Digital and personal safety guide
Your safety is paramount. Before documenting or reporting, ensure you are taking the necessary precautions to protect your digital footprint and physical security.
Digital safety and online hygiene
Secure connections
- Always use a reputable VPN (ProtonVPN, Mullvad, TunnelBear).
- Avoid free VPNs that log or sell user data.
- Never submit reports on public Wi-Fi (cafés, hotels, hotspots).
Protect your devices
- Use a strong passcode (6+ digits) instead of biometrics.
- Ensure device storage is encrypted via system settings.
- Keep your operating system and apps updated.
Location and metadata
- Disable live location sharing on all social media apps.
- Turn off location tagging in your camera app settings.
- Remove metadata (EXIF data) before sharing files.
Communication discipline
- Avoid standard SMS or phone calls for sensitive topics.
- Use encrypted platforms like Signal for all coordination.
- Delete sensitive threads once they are no longer necessary.
Browser hygiene
- Use private/incognito mode for sensitive browsing.
- Clear browser history, cookies, and cache regularly.
- Avoid using shared or public computers for reporting.
Personal movement and physical safety
Movement awareness
- Avoid moving alone; vary your routes and transport modes.
- Avoid night movement and predictable daily routines.
- Avoid sleeping in the same location consistently.
Surveillance awareness
- Watch for suspicious vehicles appearing near you repeatedly.
- Change direction if you suspect you are followed.
- Enter crowded spaces and alert trusted contacts immediately.
Home vigilance
- Watch for unknown individuals lingering near your home.
- Encourage neighbors to alert you of suspicious activity.
- Trust community intelligence—it often precedes formal warnings.
Family and social safety
Protect your loved ones
- Ensure immediate family are in safe, secure locations.
- Reduces risk of coercion or baiting by rogue operatives.
- Advise family not to disclose your location to anyone.
Verification protocol
- Verify urgent requests for meetings through a second channel.
- Assume impersonation is possible in all communication.
- Loved ones may be coerced to extract information.
Ready to submit securely?