<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>online security &#8211; English</title>
	<atom:link href="https://onmedia.dw.com/english/?feed=rss2&#038;tag=online-security" rel="self" type="application/rss+xml" />
	<link>https://onmedia.dw.com/english</link>
	<description>Our work in Africa engages with journalists and partners across a wide range of media including radio, TV, online, mobile and film. One of the priorities of the DW Akademie in Africa is to support and strengthen independent media in post-conflict countries and countries in transition.</description>
	<lastBuildDate>Mon, 03 Dec 2018 13:57:38 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Journalism under surveillance</title>
		<link>https://onmedia.dw.com/english/?p=13043</link>
		<comments>https://onmedia.dw.com/english/?p=13043#respond</comments>
		<pubDate>Fri, 27 Sep 2013 10:42:07 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=13043</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="attachment_13045" aria-labelledby="figcaption_attachment_13045" class="wp-caption alignleft" style="width: 240px"><a href="http://www.flickr.com/photos/17964151@N00/3677688990"><img class="size-full wp-image-13045" src="http://onmedia.dw.com/english/files/3677688990_645a307bc8_m.jpg" alt="" width="240" height="193" /></a><p class="wp-caption-text">Flickr user: jmarty CC BY 2.0</p></div>
<p>Are you using any encryption tools or doing anything to protect your files, email and contacts on your computer or mobile phone?</p>
<p>As we find out more about the <a href="http://www.theguardian.com/world/the-nsa-files">internet surveillance activities</a> of the US National Security Agency, it&#8217;s clear that journalists and media organisations are among the targets of intelligence gathering agencies.</p>
<p>&#8220;Encrypt everything.&#8221;</p>
<p>That was one of the take home messages of Hauke Gierow&#8217;s talk on journalism and surveillance at this week&#8217;s <a href="http://socialmediaweek.org/berlin/events/?id=101831#.UkSKo7yWmTN">Social Media Week Berlin</a>.<span id="more-13043"></span></p>
<p>Gierow heads the internet freedom desk at <a href="http://www.reporter-ohne-grenzen.de/ueber-uns/team/">Reporters Without Borders</a> in Germany. Surveillance he says has a chilling effect on journalism. Your sources become unwilling to talk; there is an erosion of trust in the media; and, people who might be key whistleblowers hesitate to speak out.</p>
<p>Perhaps just as worrying is what he describes as the complicity of technology firms in surveillance &#8211; or as Reporters Without Borders refers to them in their <a href="http://surveillance.rsf.org/en/category/corporate-enemies/">2013 report</a>: &#8220;Corporate Enemies of the Internet&#8221;.</p>
<p>Gierow says there are some 230 companies worldwide that develop spyware and internet traffic monitoring products that may be used by governments to violate human rights and freedom of information. A number of these firms are within EU countries.</p>
<p><strong>Tools for online security</strong></p>
<p>Here on the onMedia blog you can check out our<a href="http://onmedia.dw.com/english/?cat=819"> in-depth series on online security resources and techniques</a> produced by Natalia Karbasova. It&#8217;s an ongoing topic onMedia will cover.</p>
<p>But for journalists in developing countries, working safely online can be even more challenging &#8211; particularly if they are using shared computers in newsrooms, or in internet cafes. And, some tools may make the net slower to use or be hard to install on shared computers.</p>
<p>So what can you do?</p>
<div id="attachment_13047" aria-labelledby="figcaption_attachment_13047" class="wp-caption alignright" style="width: 300px"><a href="http://onmedia.dw.com/english/files/IMG_4527.jpg" rel="lightbox[13043]"><img class="size-medium wp-image-13047" src="http://onmedia.dw.com/english/files/IMG_4527-300x225.jpg" alt="" width="300" height="225" srcset="https://onmedia.dw.com/english/files/IMG_4527-300x225.jpg 300w, https://onmedia.dw.com/english/files/IMG_4527-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p class="wp-caption-text">Gierow says open source tools are useful for online security</p></div>
<p>Gierow says to first check out the tools and the how to guides in Tactical Technology Collective&#8217;s <a href="https://www.tacticaltech.org/security-box">Security in a Box</a>. These guides are also available in many languages.</p>
<p>He also suggests journalists using shared computers at work should have a dedicated user name and login; try to store their files in encrypted folders; limit the applications you install on the computer to the ones you only need to use; surf the net using the <a href="https://www.torproject.org/projects/vidalia.html.en">TOR</a> network; and use encrypted chat programs.</p>
