The following pages and posts are tagged with:
Title | Type | Excerpt |
---|---|---|
Test | Page | Symptom goes here, within quotes as here |
Full-Disk Encryption on Mac with FileVault 2 | Page | The client has an unencrypted Mac computer (OS X Lion - 10.7 - or later) and needs to protect sensitive files. A high-risk user has a Mac computer (OS X Lion... |
PGP - Transfer Key to New Machine | Page | An old machine will no longer be in use and the owner's PGP key pair needs to be transferred to their new machine and wiped from the old device. |
How to Circumvent the Great Firewall in China | Page | Client needs to overcome the Great Firewall in Mainland China |
PGP - Lost Keys | Page | The client has lost their PGP keys after formatting their machine and has no backup of their key pair. |
Hotmail Account Blocked for Security Reasons | Page | A client has tried to change their Hotmail account settings and their account has been blocked for 30 days. |
Tails Boot Issues on Mac | Page | A Tails stick fails to boot on a Mac computer. The same Tails stick boots up normally on other machines. |
Antivirus for Mac | Page | A client is asking for an antivirus recommendation on Mac. A client is a high risk person using a Mac computer. |
PGP - GnuPG V2 Warning on Linux Systems | Page | A client is using Thunderbird + Enigmail on a Linux system. Enigmail is showing a warning message saying that the current version will be the last one to sup... |
How to Clean a Malware-Infected Windows Machine | Page | A Windows computer is suspected to be infected with malware, or the computer behaves abnormally, with some common symptoms - unusual slowness, application er... |
Removing Adware from a Windows Machine | Page | The client's browser is showing ads that stop them from doing what they need to do, for instance when trying to access documents from Google drive |
How to set up Deflect DDoSP for a client | Page | The client has suffered or is currently suffering a denial-of-service attack. The client suspects their website might be targeted by DDoS attacks in the futu... |
Online Tools to Check a Websites' Reputation | Page | A task requires you to check the reputation of an IP address, domain name and/or URL. |
Secure Chat Tools for mobile devices | Page | A client has requested recommendations for secure chat tools which are compatible with Android and iOS devices and have group chat support. |
Secure File Sharing on Google Drive | Page | A client uses Google Drive for sharing sensitive documents and needs to review their security practices. |
Force Tor Browser to use specific exit nodes | Page | There is a need to force Tor Browser to use specific exit node/s explicitly. |
Report URL miscategorization | Page | Access to a certain URL is being blocked by a network security device or software. |
PGP - Revoking old key from key servers | Page | A key needs to be revoked because it has been compromised or the client has lost their private key or has generated a new key. |
Reboot a Website under OVH Using FileZilla | Page | A website hosted under OVH was shut down as a result of prohibited activity, hacking, or phishing. The client still has access to the FTP client, so the webs... |
Security Measures for macOS Computers | Page | A high-risk macOS user is asking for digital security recommendations on how to secure their device. |
Recommendations on Encrypted Email Web Apps | Page | A client is asking for a review of a specific secure web application for encrypted email, e.g. Tutanota, Protonmail, Hushmail |
FAQ - Full-Disk Encryption (FDE) | Page | A client's sensitive information is stored on a device (laptop, smartphone) unprotected; a client has critical data on their device and is concerned about lo... |
Secure Yahoo Account with 2-Step Verification | Page | The client's Yahoo account can be accessed with a normal password, which can be acquired through bruteforcing, phishing, etc. |
Website Down | Page | A website is unreachable and the client needs to understand why and what to do |
Circumvention & Anonymity Tools List | Page | Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t... |
Safe Travel Recommendations | Page | A client needs to secure their electronic devices and communications while travelling |
FAQ - Secure Backup | Page | The client has sensitive information and is afraid of losing it; the client is going to encrypt their device and wants to back up their data in advance; the ... |
Recommend CMS/Framework for NGOs | Page | Client asks advice for a secure CMS or framework to build or audit their official website, a campaign website or any website that is related to their activis... |
PGP - Add UserID | Page | A user needs to add a new UserID to their current PGP Key, because they have a new email address or have moved to a different job. |
Encrypt an External Storage Device Using Disk Utility on Mac | Page | A client is using a Mac and their external device might be examined by an untrusted authority or risks being lost or stolen. |
Lightweight Security Assessment | Page | An organization is requesting assistance on digital security, but their request is not clear; an organization would like to receive help to improve their pra... |
Install XMPP+OTR on Linux, Windows and macOS | Page | A client has identified XMPP+OTR as the best option for securing their chat communications and needs guidance for installing Pidgin and the OTR plugin or Adi... |
