<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://learn.equalit.ie/mw/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://learn.equalit.ie/mw/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dmitri</id>
		<title>learn.equalit.ie - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://learn.equalit.ie/mw/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dmitri"/>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Special:Contributions/Dmitri"/>
		<updated>2026-04-17T14:47:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.23.1</generator>

	<entry>
		<id>https://learn.equalit.ie/wiki/DigsecResources</id>
		<title>DigsecResources</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/DigsecResources"/>
				<updated>2017-12-12T13:27:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
*[https://hygiene.digitalpublicsquare.com Hygiene Hygiene in The Digital Public Square] - an introduction and index to learning about digital security&lt;br /&gt;
*[https://securityplanner.org Security Planner] - Citizen Lab's Security Planner &lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from inline surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defence] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
[[Category: DigsecQAResources]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/DigsecResources</id>
		<title>DigsecResources</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/DigsecResources"/>
				<updated>2017-12-12T13:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
*[https://hygiene.digitalpublicsquare.com Hygiene Hygiene in The Digital Public Square] - an introduction and index to learning about digital security&lt;br /&gt;
*[https://citizenlab.ca/2017/12/citizen-lab-launches-security-planner Security Planner] - Citizen Lab's Security Planner &lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from inline surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defence] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
[[Category: DigsecQAResources]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/DigsecResources</id>
		<title>DigsecResources</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/DigsecResources"/>
				<updated>2017-12-12T13:26:07Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
*[https://hygiene.digitalpublicsquare.com Hygiene Hygiene in The Digital Public Square] - an introduction and index to learning about digital security&lt;br /&gt;
*[https://citizenlab.ca/2017/12/citizen-lab-launches-security-planner] - Citizen Lab's Security Planner &lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from inline surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defence] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
[[Category: DigsecQAResources]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Main_Page"/>
				<updated>2017-12-12T13:23:06Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''eQualit.ie's whitepapers, documentation and training guides. Free to use and share'''&lt;br /&gt;
&lt;br /&gt;
* [[DigsecResources|Learning guides and resources]]&lt;br /&gt;
* [[Curricula|a Digital Security Trainer's Curricula]]&lt;br /&gt;
* Online manual on [http://equalit.ie/esecman/ Digital Security for Human Rights Defenders]&lt;br /&gt;
* [[Secure hosting guide]]&lt;br /&gt;
* [[Online Learning|Digital Security lessons]]&lt;br /&gt;
* [[np1sec|(n+1)sec: a secure multi-party communication protocol]]&lt;br /&gt;
* [[Digital_Security_QA|Digital Security Q &amp;amp; A]]&lt;br /&gt;
* [[Workshop slides]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software.&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User_talk:Carol</id>
		<title>User talk:Carol</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User_talk:Carol"/>
				<updated>2017-11-09T21:42:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''learn.equalit.ie''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Dmitri|Dmitri]] ([[User talk:Dmitri|talk]]) 21:42, 9 November 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User:Carol</id>
		<title>User:Carol</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User:Carol"/>
				<updated>2017-11-09T21:42:07Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Creating user page for new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Carol does things and stuff&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Main_Page"/>
				<updated>2017-10-25T20:10:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''eQualit.ie's whitepapers, documentation and training guides. Free to use and share'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Curricula|a Digital Security Trainer's Curricula]]&lt;br /&gt;
* Online manual on [http://equalit.ie/esecman/ Digital Security for Human Rights Defenders]&lt;br /&gt;
* [[Secure hosting guide]]&lt;br /&gt;
* [[Online Learning|Digital Security lessons]]&lt;br /&gt;
* [[np1sec|(n+1)sec: a secure multi-party communication protocol]]&lt;br /&gt;
* [[Digital_Security_QA|Digital Security Q &amp;amp; A]]&lt;br /&gt;
* [[Workshop slides]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software.&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Workshop_slides</id>
		<title>Workshop slides</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Workshop_slides"/>
				<updated>2017-07-17T14:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Created page with &amp;quot;* July 17&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[File:July17.pdf|thumbnail|July 17]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Main_Page"/>
				<updated>2017-07-17T14:58:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''eQualit.ie's whitepapers, documentation and training guides. Free to use and share'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Curricula|a Digital Security Trainer's Curricula]]&lt;br /&gt;
* Online manual on [http://equalit.ie/esecman/index.html Digital Security for Human Rights Defenders]&lt;br /&gt;
* [[Secure hosting guide]]&lt;br /&gt;
* [[Online Learning|Digital Security lessons]]&lt;br /&gt;
* [[np1sec|(n+1)sec: a secure multi-party communication protocol]]&lt;br /&gt;
* [[Digital_Security_QA|Digital Security Q &amp;amp; A]]&lt;br /&gt;
* [[Workshop slides]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software.&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/File:July17.pdf</id>
		<title>File:July17.pdf</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/File:July17.pdf"/>
				<updated>2017-07-17T14:52:15Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Digital_Security_QA</id>
		<title>Digital Security QA</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Digital_Security_QA"/>
				<updated>2016-09-28T04:18:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
* [[%D0%9F%D0%B5%D1%80%D0%B5%D0%B2%D0%BE%D0%B4/ru|русский]]&lt;br /&gt;
*[[Traductions/fr|française]]&lt;br /&gt;
*[[فارسی/fa|فارسی]]&lt;br /&gt;
*[[اترجمة/ar|لعربية]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.&lt;br /&gt;
&lt;br /&gt;
==I want to protect my...==&lt;br /&gt;
&lt;br /&gt;
{{#ask: [[Category:Top Level Scenario Task]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q&amp;amp;A Meta Data==&lt;br /&gt;
&lt;br /&gt;
* [[DigsecInsecurity|Threat Categories]]&lt;br /&gt;