<p>Gierow cautions journalists to avoid talking about sensitive information over Skype.( You can also read our interview with Fabian von Keudell from CHIP magazine that examines <a href="http://onmedia.dw.com/english/?p=6755">the security of VoIP services such as Skype</a>.)</p>
<p>You can watch Hauke Gierow&#8217;s full presentation below and follow the journalism related links and discussions at Social Media Week Berlin on <a href="https://twitter.com/search?q=%23smwbjournalism&amp;src=typd">#smwbjournalim</a>.</p>
<p><iframe height="240" src="https://new.livestream.com/accounts/4966059/events/2397955/videos/30880568/player?width=560&amp;height=315&amp;autoPlay=false&amp;mute=false" width="560"></iframe></p>
<p>&nbsp;</p>
<p>UPDATE:</p>
<p>Dutch MEP <a href="http://www.vieuws.eu/citizens-consumers/dual-use-tech-eu-should-stop-the-spread-of-digital-arms-says-mep-schaake/">Marietje Schaake</a> has also drawn attention to the dual use of &#8220;digital arms&#8221; and wants European lawmakers to take action.</p>
<p><em>&#8216;It is a bit hypocritical to talk about the NSA revaluations with concern to stress the importance of cyber security, which is also a very popular topic nowadays, without addressing the fact that it’s EU based companies that are making and producing these digital arms.’</em><em> </em><strong><strong><em><br />
</em></strong></strong></p>
<p><strong>Author: Guy Degen</strong></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=13043</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>12 essential tips for more privacy online</title>
		<link>https://onmedia.dw.com/english/?p=12261</link>
		<comments>https://onmedia.dw.com/english/?p=12261#respond</comments>
		<pubDate>Fri, 16 Aug 2013 19:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=12261</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>What are the basic steps you need to undertake to be more secure in the digital world?</p>
<p>The <a href="https://www.tacticaltech.org/" target="_blank">Tactical Technology Collective</a>, an organisation dedicated to the use of information in activism, offers <a href="https://alternatives.tacticaltech.org/" target="_blank">useful guides</a> on secure alternatives for standard software for browsing, searching the web, writing emails and chatting. It has also compiled a great <a href="https://securityinabox.org/en" target="_blank">collection of tools and tactics for more digital security</a>. “It is important that you understand how you are communicating and inform yourself on secure alternatives,” says <a href="https://twitter.com/annalist" target="_blank">Anne Roth</a>, researcher for the Tactical Technology Collective.</p>
<p>Following the interview with Anne Roth <a href="http://onmedia.dw.com/english/?p=12237" target="_blank">in our previous post</a>, here are her essential tips on how journalists can stay secure online and when they are using smartphones and tablets.<span id="more-12261"></span></p>
<p><strong>1. Always use a secure internet connection</strong></p>
<p>This rule is especially important when you’re filling out forms on the web: https:// (not http://) should be displayed in your browser bar.</p>
<p><strong>2. Make your browsing experience more secure</strong></p>
<p>Use different pseudonyms and different browsers with different add-ons for different services. The add-ons recommended by the Tactical Technology Collective can be found in the <a href="https://myshadow.org/shadow-tracers-kit" target="_blank">Shadow</a> Tracers Kit. Always secure your WiFi router at home and in the office.</p>
<p><strong>3. Know what you are downloading</strong></p>
<p>Malware can be either contained in files which you download from the website or in browser scripts. So firstly check the files you are going to download with a virus scanner. Never open files directly in your browser. Better to first download the file, then check it with a virus scanner, then open it. Secondly, make sure you install the add-on <a href="http://noscript.net/" target="_blank">NoScript</a> for your Firefox browser. This add-on prevents scripts, which are important for the display of certain contents in your browser from transporting malware.</p>
<p><strong>4. Adjust your browser settings</strong></p>
<p>Go to “Settings” and tell your browser to save no cookies from third-party service providers. <a href="http://en.wikipedia.org/wiki/HTTP_cookie" target="_blank">Cookies</a> are small text files which are saved on your device and help identify you when you are visiting the same page again. Cookies can be helpful when you need to log in, so it’s not necessarily recommended to deactivate them completely. If you use the Firefox browser, you can adjust browser settings so that you are asked each time when a cookie is going to be installed. That significantly reduces the overall number of cookies.</p>
