{"id":177396,"date":"2017-02-01T05:59:14","date_gmt":"2017-02-01T03:59:14","guid":{"rendered":"https:\/\/scm.bz\/techsupport\/essential-tech-tools-and-tips-for-protecting-your-sources-2.html"},"modified":"2018-02-11T23:03:41","modified_gmt":"2018-02-11T21:03:41","slug":"essential-tech-tools-and-tips-for-protecting-your-sources-2","status":"publish","type":"post","link":"https:\/\/scm.bz\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/","title":{"rendered":"Essential tech tools and tips for protecting your sources"},"content":{"rendered":"<div class=\"author\" style=\"direction: ltr;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-171964 alignright\" src=\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\" alt=\"\" width=\"306\" height=\"294\" srcset=\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg 306w, https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k-300x288.jpg 300w, https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k-150x144.jpg 150w\" sizes=\"auto, (max-width: 306px) 100vw, 306px\" \/>Auther:\u00a0<strong>Sam Berkhead\u00a0<\/strong><\/div>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden view-mode-full\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p style=\"direction: ltr;\">In the post-Snowden era of investigative journalism, many journalists seek out encryption technologies to protect themselves and their sources from government surveillance.<\/p>\n<p dir=\"ltr\">The most recent data from the Pew Research Center reveals more than half \u2014 <a href=\"http:\/\/www.journalism.org\/2015\/02\/05\/investigative-journalists-and-digital-security\/\" target=\"_blank\">64 percent<\/a> \u2014 of investigative journalists in the U.S. believe the government has \u201cprobably\u201d collected their phone calls, emails or online communications. Eight in ten said they believe they are more likely to have data collected because they\u2019re journalists.<\/p>\n<p dir=\"ltr\">However,\u00a0today&#8217;s investigative journalists are\u00a0more likely to face threats in the form of subpoenas and investigations into whistleblowers,\u00a0said <a href=\"https:\/\/twitter.com\/jenvalentino\" target=\"_blank\">Jennifer Valentino-DeVries<\/a>, a reporter at The Wall Street Journal who works on its data investigations team. Criminal hackers have also been known to target prominent news outlets and individual journalists alike.<\/p>\n<p dir=\"ltr\">\u201cNot only is that a problem for you and your private information, but you can also have your sources&#8217; information be disclosed in that manner, even if that&#8217;s not what the hackers were originally looking for,\u201d Valentino-DeVries said.<\/p>\n<p dir=\"ltr\">Another threat more likely than the NSA? Accidental disclosure of information. Journalists might not realize how much data they&#8217;re revealing through their work, allowing anyone with a basic knowledge of web scraping to easily\u00a0glean sensitive data.<\/p>\n<p dir=\"ltr\">Take Vice\u2019s 2012 piece on John McAfee, in which they followed the software executive\u2019s life on the run in Latin America for several days. Vice <a href=\"http:\/\/www.vice.com\/read\/we-are-with-john-mcafee-right-now-suckers\" target=\"_blank\">published a blog<\/a> featuring a photo with McAfee and Vice editor-in-chief Rocco Castoro taken with an iPhone 4S \u2014 a photo whose geolocation data hadn\u2019t been wiped before publishing. Using this data, it was shockingly easy to <a href=\"http:\/\/www.wired.com\/2012\/12\/oops-did-vice-just-give-away-john-mcafees-location-with-this-photo\/\" target=\"_blank\">pinpoint McAfee\u2019s location<\/a> by a swimming pool along Guatemala&#8217;s Rio Dulce.<\/p>\n<p style=\"direction: ltr;\"><iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/maps\/embed?pb=!1m18!1m12!1m3!1d5924.781240004152!2d-88.9959630297021!3d15.658544022417974!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x0!2zMTXCsDM5JzI5LjQiTiA4OMKwNTknMzEuOCJX!5e0!3m2!1sen!2sus!4v1467818481631\" width=\"500\" height=\"225\" frameborder=\"0\" scrolling=\"yes\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p dir=\"ltr\">Knowing this, how can investigative reporters maintain privacy between themselves and their sources? Valentino-DeVries covered the best tools and tips for protecting sources\u00a0at last month\u2019s <a href=\"http:\/\/www.ire.org\/events-and-training\/event\/2199\/2763\/\" target=\"_blank\">Investigative Reporters and Editors (IRE) conference<\/a>. Here are our top takeaways:<\/p>\n<h4 dir=\"ltr\">Threat modeling<\/h4>\n<p dir=\"ltr\">A key first step in determining\u00a0the\u00a0security steps you need to take is through the practice of threat modeling, Valentino-DeVries said. Typically used in computer security circles, threat modeling can help journalists evaluate who an adversary is most likely to be, what information they might want and the consequences of a\u00a0story\u2019s sensitive information getting out. From there, you can determine your best options for security tools and techniques.