* [[digsecResources|Digital Security Resources]]&lt;br /&gt;
* [[Scenario Tools|Tools]]&lt;br /&gt;
* [[Scenario Services|Services]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Digital_Security_QA</id>
		<title>Digital Security QA</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Digital_Security_QA"/>
				<updated>2016-09-28T04:15:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
* [[%D0%9F%D0%B5%D1%80%D0%B5%D0%B2%D0%BE%D0%B4/ru|русский]]&lt;br /&gt;
*[[Traductions/fr|française]]&lt;br /&gt;
*[[فارسی/fa|فارسی]]&lt;br /&gt;
*[[اترجمة/ar|لعربية]]&lt;br /&gt;
*[[Translations/dv|dimi talk]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.&lt;br /&gt;
&lt;br /&gt;
==I want to protect my...==&lt;br /&gt;
&lt;br /&gt;
{{#ask: [[Category:Top Level Scenario Task]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q&amp;amp;A Meta Data==&lt;br /&gt;
&lt;br /&gt;
* [[DigsecInsecurity|Threat Categories]]&lt;br /&gt;
* [[digsecResources|Digital Security Resources]]&lt;br /&gt;
* [[Scenario Tools|Tools]]&lt;br /&gt;
* [[Scenario Services|Services]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User_talk:Ruud</id>
		<title>User talk:Ruud</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User_talk:Ruud"/>
				<updated>2016-07-21T12:58:57Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''learn.equalit.ie''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Dmitri|Dmitri]] ([[User talk:Dmitri|talk]]) 12:58, 21 July 2016 (UTC)&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User:Ruud</id>
		<title>User:Ruud</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User:Ruud"/>
				<updated>2016-07-21T12:58:56Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Creating user page for new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Nothing here for now.&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User_talk:Munk_sean</id>
		<title>User talk:Munk sean</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User_talk:Munk_sean"/>
				<updated>2016-03-14T18:51:05Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''learn.equalit.ie''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Dmitri|Dmitri]] ([[User talk:Dmitri|talk]]) 18:51, 14 March 2016 (UTC)&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/User:Munk_sean</id>
		<title>User:Munk sean</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/User:Munk_sean"/>
				<updated>2016-03-14T18:51:04Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Creating user page for new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I really like digital hygiene.&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Digital_Security_QA</id>
		<title>Digital Security QA</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Digital_Security_QA"/>
				<updated>2016-03-14T18:37:54Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
* [[%D0%9F%D0%B5%D1%80%D0%B5%D0%B2%D0%BE%D0%B4/ru|русский]]&lt;br /&gt;
*[[Traductions/fr|française]]&lt;br /&gt;
*[[فارسی/fa|فارسی]]&lt;br /&gt;
*[[اترجمة/ar|لعربية]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.&lt;br /&gt;
&lt;br /&gt;
==I want to protect my...==&lt;br /&gt;
&lt;br /&gt;
{{#ask: [[Category:Top Level Scenario Task]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q&amp;amp;A Meta Data==&lt;br /&gt;
&lt;br /&gt;
* [[DigsecInsecurity|Threat Categories]]&lt;br /&gt;
* [[digsecResources|Digital Security Resources]]&lt;br /&gt;
* [[Scenario Tools|Tools]]&lt;br /&gt;
* [[Scenario Services|Services]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/%D8%AA%D8%B1%D8%AC%D9%85%D9%87%D9%94_%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa</id>
		<title>ترجمهٔ فارسی/fa</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/%D8%AA%D8%B1%D8%AC%D9%85%D9%87%D9%94_%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa"/>
				<updated>2016-03-14T18:36:40Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Dmitri moved page ترجمهٔ فارسی/fa to فارسی/fa&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[فارسی/fa]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa</id>
		<title>فارسی/fa</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa"/>
				<updated>2016-03-14T18:36:37Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Dmitri moved page ترجمهٔ فارسی/fa to فارسی/fa&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Translations|fa}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/%D8%A7%D8%AA%D8%B1%D8%AC%D9%85%D8%A9/ar</id>
		<title>اترجمة/ar</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/%D8%A7%D8%AA%D8%B1%D8%AC%D9%85%D8%A9/ar"/>
				<updated>2016-03-14T18:34:43Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Created page with &amp;quot;{{Scenario Translations|ar}}&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Translations|ar}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Digital_Security_QA</id>
		<title>Digital Security QA</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Digital_Security_QA"/>
				<updated>2016-03-14T18:33:59Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
* [[%D0%9F%D0%B5%D1%80%D0%B5%D0%B2%D0%BE%D0%B4/ru|русский]]&lt;br /&gt;
*[[Traductions/fr|française]]&lt;br /&gt;
*[[ترجمهٔ فارسی/fa|ترجمهٔ فارسی]]&lt;br /&gt;
*[[اترجمة/ar|لعربية]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.&lt;br /&gt;
&lt;br /&gt;
==I want to protect my...==&lt;br /&gt;
&lt;br /&gt;
{{#ask: [[Category:Top Level Scenario Task]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q&amp;amp;A Meta Data==&lt;br /&gt;
&lt;br /&gt;
* [[DigsecInsecurity|Threat Categories]]&lt;br /&gt;
* [[digsecResources|Digital Security Resources]]&lt;br /&gt;
* [[Scenario Tools|Tools]]&lt;br /&gt;
* [[Scenario Services|Services]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa</id>
		<title>فارسی/fa</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/fa"/>
				<updated>2016-02-25T14:02:54Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: Created page with &amp;quot;{{Scenario Translations|fa}}&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Translations|fa}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Digital_Security_QA</id>
		<title>Digital Security QA</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Digital_Security_QA"/>
				<updated>2016-02-25T14:02:05Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
[[%D0%9F%D0%B5%D1%80%D0%B5%D0%B2%D0%BE%D0%B4/ru|русский перевод]]; [[Traductions/fr|traductions française]]; [[ترجمهٔ فارسی/fa|ترجمهٔ فارسی]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.&lt;br /&gt;
&lt;br /&gt;
==I want to protect my...==&lt;br /&gt;
&lt;br /&gt;
{{#ask: [[Category:Top Level Scenario Task]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q&amp;amp;A Meta Data==&lt;br /&gt;
&lt;br /&gt;
* [[DigsecInsecurity|Threat Categories]]&lt;br /&gt;
* [[digsecResources|Digital Security Resources]]&lt;br /&gt;
* [[Scenario Tools|Tools]]&lt;br /&gt;
* [[Scenario Services|Services]]&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/To_send_an_email_that_no_one_but_me_and_the_recipient_can_read</id>
		<title>To send an email that no one but me and the recipient can read</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/To_send_an_email_that_no_one_but_me_and_the_recipient_can_read"/>
