dark mode decorative image light mode decorative image
FR EN
arrowNavigational help

KEYBOARD SHORTCUTS
decorative line

ALTERNATIVE STYLES
decorative line

Menu About Practical cases Resources News Contact
decorative picture - leaves

WIQUAYA

online privacy for queers

Practical cases

The basics

Help sheet I practice the pseudonymity

I practice pseudonymity

What does pseudonymity consist of?
ADVICES
  1. Choose a nickname
  2. Create an email with the nickname and not my civil identity with an ethical email host
  3. Use this email and this nickname on social networks
  4. Possibility of multiplying your “virtual identities”
    • ex : Be called Watermelon Masked on Facebook
      Be called Metatu on Mastodon
  5. Ability to multiply my accounts on social networks
    • ex : An account for my friends
      An account for activism
      A professional account for employers

« It is impossible to leave no trace, but it is perhaps possible to leave traces that lead nowhere. »

Guide d’autodéfense numérique, éditions Tahin Party
Help sheet I avoid GAFAM services

I avoid the services of THE GAFAM

How to avoid their services? What are the alternatives ?
reminder

GAFAM = Web giants which are Google, Amazon, Facebook (Meta), Apple, Microsoft These companies sell the personal data of its users.

ADVICES
  1. Use ethical search engines: they don’t track me or resell my search history
    • ex : DuckDuckGo
      Qwant
  2. Install an ad blocker add-on like ublock, for example
  3. Find alternatives to Google Docs, Skype, Whatsapp, ...
    • ex : Framasoft offers alternatives
      Wire can replace Whatsapp
  4. Install an extension to block ad cookies
    • ex : Privacy Badger
  5. Use ethical, secure and encrypted messaging
    • ex : autistici.org
Help sheet I delete my history, cookies, cache and downloads

I DELETE MY HISTORY, COOKIES, CACHE AND DOWNLOADS

Why and how to remove them?
Why?

I am on a community support site for queer / lgbti+ people. It is possible that someone close to me, who does not know my queer / lgbti+ identity, could harm me if they found out that I was browsing this site. Then it is necessary for me to remove certain traces of navigation.

ADVICES
  1. If the computer is shared or there is a risk of intrusion into it: delete my “recent” or “from the beginning” browsing history even if the latter option is more suspicious
  2. Ideally, delete cookies and cache (cached web content)
    1. Cookies are small, often encrypted text files located in browser directories. They indicate my browsing preferences
    2. The cache is an intermediate memory system that makes it possible to display recently loaded web pages in the browser more quickly.
  3. Delete my downloads
Help sheet I manage access to my private messages

I manage access to my private messages

How do I sort and select the people who can write to me?
ADVICES
  1. Restrict access to the “contact” option to my friends
    1. On Facebook restrict the option “who can send you invitations” to “friends and their friends”
    2. On Instagram, switch your account to private mode
    3. On Twitter uncheck the option “Allow message requests from everyone”
  2. For Twitter, install the SafeDM application which sorts explicit content
  3. Block an unwanted contact on different social networks
  4. Install and use the red block add-on which allows you to block several users at once
Help sheet I use private browsing

I use private browsing

What are the advantages and limits of private browsing?
AVANTAGES ?

Private browsing allows you to browse without saving history and cookies

LIMITS ?
  1. Be aware that it does not prevent leaving traces on social networks and on other sites
  2. Realize that if it is an office computer, the employer can collect information on the sites that I visit
  3. Realize that my Internet Service Provider (ISP) can too
  4. If I download a file, it stays on my computer and in my download history.
ADVICES

Click on the logo to open a new private browsing window

Help sheet I manage my privacy settings on social networks

I manage my privacy settings on social media

What does the management of these parameters consist of?
ADVICES

Who can see my content ? Who can react to it? How will it be shared? Which of my profile information is visible and by whom?

  1. Set my account private and set the audience for my posts in private
  2. Put the audience for my personal information in “me only”

Who can find my profile on a social network in a search engine?

Possibility to use a nickname and not my civil identity

Who owns my data?