<\/p>\n<p dir=\"ltr\">Because threat modeling isn\u2019t static \u2014 security threats often vary from story to story \u2014 it\u2019s important to be flexible with your security routine. This is especially true when your biggest security threat might actually be a source\u2019s unwillingness to follow your security regimen, Valentino-DeVries explained.<\/p>\n<p dir=\"ltr\">\u201cI find that sometimes sources don&#8217;t exactly want to think that they&#8217;re sources,\u201d she said. \u201cIf you say \u2018You need to encrypt this,\u2019 it freaks them out. They don&#8217;t want to think they&#8217;re doing anything dangerous. Instead of worrying about whether the tool you&#8217;re using is 100 percent perfect against a state-level attack, it might be a better step to make sure your source is comfortable using it.\u201d<\/p>\n<h4 dir=\"ltr\">Tech basics<\/h4>\n<p dir=\"ltr\">\u201cBefore you worry about whether everything you have is encrypted, make sure you\u2019re taking basic security steps,\u201d Valentino-DeVries said. \u201cIf you don&#8217;t have the basics covered, it&#8217;s pointless to do the more complicated stuff.\u201d<\/p>\n<p dir=\"ltr\">Using antivirus software, a Virtual Private Network (VPN) and the latest software version are all important basic steps that can help keep your computer secure. Be wary of using USB drives that come from unfamiliar sources. Journalists should also practice good password hygiene, creating secure, randomized passwords with a <a href=\"https:\/\/hidester.com\/password-generator\/\" target=\"_blank\">Diceware<\/a> password generator, and taking advantage of two-factor authentication whenever it\u2019s available.<\/p>\n<h4 dir=\"ltr\">Encryption<\/h4>\n<p dir=\"ltr\">Encryption, a process of encoding messages so only authorized parties can read them, can be useful when communicating private information with sources. Several encrypted messaging apps are available, and it\u2019s possible to encrypt one\u2019s emails using PGP or GPG keys. <a href=\"https:\/\/otr.cypherpunks.ca\/\" target=\"_blank\">Off-The-Record Messaging<\/a> lets you send encrypted instant messages, but shouldn\u2019t be confused with Google\u2019s off-the-record chat feature, which isn\u2019t secure.<\/p>\n<p dir=\"ltr\">However, it\u2019s important to remember that encryption isn\u2019t fully impenetrable \u2014 encrypted emails still contain geolocation data and other metadata that can get you or your sources into trouble.<\/p>\n<h4 dir=\"ltr\">Other security steps<\/h4>\n<p dir=\"ltr\">Valentino-DeVries offered up several other security tools to use during investigations. The <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en\" target=\"_blank\">Tor browser<\/a> routs your internet browsing activity through servers around the world,\u00a0preventing people from finding out what sites you visit. <a href=\"https:\/\/www.eff.org\/https-everywhere%20\" target=\"_blank\">HTTPS Everywhere<\/a> places the more secure HTTPS protocol on all websites you visit, protecting your web browsing. <a href=\"https:\/\/onionshare.org\/\" target=\"_blank\">OnionShare<\/a> allows for the secure sharing of documents and is based off the Tor browser\u2019s software. Similarly, <a href=\"https:\/\/securedrop.org\/\" target=\"_blank\">SecureDrop<\/a> allows whistleblowers to anonymously and securely share documents with news organizations. Lastly, journalists can securely erase files from their computer using tools like <a href=\"https:\/\/www.piriform.com\/ccleaner\" target=\"_blank\">CCleaner<\/a> \u2014 Valentino-DeVries recommended erasing your data regularly.<\/p>\n<p dir=\"ltr\"><em>Main image CC-licensed by Flickr via <a href=\"https:\/\/www.flickr.com\/photos\/111692634@N04\/11407106173\/in\/photolist-io1pfn-CJhVy-xXbKe7-vTFF6P-vea3nb-7xBBNQ-xXcTvd-59ccay-59cb7d-5981kg-dpu5tk-59cb2S-5981HZ-5dfNCu-4BdKAj-fEt6bg-fEt6aK-4Ubsk3-fEKF2J-6GSQ2-fvLzbt-fvLzbp-fEt6bi-fEKF3W-ihGAHS-fEKF3J-fEt6aR-6jw2jL-5dbtDi-fw1RkU-5PnE92-fw1RmQ-5dbtoH-fw1Rjs-fw1RkC-6jw2p5-6jw2mU-6jrRnH-6jw2qE-sgqPsk-5PoswT-hSZkHk-4sY986-5PrWqf-8TnkqM-fw1Rmd-fw1Rkh-fvLzar-fw1RjQ-7JRRhT\" target=\"_blank\">Perspecsys Photos<\/a>.