				<updated>2015-11-25T03:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Parent=Email&lt;br /&gt;
|Scenario Task Type=Surveillance&lt;br /&gt;
|Scenario Task Description=There are several options for sending a confidential email that no one but the sender and recipient/s can read. Unlike traditional letters, email isn't protected by an envelope and isn't just one copy of a message travelling from the sender to the receiver. Rather, it is plainly visible to anyone who has access to its several copies, which are stored in several computers along the way. So you have to trust that those copies won't be read by your email provider, the Internet service provider and anyone else responsible for sending and delivering your message. If you want to be sure that no one but you and the recipient can read your messages, the solution relies on using encryption. The Electronic Frontier Foundation has a good introductory guide to [https://ssd.eff.org/en/playlist/want-security-starter-pack#communicating-others communicating with others] in a secure way.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_destroy_data</id>
		<title>I want to destroy data</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_destroy_data"/>
				<updated>2015-11-25T03:38:04Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Unauthorised Access, Data Loss&lt;br /&gt;
|Scenario Tools and Services=Bleachbit, CCleaner, Eraser&lt;br /&gt;
|Scenario Task Description=Those rumours were true - computers [https://learn.equalit.ie/wiki/Destroying_data cannot delete data]. Information previously deleted on your computer, USB or SD card by using the standard delete &amp;gt; empty bin method, can be recovered. In order to destroy data you need to overwrite its physical location on the disk with new information. Specific tools exist for this purpose including [https://ssd.eff.org/en/module/how-delete-your-data-securely-windows Bleachbit for Windows] and [https://ssd.eff.org/en/module/how-delete-your-data-securely-linux Linux], as well as [https://securityinabox.org/en/guide/ccleaner/windows Ccleaner] and [http://sourceforge.net/projects/eraser/ Eraser] for Windows. MacOS users can follow the techniques mentioned in [https://ssd.eff.org/en/module/how-delete-your-data-securely-mac-os-x this guide] or recommendations regarding SecureTrash on the [https://support.apple.com/kb/PH18638?locale=en_US&amp;amp;viewlocale=en_US Apple website]. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_share_a_document_securely</id>
		<title>I want to share a document securely</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_share_a_document_securely"/>
				<updated>2015-11-25T03:37:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Surveillance&lt;br /&gt;
|Scenario Tools and Services=GPG4USB&lt;br /&gt;
|Scenario Task Description=If you want to share a document with a friend or two, without anyone else being able to access this document, several options are available. You can send your document as an encrypted email attachment, as described in [[I want to learn about encrypting email]] or use a stand-alone [https://securityinabox.org/en/guide/gpg4usb/windows GPG4USB] to encrypt one or more individual files. In either case, both parties need to have [[I want to learn about encrypting email | set up and exchanged their keys]] in advance - to decrypt the message they have received.&lt;br /&gt;
&lt;br /&gt;
You can also use an [[I want to investigate other options | encrypted messaging service]] or do a file transfer if both parties have set up a [[I want to know about secure chat | secure chat session]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_recover_data</id>
		<title>I want to recover data</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_recover_data"/>
				<updated>2015-11-25T03:36:43Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Data Loss&lt;br /&gt;
|Scenario Tools and Services=Ubuntu&lt;br /&gt;
|Scenario Task Description=Information previously deleted from your computer or removable memory card can [https://securityinabox.org/en/guide/recuva/windows sometimes be recovered].&lt;br /&gt;
&lt;br /&gt;
If your computer is broken and the operating system refuses to load, it may still be possible to recover data from the hard drive by booting it from a [http://www.ubuntu.com/download/desktop/create-a-usb-stick-on-windows live operating system]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_prevent_unauthorised_access_to_my_data</id>
		<title>I want to prevent unauthorised access to my data</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_prevent_unauthorised_access_to_my_data"/>
				<updated>2015-11-25T03:36:12Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Tools and Services=Veracrypt, LibreCrypt, DiskCryptor, BitLocker, GPG4UAB, Symantec Endpoint&lt;br /&gt;
|Scenario Task Description=If you want to avoid that your documents are accessed by someone without your permission, you need to either encrypt them one by one (file encryption) or to store them in a secure space, which may be your computer, a storage device or just a part of them (disk encryption).&lt;br /&gt;
&lt;br /&gt;
In order to create a secure space on your hard disk or storage device or encrypt the entire computer, you can use several tools:&lt;br /&gt;
&lt;br /&gt;
* [https://securityinabox.org/en/guide/truecrypt/windows Truecrypt] can encrypt your entire hard disk or just a part of it, but is no longer actively maintained.&lt;br /&gt;
* Truecrypt is being replaced by [https://www.idrix.fr/Root/content/category/7/32/46/ Veracrypt], which has been developed starting from Truecrypt's code, but this project is very recent and doesn't have a very large user base.&lt;br /&gt;
* [https://ssd.eff.org/en/module/how-encrypt-your-windows-device DiskCryptor] and [https://github.com/t-d-k/LibreCrypt LibreCrypt] are two other free and open source tools for disk encryption that are gaining prominence as replacements of Truecrypt.&lt;br /&gt;
* [https://en.wikipedia.org/wiki/BitLocker BitLocker] is a Windows solution (Vista and 7 Ultimate+ editions and Windows 8+) with several options for full disk or folder encryption.&lt;br /&gt;
* Another popular commercial disk encryption tool is [https://www.symantec.com/endpoint-encryption/ Symantec Endpoint Encryption].&lt;br /&gt;
* Mac users can encrypt their disk using the built-in [https://support.apple.com/en-ca/HT204837 FileVault] feature. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can also use an encrypted file storage service like [https://peerio.com Peerio] or [https://mega.nz Mega] as explained in the [[I want to ensure that my data is never lost]] section. Individual files can be protected with [https://securityinabox.org/en/guide/gpg4usb/windows GPG4USB].&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_hide_my_traces</id>
		<title>I want to hide my traces</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_hide_my_traces"/>
				<updated>2015-11-25T03:33:17Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Profiling your identity and actions&lt;br /&gt;
|Scenario Tools and Services=Bleachbit, Tails OS, &lt;br /&gt;
