-Overview">BitLocker</a> or <a href="http://osxdaily.com/2013/05/22/filevault-disk-encryption-mac/">FileVault</a> -  Linux's full disk encryption is open source. And as we learned from the latest report on TrueCrypt's vulnerabilities, it's important that the source code of the tools we use is open for review by engineers and researchers around the world.</p>
]]></description><link>https://securityinabox.org/en/blog/truecrypts-security-flaws-what-now/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/truecrypts-security-flaws-what-now/index.html</guid><dc:creator><![CDATA[Maria Xynou]]></dc:creator><pubDate>Thu, 08 Oct 2015 00:00:00 GMT</pubDate></item><item><title><![CDATA[Workbook on Security - Practical Steps for Human Rights Defenders at Risk]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/fld-workbook-on-security1.jpg" alt=""></p>
<p>The Workbook on Security is designed to raise awareness about security issues and to help human rights defenders consider how to mitigate threats. The workbook takes human rights defenders through the steps to producing a security plan - for individuals and for organisations. It follows a systematic approach for assessing their security situation and developing risk and vulnerability reduction strategies and tactics. The workbook is available in <a href="https://www.frontlinedefenders.org/en/file/1097/download?token=HDBq4NXR">English</a>, <a href="https://www.frontlinedefenders.org/ar/file/1534/download?token=wR0PDCS1">Arabic</a>, <a href="https://www.frontlinedefenders.org/zh/file/2343/download?token=qLfz0LPP">Chinese</a>, <a href="https://www.frontlinedefenders.org/en/file/3067/download?token=tSE8lBdh">Dari</a>, <a href="https://www.frontlinedefenders.org/fr/file/1652/download?token=A8lc3mrx">French</a>, <a href="https://www.frontlinedefenders.org/pt/file/2277/download?token=9hrswjtN">Portuguese</a>, <a href="https://www.frontlinedefenders.org/ru/file/2183/download?token=0TMpabhU">Russian</a>, <a href="https://www.frontlinedefenders.org/es/file/1541/download?token=XfyVORpn">Spanish</a> and <a href="https://www.frontlinedefenders.org/en/file/3068/download?token=orw-Jx_S">Urdu</a>.</p>
]]></description><link>https://securityinabox.org/en/blog/workbook-security-practical-steps-human-rights-defenders-risk/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/workbook-security-practical-steps-human-rights-defenders-risk/index.html</guid><dc:creator><![CDATA[Front Line Defenders]]></dc:creator><pubDate>Fri, 13 Mar 2015 00:00:00 GMT</pubDate></item><item><title><![CDATA[For LGBT Ugandans, physical security threats often translate into digital threats and vice versa]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/kampala.jpg" alt=""></p>
<p>Uganda has been in the news headlines around the world since 2009, when it introduced its first <a href="http://www.publiceye.org/publications/globalizing-the-culture-wars/pdf/uganda-bill-september-09.pdf">Anti-homosexuality Bill</a> and there have been <a href="http://www.publiceye.org/publications/globalizing-the-culture-wars/pdf/uganda-bill-september-09.pdf">several attempts</a> since then to increase penalties for LGBT people and those who help them. Unsurprisingly, criminalization, physical violence and harassment has led many in the LGBT community to socialize, discuss and organize online. However, many LGBT people are now facing extreme digital threats, including abuse on social media and targeted malware attacks. Activists and trainers are working hard to help people protect themselves online, in one of the most hostile to LGBT people climates in Africa.</p>
<p>Despite the political repression, Uganda has one of the most vibrant and outspoken LGBT movements in Africa, but the repercussions for those choosing to live publicly as LGBT can be severe.</p>
<p>As one human rights defender says:</p>
<blockquote>
<p>LGBT persons in Uganda are under threat. Occasionally even their neighbors threaten to report them to the police.</p>
</blockquote>
<p>LGBT people suffer <a href="http://76crimes.com/2015/01/27/uganda-9-gay-men-threatened-by-mob-arrested-by-police/">arbitrary arrests</a>, <a href="http://www.hrw.org/news/2014/05/14/uganda-anti-homosexuality-act-s-heavy-toll">physical assaults</a> and are frequently <a href="http://www.hrw.org/news/2014/05/14/uganda-anti-homosexuality-act-s-heavy-toll">evicted</a> from their homes. And in an atmosphere of <a href="http://www.hrw.org/world-report/2014/country-chapters/uganda">concerted political suppression</a>, opportunities for LGBT people to meet and organize are very limited.</p>
