{"id":6720,"date":"2022-06-21T09:43:48","date_gmt":"2022-06-21T09:43:12","guid":{"rendered":"https:\/\/amp.ngo\/protection-for-human-rights-defenders\/protection-for-human-rights-defenders-2\/"},"modified":"2023-05-11T07:50:46","modified_gmt":"2023-05-11T06:50:46","slug":"digital-security","status":"publish","type":"page","link":"https:\/\/amp.ngo\/en\/protection-for-human-rights-defenders\/digital-security\/","title":{"rendered":"Digital security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#e2fde3&#8243; background_image=&#8221;https:\/\/amp.ngo\/wp-content\/uploads\/2020\/04\/MOSHED-2020-4-14-17-7-35.jpg&#8221; background_enable_image=&#8221;off&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_style=&#8221;fade&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; parallax__hover=&#8221;off&#8221; parallax__hover_enabled=&#8221;off&#8221; parallax_method__hover=&#8221;on&#8221; parallax_method__hover_enabled=&#8221;on&#8221; background_size__hover=&#8221;cover&#8221; background_size__hover_enabled=&#8221;cover&#8221; background_position__hover=&#8221;center&#8221; background_position__hover_enabled=&#8221;center&#8221; background_repeat__hover=&#8221;no-repeat&#8221; background_repeat__hover_enabled=&#8221;no-repeat&#8221; background_blend__hover=&#8221;normal&#8221; background_blend__hover_enabled=&#8221;normal&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;3px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; title_font=&#8221;|700|||||||&#8221; title_font_size=&#8221;2vw&#8221; custom_margin=&#8221;50px||0px||false|false&#8221; title_font_size_tablet=&#8221;&#8221; title_font_size_phone=&#8221;5vw&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;3px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||2px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/amp.ngo\/wp-content\/uploads\/2023\/05\/digital-security-color-scaled.jpg&#8221; title_text=&#8221;digital-security-color&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; custom_margin=&#8221;||2px|||&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; custom_margin=&#8221;-3px|||||&#8221;]<\/p>\n<p><p style=\"text-align: right;\">\u00a9 Marc Lewis Ramage<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;1px|auto||auto||&#8221; custom_padding=&#8221;4px||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; custom_margin=&#8221;||0px|||&#8221; custom_padding=&#8221;||19px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The list includes a helpline to turn to if there is an urgent digital security concern as well as tools and trainings that provide knowledge and concrete steps to improve the digital security of hardware and online activities.<\/p>\n<p>[\/et_pb_text][et_pb_toggle title=&#8221;Access Now: Digital Security Helpline&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization: <a href=\"https:\/\/www.accessnow.org\/\" target=\"_blank\" rel=\"noopener\">Access Now<\/a><br \/>Special Focus: None<\/p>\n<p>Access Now\u2019s Digital Security Helpline works with individuals and organizations around the world to keep them safe online. If at risk, Access Now can help to improve the digital security practices to keep out of harm\u2019s way. If the activist\/human rights defender is already under attack, the helpline provides rapid-response emergency assistance. The emergency assistance is supposed to respond within two hours of the email request, the conversation is secured and Access Now verifies the identity and information of the client. The client may receive direct assistance or would be referred to another partner of Access Now for further help. The helpline also offers services in Tagalog.<\/p>\n<p>Contact: <span><a href=\"mailto:help@accessnow.org\">help@accessnow.org<\/a><\/span><\/p>\n<p>For more information, please visit:<\/p>\n<p><a href=\"https:\/\/www.accessnow.org\/help\/#contact-us\" target=\"_blank\" rel=\"noopener\">How to contact us?<\/a><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Electronic Frontier Foundation: Surveillance Self-Defense&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization:Electronic Frontier Foundation<br \/>Focus: None<\/p>\n<p><em>Surveillance Self-Defense<\/em> (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at an audience with considerable technical expertise and privacy\/security trainers.<\/p>\n<p>To access the guide, please visit:<\/p>\n<p><a href=\"https:\/\/ssd.eff.org\/en\/module\/how-avoid-phishing-attacks\" target=\"_blank\" rel=\"noopener\">How to: Avoid Pishing Attacks<\/a><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Hasso-Plattner-Institut: HPI Identity Leak Checker&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization: <a href=\"https:\/\/hpi.de\/en\/index.html\" target=\"_blank\" rel=\"noopener\">Hasso-Plattner-Institut<\/a><br \/>Special Focus: None<\/p>\n<p>Everyday personal data is stolen in criminal cyber attacks. A large part of the stolen information is subsequently made public on Internet databases, where it serves as the starting point for other illegal activities.<\/p>\n<p>With the HPI Identity Leak Checker, it is possible to check whether your email address, along with other personal data (e.g. telephone number, date of birth or address), has been made public on the Internet where it can be misused for malicious purposes.<\/p>\n<p>To check your email address, please visit:<\/p>\n<p><a href=\"https:\/\/sec.hpi.de\/ilc\/search\" target=\"_blank\" rel=\"noopener\">HPI Identity Leak Checker<\/a><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;KeePassXC: KeePassXC Cross-Platform Password Manager&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization: <a href=\"https:\/\/keepassxc.org\/\" target=\"_blank\" rel=\"noopener\">KeePassXC\u00a0<\/a><br \/>Special Focus: None<\/p>\n<p>KeePassXC is a modern, secure, and open-source password manager that stores and manages your most sensitive information.