The following pages and posts are tagged with
| Title | Type | Excerpt | 
|---|---|---|
| Advanced Threats Triage Workflow | Page | The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network. | 
| Circumvention & Anonimity tools list | Page | Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t... | 
| How to clean a malware-infected Windows machine | Page | A windows computer is suspected to be infected with malware, or the computer behaves abnormally, with some common symptoms - unusual slowness, application er... | 
| Encrypt files on a Mac with GpgTools | Page | Sensitive data being uploaded on an online file hosting service (DropBox-like) without being protected/encrypted. | 
| Recommendations on encrypted email web apps | Page | A client is asking for a review of a specific secure web application for encrypted email, e.g. Tutanota, Protonmail, Hushmail. | 
| Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence. | 
| Converting Markdown to InDesign and vice-versa | Page | The client needs to start a git-based documentation workflow and currently their documentation is based on InDesign. | 
| Lightweight Security Assessment | Page | An organization is requesting assistance on digital security, but their request is not clear; An organization would like to receive help to improve their pra... | 
| PGP key signing | Page | A PGP key needs to be signed to confirm that it's connected to a user's email address. | 
| Recommend CMS/Framework for NGOs | Page | Client asks advice for a secure CMS or framework to build or audit their official website, a campaign website or any website that is related to their activis... | 
| Set a client with Riseup's VPN using Bitmask | Page | Client is connecting through a monitored connection; Connection to Tor is blocked; Client's Internet connection is censored; Client requires Internet access ... | 
| Safe Travel Recommendations | Page | A client needs to secure their electronic devices and communications while travelling. | 
| FAQ - Secure Backup | Page | The client has sensitive information and he is afraid of loosing them; The client is going to encrypt their device and wants to back up their data in advance... | 
| Secure Email Recommendations | Page | A client needs recommendations on how to secure their email communications. | 
| Outreach to clients for local situations | Page | A critical situation has emerged in a country where we have clients. | 
| How to recognize spear-phishing and what to do | Page | A user at risk has received a phishing message that seems targeted. | 
| Client Receives a Suspicious/Phishing Email | Page | The client has received an email with or without an attachment from a known or unknown source. | 
| Digital security advice when travelling to China | Page | A client who is preparing a trip to Mainland China has asked us for advice. | 
| Recommendations on VoIP/video chat tools | Page | Client uses Skype, Google Hangouts, or other commercial services for sensitive voice/video chat. | 
| How to circumvent the Great Firewall in China | Page | Client needs to overcome the Great Firewall in Mainland China. | 
| Website censorship in China | Page | A website is censored in China by the Great Firewall. | 
| Website down | Page | A website is unreachable. |