<p>As a result, the internet has become hugely important to the Ugandan LGBT community. LGBT organizations have been launching <a href="https://www.change.org/p/international-criminal-court-investigate-and-prosecute-the-top-3-homophobic-ugandans-for-crimes-against-humanity">online petitions</a>, <a href="https://sexualminoritiesuganda.com/">running websites</a> and participating in the human rights <a href="http://thelede.blogs.nytimes.com/2014/02/24/reaction-to-uganda-antigay-law/?_r=0">debate</a> in Uganda, while LGBT individuals use internet platforms - such as dating websites - to network. But this creates further risks. One human rights defender said:</p>
<blockquote>
<p>There is a lot of hate speech on discussion forums. Often we find comments with threats, including death threats</p>
</blockquote>
<p><a href="https://www.facebook.com/IWasAliveWhenUgandaMade50">Facebook pages</a> harassing and expressing hate speech against LGBT individuals have often been shared in Uganda. Newspapers have repeatedly <a href="http://www.bbc.com/news/world-africa-26338941">published</a> the names and addresses of alleged LGBT individuals and in some cases have even used their Facebook pictures.</p>
<p>In 2014 several LGBT organizations <a href="https://freedomhouse.org/report/freedom-net/2014/uganda">received emails</a> affected by <a href="https://en.wikipedia.org/wiki/Zeus_(malware)">Zeus malware</a>, which is used as a “backdoor” to access personal online accounts. In early 2015 an organization had one of their email accounts hacked and information about their donors leaked; they were then asked to send part of a donation they had received days before to an organization based in Kenya.</p>
<p>Frequent police raids on HIV/AIDS organization <a href="http://www.nature.com/nm/journal/v20/n5/full/nm0514-456.html">offices</a> and at <a href="https://freedomhouse.org/article/uganda-police-raid-lgbti-activists-workshop-kampala-condemned#.VP2mNcvaaPQ%20%7C%20http://www.nature.com/nm/journal/v20/n5/full/nm0514-456.html">events</a> also make it extremely risky to store sensitive information on devices. In addition, the 2014 <a href="http://www.ug-cert.ug/files/downloads/The-Anti-pornography-act-2014">Anti-Pornography Act</a> holds Internet Service Providers (ISP) responsible for allowing pornography downloads through their services: such a provision can give way for surveillance and blocking of LGBT-related content by ISPs.</p>
<p>There is a clear connection between online and offline threats to LGBT people. Online harassment – especially when real names and pictures are involved – can be reproduced in the offline space. Police raids pose not only physical threats but also threats to information stored on devices. Malware and hacking attempts can result into wealth and information loss and so on.</p>
<p>One activist says:</p>
<blockquote>
<p>Data- and email-theft are of the greatest digital security risks LGBT communities face in Uganda. And for that reason, strong passwords, whole-drive encryption, anti-viruses and anti-malware are the main tactics we adopt.</p>
</blockquote>
<p>Activists in the Ugandan LGBT community have been highly pro-active in raising awareness of digital threats and taking steps to counter them. <a href="http://ifreedomuganda.net/#">Digital security trainings</a> have been taking place for some time, particularly with organizations. In these trainings activists learn how to stay secure online and offline and find out about new tools and techniques. But <a href="https://www.unwantedwitness.or.ug/wp-content/uploads/2014/01/internet-they-are-coming-for-it-too.pdf">limited digital literacy</a> and <a href="http://opennetafrica.org/wp-content/uploads/researchandpubs/State%20of%20Internet%20Freedoms%20in%20Uganda%202014.pdf">low internet penetration</a> make effective digital security training highly challenging.</p>
<p>One trainer in Uganda says:</p>
<blockquote>
<p>One of the most outstanding challenges I face as a digital security trainer is the fact that most of our people don't have concrete background in the use of ICTs and computers. They just have a basic knowledge of connecting online to specific pages. As such, we have had to first give these people computer literacy trainings and later introduce them to digital security. […] We have very recently embarked on distributing Tactical Tech's Security in-a-box manuals to community organizations and members.</p>
