The following pages and posts are tagged with:
Title | Type | Excerpt |
---|---|---|
Vetting Request - Encrypted | Page | External Vetting, email to partner (only encrypted) |
Instructions to set Up FileVault 2 on a Mac | Page | Email template to guide clients into setting up FileVault 2 in their Mac |
Facebook - Page Blocked | Page | Initial email to client about a Facebook page blocked due to an alias |
Post-DSC Outreach Template | Page | Email template for outreach - addressed at members of civil society we met during a Digital Security Clinic or an event |
Initial Reply in English | Page | First response, Email to Client |
Inform Clients of Vetting Process | Page | Template to inform clients about our vetting process |
Inform Intermediary About Vetting Process | Page | Template to inform an intermediary about our vetting process |
PGP - User ID added | Page | Email to client to confirm that their new user ID has been added to their PGP key |
Template - Phishing Link | Page | Email sent to hosting provider or technical responsible of domain to request them to cease spreading harm |
Reporting a Domain Name in Out-of-Mandate Cases | Page | This template is sent as guidance to clients who are reporting a domain name but are out of mandate |
PGP Key Signing Introduction | Page | Template to suggest key signing to enhance the web of trust and/or address a key tampering attack |
Sending Signed PGP Key | Page | Template to be used after signing a PGP key to send the signed key and instructions to the user |
Setup Checklist for Clients Travelling to China | Page | Secure setup for clients who need to take their work or private devices to Mainland China |
Response to 1st-Time/Non-Vetted Helpline Client | Page | First reply - questions and introduction to vetting |
Disable C&C Server - Email to Registrar of Malicious Domain | Page | Template for writing to the registrar of a malicious domain to disable it |
Disable C&C Server - Email to Hosting Provider | Page | Template to ask the company that hosts a malicious website to disable it |
Disable C&C Server - Email to Client | Page | Email to ask the client or partner for permission to share malware indicators with the digital security community after a C&C server has been disabled |
Initial Reply for Harassment Cases | Page | First response to clients who have been targeted by gendered online violence |
Inform Clients Targeted by Harassment about Vetting Process | Page | Template to inform clients who have been targeted by gendered online violence about our vetting process |
Outreach Template for Local Situations | Page | Template for reaching out to clients who might be affected by a local situation |
Warning on Possible Spear-Phishing Attacks | Page | Template for writing to intermediaries to gather information on a possibly targeted phishing attack |
Outreach Template | Page | Email template for outreach - addressed at members of civil society |
PGP - Transfer Key to New Machine - Email | Page | Email to client to explain how to transfer their PGP key pair to a new computer |
PGP - Setup - Final Email | Page | Email to client to confirm that they have set up PGP |
Wordpress Hardening Template | Page | Email to Client with links on how to harden a Wordpress-based site |
Feedback Survey Template | Page | Email to be sent to clients or requestors when closing a ticket |
Fake Domain - Report Impersonation/Cloning to Domain Provider | Page | Email template to report cases of domain impersonation and request take-down of the violating domain |
Template to Report Cloned Website to Hosting Provider | Page | Email template to report a cloned or phishing website and request it to be taken down |
Initial Reply for Clients You Suspect Are Paranoid | Page | First response to clients who we suspect are suffering from paranoia |
PGP - Extend Expiration Date - Email | Page | Email to client explaining how to extend the expiration date of their PGP key |
Warning Before Gmail Account Deactivation | Page | Template to warn clients that a recovery method needs to be set up to recover a deactivated account |
Content Removal - Standard Reporting Mechanisms | Page | Template to point the client to the reporting mechanisms of the different social media platforms |
Content Removal - Out of Mandate | Page | Template to communicate to the client that their request for content removal is out of mandate |
Content Restoration - Out of Mandate | Page | Template to communicate to the client that their request for content restoration is out of mandate |
Content Restoration - Unsuccessful Escalation | Page | Response to client after an unsuccessful attempt at escalation with social media platforms |
PGP - Extend Expiration Date - Confirmation Email | Page | Email to Client to confirm that their PGP key has an extended expiration date |
Follow-up - Subcontact | Page | Email to client to follow up on a referral to a third party |
Email to client to perform analysis | Page | Use this email to ask the client's permission to perform analysis on their digital assets in order to detect compromise, or in order to find further evidence... |
Email to platform with no existing escalation process | Page | Template for writing to platforms with no established contact procedure |
Instructions on Disabling Subject Line Encryption in Thunderbird | Page | Email instructing the beneficiary how to turn off subject line encryption in Thunderbird. |
Initial Reply in English for a Vetted Beneficiary | Page | First response email to a beneficiary who has already been vetted. |
Vetting Request - External Unencrypted | Page | External Vetting, Email to Contact if unencrypted |
Phishing - First Email | Page | First email, with precautions and instructions to get full headers |
PGP - add User ID - email template | Page | Email to client to explain how to add a user ID to their PGP key |
Title of the template | Page | Summary of the template, within quotes as here |