All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "66715",
"signature": "Article:66715",
"url": "https://staging.dailymaverick.co.za/article/2015-06-08-think-youre-safe-online-think-again-says-afrileaks/",
"shorturl": "https://staging.dailymaverick.co.za/article/66715",
"slug": "think-youre-safe-online-think-again-says-afrileaks",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Think you’re safe online? Think again, says Afrileaks",
"firstPublished": "2015-06-08 00:49:37",
"lastUpdate": "2015-06-08 00:50:12",
"categories": [
{
"id": "3",
"name": "Africa",
"signature": "Category:3",
"slug": "africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": false
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 7633,
"contents": "\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\"><span><span>Last week, the new whistleblowing platform Afrileaks – a kind of Wikileaks for Africa – hosted journalists at a two-day digital security bootcamp (</span></span><span><span><em>Disclaimer: the Daily Maverick is an Afrileaks’ media partner. In other words, if you want to leak confidential information to us, do so through the <a href=\"https://www.afrileaks.org/\">Afrileaks platform</a> to protect your anonymity</em></span></span><span><span>). The premise was simple: before journalists can look after delicate, confidential sources online, they need to know how to look after </span></span><span><span><em>themselves</em></span></span><span><span> online.</span></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>Few individuals take digital security very seriously. Yet as we live more and more of our lives online, we all become more vulnerable to increasingly sophisticated hackers and fraudsters who don’t often have our best interests at heart. Not to mention governments, many of whom – including the South African government – are engaged in the widespread and indiscriminate collection of personal data. It doesn’t matter if you have nothing to hide: you’re still vulnerable to fraud, and your security lapses might compromise the security of people who are hiding something (i.e. whistleblowers, journalists, and civil society activists).</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>As John Oliver <a href=\"https://www.youtube.com/watch?v=XEVlyP4_11M\">argued so memorably</a> in his must-watch interview with Edward Snowden: if for no other reason, look after your digital security to make sure no one can see your 'dick pics'.</span></span></p>\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\">“<span><span>You might not have anything to hide, but you still communicate. Everything that you do leaves traces. The moment when you, your account, your info is compromised, you can compromise others who have been in touch with you. So even if this doesn’t directly affect you, others with whom you’ve been in touch can be compromised,” said Gillo Cutrupi, a digital security expert with the Hermès Foundation, who led the Afrileaks training.</span></span></span></p>\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\">“<span><span>It’s not just state surveillance that you need to worry about, or commercial people targeting you with creepy adverts, it’s that organised crime is increasingly becoming incredibly sophisticated with using technology,” added Justin Arenstein, an investigative journalist and digital strategist helping to establish Afrileaks. “So they use it to profile people, to say well am I going to do identity theft which is the simplest of things, or are we actually going to profile someone so we know who to hit, when to hit… right down to the most extreme cases of people getting kidnapped, simply because they’re checking in at places, or their calendar is visible to others. A lot of this is not really meaning that you have to be a super spy, it’s simply understanding what your security settings on your normal social media. So on your Facebook, can people see you posting pictures of your kids and your family, or are you keeping that private?”</span></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>In South Africa, we’ve all become pretty good at keeping ourselves safe. We lock our doors, we install burglar bars, and we remain vigilant. If you haven’t already, it’s time to turn that same vigilance to digital security – and here are a few Afrileaks-approved steps to do so. While some of it may sound complicated, this is really just a start; the bare minimum. For more comprehensive advice, visit <a href=\"https://securityinabox.org/en\">Security in a Box</a>, a free advisory service which independently tests and rates various security measures.</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span><strong>1. Use a pass phrase, not a password</strong></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>Passwords are the first line of defence, but they can be ridiculously easy for programmes to guess. A six character password takes a maximum of two minutes to crack, and usually it’s a lot quicker than that (if you are one of the millions of people who uses ‘qwerty’, ‘123456’ or ‘password’, go sit in the naughty corner and hang your head in shame). This is because algorithms are getting fancier as processing power increases. There’s an easy fix, however: make your password longer. A lot longer. Every extra letter makes an exponential difference, so go big or go home. The industry standard these days is pass phrases rather than passwords: strings of words, characters and numbers (even spaces are usually ok) that will keep a password-guessing programme occupied for a very long time.</span></span></p>\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\"><span><span><strong>2</strong></span></span><span><span>. </span></span><span><span><strong>Never use the same password, and keep them fresh</strong></span></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>You need a different password for every account. It’s simple, really: if someone gets hold of one of your passwords, you don’t want them to then have access to everything. Remember too that many smaller sites, such as forums, do not store your passwords securely.</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>This is common sense, of course, but easier said than done. How do you possibly keep track of so many different passwords – especially when you’re meant to change every password regularly? The answer here is to get yourself a password keeper – a secure place to store all your passwords, meaning that you just have to remember the one password to access the password keeper. Afrileaks recommends <a href=\"https://www.keepassx.org/\">KeePassX</a>.</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span><strong>3. Secure your browsing</strong></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>Most major websites use the secure “https” protocol to protect their customers (look for the ‘https’ in the domain name, often accompanied by a little green bar or padlock). This means that it’s difficult for anyone else to see what you’re looking at or what information you’re submitting to those websites. In other words, if you send an email from one Gmail account to another, it’s relatively easy to know that you have sent an email, but not the contents of that email.