This is a tool for anonymizing photographs taken at protests. It will remove identifying metadata (Exif data) from photographs, and also allow you to selectively blur parts of the image to cover faces and other identifiable information.
48 results found
If you’re taking to the streets to demand justice for the victims of police brutality and homicide, you may want to leave your phone at home. At the same time, it’s a good idea to bring a phone to a protest so you can record what’s happening and get the message out on social media. To reconcile this tension — between wanting to protect your privacy and wanting to digitally document protests and police misdeeds — the safest option is to leave your primary phone, which contains a massive amount of private information about you, at home and instead bring a specially-prepared burner phone to protests. The Intercept’s Micah Lee discusses how to do this at length in this video.
There’s a deluge of apps that detect your covid-19 exposure, often with little transparency. This Covid Tracing Tracker project will document them. When they began comparing apps around the world, they realized there was no central repository of information; just incomplete, constantly changing data spread across a wide range of sources. Nor was there a single, standard approach being taken by developers and policymakers: citizens of different countries were seeing radically different levels of surveillance and transparency. So to help monitor this fast-evolving situation, they are gathering the information into a single place for the first time with this Covid Tracing Tracker—a database to capture details of every significant automated contact tracing effort around the world.
“A security culture is a set of customs shared by a community whose members may be targeted by the government, designed to minimize risk.” This zine is an excellent introductory piece on security culture. It defines what a security culture is, gives practical examples of how it can be used and implemented, and addresses numerous other components of security culture.
This manual by and for women activists and human rights defenders that is designed to strengthen collective safety so they can continue their vital work. The manual builds on the experiences of women activists to offer practical and interactive approaches that both deepen their understanding of context, power and risk, and help them develop collective strategies and practices which keep them safer and stronger as we defend human rights.
The Blueprints for Change Progressive Organizing and Campaigning Manual is a compilation of all guides produced through Blueprints for Change up till November 2019 in its current edition. This includes 14 detailed how-to guides on cutting-edge approaches to progressive organizing and mobilizing.
This digital security guideline, developed to help human rights defenders and journalists in Ethiopia, provides essential information on how to use mobile phones, computers, email, and the Internet in a safe and secure manner.
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering trainers with tools to provide in-person learning experiences to human rights defenders and journalists working in high-risk environments. The guide is geared towards both professional trainers and those who want to learn how to train others on their digital protection, and include gender considerations as they do so.
Human Rights First maintains a list of resources for human rights defenders who are facing security threats because of their work. This compilation includes information about emergency funds, fellowships, human rights awards, training opportunities, and guidelines for embassies and missions on the protection of human rights defenders.
Safety of the human rights defenders is a priority for the Universal Periodic Review (UPR). The purpose of this handbook is to share information to make sure that human rights defenders will understand the risks they could face due their engagement in the promotion of human rights, and what means are available to protect themselves in case of intimidation and reprisals.