</blockquote>
<p>There is a combination of factors that increases both offline and online risks to LGBT Ugandans. Legal persecution and social prejudice are reproduced in the online space as digital risks. These risks feed then back to the cycle and often have consequences in the offline world. Digital risks are reinforced by an environment characterized by <a href="http://www.hrw.org/world-report/2014/country-chapters/uganda">loopholes in the protection of human rights</a> and limited digital literacy. As such, there is an urgent need to increase LGBT Ugandans' awareness of digital risks and of the tools and tactics they can use to deal with these risks.</p>
<p><a href="https://tacticaltech.org/">Tactical Technology Collective</a> has produced a series of toolkits tailored to the needs of LGBT communities in sub-Saharan Africa. They present and describe, in user-friendly way, the tools and tactics LGBT communities can undertake to deal with digital risks. If you are a member of Uganda's LGBT communities and you would like to find out more on how to protect your devices and online communications you can access Tactical Tech's guide <a href="https://securityinabox.org/en/lgbti-africa">here</a> and <a href="https://securityinabox.org/media/en/blog/cf-lgbti-africa.pdf">here</a>, for free. If you are interested in Tactical Tech's work on digital security in general, you can visit our <a href="https://tacticaltech.org/">website</a> or the website dedicated to our project <a href="https://securityinabox.org/en/">Security in-a-box</a>.</p>
<p>You can follow me on <a href="https://twitter.com/spyrosem">twitter</a>.</p>
<p>Many thanks to <a href="http://www.frontlinedefenders.org/GeoffreySsebaggala">Geoffrey Wokulira Ssebaggala</a> from <a href="https://unwantedwitness.or.ug/">Unwanted Witness</a> and <a href="https://twitter.com/KellyMukwano">Kelly Daniel Mukwano</a> from <a href="http://ifreedomuganda.net/">i freedom Uganda</a> for their comments and support.</p>
<p>The quotes have been picked from research on the digital security needs of African LGBT communities conducted by Tactical Tech staff. For security reasons the quotes have been anonymized.</p>
]]></description><link>https://securityinabox.org/en/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/index.html</guid><dc:creator><![CDATA[Spyros E. Monastiriotis]]></dc:creator><pubDate>Fri, 13 Mar 2015 00:00:00 GMT</pubDate></item><item><title><![CDATA[Does encryption still work?]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/national_security_agency_2013.jpg" alt=""></p>
<p>In light of ongoing revelations about the global surveillance efforts of the US National Security Agency (NSA) and its intelligence allies, you might be wondering if any of this really matters anymore. Much of the recent media coverage appears to suggest that, not only are They recording everything we do and say on the Internet, but now They've defeated our encryption. The sky is falling; all is lost; etc. It is certainly the case that we have learned a great deal from this episode, and that toolkits like Security in-a-Box must be updated to reflect some of those lessons. (Watch this space!) And, of course, it is also true that bombshells remain to be dropped; <a href="https://www.eff.org/deeplinks/2013/09/crucial-unanswered-questions-about-nsa-bullrun-program">questions to be answered</a>; suspicions to be confirmed or denied. However, to the best of our knowledge—where "our" knowledge, in this case, is largely that of the security community's best and brightest researchers, <a href="https://www.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/">cryptologists</a> and tool developers—nothing has come to light that should lead us to abandon hope. While perfect security is (and will remain) unachievable, with the right tools and tactics, we can still <a href="http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance">protect our digital privacy and security</a> in meaningful ways.</p>
<p>In the words of Edward Snowden himself, "Properly implemented strong crypto systems are one of the few things that you can rely on..." One of the primary goals of Security in-a-Box is to help demystify those two facets of reliability: to identify security tools that the community considers "strong," and to guide you through whichever aspects of "properly implemented" fall on <em>your</em> shoulders, as a user of those tools. Over the coming months, we expect to learn a little about how we've done so far, and we hope to learn a lot about how we can do better.</p>
