A group of NGOs, including the Electronic Frontier Foundation, offer a suite of tools for diagnosing and mitigating the kinds of attacks faced by dissidents and independent media all over the world, especially when they threaten the powerful.
The Digital First Aid Kit includes a secure communications layer, as well as sections on hacked accounts, DoS, seizure of devices and malware attacks on your site and network. You can modify and share the kit, downloading it from github, where it carries a Creative Commons Attribution Share Alike license.
NGOs Launch Digital First Aid Kit
The Digital First Aid Kit is not meant to serve as the ultimate solution to all your digital emergencies. It strives to give you tools that can help you make a first assessment of what is happening and determine if you can mitigate the problem on your own. If at any moment you feel uncomfortable or unsure about implementing any of the solutions outlined here, ask for help from trained professionals.
The Digital First Aid Kit came about when a number of organizations working in the digital emergency field observed that once a person is targeted digitally, he or she often does not know what to do or where to turn for assistance. It was inspired by the belief that everyone has the ability to take preventative measures to avoid emergencies and responsive steps when they are in trouble. Further, everyone has the ability to help out a colleague facing trouble. The self-diagnostic quality of the Kit should also enable journalists, bloggers, activists and human rights defenders to understand what is happening to their digital assets, to be able to determine more rapidly when they should reach out for help, what kind of help they need, and improve individual digital safety. In addition, the Kit serves as a first responder checklist for individuals who a person under possible digital attack reaches out to first.
Under TPP, signatories are required to give their judges the power to “order the destruction of devices and products found to be involved in” breaking digital locks, such as those detailed in this year’s US Copyright Office Triennial DMCA Hearing docket, which were used to identify critical vulnerabilities in vehicles, surveillance devices, voting machines, medical […]
Mostly it’s your record locator and frequent flier number, but with that, an attacker can access the ticket record, see your future flights, your email address, and the details of the emergency contacts you’d added to the reservation.
Adam Conover latest “Adam Ruins Everything” is five depressingly hilarious minutes on aviation security, security theater, privacy, and ritual humiliation, with a guest-appearance by Bruce Schneier. If you didn’t laugh, you’d have to cry, although you can always do both, right?
Lean Project Management, as the name suggests, is a popular method for wasting less time and effort over the duration of a project. By focusing on prioritizing tasks, Project Managers are able to boost productivity, meet goals, and, inevitably, impress the execs. This exam prep course is led by the accredited Management and Strategy Institute, […]
This Smartphone Photo Lens Kit arms you with six unique smartphone photography accessories, so you can take high-quality and well-composed photos of any subject from small insects to expansive landscapes.6 unique lensesRolls up neatly for transportTripod for stabilitySmall lenses attach seamlessly with magnetMicroscope and 8x telephoto lenses attach with a case (case attaches to phone)Lens wallet […]
Inspired by the universality of symbols, the founders of Noun Project began to collect thousands of hand-drawn icons. The concept has since transformed into a massive digital collection of 150,000+ unique icons that fuel the work of designers every day. Spend less time crafting icons and more time putting amazing designs out into the world with […]