SlideShare a Scribd company logo
Privacy for Journalists Introduction
Me
Gabor Szathmari
• @gszathmari
• Information Security Professional
• CryptoParty organiser
CryptoParty Sydney
www.cryptoparty.in/sydney
Privacy for Journalists
• https://privacyforjournalists.org.au
• @PrivacyJournAU
Community for helping reporters protect their
information sources from:
• Metadata collection and retention
• Targeted surveillance
• Corporate hacking
What we do?
Threat Modeling: to help journalists understand their
adversaries and motives
Practial Guides: to defend the journalists' data and information
sources based on the threat modeling from above
Useful Links: a collection of various security tips, legislations,
Meetups, associations and other events aiming to defend
privacy
Group Chat: where we can discuss best practices with each
other
CryptoParty for Journalists: Hands-on sessions of practical
security practices
Agenda
1. Threat Modeling: to understand your adversaries and
their motives
2. Sneak peek into GlobaLeaks: secure tip-offs
3. Setting up some of the followings:
• Signal - End-to-end encrypted chat and voice calls
• Tor Browser - Anonymous web browsing
• OnionShare - File exchange without leaving metadata
• Ricochet - Chat without the metadata

More Related Content

PDF
Privacy for journalists introduction
PDF
Publeaks en
PPTX
Basic principles to information privacy in data mining & data warehouse
PPTX
Public key encryption presentation
PDF
DEFCON: Burning the Lookout
PPT
Detection is Dead
PDF
Sw2
PDF
Understanding your own data - Varonis
Privacy for journalists introduction
Publeaks en
Basic principles to information privacy in data mining & data warehouse
Public key encryption presentation
DEFCON: Burning the Lookout
Detection is Dead
Sw2
Understanding your own data - Varonis

What's hot (14)

PDF
How Encryption for Strong Security Works
PPTX
Osint, shoelaces, bubblegum
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PDF
Information Security - Foundations and basic understanding
PPTX
Cybercriminals focus on Cryptocurrency
PPTX
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
PDF
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
PPTX
Investigating cybercrime - the research process
PPT
OWASP Ukraine Thomas George presentation
PDF
How to transition from selling security products to selling profitable securi...
PPTX
osint - open source Intelligence
PPTX
Paran Chandrasekaran
PDF
Vault: Beyond secret storage - Using Vault to harden your infrastructure
How Encryption for Strong Security Works
Osint, shoelaces, bubblegum
How to Use Open Source Intelligence (OSINT) in Investigations
Information Security - Foundations and basic understanding
Cybercriminals focus on Cryptocurrency
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Investigating cybercrime - the research process
OWASP Ukraine Thomas George presentation
How to transition from selling security products to selling profitable securi...
osint - open source Intelligence
Paran Chandrasekaran
Vault: Beyond secret storage - Using Vault to harden your infrastructure
Ad

Similar to Privacy for Journalists Introduction (20)

PDF
Threat Modeling for Journalists
PDF
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
PDF
FCF June 2014 - 04 evolving our forum
PPTX
Cryptoparty: encryption and data security for journalists
PPTX
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
PDF
HDI Capital Area Slides August 17, 2018
PPTX
Online privacy & security
PPTX
Honeypots for proactively detecting security incidents
 
PPTX
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
PPTX
OpenSourceIntelligence-OSINT.pptx
PPTX
Case Study on Dark Web:Insights, Risks & Security Measures
PDF
Talk1 muscl club_v1_2
PDF
Are Crypto Airdrops Safe? What to Expect in 2025
PDF
Hunting: Defense Against The Dark Arts v2
PDF
Hire a Bitcoin Hacker: Navigating the World of Cryptocurrency Security
PPTX
So whats in a password
PPTX
privacy and security in online social media useful for NPTEL
PPTX
AISA - v6 - Damien Manuel
PPTX
Twitter: A Hands-On Learning Session for Researcher
PPTX
Untitled presentation.pptx
Threat Modeling for Journalists
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
FCF June 2014 - 04 evolving our forum
Cryptoparty: encryption and data security for journalists
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
HDI Capital Area Slides August 17, 2018
Online privacy & security
Honeypots for proactively detecting security incidents
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
OpenSourceIntelligence-OSINT.pptx
Case Study on Dark Web:Insights, Risks & Security Measures
Talk1 muscl club_v1_2
Are Crypto Airdrops Safe? What to Expect in 2025
Hunting: Defense Against The Dark Arts v2
Hire a Bitcoin Hacker: Navigating the World of Cryptocurrency Security
So whats in a password
privacy and security in online social media useful for NPTEL
AISA - v6 - Damien Manuel
Twitter: A Hands-On Learning Session for Researcher
Untitled presentation.pptx
Ad

More from Gabor Szathmari (11)

PPTX
Iron Bastion: Preventing business email compromise fraud at your firm
PPTX
Iron Bastion: How to Manage Your Clients' Data Responsibly
PPTX
Hacking law firms with abandoned domain names
PPTX
How to manage your client's data responsibly
PPTX
How to protect your clients and your law firm from money transfer scams
PPTX
Phishing stories from the trenches
PDF
Help! I am an Investigative Journalist in 2017
PPTX
CryptoParty Tor Relay Workshop
PDF
Safe Browsing in 2016
PDF
When the CDN goes bananas
PPTX
PGP and Keybase (CryptoParty Belfast)
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: How to Manage Your Clients' Data Responsibly
Hacking law firms with abandoned domain names
How to manage your client's data responsibly
How to protect your clients and your law firm from money transfer scams
Phishing stories from the trenches
Help! I am an Investigative Journalist in 2017
CryptoParty Tor Relay Workshop
Safe Browsing in 2016
When the CDN goes bananas
PGP and Keybase (CryptoParty Belfast)

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
 
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
 
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
 
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Privacy for Journalists Introduction

  • 2. Me Gabor Szathmari • @gszathmari • Information Security Professional • CryptoParty organiser
  • 4. Privacy for Journalists • https://privacyforjournalists.org.au • @PrivacyJournAU Community for helping reporters protect their information sources from: • Metadata collection and retention • Targeted surveillance • Corporate hacking
  • 5. What we do? Threat Modeling: to help journalists understand their adversaries and motives Practial Guides: to defend the journalists' data and information sources based on the threat modeling from above Useful Links: a collection of various security tips, legislations, Meetups, associations and other events aiming to defend privacy Group Chat: where we can discuss best practices with each other CryptoParty for Journalists: Hands-on sessions of practical security practices
  • 6. Agenda 1. Threat Modeling: to understand your adversaries and their motives 2. Sneak peek into GlobaLeaks: secure tip-offs 3. Setting up some of the followings: • Signal - End-to-end encrypted chat and voice calls • Tor Browser - Anonymous web browsing • OnionShare - File exchange without leaving metadata • Ricochet - Chat without the metadata