Set-up Instructions for XMPP and OTR on Linux, Windows and macOS | Page | A client has identified XMPP+OTR as the best option for securing their chat communications and has already installed Pidgin and OTR or Adium. They now need g... |
File Encryption with VeraCrypt or GPG | Page | A client is uploading sensitive data on an online file hosting service (DropBox-like) without protecting it through encryption, or needs to back up sensitive... |
Safe Browsing Practices and Plugins | Page | A client is inquiring about best practices when browsing online. |
Encrypt an External Storage Device with VeraCrypt | Page | A client needs to store sensitive data in an external storage device, like a USB stick, a memory card, or an external hard drive. The storage device risks be... |
Report and Disable Malicious C&C Server | Page | A C&C server is identified by malware researchers, clients, or partners to be linked to a phishing campaign or to malware targeting civil society groups;... |
FAQ - Data Leak | Page | Sensitive information that was stored in a client's computer or storage has been published on a public website without the client's consent and is being used... |
FAQ - Initial Reply in Foreign Languages | Page | When a client sends their first email, we need to provide a human and understandable answer within 2 hours. In the initial reply we should inform the client ... |
Website Defaced | Page | The website has an inappropriate index page, or the content of any of its pages has changed, generally to launch a message opposite to the one supported by t... |
FAQ - Online Harassment Targeting a Civil Society Member | Page | A civil society member has been subjected to a hate speech campaign or other forms of harassment and gendered online violence |
PGP Key Signing | Page | A PGP key needs to be signed to confirm that it's connected to a user's email address |
Digital Security Advice when Travelling to China | Page | A client who is preparing a trip to Mainland China has asked us for advice |
Website Censorship in China | Page | A website is censored in China by the Great Firewall |
Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence |
Secure Email Recommendations | Page | A client needs recommendations on how to secure their email communications |
Advanced Threats Triage Workflow | Page | The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network |
Guiding Questions for High-Risk Organisations | Page | A high-risk organization is requesting assistance for dealing with advanced threats and a clear threat assessment is needed |
Converting Markdown to InDesign and Vice Versa | Page | A client needs to start a git-based documentation workflow and currently their documentation is based on InDesign |
Outreach to Clients for Local Situations | Page | A critical situation has emerged in a country where we have clients |
How to Recognize Spear-Phishing and What to Do | Page | A user at risk has received a phishing message that seems targeted |
Recommendations on Secure File Sharing and File Storage | Page | A client needs a secure solution for sharing files and/or for storing them in the cloud |
Secure Survey Tools | Page | A client has requested advice on a secure survey tool |
Recommendations on Two-Factor Authentication | Page | A client needs advice on how to secure their account with multi-factor authentication. |
Recommendations on Team Password Managers | Page | A client has asked how best to store sensitive passwords that need to be accessed by more than one person. |
Android App Removal | Page | An app created by a civil society member has disappeared from the Android app store. |
Doxing and Non-Consensual Publication of Pictures and Media | Page | A civil society member's personal details, pictures, or other private information have been published online. |
Training Resources | Page | An organization or group of activists has requested a training or workshop and we are looking for reference resources to prepare it. |
Remove PGP Passphrase from Cache | Page | A user reports that their PGP client encrypts or decrypts emails without requesting a passphrase. |
Android Devices Data Acquisition Procedure | Page | The Helpline has come into possession of a Android device that could be infected or can be use as digital evidence. |
Mobile Data Acquisition Report Guidelines | Page | The Helpline has acquired data from an Android device that could be infected or can be used a digital evidence, and needs to issue a report on the forensic a... |
Data Acquisition Using Android Debug Bridge (ADB) | Page | The Helpline has come into possession of an Android device that could be infected or can be used as digital evidence. |
Handling Fake Domains in Out-of-Mandate Cases | Page | A fake domain has been reported, but after the vetting process, we have found out the client is not part of civil society but is a commercial entity or out o... |
Handling of Fake Domains | Page | A fake domain has been established to impersonate a legitimate website of a client, and we need to report it. |
Recommendations for Domain Registration and Disputes | Page | A client would like to register a new domain and needs advice on how to choose a registrar, or has issues with the registrar and needs advice on how to addre... |
