27 pages has current instructions Wieman not hacked is US online magazine morboard in PDF format. 27 pages that convey most important basic knowledge. To state of what average users experience as ” Internet” is actually all said. To move around net today is similar to a walk through Berlin-Neukölln on New Year’s Eve: it is always necessary to be careful not to be hit by anything burning or exploding.

if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile8’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile8’; elem.className = “ad ad-desktop ad-desktop–8 ad-desktop–8-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-8’).parentNode.appendChild(elem); AdController.render(‘iqadtile8’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 8 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile3’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile3’; elem.className = “ad ad-mobile ad-mobile–3 ad-mobile–3-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-3’).parentNode.appendChild(elem); AdController.render(‘iqadtile3’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 3 mobile’) } } }

The AufIT security specialized reporter of Morboardbeginnen with threat model, so question “what do Dueigentlich want to protect and before whom?” The responses depend on what action to take. At this point Anleitungendet individual cut but also already. Consecutively Werdendann topics such as passwords, two-factor auntication, anonymization as well as encryption of emails, chats UndFestplatten handled. A solid knowledge of English is required, officeisof is usually well understood, including limitations that each technique has. But first question that lay people frequently does not answer instructions: What should ichüber Head start with?

That makes redefining security planner of Canadian Citizen Lab better. The security researchers of institution at University of Torontoangesiedelten usually deal with state-sponsored attempts by dissidents and journalists. They cover what spying software against opponents and critics of regime The manufacturers and ir suppliers only and help those concerned to protect mselves. Non dieschlechtesten references for a guide to DigitalenSelbstverteidigung.

Individual Action Plan

The Special AmSecurity Planner is interactive structure. First, encouraged users answer three questions: what devices and WelcheAnwendungen do y use? Android or iphones, Mac, Windows PCoder games console, email, online banking or social media? Whatdo you prevent? That someone is hacking ir accounts, that Jemandihren screen looks or redraws what y are calling on net? And do you want to inform yourself only about technical aids undstaatliches hacking or do you need acute help, admission for example be harassed on net?

if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-desktop ad-desktop–4 ad-desktop–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-mobile ad-mobile–4 ad-mobile–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 mobile’) } } }

Depending on Dengewählten answers – A multiple selection is always possible – The security Planner creates an individual action existing several tips and a “top priority” such as Beispieldem use of two-factor auntication to ZusätzlichenAbsicherung of social media accounts.

The authors also erklärenaber how to make a backup copy of ir iphone, warumsie which password managers recommend and how to check attachment Einerverdächtigen email safely. The target group Bestehtausdrücklich from beginners in field, most empfohlenenWerkzeuge are free. Those who are exposed to particular risks due to ir profession, however, are only offered links to or organisations. There is still security Plannernur in English, furr versions are to follow. Explicitly be so far but only French and Spanish.

Google has tips for risk users

The citizen Labverspricht also to keep its advice and instructions on pflegenund up to date. All recommendations undergo EinenPeer review process, involving security researchers, among ors, by universities and activist groups such as TibetAction Institute and GuardianProject. Three of consultants and reviewers of Security Planner project are Google employees.

Citizen-Lab-DirektorRonald Deibert, however, emphasizes independence of his institution: “We are supported by a community of non-profit UndBildungseinrichtungen as well as foundations and akzeptierenniemals money or services in exchange for a Recommendation, “he writes.

© time online Patrick Beuth Editor in Portfolio Digital, time online to authors page

Google itself started a few weeks ago a “ErweitertesSicherheitsprogramm” published. It is aimed at vulnerable users of Google services, such as EtwaJournalisten and election campaigners. Key components are physischeSicherheitsschlüssel for logging into Google Account, restricted access rights for third-party apps, personal data from Google Drive or Gmail, and a verschärfterIdentifikationsprozess if someone specifies to be “Forgot password”.

The program is intended to mitigate consequences of attempted or even erfolgreichemPhishing in first line. As necessary, last year, among ors, was Hillary Clinton’s election campaign leader John Podestademonstriert.

The NeuenAnleitungen and initiatives do not contain any bahnbrechendenErkenntnisse and tips, in many places y rely sogarausdrücklich on work of or activists UndOrganisationen, some of which have been disseminated for years in network. But in particular comparatively low-threshold Einstiegehelfen one or or maybe, just start with attempt to not be hacked.