|Scenario Task Description=Your computer [[Destroying temporary files | keeps trace]] of most of your activities. This includes the websites you visit, documents you've worked on, email attachments opened, etc. This information is constantly collected and stored as 'temporary files' on the computer. Since these files document your actions, they could give away a lot of information about you to anyone who might have access to your machine, so it may be prudent to delete such traces. &lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/en/module/how-delete-your-data-securely-windows Bleachbit for Windows] and [https://ssd.eff.org/en/module/how-delete-your-data-securely-linux Linux], as well as [https://securityinabox.org/en/guide/ccleaner/windows Ccleaner] can destroy temporary files. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using your browser in [https://support.google.com/chrome/answer/95464?hl=en Incognito mode on Chrome] or [https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history Firefox] will prevent the  recording of your browsing history and the download of [https://en.wikipedia.org/wiki/Cache_%28computing%29 cache] to the computer. It will also disable [https://en.wikipedia.org/wiki/HTTP_cookie cookie] collection for that session and help [https://myshadow.org/visualisations/animation prevent profiling]. Additional browser settings on [https://myshadow.org/how-to-increase-your-privacy-on-firefox Firefox] and [https://myshadow.org/how-to-increase-your-privacy-on-chrome Chrome] will help you better control your data.&lt;br /&gt;
&lt;br /&gt;
If you want to be fairly sure that anyone getting hold of your machine will not be able to learn about what you've been up to, it is always advisable to [[I want to prevent unauthorised access to my data | encrypt your hard disk]], and you can also consider using [https://tails.boum.org/ Tails], a live operating system that leaves no traces on the computer you are using (unless you ask it to do so).&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_ensure_that_my_data_is_never_lost</id>
		<title>I want to ensure that my data is never lost</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_ensure_that_my_data_is_never_lost"/>
				<updated>2015-11-25T03:32:28Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Data&lt;br /&gt;
|Scenario Task Type=Data Loss, Unauthorised Access&lt;br /&gt;
|Scenario Tools and Services=Peerio, Mega&lt;br /&gt;
|Scenario Task Description=Whether through a malicious action or by sheer bad luck, data can be lost in many different ways. And if that data had been stored just in one device or location, it may be very difficult or even impossible to [[I_want_to_recover_data | recover]] it.&lt;br /&gt;
&lt;br /&gt;
The only way to not actually lose any information is to have an up-to-date and secure backup.&lt;br /&gt;
The best solution, especially if your archive is sizeable and your Internet connection speed is basic, is to make several [[I want to prevent unauthorised access to my data | encrypted copies]] of your data on various portable memory devices &lt;br /&gt;
&lt;br /&gt;
If you want to keep an online archive of your files, there are many commercial and some free  services offering encrypted storage. In  choosing between them, look out for terms such as 'client-side' or 'end-to-end' encryption - that is where the provider cannot decrypt your data because it was encrypted locally, by your client.&lt;br /&gt;
&lt;br /&gt;
[https://peerio.com Peerio] is an encrypted file storage and sharing tool with 1GB of free space. [https://mega.nz Mega] also offers encrypted online storage and sharing with 50GB for free. There is a syncing feature to keep all your devices up to date.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Minimising_damage_from_a_lost_or_stolen_computer</id>
		<title>Minimising damage from a lost or stolen computer</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Minimising_damage_from_a_lost_or_stolen_computer"/>
				<updated>2015-11-25T03:29:06Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Computer&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=Security measures must be done in advance of the loss. They include:&lt;br /&gt;
* A good backup, either on removable media or [[I want to ensure that my data is never lost|online]]&lt;br /&gt;
* An [[I want to prevent unauthorised access to my data|encrypted disk]] or [[I would like to prevent others from accessing my computer|secure chip]] in your computer&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_would_like_to_prevent_others_from_accessing_my_computer</id>
		<title>I would like to prevent others from accessing my computer</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_would_like_to_prevent_others_from_accessing_my_computer"/>
				<updated>2015-11-25T03:28:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Computer&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Tools and Services=DM Crypt&lt;br /&gt;
|Scenario Task Description=Barring physical access to your computer may be a logistical challenge: in most cases there will be moments when it is left unattended. Nevertheless, you can prevent others from getting any of your personal data out of it by using [https://learn.equalit.ie/wiki/Better_Passwords strong passwords] and [[I_want_to_prevent_unauthorised_access_to_my_data|disk encryption]].&lt;br /&gt;
&lt;br /&gt;
A laptop with a [https://en.wikipedia.org/wiki/Trusted_Platform_Module TPM chip] can encrypt the entire drive and secure the computer from booting to unauthorised parties, using [http://windows.microsoft.com/en-ca/windows-vista/bitlocker-drive-encryption-overview BitLocker] for Windows (Ultimate and Enterprise editions of Windows Vista and Windows 7, the Pro and Enterprise editions of Windows 8) and [https://en.wikipedia.org/wiki/Dm-crypt dm-crypt] for Linux. Mac users can encrypt the disk using the built-in [https://support.apple.com/en-ca/HT204837 FileVault] feature.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_protect_my_computer_from_virus_infection</id>
		<title>I want to protect my computer from virus infection</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_protect_my_computer_from_virus_infection"/>
				<updated>2015-11-25T03:27:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Computer&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Tools and Services=Tails OS, Qubec OS, NoScript, ScriptBlock&lt;br /&gt;
|Scenario Task Description=Like its biological predecessor, a computer virus can be caught in a lot of different circumstances. It may be impossible to prevent your computer from exposure but a series of defensive mechanisms should be able to stop the infection. They include:&lt;br /&gt;
&lt;br /&gt;
* Automatic updates installation for the operating system (Windows, Mac, etc) and all software&lt;br /&gt;
* A registered and functioning [https://securityinabox.org/en/guide/avast/windows anti-virus]&lt;br /&gt;
* Use either the native [https://support.apple.com/en-us/HT201642 Mac] or [http://windows.microsoft.com/en-us/windows-8/windows-firewall-from-start-to-finish Windows] firewall or a third-party  [https://securityinabox.org/en/guide/comodo/windows firewall] on your computer&lt;br /&gt;