Consult the pribot.org/polisis website for a summary of the Terms of Service (TOS) of most sites

Retrieve my archives from the various social networks that I frequent to have visibility on what is collected about me

Help sheet I assess my threat model

I assess my threat model

What is a threat model?
DEFINITION

The threat model is a process by which potential threats can be identified, listed and prioritized, from the perspective of the hypothetical attacker.

ADVICES
  1. Realize that we do not all have the same threat models
  2. ex : Paprika34 is Tunisian, survivor of domestic violence, they can protect themself from racist people, them ex-boyfriend, ...
    Diva_glam is dragqueen, homosexual, fat and trans, he can protect himself from homophobics, fatphobics, transphobics, ...
    Anon1m@ is an anti-authoritarian and Lebanese activist, she can protect herself from people who advocate authoritarianism, racists, ...
  3. I ask myself what do I want to protect and who do I need to protect myself from? This leads to different ways of frequenting the web and different protection solutions.
  4. “A chain has the strength of its weakest link. “
Help sheet i use an encrypted messaging service

I use an encrypted messaging service

Who owns my data?
CONTEXT

Depending on my threat model, sometimes using an encrypted email service is not enough. It’s crypted, great! But do I trust the company that stores my data and offers this service?

ADVICES
  1. Evaluate my threat model: I ask myself what I want to protect and against whom I want to protect myself?
  2. Evaluate who or what company I trust to use an encrypted messaging service.
    • ex : Protonmail may be fine for me, but I don’t forget that they collaborated with Interpol to give out activists’ private information.
    • Whatsapp may be suitable for me, but I keep in mind that this service is owned by the Facebook company and therefore my data can be managed by them.
  3. PPrefer services by co-optation, companies outside GAFAM (Google, Amazon, Facebook, Apple, Microsoft)
I assess my threat model

Secure exchange applications:

Help sheet i encrypt my mails with thunderbird

i encrypt my mails with thunderbird

How do I protect my privacy by sending encrypted emails?
DEFINITION

Encrypting your emails is to ensure the confidentiality of the email I send to my sender. The message is therefore not in the clear (unencrypted).

Key system

Each person who sends an encrypted email has a set of two keys:

  1. PUBLIC : it is used by my recipients to send me encrypted emails
  2. PRIVATE : I do not give it to anyone, it is used to decipher the encrypted emails sent to me
ADVICES
  1. I import my email account to Thunderbird
  2. I generate my OpenPGP key in: account settings -> end-to-end encryption -> add a key
  3. I must have the public key of my recipient
  4. Once the set of keys has been generated, I compose my email: I compose my body of the email and I put the email of my recipient
  5. I encrypt my email:
      I click on the “security” tab
      SIf this is the first time I am addressing this recipient, I can check the option “attach my public key”
      I check on “require encryption”
  6. I send my email.
Help sheet I sign my emails with Thunderbird

i sign my mails with thunderbird

How do I protect my privacy by sending signed emails?
DEFINITION

Signing emails means guaranteeing the authenticity of the email I send to my sender-ice. The message is in the clear, but it is attested that it came from me and that it was not altered between me and the recipient.

Key system

Each person who sends a signed email has a set of two keys:

  1. PUBLIC : it is used by people to verify that it is me who is sending the encrypted email
  2. PRIVATE : I don’t give it to anyone, I use it to sign my emails
ADVICES
  1. I import my email account to Thunderbird
  2. I generate my OpenPGP key in: account settings -> end-to-end encryption -> add a key
  3. Once the set of keys has been generated, I compose my email: I compose my body of the email and I put the email of my recipient
  4. I sign my email:
      I click on the “security” tab
      I check “digitally sign”
  5. I send my email.

Social Media

Help sheet I’m QUEER/LGBTI+ and my family doesn’t know it

I’m QUEER/LGBTI+ and my family doesn’t know it

How can i protect my informations and my private life on social media ?
What do i need to protect?

My publications (photos, status, shares ...)

Who do I need to protect myself from?

Usually anyone who is unaware of my queer / lgbti+ identity in and out of social media.

