Edit me

The following pages and posts are tagged with:

TitleTypeExcerpt
Test Page Symptom goes here, within quotes as here
Full-Disk Encryption on Mac with FileVault 2 Page The client has an unencrypted Mac computer (OS X Lion - 10.7 - or later) and needs to protect sensitive files. A high-risk user has a Mac computer (OS X Lion...
PGP - Transfer Key to New Machine Page An old machine will no longer be in use and the owner's PGP key pair needs to be transferred to their new machine and wiped from the old device.
How to Circumvent the Great Firewall in China Page Client needs to overcome the Great Firewall in Mainland China
PGP - Lost Keys Page The client has lost their PGP keys after formatting their machine and has no backup of their key pair.
Hotmail Account Blocked for Security Reasons Page A client has tried to change their Hotmail account settings and their account has been blocked for 30 days.
Tails Boot Issues on Mac Page A Tails stick fails to boot on a Mac computer. The same Tails stick boots up normally on other machines.
Antivirus for Mac Page A client is asking for an antivirus recommendation on Mac. A client is a high risk person using a Mac computer.
PGP - GnuPG V2 Warning on Linux Systems Page A client is using Thunderbird + Enigmail on a Linux system. Enigmail is showing a warning message saying that the current version will be the last one to sup...
How to Clean a Malware-Infected Windows Machine Page A Windows computer is suspected to be infected with malware, or the computer behaves abnormally, with some common symptoms - unusual slowness, application er...
Removing Adware from a Windows Machine Page The client's browser is showing ads that stop them from doing what they need to do, for instance when trying to access documents from Google drive
How to set up Deflect DDoSP for a client Page The client has suffered or is currently suffering a denial-of-service attack. The client suspects their website might be targeted by DDoS attacks in the futu...
Online Tools to Check a Websites' Reputation Page A task requires you to check the reputation of an IP address, domain name and/or URL.
Secure Chat Tools for mobile devices Page A client has requested recommendations for secure chat tools which are compatible with Android and iOS devices and have group chat support.
Secure File Sharing on Google Drive Page A client uses Google Drive for sharing sensitive documents and needs to review their security practices.
Force Tor Browser to use specific exit nodes Page There is a need to force Tor Browser to use specific exit node/s explicitly.
Report URL miscategorization Page Access to a certain URL is being blocked by a network security device or software.
PGP - Revoking old key from key servers Page A key needs to be revoked because it has been compromised or the client has lost their private key or has generated a new key.
Reboot a Website under OVH Using FileZilla Page A website hosted under OVH was shut down as a result of prohibited activity, hacking, or phishing. The client still has access to the FTP client, so the webs...
Security Measures for macOS Computers Page A high-risk macOS user is asking for digital security recommendations on how to secure their device.
Recommendations on Encrypted Email Web Apps Page A client is asking for a review of a specific secure web application for encrypted email, e.g. Tutanota, Protonmail, Hushmail
FAQ - Full-Disk Encryption (FDE) Page A client's sensitive information is stored on a device (laptop, smartphone) unprotected; a client has critical data on their device and is concerned about lo...
Secure Yahoo Account with 2-Step Verification Page The client's Yahoo account can be accessed with a normal password, which can be acquired through bruteforcing, phishing, etc.
Website Down Page A website is unreachable and the client needs to understand why and what to do
Circumvention & Anonymity Tools List Page Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t...
Safe Travel Recommendations Page A client needs to secure their electronic devices and communications while travelling
FAQ - Secure Backup Page The client has sensitive information and is afraid of losing it; the client is going to encrypt their device and wants to back up their data in advance; the ...
Recommend CMS/Framework for NGOs Page Client asks advice for a secure CMS or framework to build or audit their official website, a campaign website or any website that is related to their activis...
PGP - Add UserID Page A user needs to add a new UserID to their current PGP Key, because they have a new email address or have moved to a different job.
Encrypt an External Storage Device Using Disk Utility on Mac Page A client is using a Mac and their external device might be examined by an untrusted authority or risks being lost or stolen.
Lightweight Security Assessment Page An organization is requesting assistance on digital security, but their request is not clear; an organization would like to receive help to improve their pra...