<p><strong>5. Don’t let your search be tracked</strong></p>
<p>To make sure your search queries aren’t being tracked, use search engines <a href="https://duckduckgo.com/" target="_blank">DuckDuckGo</a> and <a href="https://startpage.com/" target="_blank">Startpage</a>. However, note that DuckDuckGo is based in the US.</p>
<p><strong>6. Use special cloud services</strong></p>
<p>There are many cloud services like Dropbox out there, but you can’t expect total security from them. Alternatively, you can host your own cloud with the software by <a href="http://owncloud.org/" target="_blank">OwnCloud</a>. Always encrypt the data on your device before sending them into the cloud. However, that still means your metadata (file name, place and time of the upload) is visible.</p>
<p><strong>7. Use complex passwords</strong></p>
<p>Also, never use the same password for different services. You can resort to a password manager like KeePass for Windows or KeePassX for Mac.</p>
<p><strong>8. Encrypt your hard drive</strong></p>
<p>You can do it with standard software on your computer. That will help you secure your data should your device be lost or stolen. Don’t forget to regularly backup your data.</p>
<p><strong>9. Secure your communication</strong></p>
<p>It’s not a secret any more that Skype, Google, Facebook and other US companies are cooperating with the secret services. So think if you really need to use voice or video chat, especially in case of important conversations.<br />
Use different email addresses for different purposes. It is recommended to use an email client like Thunderbird with an add-on Enigmail instead of a webmail. <a href="https://securityinabox.org/en/thunderbird_main" target="_blank">Here’s</a> how you install it. If you do use webmail, make sure the data is being transferred per secure protocol <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank">SSL</a>. Try to avoid using Facebook or Twitter messaging services, traditional email is still more secure.</p>
<p><strong>10. Secure your mobile devices</strong></p>
<p>Users should use a tablet or a laptop with open source &#8211; or free &#8211; software rather than a smartphone to secure your communication. To avoid tracking of any kind, UMTS, GPS and geolocation features should be deactivated.<br />
Have a <a href="https://securityinabox.org/en/chapter-11" target="_blank">look at this introduction</a> on secure use of smartphones and check the <a href="https://guardianproject.info/" target="_blank">Guardian project</a> which offers security apps for mobile devices.</p>
<p><strong>11. Prevent interception of phone calls</strong></p>
<p>There’re encrypted mobile phones out there with a respective price tag. There’re apps like <a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&amp;hl=en" target="_blank">RedPhone</a>, <a href="https://guardianproject.info/apps/ostel/" target="_blank">OStel</a> or <a href="https://jitsi.org/" target="_blank">Jitsi</a> which encrypt your phone calls. Internet telephony is also a good option, which allows you to avoid using phone lines and mobile phone networks.</p>
<p><strong>12. Don’t let others locate your mobile phone</strong></p>
<p>To avoid the identification of your mobile phone location, deactivate the GPS function. But you can avoid being located completely only if you deactivate the phone and take out the sim card -your phone automatically checks in at mobile towers to be able to make calls.</p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=12261</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Who gathers your data and what you can do about it?</title>
		<link>https://onmedia.dw.com/english/?p=12237</link>
		<comments>https://onmedia.dw.com/english/?p=12237#respond</comments>
		<pubDate>Fri, 16 Aug 2013 18:48:12 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tor]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=12237</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span style="font-family: Times"><span style="font-size: medium"><a href="http://onmedia.dw.com/english/files/Anne_Roth_sm.jpg" rel="lightbox[12237]"><img class="alignleft  wp-image-12241" src="http://onmedia.dw.com/english/files/Anne_Roth_sm-300x300.jpg" alt="" width="200" height="200" srcset="https://onmedia.dw.com/english/files/Anne_Roth_sm-300x300.jpg 300w, https://onmedia.dw.com/english/files/Anne_Roth_sm-150x150.jpg 150w, https://onmedia.dw.com/english/files/Anne_Roth_sm-1024x1024.jpg 1024w" sizes="(max-width: 200px) 100vw, 200px" /></a>The revelations of the surveillance program of the US </span></span><a href="http://en.wikipedia.org/wiki/National_Security_Agency" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">National Security Agency</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> (NSA) has shown that no one is protected from being spied upon. Diplomats, political activists, as well as journalists around the world, are becoming increasingly vulnerable to online surveillance. </span></span><a href="https://twitter.com/annalist" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Anne Roth</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> is a researcher for the NGO </span></span><a href="https://www.tacticaltech.