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Auther:\u00a0Sam Berkhead\u00a0 In the post-Snowden era of investigative journalism, many journalists seek out encryption technologies to protect themselves and their sources from government surveillance. The most recent data from the Pew Research Center reveals more than half \u2014 64 percent \u2014 of investigative journalists in the U.S. believe the government has \u201cprobably\u201d collected their phone [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":178953,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[372],"tags":[],"class_list":["post-177396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-support-and-digital-safety","post-wrapper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.6 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential tech tools and tips for protecting your sources - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression<\/title>\n<meta name=\"description\" content=\"%\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential tech tools and tips for protecting your sources\" \/>\n<meta property=\"og:description\" content=\"%\" \/>\n<meta property=\"og:url\" content=\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scm.center\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-01T03:59:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-11T21:03:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/20.93.6.125\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"306\" \/>\n\t<meta property=\"og:image:height\" content=\"294\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"scmadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SyrianCenter\" \/>\n<meta name=\"twitter:site\" content=\"@SyrianCenter\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"scmadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\"},\"author\":{\"name\":\"scmadmin\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45\"},\"headline\":\"Essential tech tools and tips for protecting your sources\",\"datePublished\":\"2017-02-01T03:59:14+00:00\",\"dateModified\":\"2018-02-11T21:03:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\"},\"wordCount\":828,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/scm.bz\/#organization\"},\"image\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\",\"articleSection\":[\"Tech Support and Digital Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\",\"url\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\",\"name\":\"Essential tech tools and tips for protecting your sources - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"isPartOf\":{\"@id\":\"https:\/\/scm.bz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\",\"datePublished\":\"2017-02-01T03:59:14+00:00\",\"dateModified\":\"2018-02-11T21:03:41+00:00\",\"description\":\"%\",\"breadcrumb\":{\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage\",\"url\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\",\"contentUrl\":\"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg\",\"width\":306,\"height\":294},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/scm.bz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential tech tools and tips for protecting your sources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/scm.bz\/#website\",\"url\":\"https:\/\/scm.bz\/\",\"name\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/scm.bz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/scm.bz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/scm.bz\/#organization\",\"name\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\",\"url\":\"https:\/\/scm.bz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png\",\"contentUrl\":\"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png\",\"width\":1450,\"height\":1450,\"caption\":\"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression\"},\"image\":{\"@id\":\"https:\/\/scm.bz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/scm.center\",\"https:\/\/x.com\/SyrianCenter\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45\",\"name\":\"scmadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/scm.bz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g\",\"caption\":\"scmadmin\"},\"url\":\"https:\/\/scm.bz\/en\/author\/scmadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential tech tools and tips for protecting your sources - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","description":"%","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/","og_locale":"en_US","og_type":"article","og_title":"Essential tech tools and