ADVICES
  1. Use private browsing (if sharing a computer)
  2. Install an ad blocker to avoid targeted ad alerts
  3. Create a dedicated email address on an ethical host
  4. Practice pseudonymity
  5. Generate or create a strong and confidential password, preferably one per account
  6. Evaluate who I trust to follow me on social media
  7. Configure and control the privacy settings on the social media I use
  8. Do a history / cookies scan to erase everything after a user session that I want to keep private
Help sheet I experience harassment in life

I am being harassed outside of the internet

How can I protect myself on social networks from people who harass me?
What do i need to protect?

My personal information such as my address, my media (photos, videos), my hangouts, my social circle.

Who do I need to protect myself from?

People who harass me outside of the internet.

ADVICES
  1. Practice pseudonymity or anonymity if possible
  2. Evaluate who I trust to follow me on social media
  3. Configure and control the privacy settings of these networks
  4. Surround myself with people I trust to discuss and help me: notify me if my identity is disclosed or otherwise ...
Help sheet I am experiencing occasional cyberbullying because of my identity or my beliefs

I suffer from occasional cyber-harassment because of my identity / my beliefs

How can I protect myself from people who harass me on social media?
What do i need to protect?

My physical and mental integrity.

Who do I need to protect myself from?

People who harass me on social media.

ADVICES
  1. Restrict exchanges during the attack by:
    1. Switching the account to private mode
    2. Blocking people who harass
  2. Keep evidence of harassment: take screenshots with nickname + comment
    1. If I want to speak out against the assault, I might find this evidence useful
  3. Remove hateful, harassing comments
  4. Do not hesitate to disconnect from the computer to avoid feeling overwhelmed
  5. Deactivate the account momentarily if the attack continues
  6. Surround myself with people I trust to discuss or help me sort out problematic comments / posts
Help sheet I frequent dating websites

I frequent dating websites

How do I protect my information and privacy on dating sites?
What do i need to protect?

Within the website: my civil identity. Outside the website: my data on the site, my physical and mental integrity.

Who do I need to protect myself from?

People behind fake profiles that could harm me through the site. Usually anyone who is unaware of my queer / lgbti+ identity outside of the site.

ADVICES
  1. Evaluate which dating site I trust to sign up for. Some resell my personal data (sexual preference, HIV status)
  2. Manage my profile privacy settings on the site
  3. Use pseudonymity
  4. Be aware that my profile picture may leak outside the site
  5. Become aware of the possible existence of false profiles
  6. Evaluate who I trust on this site
  7. If there is a physical appointment, I can go accompanied and choose a frequented public place.
Help sheet I use facebook

I use facebook

QUELLES SONT LES (TRÈS) GRANDES LIGNES AUXQUELLES JE DOIS PRÊTER ATTENTION ?
REMINDER

Facebook belongs to the giants of the web. The others are Google, Amazon, Apple, Microsoft.

ADVICES
  1. There are two confidentialities for a facebook group:

    * PUBLIC : Anyone can see group members and their posts, on and off Facebook.

    * PRIVATE : Only members can see other group members and their posts.

    Pay attention to the confidentiality of the groups that I join.
  2. Facebook can access my phone book on the phone (this is where suggestions from friends can come from)

    Have two phones: a personal and a professional without facebook.

    Have two phones: a personal and a professional without facebook.

    Have a professional facebook showcase account.

    Go to facebook only with the computer.

    Be aware that double authentication with the number phone number facilitates this link between facebook and my directory telephone.

Help sheet I use instagram

I use instagram

What are the (very) main lines that I should pay attention to?
REMINDER

Instagram is a social media for sharing pictures. This platform belongs to Facebook (which is one of the GAFAM).

ADVICES
  1. There are two confidentialities for my Instagram profile:

    * PUBLIC : everyone can see my subscriptions / subscribers and my publications

    * PRIVÉ : only my subscribers can see my subscriptions / subscribers and my publications.

  2. There are two sociability groups to share my stories

    * Everyone: everyone or all my subscribers, depending on the confidentiality of my profile (public / private)

    * Close friends: restricted circles of subscribers that I choose

  3. Whether or not I allow messages on my stories to:

    Everybody

    People that I follow

    Anybody

Help sheet I use twitter

I use twitter

What are the (very) main lines that I should pay attention to?
REMINDER

Twitter is a microblogging social media created by Twitter Inc.