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Tactical Technology Collective</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> that trains rights advocates how to use information and communications technologies. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">DW Akademie’s </span></span><a href="http://mediakar.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Natalia Karbasova</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> spoke to Roth about the biggest risks journalists face online, and about the parties interested in gathering all relevant and irrelevant information: from local authorities to national secret services. <span id="more-12237"></span></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>Is it possible for journalists to completely protect their online privacy?</strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">Complete protection is not really possible. It will not be possible in the future either, since we need to supply our data to an internet provider to go online in the first place. The question is rather: what do you want to be secure from? If you want to be sure you are not being tracked by the advertising industry, you can use an adblocker as a browser plugin and configure it manually. If you want to shop online and at the same time protect your identity, you can use secure online payment services like </span></span><a href="https://www.paysafecard.com/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Paysafecard </span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">or </span></span><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">UKash</span></span></span></span><span style="font-family: Times"><span style="font-size: medium">. If you want to use internet services without disclosing your IP address, you should use the </span></span><a href="https://www.torproject.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">software Tor</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">. Still, this personal anonymity is only guaranteed if you don’t use your personal log-in data while browsing the web.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What are the biggest security vulnerabilities online? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">There’s no general answer to this question. It depends on whether you are a big company, a journalist or just a normal user. Access to data which are being transferred unencrypted through email or other internet services pose a big problem. If data transfer isn’t </span></span><a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">SSL</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">-encrypted (you can see this encryption in your browser address bar which says “https://” instead of “http://”), it can be easily intercepted in an open WiFi network.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">It is especially Windows users who face security problems. There’re numerous viruses and malware for Windows out there since this operating system is wide spread. They use unknown security weaknesses of Windows or install standard software and browser plug-ins to get daily access to the computer. That’s why is it is extremely important that you install the latest updates and the latest software. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">You should also be really careful and limit yourself to the software, plug-ins and add-ons you really need. You can also protect yourself by installing a personal firewall and a virus scanner. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>How do I know I’m being spied upon? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">Normally you won&#8217;t discover if you’re being kept under surveillance by the authorities. In Germany, you have the right to request this information from the German Federal Intelligence Service and other services. The question is, if you get the answer. Foreign secret services like the NSA don’t provide any information to non-US citizens.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>Who is interested in gathering my private information in the first place? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">On the one hand, we talk about authorities, on the other hand, about companies. Their motives and methods differ of course. Secret services gather information on internet usage and on users not only to protect their country against terror attacks, but also to exchange this information with foreign secret services which are not necessarily able to track the global internet traffic on their own. The approach of the secret services can be described as “full take”: you take so much information as you can. Edward Snowden and other whistleblowers have shown that secret services often use special interfaces, which global companies have provided them with. Secret services also use intercontinental internet lines. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">You have to be extremely cautious when it comes to using free services on the web. Remember that you still pay for it, but in a different manner, that is, not with money but with your data. That’s when you stop being a client and become a product. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What do companies do with the data they collect? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The data are collected through third-party cookies &#8211; little text files &#8211; users accept by browsing the web. Most users are not aware that they interact with other, third, parties when reading a news or any other website. These sites get paid to let the third parties have access to their users&#8217; data. The more information is known about a user, the more valuable and up-to-date is his or her profile. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The advertising industry uses profiles for individual ads. Financial and insurance industries use your profile data to give predictions and to calculate how expensive their services should be for the end customers. By the way, the German registry office also sells your data, which many of us don’t know. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What’s so bad about it?</strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The problem of such data pools is, data collectors want more and more data. The intended use is often expanded later without updating those affected. That’s why I would recommend to be very careful with requests to share your address, you date of birth or the data of your children. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">There’s an ongoing discussion in Germany following the data retention directive of the European Union. It regards retention of communication meta data. It is basically the same as gathering of metadata which is being intensely debated in the light of Prism. You can easily generate motion profiles and networks with the help of these data, which show who knows whom, who makes calls with whom and how long these calls last. The initial purpose of the initiative was counter-terrorism, but it’s obvious that even here others are interested to extend access options.</span></span></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=12237</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Digital security: The basics to keep you safe online</title>
		<link>https://onmedia.dw.com/english/?p=11589</link>
		<comments>https://onmedia.dw.com/english/?p=11589#respond</comments>
		<pubDate>Wed, 17 Jul 2013 07:26:55 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=11589</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span><a href="http://onmedia.dw.com/english/files/2_Sandra-Sandra-Mamitzsch.-Foto-by-Natalia-Karbasova.jpg" rel="lightbox[11589]"><img class="alignleft  wp-image-11593" src="http://onmedia.dw.com/english/files/2_Sandra-Sandra-Mamitzsch.-Foto-by-Natalia-Karbasova-1024x699.jpg" alt="" width="351" height="239" srcset="https://onmedia.dw.com/english/files/2_Sandra-Sandra-Mamitzsch.-Foto-by-Natalia-Karbasova-1024x699.jpg 1024w, https://onmedia.dw.com/english/files/2_Sandra-Sandra-Mamitzsch.-Foto-by-Natalia-Karbasova-300x204.jpg 300w" sizes="(max-width: 351px) 100vw, 351px" /></a>The revelations into the <a href="http://www.dw.com/us-charges-seeks-extradition-of-alleged-nsa-leaker-snowden/a-16899373">electronic surveillance activities</a> of the US National Security Agency and its Prism system have shown that no one is safe from being spied on. However, journalists can still use some clever tools and open source programs to ensure more security browsing the web, sending emails and communicating with colleagues and sources.</span></p>
<p><span style="font-family: Georgia,serif"><a href="http://dld-conference.com/users/sandra-mamitzsch">Sandra Mamitzsch</a> of re:publica, Germany&#8217;s largest conference on internet and society, offered useful insights on how to start securing your data during her workshop <a href="http://dld-conference.com/events/how-to-keep-the-nsa-out-of-your-email-a-practical-guide-to-more-security-for-your-data">How to keep the NSA out of your Email – a Practical Guide to more Security for your Data</a> at the DLDWomen conference.</span></p>