</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>Any exchange of information should be done only on and between sites and providers using the ‘https’ protocol. There are several add-on programmes that can enhance this security a little further, and you should download all of them as a matter of urgency. <a href=\"https://getadblock.com/\">Adblock</a> blocks automated trackers, as well as annoying banners, pop-ups and even video ads; <a href=\"https://noscript.net/\">NoScript</a> (for Mozilla) blocks executable content such as Javascript and Flash unless it comes from a trusted site; <a href=\"https://www.ghostery.com/en/\">Ghostery</a> allows you to see and control who is tracking your browsing; and <a href=\"https://www.eff.org/https-everywhere\">HTTPS Everywhere</a> encrypts your communications with most major websites.. These are all free and tested by independent digital security experts, and work with most major browsers (except Internet Explorer, which is considered to be a particularly insecure browser. Use Chrome, Firefox or Opera instead).</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>It’s important to note that browser security is different from browser anonymity. If you want to mask your online presence entirely, you’ll need to download The Onion Router (<a href=\"https://www.torproject.org/\">Tor</a>), a special browser that routes traffic through multiple nodes to completely disguise your online activity).</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span><strong>4. Don’t always trust the Cloud</strong></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>Anything stored on the cloud is only as secure as the company that’s storing it, and not all companies offer the same level of digital security. That’s why it’s vital to think carefully about what exactly you choose to store on the cloud; sensitive documents should be encrypted first. It’s also important to use companies with better track records when it comes to digital security: <a href=\"https://www.dropbox.com/\">Dropbox</a> and <a href=\"https://spideroak.com/\">SpiderOak</a> have good reputations on this front.</span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span><strong>5. Don’t forget your smartphone</strong></span></span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\"><span>These days, you’re as likely (if not more likely) to access the internet through your smartphone. All the same rules apply here, with an added caution: phones can easily be used to track your physical location, even with SIM cards removed. If you don’t want your movements to be tracked, leave the phone at home.</span></span></p>\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\"><a name=\"_GoBack\"></a><span><span>Most mobile messaging apps such as WhatsApp have their own unique vulnerabilities. These are all highly insecure, and most pull your entire contacts list into your database – potentially putting other people at risk (this is especially true for journalists: never, ever save confidential source information in your address book). For a secure messaging app, use SureSpot or Text Secure/Signal (Android/iOS). </span></span><span><span><span style=\"text-decoration: underline;\"><strong>DM</strong></span></span></span></span></p>\r\n",
"teaser": "Think you’re safe online? Think again, says Afrileaks",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "89",
"name": "Simon Allison",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/eae219ae9b996238276d7017fe9a1741.jpg",
"url": "https://staging.dailymaverick.co.za/author/simonallison/",
"editorialName": "simonallison",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "3990",
"name": "the daily maverick",
"url": "https://staging.dailymaverick.co.za/keyword/the-daily-maverick/",
"slug": "the-daily-maverick",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "the daily maverick",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5505",
"name": "Security",
"url": "https://staging.dailymaverick.co.za/keyword/security/",
"slug": "security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "9081",
"name": "Computer security",
"url": "https://staging.dailymaverick.co.za/keyword/computer-security/",
"slug": "computer-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Computer security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10247",
"name": "Computer network security",
"url": "https://staging.dailymaverick.co.za/keyword/computer-network-security/",
"slug": "computer-network-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Computer network security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "16283",
"name": "Cryptography",
"url": "https://staging.dailymaverick.co.za/keyword/cryptography/",
"slug": "cryptography",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cryptography",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "17788",
"name": "Password",
"url": "https://staging.dailymaverick.co.za/keyword/password/",
"slug": "password",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Password",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54630",
"name": "Computer access control",
"url": "https://staging.dailymaverick.co.za/keyword/computer-access-control/",
"slug": "computer-access-control",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Computer access control",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "65377",
"name": "Password manager",
"url": "https://staging.dailymaverick.co.za/keyword/password-manager/",
"slug": "password-manager",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Password manager",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "28003",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/iut73Ie5569Xngfy55o6ibznbng=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/s4AP6i4R3D_ygo0GJyEXni6-8RY=/450x0/smart/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/A1rIxbBuh1LH0MBDMXa_j2iA6WE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/vlGN6hjxU0_cUfYyLNX9N-S-lvM=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/zYc_VZvLzgw8VqeKQ0JJxUnMnEM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/iut73Ie5569Xngfy55o6ibznbng=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/s4AP6i4R3D_ygo0GJyEXni6-8RY=/450x0/smart/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/A1rIxbBuh1LH0MBDMXa_j2iA6WE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/vlGN6hjxU0_cUfYyLNX9N-S-lvM=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/zYc_VZvLzgw8VqeKQ0JJxUnMnEM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Simon-AfrileaksDigiSecurity_subbed.jpg",
"type": "image"
}
],
"summary": "For better or worse, most of us live much of our lives online these days. But almost no one takes digital security as seriously as physical security, leaving us all incredibly vulnerable to crime and surveillance. If it comes to a showdown between you and the hackers – be they government or criminal or somewhere in between – you may as well make their life a little more difficult. Here are a few easy steps. By SIMON ALLISON.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Think you’re safe online? Think again, says Afrileaks",
"search_description": "\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\"><span><span>Last week, the new whistleblowing platform Afrileaks – a kind of Wikileaks for Africa – hosted journalists at a two-day ",
"social_title": "Think you’re safe online? Think again, says Afrileaks",
"social_description": "\r\n<p><span style=\"font-size: 12pt; font-family: georgia, palatino;\"><span><span>Last week, the new whistleblowing platform Afrileaks – a kind of Wikileaks for Africa – hosted journalists at a two-day ",
"social_image": ""
},
"cached": true,
"access_allowed": true
}