<\/p>\n<p>KeePassXC can run on Windows, macOS, and Linux systems. KeePassXC is for people with extremely high demands of secure personal data management. It saves many different types of information, such as usernames, passwords, URLs, attachments, and notes in an offline, encrypted file that can be stored in any location, including private and public cloud solutions.<\/p>\n<p>For more information, please visit:<\/p>\n<p><a href=\"https:\/\/keepassxc.org\/\" target=\"_blank\" rel=\"noopener\">KeePassXC Cross-Platform Password Manager<\/a><\/p>\n<p>Not sure whether a password manager is needed? Here are some reasons why it can help to stay safe:<\/p>\n<p><span><a href=\"https:\/\/monitor.firefox.com\/security-tips#five-myths\" target=\"_blank\" rel=\"noopener\">5 myths about password manager<\/a>s\u00a0<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Overview of Messenger Apps&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization: None, Individual cyber security architect recommended by experts<br \/>Special Focus: None<\/p>\n<p>The website provides a security comparison of the following Messenger Apps: Google Messages, Apple iMessage, Facebook Messenger, Element\/ Riot, Signal, Microsoft Skype, Telegram, Threema, Viber, Facebook Whatsapp, Amazon Wickr Me, Wire, Session.<\/p>\n<p>To access the comparison, please visit:<\/p>\n<p><a href=\"https:\/\/www.securemessagingapps.com\/\" target=\"_blank\" rel=\"noopener\">Secure Messaging Apps Comparison<\/a><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Totem: Digital Security Trainings&#8221; admin_label=&#8221;Umschalter&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d9fbe0&#8243; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; background_color__hover=&#8221;#f4f4f4&#8243; background__hover_enabled=&#8221;on|hover&#8221; background_enable_color__hover=&#8221;on&#8221;]<\/p>\n<p>Organization: <a href=\"https:\/\/totem-project.org\/index.html#page-top\" target=\"_blank\" rel=\"noopener\">Totem<\/a><br \/>Special Focus: Activists and journalists<\/p>\n<p>Totem helps security trainers extend the learning experience from a few days of face-to-face, offline training into a continuous and on-going, interactive learning experience. Totem offers courses on Secure Messaging Apps, Social Media Research, Desk Research, Keep it Private, Secure your Devices, How to Protect your Identity Online and others. These courses can be accessed online and guide you through your self-study.<\/p>\n<p>For more information, please visit:<\/p>\n<p><a href=\"https:\/\/totem-project.org\/\" target=\"_blank\" rel=\"noopener\">Digital security trainings for activists and journalists<\/a><\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a9 Marc Lewis RamageThe list includes a helpline to turn to if there is an urgent digital security concern as well as tools and trainings that provide knowledge and concrete steps to improve the digital security of hardware and online activities.Organization: Access NowSpecial Focus: None Access Now\u2019s Digital Security Helpline works with individuals and organizations [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":6552,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"The human rights situation in the Philippines is marked by various human rights violations that drastically increased within the past years. Human rights defenders (HRDs) who dare to speak up, write or advocate for rights and\/or assist marginalized groups are being harassed, threatened, incarcerated, killed or forcibly disappeared. The Action Network Human Rights - Philippines (amp) has therefore decided to take a deeper look at various protection measures available for human rights defenders from the Philippines.\r\n\r\nThe following list is an overview of a number of programs, guides and tools, yet it does not claim to be complete. Comments and additions are welcome. The presentation is in alphabetical order and focuses on the name of the program, the funding or convening organization, the scope of the measure(s), the eligibility, and application process and\/ or contact. Links provide access to the funding organization and further information. Most of the programs address individual HRDs while some also address organizations under threat.\r\n\r\nAside from the listed programs some of the amp member organizations such as Brot f\u00fcr die Welt, MISEREOR or the United Evangelical Mission have their own emergency related programs for their direct partners and can be contacted individually by their partner organizations.\r\n\r\nShould you have further questions or comments, kindly contact <a href=\"mailto:humanrights.education@amp.ngo\">humanrights.education@amp.ngo<\/a>","_et_gb_content_width":"","footnotes":""},"class_list":["post-6720","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/pages\/6720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/comments?post=6720"}],"version-history":[{"count":7,"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/pages\/6720\/revisions"}],"predecessor-version":[{"id":8437,"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/pages\/6720\/revisions\/8437"}],"up":[{"embeddable":true,"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/pages\/6552"}],"wp:attachment":[{"href":"https:\/\/amp.ngo\/en\/wp-json\/wp\/v2\/media?parent=6720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}