3rd Wikimedia Technology Summit/Guide/Digital Safety
India WTS | Meta | Digital Safety | 2024
Wikimedia events present exciting opportunities for us to connect as fellow Wikimedians, share ideas and have a good time; traveling and attending online sessions, however, presents digital safety risks. Below we have compiled a few best practices as you attend this year’s Wiki Technology Summit.
Audio visual sharing
Whether you’re posting on Instagram, creating a TikTok video, or uploading photos to Commons, remember to be respectful of people’s privacy and seek their permission before sharing content that includes them. While many may display their preferences through lanyards, it’s only respectful to get their explicit consent. See here the conference’s photography policy for more details.
On online sessions
When attending online sessions, be aware of your username and if you are being recorded, as it may capture all voice, video, and text from the meeting. And before switching on your camera or sharing your screen, consider what information may appear and make sure confidential information is not visible.
Before heading to the conference, backup all your essential data, either on the cloud or an external storage device. In the unfortunate event of device theft, loss, or damage, having a recent backup will save you from losing valuable information and ensure a smoother recovery process.
Cybercriminals may take advantage of the excitement surrounding Wiki Technology Summit to launch phishing attacks. These deceptive emails or messages often masquerade as legitimate organizations and aim to trick you into revealing sensitive information or clicking on malicious links. Always double-check the sender’s email address or phone number and verify any suspicious requests before taking action. Checkout Shira, to learn how to identify and defeat phishing attempts.
Encrypting your devices is a powerful defense against unauthorized access to your data, and it plays a vital role in enhancing your overall digital safety. Whether it’s your laptop, smartphone, or tablet, encrypting these devices adds an extra layer of protection to your information, ensuring that even if your device falls into the wrong hands, your data remains secure.
Consider installing a VPN or Tor
These tools either help provide a secure network connection or mask your internet activity through relays, which is most important when you are away from home. While a trusted VPN or Tor is a good idea whenever you’re connected to the internet, it becomes even more crucial while traveling to safeguard your network traffic on insecure networks, such as at airports or hotels.
Looking to charge your device?
When traveling, no doubt you’ll have your cell phone or another portable device you’ll need to recharge at some point. While convenient, be aware that using free USB port charging stations, such as those found in airports and hotel lobbies can lead to data theft or malware installation on your device. As such, carry your own charger and USB cord and use an electrical outlet instead. Also, if you’re using another person’s device (like a laptop) to charge your own, a prompt regarding data sharing or trusting the device might pop up – make sure to decline.
Regarding public-wifi
Especially when we are traveling, we are more likely to use freely available public Wi-Fi. Public Wi-Fi networks present opportunities for threats like man-in-the-middle attacks and data interception. If possible, use a Virtual Private Network (VPN) to encrypt your internet connection, adding an extra layer of protection when accessing sensitive information on public networks.
Other best practices
[edit ]●くろまる Limit Public Exposure: Consider minimizing your personal presence on social media and other public platforms. Use pseudonyms when necessary and avoid sharing identifying details such as your location, workplace, or information on loved ones.
●くろまる Review Your Digital Footprint: Conduct a thorough audit of your online presence including your userpages. Remove or secure any personal data that may have been publicly shared, and be mindful of what you post - consider the Internet a permanent space. See here for a guided worksheet.
●くろまる Be Cautious of Suspicious Communications: Stay alert to phishing and other suspicious communication attempts. Bad actors may try to impersonate trusted contacts or organizations to extract personal information. Avoid clicking on suspicious links, and consider verifying the sender’s identity before engaging.
●くろまる Tighten Privacy Settings: Ensure your social media accounts and other online profiles have strict privacy settings. Limit who can view your posts, contact you, or see your personal information. Regularly review and update these settings.
●くろまる Review and be cautious of your online activity: If you frequently post stories or updates on platforms like Instagram, Facebook, or Twitter, pay attention to who is viewing or engaging with them. Do you recognize all of the people? Are there unfamiliar accounts regularly watching your content? Be cautious if you see accounts with little personal information, strange usernames, or no mutual connections. These could be fake or anonymous profiles used by bad actors to monitor your activity.
Further Resources
[edit ]Digital Safety Resources Page: A meta page where you will find articles, tools and links to interactive learning platforms to learn about digital safety concepts and inform yourself of the various risks and threats that exist as you interact with digital technologies online.
Assess your digital security risks: This course provides a five part assessment of the different aspects of your digital security and provides a curated list of resources to improve on the areas it is lacking.
Digital safety considerations for Wikimedians: This document highlights some of the main digital safety considerations for new and seasoned Wikimedians.
From the Safety and Advocacy series:
●くろまる How can a username keep you safe?