The following pages and posts are tagged with
Title | Type | Excerpt |
---|---|---|
Advanced Threats Triage Workflow | Page | The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network. |
Circumvention & Anonimity tools list | Page | Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t... |
How to clean a malware-infected Windows machine | Page | A windows computer is suspected to be infected with malware, or the computer behaves abnormally, with some common symptoms - unusual slowness, application er... |
Encrypt files on a Mac with GpgTools | Page | Sensitive data being uploaded on an online file hosting service (DropBox-like) without being protected/encrypted. |
Recommendations on encrypted email web apps | Page | A client is asking for a review of a specific secure web application for encrypted email, e.g. Tutanota, Protonmail, Hushmail. |
Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence. |
Converting Markdown to InDesign and vice-versa | Page | The client needs to start a git-based documentation workflow and currently their documentation is based on InDesign. |
Lightweight Security Assessment | Page | An organization is requesting assistance on digital security, but their request is not clear; An organization would like to receive help to improve their pra... |
PGP key signing | Page | A PGP key needs to be signed to confirm that it's connected to a user's email address. |
Recommend CMS/Framework for NGOs | Page | Client asks advice for a secure CMS or framework to build or audit their official website, a campaign website or any website that is related to their activis... |
Set a client with Riseup's VPN using Bitmask | Page | Client is connecting through a monitored connection; Connection to Tor is blocked; Client's Internet connection is censored; Client requires Internet access ... |
Safe Travel Recommendations | Page | A client needs to secure their electronic devices and communications while travelling. |
FAQ - Secure Backup | Page | The client has sensitive information and he is afraid of loosing them; The client is going to encrypt their device and wants to back up their data in advance... |
Secure Email Recommendations | Page | A client needs recommendations on how to secure their email communications. |
Outreach to clients for local situations | Page | A critical situation has emerged in a country where we have clients. |
How to recognize spear-phishing and what to do | Page | A user at risk has received a phishing message that seems targeted. |
Client Receives a Suspicious/Phishing Email | Page | The client has received an email with or without an attachment from a known or unknown source. |
Digital security advice when travelling to China | Page | A client who is preparing a trip to Mainland China has asked us for advice. |
Recommendations on VoIP/video chat tools | Page | Client uses Skype, Google Hangouts, or other commercial services for sensitive voice/video chat. |
How to circumvent the Great Firewall in China | Page | Client needs to overcome the Great Firewall in Mainland China. |
Website censorship in China | Page | A website is censored in China by the Great Firewall. |
Website down | Page | A website is unreachable. |