* Use the [https://securityinabox.org/en/guide/firefox/windows NoScript] and [https://addons.mozilla.org/en-us/firefox/addon/flashblock/ FlashBlock] extensions for Firefox or [https://chrome.google.com/webstore/detail/flashcontrol/mfidmkgnfgnkihnjeklbekckimkipmoe?hl=en FlashControl] and [https://chrome.google.com/webstore/detail/scriptblock/hcdjknjpbnhdoabbngpmfekaecnpajba?hl=en ScriptBlock] for Chrome&lt;br /&gt;
* Switch to [https://en.wikipedia.org/wiki/Linux_distribution#Popular_distributions Linux] or use the security-oriented [https://tails.boum.org/ Tails] or [https://www.qubes-os.org/ QubesOS] operating systems&lt;br /&gt;
&lt;br /&gt;
Furthermore, detailed guides are available in the [https://ssd.eff.org/en/module/how-do-i-protect-myself-against-malware Surveillance Self Defense] project and the [https://securityinabox.org/en/guide/malware Security in-a-box] toolkit.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_would_like_to_connect_to_a_website_securely</id>
		<title>I would like to connect to a website securely</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_would_like_to_connect_to_a_website_securely"/>
				<updated>2015-11-25T03:20:54Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Access to the Web&lt;br /&gt;
|Scenario Task Type=Surveillance, Profiling your identity and actions&lt;br /&gt;
|Scenario Tools and Services=HTTPS Everywhere, &lt;br /&gt;
|Scenario Task Description=Connecting to a website securely means several things, all of which contribute to secure your access to the websites you visit:&lt;br /&gt;
&lt;br /&gt;
* the connection between your computer and the website's server is [https://learn.equalit.ie/wiki/Encrypted_connections '''encrypted'''];&lt;br /&gt;
* there are '''no [https://trackography.org/ leaks of information]''' about the current session to third parties;&lt;br /&gt;
* you do not expose yourself to '''[https://support.google.com/websearch/answer/8091?hl=en malware infection]''' by visiting a compromised website.&lt;br /&gt;
&lt;br /&gt;
Read the [https://help.riseup.net/en/better-web-browsing Better Browsing] guide by RiseUp for details on how to browse with greater security in Firefox or Chrome (in general, these are the recommended browsers when discussing security).&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The [https://www.eff.org/HTTPS-EVERYWHERE HTTPS Everywhere] browser add-on by the Electronic Frontier Foundation ensures that you connect securely and with trusted credentials to thousands of websites.&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In all cases, make sure that your computer's operating system is up-to-date, that you are using the latest version of your browser and that you are running [https://securityinabox.org/en/guide/avast/windows anti-malware] protection. Install the recommended extensions from the RiseUp guide and review the [https://ssd.eff.org/en/module/how-do-i-protect-myself-against-malware How Do I Protect Myself Against Malware?] guide from the EFF.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You may also wish to use an anonymity network or a VPN to reach the desired website as explained in the [[I want to be anonymous when browsing the web]] section. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/A_website_I_am_trying_to_access_is_unreachable</id>
		<title>A website I am trying to access is unreachable</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/A_website_I_am_trying_to_access_is_unreachable"/>
				<updated>2015-11-25T03:18:47Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Parent=Access to the Web&lt;br /&gt;
|Scenario Task Type=Censorship&lt;br /&gt;
|Scenario Tools and Services=Herdict&lt;br /&gt;
|Scenario Task Description=Many countries that practice [https://opennet.net/ Internet censorship] are 'kind' enough to display a warning or a reason to the user when a banned website is being requested. In other circumstances your request may simply result in a 'Page Not Found' error, or the browser will keep spinning and eventually time out with another error message. There could be several reasons for this situation to consider, before claiming with certainty that the site is indeed censored.&lt;br /&gt;
# You made a mistake in the site's name (perhaps omitted or added 'www' when it's not necessary)&lt;br /&gt;
# Your computer's network configuration is not working. Try opening other websites or http://74.125.224.72 (Google's search page by IP). If nothing works - check your computer's settings. &lt;br /&gt;
# Try to open the site from http://downforeveryoneorjustme.com This service will attempt to open your website from a different physical location. If that works, then the site is functioning and is likely censored (not accessible) from your location/country.&lt;br /&gt;
&lt;br /&gt;
If you think that the website has been blocked in your country, take a look at [http://www.herdict.org/ Herdict] project from the Berkman Center for Internet. Here you can test the site's accessibility from different countries and whether other users have reported similar blockages. If that site is blocked, please see [[I want to learn about circumventing Internet censorship]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/A_website_I_am_trying_to_access_is_unreachable</id>
		<title>A website I am trying to access is unreachable</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/A_website_I_am_trying_to_access_is_unreachable"/>
				<updated>2015-11-25T03:18:21Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Parent=Access to the Web&lt;br /&gt;
|Scenario Task Type=Censorship&lt;br /&gt;
|Scenario Task Description=Many countries that practice [https://opennet.net/ Internet censorship] are 'kind' enough to display a warning or a reason to the user when a banned website is being requested. In other circumstances your request may simply result in a 'Page Not Found' error, or the browser will keep spinning and eventually time out with another error message. There could be several reasons for this situation to consider, before claiming with certainty that the site is indeed censored.&lt;br /&gt;
# You made a mistake in the site's name (perhaps omitted or added 'www' when it's not necessary)&lt;br /&gt;
# Your computer's network configuration is not working. Try opening other websites or http://74.125.224.72 (Google's search page by IP). If nothing works - check your computer's settings. &lt;br /&gt;
# Try to open the site from http://downforeveryoneorjustme.com This service will attempt to open your website from a different physical location. If that works, then the site is functioning and is likely censored (not accessible) from your location/country.&lt;br /&gt;
&lt;br /&gt;
If you think that the website has been blocked in your country, take a look at [http://www.herdict.org/ Herdict] project from the Berkman Center for Internet. Here you can test the site's accessibility from different countries and whether other users have reported similar blockages. If that site is blocked, please see [[I want to learn about circumventing Internet censorship]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/FAQ</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/FAQ"/>