<h2 id="what-has-changed">What has changed?</h2>
<p>On September 6th, The Guardian, the New York Times and ProPublica jointly reported on a classified NSA program called BULLRUN that is dedicated to subverting various forms of encryption meant protect the privacy of online communications. Crucially, efforts by the NSA to ensure its own ability to bypass these protections has the effect of <a href="https://www.eff.org/deeplinks/2013/05/caleatwo">weakening them against other attackers</a>, as well. It is virtually impossible to install "backdoors" into security devices, protocols, software or standards without compromising those systems more generally. (Nor does the NSA appear to be trying all that hard. One particularly blunt instrument in the $250 million BULLRUN arsenal involved blatant manipulation of standards setting initiatives, with the express goal of weakening any recommendations produced.)</p>
<p>The second half of Snowden's statement, mentioned above, is less optimistic: "Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it." Or, as Bruce Schneier puts it, "If the NSA wants in to your computer, it's in. Period." So, what does this mean for users of Security in-a-Box? Admittedly, it means you're better off not being a personal target of the most well-resourced espionage organization in the world. But, even if you are—or if it turns out that other nefarious organizations and individuals have similar capabilities—the advice in this toolkit can make their lives much more difficult.</p>
<h2 id="what-remains">What remains?</h2>
<p>We do not yet have specifics on what systems, standards, services and tools the NSA and its allies have attempted to undermine, but security researchers who have weighed in on the topic remain confident in the core technology behind most of the secure communication software recommended in this toolkit. One example is Pretty Good Privacy (also known as PGP or GPG), the encryption scheme implemented by <a href="https://securityinabox.org/en/guide/gpg4usb/windows">gpg4usb</a>, by the <a href="https://securityinabox.org/en/guide/thunderbird/windows">Enigmail add-on to the Thunderbird email client</a> and by the <a href="https://securityinabox.org/en/guide/apg/android">APG application for Android</a>. Another good example is <a href="https://securityinabox.org/en/guide/pidgin/windows">Off the Record (OTR), the instant messaging (IM) encryption used by Pidgin</a> and Adium, and by <a href="https://securityinabox.org/en/guide/textsecure/android">TextSecure</a> for text messaging (SMS). Along with zRTP—the Voice over IP (VoIP) encryption used by a number of tools that do not yet appear in Security in-a-Box—these technologies have several things in common:</p>
<ul>
<li><p>They are Free and Open Source Software (FOSS), and they are based on open standards.</p>
</li>
<li><p>They rely on end-to-end encryption, which means your content is scrambled when it leaves your computer or smartphone, and it stays that way until it reaches the person with whom you are communicating. Unlike other forms of encryption (HTTPS-protected webmail, for example), the tools listed above prevent your service provider from understanding the data you send and receive. This, in turn, protects you from anyone who might be monitoring or pressuring that provider.</p>
</li>
<li><p>They have been around for a while, and are well-respected by the digital security community.</p>
</li>
<li><p>Unfortunately, they are not as common as they should be, nor as easy to use as they could be. And, they do not work unless the person with whom you wish to communicate also uses them.</p>
</li>
</ul>
<h2 id="what-does-that-mean-for-me">What does that mean for me?</h2>
<p>At risk of getting a bit too technical a bit too soon, the following is a brief list of recommendations in light of what we have learned over the past few months. This will make more sense if you've already read through Security in-a-Box (or another guide like it), but even if you are new to this material, you might want to keep these suggestions handy as you begin to learn more about digital security.</p>