tips for protecting your sources","og_description":"%","og_url":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/","og_site_name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","article_publisher":"https:\/\/www.facebook.com\/scm.center","article_published_time":"2017-02-01T03:59:14+00:00","article_modified_time":"2018-02-11T21:03:41+00:00","og_image":[{"width":306,"height":294,"url":"https:\/\/20.93.6.125\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg","type":"image\/jpeg"}],"author":"scmadmin","twitter_card":"summary_large_image","twitter_creator":"@SyrianCenter","twitter_site":"@SyrianCenter","twitter_misc":{"Written by":"scmadmin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#article","isPartOf":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/"},"author":{"name":"scmadmin","@id":"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45"},"headline":"Essential tech tools and tips for protecting your sources","datePublished":"2017-02-01T03:59:14+00:00","dateModified":"2018-02-11T21:03:41+00:00","mainEntityOfPage":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/"},"wordCount":828,"commentCount":0,"publisher":{"@id":"https:\/\/scm.bz\/#organization"},"image":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage"},"thumbnailUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg","articleSection":["Tech Support and Digital Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/","url":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/","name":"Essential tech tools and tips for protecting your sources - \u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","isPartOf":{"@id":"https:\/\/scm.bz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage"},"image":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage"},"thumbnailUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg","datePublished":"2017-02-01T03:59:14+00:00","dateModified":"2018-02-11T21:03:41+00:00","description":"%","breadcrumb":{"@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#primaryimage","url":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg","contentUrl":"https:\/\/scm.bz\/wp-content\/uploads\/2017\/03\/11407106173_965d15e42b_k.jpg","width":306,"height":294},{"@type":"BreadcrumbList","@id":"https:\/\/20.93.6.125\/en\/essential-tech-tools-and-tips-for-protecting-your-sources-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scm.bz\/en\/"},{"@type":"ListItem","position":2,"name":"Essential tech tools and tips for protecting your sources"}]},{"@type":"WebSite","@id":"https:\/\/scm.bz\/#website","url":"https:\/\/scm.bz\/","name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","description":"","publisher":{"@id":"https:\/\/scm.bz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scm.bz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scm.bz\/#organization","name":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression","url":"https:\/\/scm.bz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scm.bz\/#\/schema\/logo\/image\/","url":"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png","contentUrl":"http:\/\/scm.bz\/wp-content\/uploads\/2021\/01\/SCM-logo-1-with-Clear-Space-1-2.png","width":1450,"height":1450,"caption":"\u0627\u0644\u0645\u0631\u0643\u0632 \u0627\u0644\u0633\u0648\u0631\u064a \u0644\u0644\u0625\u0639\u0644\u0627\u0645 \u0648\u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u0639\u0628\u064a\u0631 Syrian Center for Media and Freedom of Expression"},"image":{"@id":"https:\/\/scm.bz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/scm.center","https:\/\/x.com\/SyrianCenter"]},{"@type":"Person","@id":"https:\/\/scm.bz\/#\/schema\/person\/d116d4c43d9f3d4fe4b61619e91ead45","name":"scmadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scm.bz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8cb2b559549de2ba5e28f5d26e15c8f315b5dd63c953e348e6769ae2e88e3cdc?s=96&d=blank&r=g","caption":"scmadmin"},"url":"https:\/\/scm.bz\/en\/author\/scmadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts\/177396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/comments?post=177396"}],"version-history":[{"count":0,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/posts\/177396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/media\/178953"}],"wp:attachment":[{"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/media?parent=177396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/categories?post=177396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scm.bz\/en\/wp-json\/wp\/v2\/tags?post=177396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}