				<updated>2015-11-25T02:40:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Description=This is an introductory guide for those looking for an answer to their digital security concerns. It assumes common threat scenarios and asks a series of iterative questions to direct you to a solution, whether that's a tool, a technique or a link to one of the excellent resources listed herein. Treat every recommendation as one piece of the security puzzle you need to solve. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
===Guides and reference manuals===&lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from online surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defense] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
===Software and services index===&lt;br /&gt;
{{#ask: [[Category:Scenario Tool]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
===Contacts===&lt;br /&gt;
If you have a suggestion for a threat scenario or new resource to link to, a recommendation or simply want to help or find something out, please write https://encrypt.to/info@equalit.ie&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/FAQ</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/FAQ"/>
				<updated>2015-11-25T02:33:17Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Description=This is an introductory guide for those looking for an answer to their digital security concerns. It assumes common threat scenarios and asks a series of iterative questions to direct you to a solution, whether that's a tool, a technique or a link to one of the excellent resources listed herein. Treat every recommendation as one piece of the security puzzle you need to solve. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
===Guides and reference manuals===&lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from online surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defense] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
===Software and services index===&lt;br /&gt;
{{#ask: [[Category:Scenario Tool]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
===Contacts===&lt;br /&gt;
If you have a new suggestion for a threat scenario, a recommendation or simply want to help or find something out, please write to us with a bit of privacy via https://encrypt.to/info@equalit.ie&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/FAQ</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/FAQ"/>
				<updated>2015-11-25T01:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Description=This is an introductory guide for those looking for an answer to their digital security concerns. It assumes common threat scenarios and asks a series of iterative questions to direct you to a solution, whether that's a tool, a technique or a link to one of the excellent resources listed herein. Treat every recommendation as one piece of the security puzzle you need to solve. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
===Guides and reference manuals===&lt;br /&gt;
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from online surveillance&lt;br /&gt;
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides&lt;br /&gt;
*[https://emailselfdefense.fsf.org/ Email Self Defense] - Free Software Foundation&lt;br /&gt;
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders&lt;br /&gt;
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective &amp;amp; Front Line Defenders&lt;br /&gt;
*[https://help.riseup.net/en/security Security Guides] - Riseup&lt;br /&gt;
*[https://ssd.eff.org Surveillance Self Defense guide] - Electronic Frontier Foundation&lt;br /&gt;
*[https://www.accessnow.org/pages/protecting-your-security-online Protecting Your Security Online] - AccessNow&lt;br /&gt;
*[https://myshadow.org My Shadow] - Tactical Technology Collective&lt;br /&gt;
*[https://gendersec.tacticaltech.org/wiki/index.php/Main_Page Gender and Tech Resources] - Tactical Technology Collective&lt;br /&gt;
*[http://equalit.ie//esecman/index.html Digital Security Manual for Human Rights Defenders] - Front Line Defenders&lt;br /&gt;
*[https://github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md What to do when your website goes down] - Jon Camfield&lt;br /&gt;
*[https://flossmanuals.net/basic-internet-security Basic Internet Security] - FLOSS manuals Greenhost, Free Press Unlimited&lt;br /&gt;
*[https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md Encryption Works] - Freedom of the Press Foundation&lt;br /&gt;
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case&lt;br /&gt;
&lt;br /&gt;
===Software and services index===&lt;br /&gt;
{{#ask: [[Category:Scenario Tool]]|format=ul }}&lt;br /&gt;
&lt;br /&gt;
===Contacts===&lt;br /&gt;
Contact us securely https://encrypt.to/0x6FF1895D&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Test_my_site_for_vulnerabilities</id>
		<title>Test my site for vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Test_my_site_for_vulnerabilities"/>
				<updated>2015-11-24T22:05:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=My Website&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=The rule of thumb for not getting your site hacked or infected with malware is:&lt;br /&gt;
* Run up-to-date software, including all themes and plugins (if there are no recent updates to either - do not use them anymore)&lt;br /&gt;
* Do not install or run any services you are not currently using&lt;br /&gt;
* Make sure your web hosting service continually updates their own systems and services&lt;br /&gt;
&lt;br /&gt;
Testing a site for vulnerabilities is not an easy task. You need to look not only at the various systems your website is comprised of and depends on, but to be able to interpret the results as well. A vulnerability could be found and exploited on a systems level (e.g. hosting set-up), in the web server configuration, inside Wordpress or in some third-party plug-in you have installed within it. &lt;br /&gt;
&lt;br /&gt;
An [https://pentest-tools.com online penetration test] is available with several testing options, including a passive reconnaissance [https://pentest-tools.com/information-gathering/google-hacking# 'Google hacking'] test. In principle it is recommended to run your own vulnerability testing systems, including the popular [https://nmap.org/download.html Nmap] tool and the surprisingly easy to set up but very well respected [http://www.tenable.com/products/nessus/nessus-professional Nessus vulnerability scanner].&lt;br /&gt;
&lt;br /&gt;
Many vulnerabilities occur at the user level - with you. For an in-depth look into auditing internal organisational processes and systems, refer to the [http://www.safetag.org Safetag] project and make sure you have read the section on how to [[I would like to prevent others from accessing my computer|protect your computer]].&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Reset_passwords_and_security_questions</id>
		<title>Reset passwords and security questions</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Reset_passwords_and_security_questions"/>