ADVICES
  1. There are two confidentialities for my Twitter profile

    * PUBLIC: everyone can see my subscriptions / subscribers and my publications

    * PRIVATE: Protected tweets cannot be RT (shared), nor referenced in search engines like Google.

  2. I can deactivate the link between my Twitter profile and my email or phone number in the privacy settings.
  3. I don’t forget to disabled geolocation in the privacy settings.
  4. If I experience a wave of cyberharassing, I can use the Redblock add-on which allows me to block multiple users at the same time.
help sheet i use snapchat

I USE SNAPCHAT

What are the (very) main lines that I should pay attention to?
REMINDER

Snapchat is a social media for sharing ephemeral videos not stored on a news feed. It notifies the sender of a snap when the recipient uses the usual methods to take a screenshot. Snapchat is owned by Snap Inc.

ADVICES
  1. Realize that snaps are disappearing but a friend can still take a screenshot of them or take a picture of them with another device.
  2. Realize that snaps disappear from users but not from Snap Inc.
  3. Check my privacy settings to choose who can see my snaps and stories.
  4. Check my privacy settings to choose who can see my location on the Snap Map.
  5. If I am being harassed, I can block the user and leave the group chat.
help sheet i use tiktok

I USE TIKTOK

What are the (very) main lines that I should pay attention to?
REMINDER

TikTok is a social media owned by ByteDance. Users share short videos and follow “trends”.

ADVICES
  1. Realize that the advertisements that I can see on the app are offered based on the date of birth that I wrote down to register.
  2. Anyone can see the nickname and username
  3. There are two confidentialities for my TikTok profile:

    * PUBLIC : anyone can see my posts and subscribe to me

    * PRIVATE: Only subscribers I approve can subscribe to me and watch my videos.

  4. Evaluate the impact of synchronizing TikTok contacts and Facebook friends
    I might not have the same contacts on these two accounts and don’t want Facebook contacts to see my TikTok videos, for example.
  5. I can choose who sends me comments, who sees the subscription list, etc.
Help sheet I use discord

I USE DISCORD

What are the (very) main lines that I should pay attention to?
REMINDER

Discord is free proprietary software for enable voice chats over networks and instant messaging. It belongs to Discord Inc. Microsoft was well placed in the list of possible buyers but ultimately Discord prefers to go public.

ADVICES
  1. There are three types of people who can add me as a friend:

    * EVERYONE: anyone with my DiscordTag (my nickname + the number after #).

    * Friends of my friends: only people who have friends in common with me.

    * SERVER MEMBERS: only people who are on the same server as me

  2. Block an unwanted user by clicking on the username in the private message window -> click on the three dots, at the top right -> click on “block”

Integrity

Help sheet i'm being harassed outside of the internet

I am being harassed outside of the internet

How can I protect myself on social networks from people who harass me?
What do i need to protect?

My personal information such as my address, my media (photos, videos), my hangouts, my social circle.

Who do I need to protect myself from?

People who harass me outside of the internet.

ADVICES
  1. Practice pseudonymity or anonymity if possible
  2. Evaluate who I trust to follow me on social media
  3. Configure and control the privacy settings of these networks
  4. Surround myself with people I trust to discuss and help me: notify me if my identity is disclosed or otherwise ...
Help sheet I suffer from revenge porn

I suffer from revenge porn

How to prevent revenge porn? How do I try to have my intimate photos / videos removed from the web and obtain redress?
What do i need to protect?

My privacy and my civil identity.

Who do I need to protect myself from?

People for whom the intimate photo / video was not intended.

ADVICES
  1. Keep proof of publication with my photo / video: take a screenshot with username + photo visible
    • If I want to speak out against the assault, I might find this evidence useful
  2. Report the published content without my consent to the concerned platform in order to remove it
  3. Report the profile of the author of this content to the platform concerned so that he is excluded
  4. Use the right to be forgotten of a search engine
  5. Surround myself with people I trust to discuss and help me
  6. As a precautionary measure, follow the advice in the sheet “I post / send nudes on social media or privately”
Help sheet I receive unsolicited photos of sexual nature

I receive unsolicited photos of sexual nature

How can I protect myself from this kind of photos?
What do i need to protect?