Install XMPP+OTR on Linux, Windows and macOS Page A client has identified XMPP+OTR as the best option for securing their chat communications and needs guidance for installing Pidgin and the OTR plugin or Adi...
Set-up Instructions for XMPP and OTR on Linux, Windows and macOS Page A client has identified XMPP+OTR as the best option for securing their chat communications and has already installed Pidgin and OTR or Adium. They now need g...
File Encryption with VeraCrypt or GPG Page A client is uploading sensitive data on an online file hosting service (DropBox-like) without protecting it through encryption, or needs to back up sensitive...
Safe Browsing Practices and Plugins Page A client is inquiring about best practices when browsing online.
Encrypt an External Storage Device with VeraCrypt Page A client needs to store sensitive data in an external storage device, like a USB stick, a memory card, or an external hard drive. The storage device risks be...
Report and Disable Malicious C&C Server Page A C&C server is identified by malware researchers, clients, or partners to be linked to a phishing campaign or to malware targeting civil society groups;...
FAQ - Data Leak Page Sensitive information that was stored in a client's computer or storage has been published on a public website without the client's consent and is being used...
FAQ - Initial Reply in Foreign Languages Page When a client sends their first email, we need to provide a human and understandable answer within 2 hours. In the initial reply we should inform the client ...
Website Defaced Page The website has an inappropriate index page, or the content of any of its pages has changed, generally to launch a message opposite to the one supported by t...
FAQ - Online Harassment Targeting a Civil Society Member Page A civil society member has been subjected to a hate speech campaign or other forms of harassment and gendered online violence
PGP Key Signing Page A PGP key needs to be signed to confirm that it's connected to a user's email address
Digital Security Advice when Travelling to China Page A client who is preparing a trip to Mainland China has asked us for advice
Website Censorship in China Page A website is censored in China by the Great Firewall
Forensic Handling of Data on a PC Page The Helpline has come into possession of a personal computer with digital evidence
Secure Email Recommendations Page A client needs recommendations on how to secure their email communications
Advanced Threats Triage Workflow Page The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network
Guiding Questions for High-Risk Organisations Page A high-risk organization is requesting assistance for dealing with advanced threats and a clear threat assessment is needed
Converting Markdown to InDesign and Vice Versa Page A client needs to start a git-based documentation workflow and currently their documentation is based on InDesign
Outreach to Clients for Local Situations Page A critical situation has emerged in a country where we have clients
How to Recognize Spear-Phishing and What to Do Page A user at risk has received a phishing message that seems targeted
Recommendations on Secure File Sharing and File Storage Page A client needs a secure solution for sharing files and/or for storing them in the cloud
Secure Survey Tools Page A client has requested advice on a secure survey tool
Recommendations on Two-Factor Authentication Page A client needs advice on how to secure their account with multi-factor authentication.
Recommendations on Team Password Managers Page A client has asked how best to store sensitive passwords that need to be accessed by more than one person.
Android App Removal Page An app created by a civil society member has disappeared from the Android app store.
Doxing and Non-Consensual Publication of Pictures and Media Page A civil society member's personal details, pictures, or other private information have been published online.
Training Resources Page An organization or group of activists has requested a training or workshop and we are looking for reference resources to prepare it.
Remove PGP Passphrase from Cache Page A user reports that their PGP client encrypts or decrypts emails without requesting a passphrase.
Android Devices Data Acquisition Procedure Page The Helpline has come into possession of a Android device that could be infected or can be use as digital evidence.
Mobile Data Acquisition Report Guidelines Page The Helpline has acquired data from an Android device that could be infected or can be used a digital evidence, and needs to issue a report on the forensic a...
Data Acquisition Using Android Debug Bridge (ADB) Page The Helpline has come into possession of an Android device that could be infected or can be used as digital evidence.
Handling Fake Domains in Out-of-Mandate Cases Page A fake domain has been reported, but after the vetting process, we have found out the client is not part of civil society but is a commercial entity or out o...
Handling of Fake Domains Page A fake domain has been established to impersonate a legitimate website of a client, and we need to report it.
Recommendations for Domain Registration and Disputes Page A client would like to register a new domain and needs advice on how to choose a registrar, or has issues with the registrar and needs advice on how to addre...