<p>1) At least one organization out there probably is recording everything you do or say on the Internet. But, that doesn't mean  they can read and understand all of it! Use FOSS, end-to-end encryption tools to protect the content of your sensitive communications. You can read more about this below.</p>
<p>2) Even though attackers probably won't be able to read your end-to-end encrypted communication, we now know that at least one organization is <em>trying really hard</em>. To ensure that they, and others like them, are not successful, you should use strong keys. (For GPG, use at least a 2048 bit RSA key.) If you have an older, weaker (1024 bit and/or DSA) GPG key, now is probably a good time to create a new one. And, in general, ask around or search the the Web for information about other "details" you might not understand at first. As mentioned in the toolkit, for example, "authenticating" your <a href="https://securityinabox.org/en/guide/gpg4usb/windows">encrypted</a> <a href="https://securityinabox.org/en/guide/thunderbird/windows">email</a> and <a href="https://securityinabox.org/en/guide/pidgin/windows">instant messaging</a> contacts is no less important than installing the software itself and exchanging keys. As cryptologists like to say, "the math works," but you have to do your part, as well.</p>
<p>3) Against a truly determined attacker with significant resources, the OTR-based messaging tools described in this resource—Pidgin and TextSecure—are in some ways safer than GPG-encrypted email. Specifically, this is because every message you send or receive using OTR is automatically encrypted with a new key. So, even if somebody records all of your (unreadable) messages over the course of several years, and then somehow gets their hands on your secret key, they still won't be able to decrypt all of that content. This is not true with GPG. In case you're curious, this property is called "perfect forward secrecy" (PFS), and it holds true for zRTP-encrypted VoIP tools, as well, including <a href="https://securityinabox.org/en/guide/jitsi/windows">Jitsi</a> used with the <a href="https://ostel.co/">ostel.co</a> service.</p>
<p>4) Be aware that hiding basic data about your Internet and mobile phone "traffic" (also called "meta-data") is much more difficult than hiding the actual content of your communications. Examples of meta-data include: who you talk to, from where, when, for how long and through what channels. If you need to protect this sort of information from a well-connected adversary, use the <a href="https://securityinabox.org/en/tools/torbrowser/">Tor Browser</a> anonymity tool (<em>in addition</em> to the other software recommended here), and make sure you study up on how to use it properly. Or, better yet, restart your PC with the <a href="https://tails.boum.org/">Tails</a> operating system (and learn how to use the Linux versions of those same tools). This will increase the likelihood that your Internet traffic is successfully anonymized by the Tor network.</p>
<p>5) Be careful with commercial software and services. Some of these resources, like Gmail, almost certainly offer strong privacy protections against outside attackers, but many of the companies who develop and operate them have shown a willingness to install monitoring code, backdoors and other "features" that weaken the security of their own software. Naturally, this is most relevant if you believe that these companies—or governments with direct influence over them—are likely to cooperate with those who oppose your online and offline activities. Keep in mind, however, that built-in surveillance mechanisms like this also represent fundamentally bad security design. (This warning applies to commercial operating systems, as well, by the way, including Microsoft Windows, Apple's Mac OS X and all major smartphone platforms.)</p>
<p>6) Make sure you are using the latest stable version of all security tools. And, while you're at it, learn how to "verify" the software you download (using checksums or digital signatures) to ensure that it's authentic. This won't protect you from a backdoor installed by the developer—voluntarily or under pressure from an organization like the NSA—but it will keep you safe from many other attacks.</p>
<h2 id="troubles-all-the-way-down">Troubles all the way down?</h2>