				<updated>2015-11-24T22:05:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=I want to protect my email account from unauthorised access&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=Password are easily forgotten (unless you are using a [https://securityinabox.org/en/guide/keepass/windows password program]). This is why most service providers offer several opportunities for you to reset your password by sending you an email or by asking you a personal question of your choice to prove your identity. Whilst often necessary, both options may result in a security risk and need to be thought through carefully in advance. For an excellent description of the problem, you can read this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article by Matt Honan]. To make a long story short:&lt;br /&gt;
&lt;br /&gt;
# Resetting a password by sending the code to another email account opens up another attack vector for the hacker. If they can break into one account and then request the reset password to another account to be sent there, you are worse off than before.&lt;br /&gt;
# Setting a security question based on personal information (e.g. your mother's maiden name) means the attacker only needs to find out this information in order to reset your password and gain access to your account.&lt;br /&gt;
&lt;br /&gt;
If at all possible, it is best to not set any reset options. If you want this option or are required to do so, put yourself in the hacker's shoes and make sure their task won't be easy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/My_Website</id>
		<title>My Website</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/My_Website"/>
				<updated>2015-11-24T22:04:34Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=It's very easy to get a website up and running these days, but it's pretty tough to keep it secure and stable against a continually evolving and maturing array of cyber attacks. In order to protect your website, you will need to consider its technical set-up, the software you are using to create the site and its content, as well as the various types of plugins and extensions enabled for extra features on that site. Most importantly, you need to have a contingency plan, by asking yourself what happens in case of an emergency. This includes:&lt;br /&gt;
&lt;br /&gt;
* creating regular backups of your files and database, in case your online content gets lost due to a technical problem or an attack;&lt;br /&gt;
* knowing your hosting provider's terms of service and their readiness to protect you during an attack;&lt;br /&gt;
* knowing your Domain name service (DNS) provider's security options and terms of service;&lt;br /&gt;
* implementing mitigation solutions in advance of a crisis.&lt;br /&gt;
&lt;br /&gt;
In most cases, for non-technical users it is advised to create a site/profile on an existing platform catering especially for this, like [https://wordpress.com/ WordPress], [https://medium.com/ Medium] and [http://www.livejournal.com/ Livejournal] to name a few of the bigger providers. They look after all the back end details, leaving you to create and manage content on the site. You can also choose to host your blog at one of the non-profit groups including [http://noblogs.org/ NoBlogs] or someone from this [https://help.riseup.net/ca/security/resources/radical-servers list].&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_protect_my_email_account_from_unauthorised_access</id>
		<title>I want to protect my email account from unauthorised access</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_protect_my_email_account_from_unauthorised_access"/>
				<updated>2015-11-24T22:04:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Email&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=There are many things you can do to protect your email account from unauthorised entry or hacking. There are quite a few things your email provider should do as well, so [[To find a reliable email provider|pick one wisely]]. First and foremost your account must be protected by a [https://learn.equalit.ie/wiki/Better_Passwords good password]. You also need to make sure that your computer is free from [[I want to protect my computer from virus infection|malware]].&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_protect_my_computer_from_virus_infection</id>
		<title>I want to protect my computer from virus infection</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_protect_my_computer_from_virus_infection"/>
				<updated>2015-11-24T22:03:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Computer&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=Like its biological predecessor, a computer virus can be caught in a lot of different circumstances. It may be impossible to prevent your computer from exposure but a series of defensive mechanisms should be able to stop the infection. They include:&lt;br /&gt;
&lt;br /&gt;
* Automatic updates installation for the operating system (Windows, Mac, etc) and all software&lt;br /&gt;
* A registered and functioning [https://securityinabox.org/en/guide/avast/windows anti-virus]&lt;br /&gt;
* Use either the native [https://support.apple.com/en-us/HT201642 Mac] or [http://windows.microsoft.com/en-us/windows-8/windows-firewall-from-start-to-finish Windows] firewall or a third-party  [https://securityinabox.org/en/guide/comodo/windows firewall] on your computer&lt;br /&gt;
* Use the [https://securityinabox.org/en/guide/firefox/windows NoScript] and [https://addons.mozilla.org/en-us/firefox/addon/flashblock/ FlashBlock] extensions for Firefox or [https://chrome.google.com/webstore/detail/flashcontrol/mfidmkgnfgnkihnjeklbekckimkipmoe?hl=en FlashControl] and [https://chrome.google.com/webstore/detail/scriptblock/hcdjknjpbnhdoabbngpmfekaecnpajba?hl=en ScriptBlock] for Chrome&lt;br /&gt;
* Switch to [https://en.wikipedia.org/wiki/Linux_distribution#Popular_distributions Linux] or use the security-oriented [https://tails.boum.org/ Tails] or [https://www.qubes-os.org/ QubesOS] operating systems&lt;br /&gt;
&lt;br /&gt;
Furthermore, detailed guides are available in the [https://ssd.eff.org/en/module/how-do-i-protect-myself-against-malware Surveillance Self Defense] project and the [https://securityinabox.org/en/guide/malware Security in-a-box] toolkit.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/I_want_to_be_protected_from_malicious_emails</id>
		<title>I want to be protected from malicious emails</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/I_want_to_be_protected_from_malicious_emails"/>
				<updated>2015-11-24T22:02:50Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=Email&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=A huge quantity of malicious content can access your computer through your email inbox. This could be annoying but harmless unsolicited advertising (spam), [https://en.wikipedia.org/wiki/Malware malicious software] embedded in an attachment or within the message itself, and various types of [https://en.wikipedia.org/wiki/Phishing#Link_manipulation links] leading you to infected web pages. Many tools exist to protect your computer from infection but they will never be 100% effective and a lot of discretion is advised when opening or reacting to content received in an email message. To learn how to check if an email you have received is malicious, read [https://ssd.eff.org/en/module/how-avoid-phishing-attacks this manual] by the Electronic Frontier Foundation. Also, be aware of [https://en.wikipedia.org/wiki/Spyware#Rogue_anti-spyware_programs rogue software] promising to protect your computer.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/How_do_I_know_if_someone_else_is_accessing_my_email_account</id>
