This is a tool for anonymizing photographs taken at protests. It will remove identifying metadata (Exif data) from photographs, and also allow you to selectively blur parts of the image to cover faces and other identifiable information.
4 results found
If you’re taking to the streets to demand justice for the victims of police brutality and homicide, you may want to leave your phone at home. At the same time, it’s a good idea to bring a phone to a protest so you can record what’s happening and get the message out on social media. To reconcile this tension — between wanting to protect your privacy and wanting to digitally document protests and police misdeeds — the safest option is to leave your primary phone, which contains a massive amount of private information about you, at home and instead bring a specially-prepared burner phone to protests. The Intercept’s Micah Lee discusses how to do this at length in this video.
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering trainers with tools to provide in-person learning experiences to human rights defenders and journalists working in high-risk environments. The guide is geared towards both professional trainers and those who want to learn how to train others on their digital protection, and include gender considerations as they do so.
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.