<p>At this point, you might be looking back at what we said about the NSA's BULLRUN program and thinking, "But even if I use trusted, open-source, end-to-end encryption software based on open, transparent standards—and even if I use it properly—how does that help me if the standards themselves have been poisoned by the NSA?" First of all, if it comes to light that the NSA has somehow compromised the most fundamental building-blocks upon which these particular encryption tools were built, and nobody has noticed, then yes; that will be a sad day. Lucky for us, that does not appear to be the case.</p>
<p>Encryption schemes like GPG, OTR and zRTP are themselves open standards, as are the underlying protocols and algorithms from which they were constructed: AES symmetric encryption, RSA asymmetric encryption and signing, DSA signing, Diffie-Hellman key agreement and SHA hash algorithms, among others. These building blocks—which are also used in secure data storage tools like <a href="https://www.veracrypt.fr/en/Home.html">VeraCrypt</a> and <a href="https://keepassxc.org/">KeePassXC</a>—have all been around for quite some time. And, unlike <a href="http://www.wired.com/threatlevel/2013/09/nsa-backdoor/">some other standards</a>, none have yet shown evidence of NSA sabotage.</p>
<p>That could change, of course, as the NSA was certainly involved at one level or another in the selection of many cryptographic standards, including several of those listed above. Regardless, the openness of these standards appears to be serving its intended purpose, and is clearly preferable to the alternative. Trusted cryptologists can at least dig the specifications, searching for intentional flaws as well as the accidental ones they've been watching out for all along, rather than just crossing their fingers and hoping for the best. Furthermore, the NSA's credibility as a defender of Internet security is pretty much shot these days, and one can hope that their role in the establishment of future standards will be severely curtailed for a good long while.</p>
]]></description><link>https://securityinabox.org/en/blog/does-encryption-still-work/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/does-encryption-still-work/index.html</guid><dc:creator><![CDATA[Chris Walker]]></dc:creator><pubDate>Wed, 11 Mar 2015 00:00:00 GMT</pubDate></item><item><title><![CDATA[Observations on recent India censorship]]></title><description><![CDATA[<p><img src="https://securityinabox.org/media/en/blog/cens2.jpg" alt=""></p>
<p>On 17th December 2014, the Government of India's Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to <a href="http://www.livemint.com/Industry/drJ5ToWFEIyRNEAbn9OcGN/Govt-blocks-32-websites-including-Vimeo-and-Github.html">block access to 32 websites</a>, effective immediately. Not only did the ban affect access to popular cultural sites such as archive.org, vimeo.com, dailymotion.com, but the order also blocked access to sites like github.com, pastebin.com, which are useful for all sorts of people but are especially popular with software developers.</p>
<p>A copy of the order that the MCIT's Department of Telecommunications sent to ISPs by email can be found <a href="http://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order_compressed.pdf">here</a> (356kB, compressed PDF) or <a href="http://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf">here</a> (2MB).</p>
<p><img src="https://securityinabox.org/media/en/blog/2015-01-06-Kaustabh_screenshot1.png" alt=""></p>
<p>The Ministry's order was issued following a request from the Mumbai police's Anti-Terrorism Squad on 15th November 2014. The police request argued that the targeted web services were being used for "Jihadi Propaganda" by "Anti-National groups", and were encouraging youth in the country to join organisations like the Islamic State (ISIS/ISIL).</p>
<p>However, many of the blocked sites are large resources for general use by diverse communities which have no links to terrorism. Tools which are important in the daily work of India-based software developers are included in the banned sites, whose work in the IT sector is penalised by broad bans with the excuse of anti-terrorism measures.</p>
<p>As IT professionals in India attempt to continue to do their jobs, there has been a lack of information about the nature of the site bans. We thought it would be a good idea to do some research using free and accessible tools and to look at how censorship has been implemented, as well as the various circumvention techniques people are using.</p>
<h2 id="a-summary-of-our-key-findings">A summary of our key findings</h2>