<p><span style="font-family: Georgia,serif">&#8220;Everything you do online is only as secure as your passwords and your software&#8221; says Sandra Mamitzsch. &#8220;So use open source wherever possible.&#8221; </span></p>
<p><span style="font-family: Georgia,serif">Here are her best tips: <span id="more-11589"></span></span></p>
<p><span style="font-family: Georgia,serif"><strong>Strengthening your mobile device</strong></span></p>
<ul>
<li><span style="font-family: Georgia,serif">Update frequently</span></li>
<li><span style="font-family: Georgia,serif">Make backups </span></li>
<li><span style="font-family: Georgia,serif">Full disk encryption (works for Android devices)</span></li>
<li><span style="font-family: Georgia,serif">Use a code/password to lock your device</span></li>
<li><span style="font-family: Georgia,serif">Change standard configurations, for example services which have the permission to track you and get your address book data on the iPhone</span></li>
<li><span style="font-family: Georgia,serif">Don’t jailbreak you device if you are not sure what you are doing. From the perspective of hackers, it’s more secure to use a standard operating system that is being updated frequently. </span></li>
</ul>
<p><span style="font-family: Georgia,serif"><strong>Browsing the web </strong></span></p>
<ul>
<li><span style="font-family: Georgia,serif">Always use secure encryption protocol HTTPS</span></li>
<li><span style="font-family: Georgia,serif">Use Tor anonymity network – it bounces your communications around a distributed network of relays and makes it impossible to track you</span></li>
<li><span style="font-family: Georgia,serif">Activate <strong>Do not track</strong> option in your browser </span></li>
<li><span style="font-family: Georgia,serif">Install blockers like <a href="http://www.ghostery.com/">Ghostery</a> which is a plug-in for your browser </span></li>
<li><span style="font-family: Georgia,serif">You can use separate browsers, one for logging into your Facebook/ Twitter accounts and another one, where all trackers are blocked. </span></li>
</ul>
<p><span style="font-family: Georgia,serif"><strong>Email </strong></span></p>
<ul>
<li><span style="font-family: Georgia,serif">Use email encryption software <a href="http://www.gpg4win.org/">GPG4win</a> for Windows and <a href="https://gpgtools.org/installer/">GPGTools</a> for OSX</span></li>
<li><span style="font-family: Georgia,serif">Use mail clients <a href="https://www.mozilla.org/en-US/thunderbird/">Thunderbird</a> with the security extension <a href="http://www.enigmail.net/home/index.php">Enigmail</a>. Please note people you are communicating with should also install the program.</span></li>
</ul>
<p><span style="font-family: Georgia,serif"><strong>Chat </strong></span></p>
<ul>
<li><span style="font-family: Georgia,serif">To chat securely, use <a href="https://adium.im/">Adium</a> (OS X), <a href="http://www.pidgin.im/">Pidgin</a> (Windows, Linux), <a href="http://chrisballinger.info/apps/chatsecure/">ChatSecure</a> (iOS) or <a href="https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im&amp;hl=en">Gibberbot</a> (Android) </span></li>
<li><span style="font-family: Georgia,serif">Use <a href="http://threema.ch/en/">Threema</a> instead of What’sApp. The app is available both for iOS and Android and ecnrypts your messages. Make sure that the person your are communicating to uses the app as well.</span></li>
</ul>
<p><span style="font-family: Georgia,serif"><strong>Useful tools for more security </strong></span></p>
<ul>
<li><a href="https://www.torproject.org/"><span style="font-family: Georgia,serif">Tor anonymizer</span></a></li>
<li><span style="font-family: Georgia,serif"><a href="https://tails.boum.org/">Tails – the amnestic incognito live system</a> uses Tor anonymity network, helps you </span><span style="color: #000000"><span style="font-family: Georgia,serif"><strong>leave no trace</strong></span></span><span style="color: #000000"><span style="font-family: Georgia,serif"> </span></span><span style="color: #000000"><span style="font-family: Georgia,serif">on the computer you&#8217;re using and encrypt your files, email and instant messaging.</span></span></li>
<li><span style="font-family: Georgia,serif"><a href="http://portableapps.com/">PortableApps</a> to use with a USB flash drive</span></li>
<li><span style="font-family: Georgia,serif"><a href="http://www.freesmug.org/portableapps">OS X portable applications</a> </span></li>