		<title>How do I know if someone else is accessing my email account</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/How_do_I_know_if_someone_else_is_accessing_my_email_account"/>
				<updated>2015-11-24T22:01:38Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=I want to protect my email account from unauthorised access&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=The three main email providers offer a 'Recent Activity' notification window where you can view where and how your account was last accessed. &lt;br /&gt;
*[https://security.google.com/settings/security/notifications Google recent activity]&lt;br /&gt;
*[https://account.live.com/Activity?mkt=en-US Hotmail recent activity]&lt;br /&gt;
*[https://www.yahoo.com/notifications# Yahoo notification]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Find_a_reliable_hosting_provider</id>
		<title>Find a reliable hosting provider</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Find_a_reliable_hosting_provider"/>
				<updated>2015-11-24T22:01:12Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=My Website&lt;br /&gt;
|Scenario Task Type=Unauthorised Access, Surveillance&lt;br /&gt;
|Scenario Tools and Services=Autistici, RiseUp&lt;br /&gt;
|Scenario Task Description=If you are setting up your own website for the first time, or want to find a more secure solution for the website you already have, you will have to look into the complicated market of hosting providers, where making the right choice can be hard. To understand what you need to look for, consider the following points:&lt;br /&gt;
&lt;br /&gt;
* Larger companies will be more reliant on existing control panels and automated processes to solve your problems and less willing to go out of their way specifically for you. On the other hand, their infrastructure could be better suited to mitigate [https://en.wikipedia.org/wiki/Denial-of-service_attack an attack]&lt;br /&gt;
* Research company reviews from past customers&lt;br /&gt;
* Read the terms of service, in particular their mitigation options during an attack&lt;br /&gt;
* Look for details on their data centre location, internal systems security, client privacy, customer support agreements&lt;br /&gt;
&lt;br /&gt;
In any case, keep your own backup of the site and make sure you are in control of the [https://en.wikipedia.org/wiki/Domain_Name_System DNS records] so as to switch providers when necessary. A more [https://learn.equalit.ie/wiki/Choose_a_hosting_provider detailed guide] is available for those considering their hosting options. &lt;br /&gt;
&lt;br /&gt;
'''Commercial Hosting'''&lt;br /&gt;
* [https://aws.amazon.com/ec2/ Amazon EC2] - huge amount of features and resources, a bit overwhelming for non-technical users at fiprst&lt;br /&gt;
* [https://www.dreamhost.com/ Dreamhost] - Many hosting options with a control panel, DNS registration included&lt;br /&gt;
* [http://wpengine.com/ WpEngine] - popular option for Wordpress site hosting&lt;br /&gt;
&lt;br /&gt;
'''Non-commercial Hosting'''&lt;br /&gt;
* [http://www.autistici.org/ Autistici] - free hosting for activists on servers run by people who care about users' privacy and security&lt;br /&gt;
* [https://help.riseup.net/ca/security/resources/radical-servers A list of non-profit] hosting and Internet service providers, catering to activist causes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Data</id>
		<title>Data</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Data"/>
				<updated>2015-11-24T22:00:23Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Type=Unauthorised Access, Data Loss&lt;br /&gt;
|Scenario Task Description=Your data is your own. Protecting it from loss, corruption and unauthorised access requires effort and by default your data is only as secure as the device it is stored on. This section deals with protecting your offline data. For information on protecting your data on the Internet, please refer to the sections on [[Email]], [[Online Conversations]], [[Access to the Web]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/Computer</id>
		<title>Computer</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/Computer"/>
				<updated>2015-11-24T22:00:05Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: removed hacking threat category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Scenario&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=A large portion of our digital identities, years of work history and meticulously configured software rests on our computers. A broken, stolen or otherwise malfunctioning computer could be a small (or large) calamity. This section deals with how best to protect your computer from various physical and digital risks.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	<entry>
		<id>https://learn.equalit.ie/wiki/2_factor_authentication</id>
		<title>2 factor authentication</title>
		<link rel="alternate" type="text/html" href="https://learn.equalit.ie/wiki/2_factor_authentication"/>
				<updated>2015-11-24T21:59:40Z</updated>
		
		<summary type="html">&lt;p&gt;Dmitri: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Scenario Task&lt;br /&gt;
|Scenario Task Format=Solution&lt;br /&gt;
|Scenario Task Parent=I want to protect my email account from unauthorised access&lt;br /&gt;
|Scenario Task Type=Unauthorised Access&lt;br /&gt;
|Scenario Task Description=[https://en.wikipedia.org/wiki/Two-factor_authentication 2-factor authentication] also known as 2-step and 2fa is a method of authenticating yourself with a combination of two components: something you know (a password) and something you have (e.g. a mobile phone). The idea behind this method is that it's incredibly difficult for the hacker to have access to both components. The service must be offered by your email provider and many of them do now. Please have a look at this excellent report by Citizen Lab on [https://citizenlab.org/2015/08/iran_two_factor_phishing/ 2fa phishing attacks], in particular the conclusions and recommendations within.&lt;br /&gt;
&lt;br /&gt;
*[https://www.google.ca/landing/2step/ Google 2-step verification] and the [https://support.google.com/accounts/answer/1066447?hl=en Authenticator] application for your smartphone that allows you to generate codes without Internet access&lt;br /&gt;
*[http://windows.microsoft.com/en-ca/windows/two-step-verification-faq Hotmail 2-step verification]&lt;br /&gt;
*[https://help.yahoo.com/kb/SLN5013.html Yahoo 2-step verification]&lt;br /&gt;
*[https://www.facebook.com/help/148233965247823 Facebook Login Approval]&lt;br /&gt;
*[https://support.twitter.com/articles/20170388# Twitter Login Verification]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://help.yahoo.com/kb/SLN5013.html Here's a list] of other popular online services that provide 2fa.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dmitri</name></author>	</entry>

	</feed>