<p>Between January 1st and 3rd 2015, we conducted censorship measurements from various Internet connections using seven different ISPs in India. These include TATA Communications and the state-run Mahanagar Telecom Nigam Limited (MTNL). The understanding we currently have is preliminary and draws on the browsing experience of several customers of different ISPs around India as well as information gained through the use of the open source censorship measurement toolkit provided by <a href="https://ooni.torproject.org/">Open Observatory of Network Interference</a> (OONI) and other manual tests we conducted.</p>
<p>The censorship order issued by the Ministry specifies what to block, but not how. Unsurprisingly, this has led to a situation where different ISPs are blocking sites using different techniques. Users of some ISPs may be able to circumvent the censorship by simply changing their DNS settings, while others will need to configure proxies or install circumvention software. In all cases we have observed, censorship can be bypassed using standard circumvention tools such as the <a href="https://torproject.org/">Tor Browser</a>.</p>
<p>We saw a variety of different block pages across multiple ISPs. Here are screenshots of the six we captured.</p>
<ul>
<li>“The page you have requested has been blocked, because the URL is banned”</li>
<li>“This site has been blocked as per the instruction of Competent Authority”</li>
<li>“&lt;!–This is a comment. Comments are not displayed in the browser–&gt;”</li>
<li>“The requested url is blocked, based on the blocking Instruction order received from the Department of Telecommunications, Ministry of Communications &amp; IT, Government of India”</li>
<li>“HTTP Error 404 — File or Directory not found”</li>
<li>The page you have requested has been blocked, because the URL is banned.”</li>
</ul>
<p>Besides finding that different ISPs use different methods of blocking, we also found that the same sites might be blocked with different methods even from the same ISP. The "not found" and "this is a comment" error pages appeared across multiple ISPs, which could indicate that there are multiple layers of blocking so that if the first one "fails open" another layer catches it. Even so, the blocking is unreliable--when requesting the same site many times, it sometimes loads and sometimes yields a censorship message or error page.</p>
<p>TATA appears to be using a proxy server to inspect and modify traffic to certain IP addresses. If the request is for one of the censored sites, a block page is returned instead. We can tell that the filtering is only being applied to certain IP addresses by sending HTTP requests for censored hostnames to the IP addresses of unrelated websites. Using some TATA connections, requests to some IP addresses are blocked based on the content of the request, while requests for those same hostnames sent to other IPs are not blocked. In particular, requests to google.com IPs containing host headers requesting blocked hostnames return the block page for those hostnames, while requests to yahoo.com IP addresses do not.</p>
<p>Instead of <a href="https://en.wikipedia.org/wiki/Deep_packet_inspection">Deep Packet Inspection</a>, MTNL appears to be using a combination of DNS-based and IP-based blocking approaches. Their DNS resolvers gives an incorrect answer (59.185.3.14) for the censored hostnames. It is possible to see the block page that MTNL users experience by browsing to <a href="http://59.185.3.14/">http://59.185.3.14/</a> from anywhere in the world. Some MTNL customers were still able to connect to github's correct IP, while others were not.</p>
<p>Most of the reports collected using OONI are available <a href="https://ooni.torproject.org/reports/0.1/IN/">here</a>. These reports contain evidence of other sites being blocked in addition to the 32 websites specified in the December 17th order. The other sites are apparently being blocked using the same infrastructure, but we have not been able to determine under what authority their blocking has been ordered.</p>
<p>Other domains which appeared blocked on MTNL during testing included adult websites featuring Indian people although other adult websites listed in the <a href="https://alexa.com/">alexa-top-1000</a> were not observed to be blocked. Censorship of advertisement, music sharing, and file hosting websites was also observed.</p>
<h2 id="how-can-one-circumvent-this-censorship">How can one circumvent this censorship?</h2>
