CONTENTS IN DETAIL
- ACKNOWLEDGMENTS
- INTRODUCTION
- Why I Wrote This Book
- What You’ll Learn
- What You’ll Need
- PART I: SOURCES AND DATASETS
- 1PROTECTING SOURCES AND YOURSELF
- Safely Communicating with Sources
- Working with Public Data
- Protecting Sensitive Information
- Minimizing the Digital Trail
- Working with Hackers and Whistleblowers
- Secure Storage for Datasets
- Low-Sensitivity Datasets
- Medium-Sensitivity Datasets
- High-Sensitivity Datasets
- Authenticating Datasets
- The AFLDS Dataset
- The WikiLeaks Twitter Group Chat
- Redaction
- What Data to Publish
- What to Redact
- Making Requests for Comment
- Password Managers
- Disk Encryption
- Exercise 1-1: Encrypt Your Internal Disk
- Windows
- macOS
- Linux
- Exercise 1-2: Encrypt a USB Disk
- Windows
- macOS
- Linux
- Protecting Yourself ...
Get Hacks, Leaks, and Revelations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.