Protocol for a Client We Suspect Is Paranoid | Page | A client is talking about threats that don't seem realistic or we suspect they are paranoid for other reasons and don't know how to react. |
Forensic Analysis of Videos and Images | Page | Video and images files are sometimes delivered to the Helpline with a request to get information about these files (date of creation, to determine if it coul... |
Securing Facebook Pages Admin Accounts | Page | A client is concerned that the accounts they use to manage their project's Facebook Page might be identified and targeted by harassers, or that the account m... |
Analysing Suspicious PDF Files | Page | A client has received a suspicious PDF file and needs to analyse it to make sure it does not contain malicious code. |
Project Management Tools for NGOs | Page | The Helpline has received a request for recommended NGO-friendly project management tools. |
How to Check the Integrity of a File | Page | A client needs to check the integrity of a file they have downloaded from the internet, or to extract the hash of a file that they are sending to the Helplin... |
Host-Based Live Forensics on Windows | Page | The Helpline needs to perform live forensics on a Windows machine using built-in tools. |
Host-Based Live Forensics on Linux/Unix | Page | The Helpline needs to perform live forensics on a Linux/Unix machine using built-in tools. |
PGP - Extend Expiration Date | Page | A client's PGP key has expired and they wish to renovate it. In some cases, without the client's warning, we may initiate the process to extend the expiratio... |
Organizational Security Policy | Page | An organization is requesting assistance to create a security policy. The organization may or may not have already undergone a security assessment. |
Google Workspace (formerly G Suite) Domain Security Review & Hardening | Page | Client organization has concerns or is experiencing issues regarding digital security when using Google Workspace, and asks for help to review it and possibl... |
MS Office Files static analysis | Page | How to analyze MS Office Files to find signs of malicious behavior. |
WebRTC - recommendations and troubleshooting | Page | Jitsi and BigBlueButton are pretty user-friendly, but sometimes there are issues connecting to them. This article includes recommendations on clients and bro... |
TLS and self-signed certificates | Page | Knowledge base for TLS and self-signed certificates. |
DDoS Attack Identification | Page | A website is unreachable, and the client needs to understand why and what to do. |
PCAP File Analysis with Wireshark to investigate Malware infection | Page | A device shows weird behavior or the user believes they opened a malicious file. The device is a smart phone, making forensics more difficult. |
Escalations To Platforms With No Escalation Channel | Page | How to handle a case that requires escalation to an online platform, host provider or registrar where the Helpline has not already established an escalation ... |
PGP - Issues with Key Transfer | Page | A GPG key pair has been transferred to a new machine, but the passphrase for the private key is not working in the new device. |
Static Analysis of APK files | Page | A client received a link to install a suspicious APK. A strange app has shown up on an Android device. |
Apple Lockdown Mode | Page | Information about Apple Lockdown Mode, what we think about it, how to enable it, and usability constraints |
Resources for conducting investigations on Social Media | Page | Resources for conducting open source investigations of malicious behavior or accounts on social media. |
Recommendations on VoIP/video Chat Tools | Page | A client is looking for a secure alternative to call people; an at risk user is concerned about making calls which can be monitored or intercepted; a client ... |
Tech Platforms Intervention in Legal Cases | Page | A beneficiary requests intervention in pushing platforms to answer requests from law enforcement. |
Client Receives a Suspicious/Phishing Email | Page | A client has received an email with or without an attachment from a known or unknown source |
Encrypt Files on a Mac with GpgTools | Page | A client using macOS is uploading sensitive data on an online file hosting service (DropBox-like) without protecting it through encryption. |
Ubuntu - Linux - FDE after OS installation | Page | The client would like to encrypt the entire hard drive of a laptop running on Linux Ubuntu. |
FDE with DiskCryptor on Windows | Page | A client has an unencrypted machine and their version of Windows does not support Bitlocker. |
GPGTools Issues with Encrypting or Signing | Page | A new installation of GPGTools with Apple Mail on a Mac computer does not allow encrypting or signing emails. In Preferences --> GPGMail there is a green che... |
Advice on Hosting | Page | A client is looking for a web hosting provider and needs advice on how to choose. |
Google Account Security for an Individual | Page | The client's Google account has suffered or been implicated in a security incident |
FAQ - Securing Online Accounts | Page | A client is concerned that one or more of their accounts might be or might have been compromised and needs basic recommendations on how to secure their onlin... |
test article | Page | just a test |
Title of the article | Page | Symptom of the article, within quotes as here |