Protocol for a Client We Suspect Is Paranoid Page A client is talking about threats that don't seem realistic or we suspect they are paranoid for other reasons and don't know how to react.
Forensic Analysis of Videos and Images Page Video and images files are sometimes delivered to the Helpline with a request to get information about these files (date of creation, to determine if it coul...
Securing Facebook Pages Admin Accounts Page A client is concerned that the accounts they use to manage their project's Facebook Page might be identified and targeted by harassers, or that the account m...
Analysing Suspicious PDF Files Page A client has received a suspicious PDF file and needs to analyse it to make sure it does not contain malicious code.
Project Management Tools for NGOs Page The Helpline has received a request for recommended NGO-friendly project management tools.
How to Check the Integrity of a File Page A client needs to check the integrity of a file they have downloaded from the internet, or to extract the hash of a file that they are sending to the Helplin...
Host-Based Live Forensics on Windows Page The Helpline needs to perform live forensics on a Windows machine using built-in tools.
Host-Based Live Forensics on Linux/Unix Page The Helpline needs to perform live forensics on a Linux/Unix machine using built-in tools.
PGP - Extend Expiration Date Page A client's PGP key has expired and they wish to renovate it. In some cases, without the client's warning, we may initiate the process to extend the expiratio...
Organizational Security Policy Page An organization is requesting assistance to create a security policy. The organization may or may not have already undergone a security assessment.
Google Workspace (formerly G Suite) Domain Security Review & Hardening Page Client organization has concerns or is experiencing issues regarding digital security when using Google Workspace, and asks for help to review it and possibl...
MS Office Files static analysis Page How to analyze MS Office Files to find signs of malicious behavior.
WebRTC - recommendations and troubleshooting Page Jitsi and BigBlueButton are pretty user-friendly, but sometimes there are issues connecting to them. This article includes recommendations on clients and bro...
TLS and self-signed certificates Page Knowledge base for TLS and self-signed certificates.
DDoS Attack Identification Page A website is unreachable, and the client needs to understand why and what to do.
PCAP File Analysis with Wireshark to investigate Malware infection Page A device shows weird behavior or the user believes they opened a malicious file. The device is a smart phone, making forensics more difficult.
Escalations To Platforms With No Escalation Channel Page How to handle a case that requires escalation to an online platform, host provider or registrar where the Helpline has not already established an escalation ...
PGP - Issues with Key Transfer Page A GPG key pair has been transferred to a new machine, but the passphrase for the private key is not working in the new device.
Static Analysis of APK files Page A client received a link to install a suspicious APK. A strange app has shown up on an Android device.
Apple Lockdown Mode Page Information about Apple Lockdown Mode, what we think about it, how to enable it, and usability constraints
Resources for conducting investigations on Social Media Page Resources for conducting open source investigations of malicious behavior or accounts on social media.
Recommendations on VoIP/video Chat Tools Page A client is looking for a secure alternative to call people; an at risk user is concerned about making calls which can be monitored or intercepted; a client ...
Tech Platforms Intervention in Legal Cases Page A beneficiary requests intervention in pushing platforms to answer requests from law enforcement.
Client Receives a Suspicious/Phishing Email Page A client has received an email with or without an attachment from a known or unknown source
Encrypt Files on a Mac with GpgTools Page A client using macOS is uploading sensitive data on an online file hosting service (DropBox-like) without protecting it through encryption.
Ubuntu - Linux - FDE after OS installation Page The client would like to encrypt the entire hard drive of a laptop running on Linux Ubuntu.
FDE with DiskCryptor on Windows Page A client has an unencrypted machine and their version of Windows does not support Bitlocker.
GPGTools Issues with Encrypting or Signing Page A new installation of GPGTools with Apple Mail on a Mac computer does not allow encrypting or signing emails. In Preferences --> GPGMail there is a green che...
Advice on Hosting Page A client is looking for a web hosting provider and needs advice on how to choose.
Google Account Security for an Individual Page The client's Google account has suffered or been implicated in a security incident
FAQ - Securing Online Accounts Page A client is concerned that one or more of their accounts might be or might have been compromised and needs basic recommendations on how to secure their onlin...
test article Page just a test
Title of the article Page Symptom of the article, within quotes as here