Secure messaging, metadata removal, and encryption for journalists working with sources.
One of the most important guarantees of professional activity, and often the safety of journalists, is the right not to disclose and to protect their sources if the information was confidential.
Experts, in turn, should not be afraid to assist journalists and work “under the source”: in cases where an official statement is impossible, this remains the only way to restore the truth.
But as we know, all information leaves digital traces, and the question arises of how to safely and effectively work with digital sources and protect personal data. Several useful tools exist.
VPN
- Cyber Ghost is a free VPN for your computer.
- Windscribe is another free cross-platform VPN.
- BetterNet is a free VPN for mobile devices.
- Nord VPN is a paid VPN.
- Avira is a free VPN.
A review of VPN providers that accept cryptocurrency payments.
Anonymizers
- Privatoria — Tor + VPN.
- HMA is a free proxy server.
- Seedr — private torrent downloading.
Secure messengers
- Wickr is a free messaging system for desktop and mobile devices.
- Signal is another free messaging system for desktop and mobile devices.
- Silent Circle — paid solutions for secure communication.
Disk encryption
- TrueCrypt is the latest, proven version of full-disk encryption and container creation software.
- VeraCrypt is an analogue of TrueCrypt.
- Bitlocker – Setting up Bitlocker for Windows.
- FileVault – Setting up FileVault 2 for Mac OS.
Passwords
- PassWare – hacking forgotten passwords.
- 7-Zip is a 7-zip-compatible archiver for Windows.
- Keka is a 7-zip-compatible archiver for MacOS.
- Randomize — password strength check.
- SafePasswd is a generator of strong passwords that are easy to remember.
- Keychain Access – A review of the built-in password manager for Mac.
- 1-Password is a universal password manager.
- Lindy is a hardware port blocker.
Multifactor authentication
- Knock — log into your computer without entering a password.
- Unlox — log into your computer without entering a password or using TouchID.
- Securenvoy – two-factor authentication.
- Centrify is a multi-factor authentication solution for your company.
- Predator is a USB key for Windows computers.
- Rohos is a USB key for a Windows computer.
- USB Lock is a USB key for Mac.
Metadata
- List of utilities for removing metadata from documents.
- Fenwick & West – A comprehensive presentation on the potential legal risks and precedents associated with the misuse of metadata.
- Metapicz — processing EXIF information from photos.
- TinEye — image search on the Internet.
Device theft protection
- LockWatch — protection for Android.
- Find My iPhone — protection for Apple devices.
Free antivirus software for Mac
- Knock Knock – checks applications and libraries for vulnerabilities or threats.
- Malwarebytes Anti-Malware – virus scan.
- ClamXAV — virus checker.
- Bitdefender Virus Scanner for Mac — virus check.
- Dylib Hijack Scanner – search for hacked or infected applications.
Free antivirus software for Windows
- Avast – virus scanning, including real-time scanning.
- AVG — virus scanning, including real-time scanning.
- BitDefender – virus scanning, including real-time scanning.
- Avira — virus scanning, including real-time scanning
- MetaDefender Cloud Client — analysis of running processes for virus infections.
Cloud-based antiviruses
- VirusTotal — scan individual files (up to 128 MB) simultaneously with several antiviruses in the cloud.
- MetaDefender – scan individual files (up to 140 MB) simultaneously with multiple antiviruses in the cloud.
Browsers
- Epic Privacy Browser is a secure browser with a built-in VPN.
- Puffin (iOS) is a secure browser for mobile devices.
- Puffin (Android) is a secure browser for mobile devices.
- Tor is an anonymous browser.
- I2P – access to the dark web.
Virtual workstations
- VirtualBox is a free virtual machine.
- VMWare is the most popular virtual machine.
- Parallels is the best virtual machine for Mac.
Secure OS for virtual desktops
- Tails is the image of Tails.
- Discreete Linux — Ubuntu Privacy Remix (UPR).
- JonDo Live-DVD — JonDo Live-DVD image.
- Ipredia is the image of Ipredia.
- Whonix is the image of Whonix.
Sandboxes
- Sandboxie — create and run secure sandboxes.
Deleting information
- Disk Utility – disk formatting for Mac.
- Eraser – disk cleaning, complete file deletion.
- CCleaner – cleaning unwanted information.
Firewalls
- TinyWall – control over the built-in Windows firewall.
- ZoneAlarm is one of the best free firewalls for Windows.
- LittleSnitch is the most popular firewall for Mac.
- Private Eye is a free network connection monitor for Mac.
DNS
- Google DNS — DNS settings from Google.
- Open DNS — DNS settings from Open DNS.
- DNS.Watch is a DNS service without logging.
Anonymous mail services
- Tutanota, Mailfence, Posteo, CoutnerMail — encrypted messaging.
- ProtonMail is an encrypted email account. Use it when communicating information. Create an email account in ProtonMail and share the keys with the recipient. Instead of sending emails, communicate with each other via drafts. Don’t forget to delete them.
- BitMessage is an anonymous email service accessible through the Tor network.
Cloud storage
- Tresorit is a secure cloud storage service.
Checking the integrity of accounts
- iCloud – iCloud Guide (1).
- iCloud – iCloud Guide (2).
- Google – How to regain access to a hacked account.
- Gmail – Recover a hacked Gmail account.