<p>In some cases, as ISPs are only blocking HTTP connections, while allowing access to sites over HTTPS, one could try to manually access the site using https:// instead of http:// in the URL. Regardless of whether the webpages you access are being censored or not, we recommend using the <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> plugin in your web browser to automatically use the HTTPS version of many sites.</p>
<p>When the censorship is DNS-based, it can usually be circumvented by changing the DNS configuration on your device to use nameservers hosted outside of India. Two popular public DNS services are offered by <a href="https://store.opendns.com/setup">OpenDNS</a> and <a href="https://developers.google.com/speed/public-dns/docs/using">Google's public DNS</a>.</p>
<p>We were also able to access the blocked websites using <a href="https://www.torproject.org/">Tor Browser</a> at all times.</p>
<p>Another option is to use a Virtual Private Network (VPN) hosted outside the country and a couple of services which offer this are The <a href="https://help.riseup.net/en/vpn">RiseUp Collective</a> (Free) and <a href="https://www.ivpn.net/">iVPN</a> (Paid). Mobile users using Android devices can also use <a href="https://psiphon.ca/en/index.html">Psiphon</a>.</p>
<h2 id="additional-resources">Additional resources</h2>
<p>If you would like to understand more about censorship techniques or help collect more data, here are some useful resources that you might want to refer to:</p>
<ul>
<li><p><a href="https://ooni.torproject.org/">Open Observatory of Network Interference</a> provides a set of open source tools that can be used to test and collect technical data about censorship and network tampering. We have made the reports generated from the data we collected using OONI <a href="https://ooni.torproject.org/reports/0.1/IN/">here</a>.</p>
</li>
<li><p>URL lists provided by <a href="http://citizenlab.org/">CitizenLab</a> were also used during <a href="https://github.com/citizenlab/test-lists/archive/master.zip">testing</a>.</p>
</li>
<li><p><a href="https://www.torproject.org/">Tor Browser</a> is a free and open source software tool, which lets you securely circumvent censorship and surveillance and allows you to access resources on the Internet anonymously.</p>
</li>
<li><p>For other resources about circumvention tools and tactics, and general digital security advice, please see Tactical Techology Collective's <a href="https://securityinabox.org/en/">Security-in-a-box</a> project.</p>
</li>
<li><p>The <a href="https://cis-india.org/">Center for Internet and Society</a> is an organisation based in Bangalore, India, which is actively working on policy for Internet governance, censorship and surveillance in India.</p>
</li>
</ul>
<h2 id="current-state-of-things">Current state of things</h2>
<p>Following a new <a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=114259">order</a> issued on 31st December 2014, 4 of the 32 websites have subsequently been unblocked. The unblocked sites are github.com, vimeo.com, dailymotion.com and weebly.com</p>
<p>We will keep monitoring this censorship and publish any other relevant findings over the next few days. If you are a software developer or an IT professional who wants to help us collect more data from multiple ISPs in India, please contact us at <a href="mailto:censorship-in@chaoslab.in">censorship-in@chaoslab.in</a>. Please use this <a href="http://chaoslab.in/goiblocks/censorship-in@chaoslab.in.pub.asc">PGP key</a> if you would like to send us an encrypted email.</p>
<p><em>To read the larger dialogue on Twitter about this blocking of websites, please follow the hashtag <a href="https://twitter.com/hashtag/GOIblocks">#GOIblocks</a>.</em></p>
<p><em>This blog post was co-authored by <a href="https://twitter.com/houndbee">Kaustubh Srikanth</a>, <a href="https://twitter.com/wiretapped">Leif Ryge</a>, Aaron Gibson and <a href="https://twitter.com/botherder">Claudio Guarnieri</a> and originally appeared in <a href="http://www.huffingtonpost.in/kaustubh-srikanth/technical-observations-ab_b_6421306.html">Huffingtonpost.in</a> on 6th January, 2015</em></p>
]]></description><link>https://securityinabox.org/en/blog/observations-recent-india-censorship/index.html</link><guid isPermaLink="true">https://securityinabox.org/en/blog/observations-recent-india-censorship/index.html</guid><dc:creator><![CDATA[Kaustubh Srikanth]]></dc:creator><pubDate>Tue, 06 Jan 2015 00:00:00 GMT</pubDate></item></channel></rss>