<li><a href="http://www.intego.com/mac-security-blog/8-password-manager-options-for-mac-and-ios/"><span style="font-family: Georgia,serif">8 password manager options for Mac and iOS</span></a></li>
</ul>
<p><span style="font-family: Georgia,serif"><strong>Further reading on security and encryption: </strong></span></p>
<p><span style="font-family: Georgia,serif"><a href="https://pressfreedomfoundation.org/encryption-works">Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance</a> by Press Freedom Foundation </span></p>
<p><span style="font-family: Georgia,serif"><em>The workshop took place at this year’s conference <a href="http://dld-conference.com/DLDwomen13">DLDWomen</a> (15-16th July) organized by the German publishing house Hubert Burda Media. DLD (Digital Life Design) is a global conference network devoted to the latest digital trends. </em></span></p>
<p><span style="font-family: Georgia,serif"><strong>Author and photo:</strong> <a href="http://mediakar.org/">Natalia Karbasova</a></span></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=11589</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Online security: How to recover deleted files</title>
		<link>https://onmedia.dw.com/english/?p=10657</link>
		<comments>https://onmedia.dw.com/english/?p=10657#respond</comments>
		<pubDate>Tue, 04 Jun 2013 08:00:12 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=10657</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><a href="http://onmedia.dw.com/english/files/Recuva_2.png" rel="lightbox[10657]"><img class="size-medium wp-image-10661 alignright" src="http://onmedia.dw.com/english/files/Recuva_2-300x234.png" alt="" width="300" height="234" srcset="https://onmedia.dw.com/english/files/Recuva_2-300x234.png 300w, https://onmedia.dw.com/english/files/Recuva_2.png 632w" sizes="(max-width: 300px) 100vw, 300px" /></a>In our <a href="http://onmedia.dw.com/english/?p=10485">previous post on online security</a>, we’ve covered basic tools which will help you securely erase data from you computer, or SSD and USB flash drives. So let’s now take a look at how you can restore your data in case you’ve deleted it by accident. As well as being a good skill to know if you can bring the deleted data back to life it&#8217;s also useful to know you find out how effective your efforts were securely delete the data in the first place. <span id="more-10657"></span></span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">For this post, let&#8217;s keep things straightforward to begin with. Imagine you have accidentally deleted an important file on your computer. What can you do? First of all, remain calm. Don’t panic! There’s still a very good chance that you’ll get your files back. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">As we already know, deleting files securely actually requires much more that simply hitting the delete button on your computer. Even if you’ve deleted a file and then emptied your recycle bin, it&#8217;s still possible to get your file back with a number of free tools.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>First steps in recovering your files </strong></span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">As soon as you notice you’ve unintentionally deleted a file, don’t wait too long. Best of all, stop working on your computer and begin recovering your file immediately. The point is, after marking your file as deleted, computers operating on Microsoft Windows can start overwriting it with different information. This will complicate the process of file recovery. So don’t wait too long. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>Recuva </strong></span></span></p>
<p><a href="https://www.piriform.com/recuva"><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>Recuva</strong></span></span></a><span style="font-family: Georgia,serif"><span style="font-size: medium"> is an absolute go-to tool. This freeware recovers files deleted from your Windows computer, recycle bin, digital camera card and MP3 player. Recuva can even find your files on a formatted drive and restore unsaved Word documents. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><a href="http://onmedia.dw.com/english/files/recuva_1.png" rel="lightbox[10657]"><img class="alignleft size-medium wp-image-10669" src="http://onmedia.dw.com/english/files/recuva_1-300x266.png" alt="" width="300" height="266" srcset="https://onmedia.dw.com/english/files/recuva_1-300x266.png 300w, https://onmedia.dw.com/english/files/recuva_1.png 508w" sizes="(max-width: 300px) 100vw, 300px" /></a>After downloading and launching Recuva, you’ll need to choose your file type and file location (or you can also choose to search on your entire computer). Recuva searches your computer for deleted files. You’ll then need to check the files you need and click the <em>Recover</em> button. Then select the location where your recovered file will be saved. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">There’s also a <a href="https://www.piriform.com/recuva/features/portable-version">portable version of Recuva</a> to store on a USB flash drive which can come in pretty handy. The tool has been programmed by the developers of <a href="https://www.piriform.com/ccleaner">CCleaner</a> which is a popular free tool for cleaning your computer. In most cases, you should be more than happy with this tool.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">Importantly, Recuva has some <a href="https://securityinabox.org/en/recuva_main">limitations</a>: it can&#8217;t recover files after programs like CCleaner or Eraser have been used to wipe free disk space or if Windows itself has already overwritten any previously occupied space. Recuva also can not recover damaged documents and files.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>When things get complicated: alternatives to Recuva </strong></span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">If Recuva is not able to identify your file, it makes sense to try other tools which may deliver slightly different results. For example, you may have deleted your hard drive partitions together with all files saved there. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">In this case, you can use the following programs: </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">With freeware </span></span><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong><a href="http://www.cgsecurity.org/wiki/TestDisk">TestDisk</a>, </strong></span></span><span style="font-family: Georgia,serif"><span style="font-size: medium">you can scan deleted hard drive partitions. According to developers, TestDisk was primarily designed to help recover lost partitions and make non-booting disks bootable again when these symptoms are caused by faulty software, certain viruses or human error.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong><a href="http://www.pcinspector.de/Default.htm?language=1">PC Inspector File Recovery</a> </strong></span></span><span style="font-family: Georgia,serif"><span style="font-size: medium">is another free data recovery programme which will automatically find partitions and recovers your files. The programme supports such popular data types as Excel and Word documents, HTML files, JPG and PNG images, WAV and MP3 sound files and ZIP archive folders.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">To recover data on your Android device, use the free </span></span><a href="https://play.google.com/store/apps/details?id=com.hexamob.hexamobrecoverylite&amp;hl=en"><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>Hexacomb Recovery-Lite</strong></span></span></a><span style="font-family: Georgia,serif"><span style="font-size: medium"> app.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">Other popular programs to recover deleted files include <a href="http://download.cnet.com/Restoration/3000-2094_4-10322950.html">Restoration</a>, <a href="http://download.cnet.com/UndeletePlus/3000-2242_4-75181912.html">Undelete Plus</a> and <a href="http://www.pcinspector.de/Default.htm?language=1">PC Inspector File Recovery</a>. You can find more file recovery alternatives <a href="http://pcsupport.about.com/od/filerecovery/tp/free-file-recovery-programs.htm">here</a>.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">You can recover your data even if you’ve wiped your hard drive. To find out how, read <a href="http://geeksaresexy.blogspot.de/2005/12/hard-drive-recovery-utilities-when-you.html">this article about hard drive recovery</a>.</span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium"><strong>Remember to backup your data</strong></span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">It is extremely important that you backup your data so that even deleting a file and not being able to recover it later will not be critical. </span></span></p>
<p><span style="font-family: Georgia,serif"><span style="font-size: medium">To find out more on data backup, read this <a href="https://securityinabox.org/en/chapter-5">guide on how to recover from information loss</a> by Frontline and Tactical Technology Collective. You can also check out this post about <a href="http://lifehacker.com/147855/geek-to-live--automatically-back-up-your-hard-drive">how to automatically backup your hard drive</a> and this <a href="https://www.pcworld.com/article/209006/how_do_i_back_up_my_data.html">article on how to backup your data</a> on your Windows computer.</span></span></p>
<p>By <a href="http://mediakar.org/">Natalia Karbasova</a></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=10657</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