The reception of my private messages, my mental integrity.

Who do I need to protect myself from?

People who send me photos of a sexual nature without my consent.

ADVICES
  1. Manage the access settings for my Private Messages (PM) on the social network
  2. Keep proof: take a screenshot with username + photo visible
    • If I want to speak out against the assault, I might find this evidence useful
  3. Block contact
  4. Report the profile of the author of this content to the platform concerned so that he is excluded
Help sheet I come out on the internet

I come out on the internet

What should I be vigilant about?
What do i need to protect?

he information given during my coming out.

Who do I need to protect myself from?

People not affected by my coming out. People who harass me after coming out.

ADVICES
  1. Evaluate who I trust to come out
  2. Evaluate the platform / social network on which to do it
  3. Configure and control the privacy settings of my publication on this platform
  4. If cyber-harassment: follow the advice in the sheet “I am subject to occasional cyber-harassment because of my identity / my convictions”
Help sheet i wish to have access to alternative and/or community information

i wish to have access to alternative and/or community information

How can I be informed while protecting myself?
What do i need to protect?

My physical and mental integrity.

Who do I need to protect myself from?

People who publish discriminating information. Overwhelming flow of information.

ADVICES
  1. Evaluate who I am subscribing to (person, newspaper ...)
  2. Choose the “I’m not interested” option - when available - on discriminating content: similar publications will appear less in the news feed
  3. If I’m feelin overwhelmed, hide publications and / or profiles relaying a lot of information
  4. Surround myself with people I trust to discuss and debrief on the news
  5. Time frame
    1. Dedicate different time slots for information, entertainment, activism, etc.
    2. Dedicate a profile to an activity: one profile for information, another for photos of little cats, etc.

Nudity

Help sheet I post / send nudes on social media or privately

I post / send nudes on social media or privately

How can I best reconcile privacy and visibility when I post / send them?
What do i need to protect?

My civil identity, my privacy.

Who do I need to protect myself from?

People who want to identify me, turn the photos against me. People for whom the intimate photo is not intended.

ADVICES
  1. Evaluate to whom I am sending and on which platform I am posting the nude: Can I trust this person? Could he/she turn this photo against me?
  2. Give preference to certain framing where my head and my body do not appear in the same photo.
  3. Avoid exposing characteristic tattoos, scars and piercings.
  4. Foster a neutral environment: that we do not recognize the place where I took the photo
  5. Use a watermark system with the nickname of the person who receives it
  6. Host / send the nude on a secure platform
  7. Lock the folder where the nude is stored on my computer or phone so that no one falls on it without my consent

Prevention

Help sheet I protect my peers on the internet

I protect my peers on the internet

How can I protect the people with whom I have identity and political affinities?
What do i need to protect?

The physical and mental integrity of my peers

Who do I need to protect myself from?

Generally, anyone who is unaware of our queer / lgbti+ identities and / or who could harm us.

ADVICES
  1. Check the visibility settings of a publication before sharing it
  2. Evaluate to whom I send and on which platform I relay a publication from a comrade
  3. Do not tag your friends under certain engaging posts, it might get them out.
  4. Use a secure email from an ethical host to protect my contacts, individually or on a mailing list
  5. *
  6. Realize that we do not all have the same threat models
Help sheet I organize activist events

I organize activist events

How can I organize “secure” activist events?
What do i need to protect?

The identity and safety of people who attend my events.

Who do I need to protect myself from?

People who disagree with the event and people who do not know the queer / lgbti+ identity of the participants

ADVICES
  1. Confidentialize the list of participants on the web
    • ex : I create an event on Facebook, I manage the visibility parameter of the participants
  2. Always ask before taking a picture of the public
  3. Focus on wide shots, not close-up and from the back
  4. Always blur the faces of the people present when I post photos / videos on the internet: blur the face, shoes and other distinctive signs (tattoos, ...) with a cluster of dark color
Help sheet I use my computer on the train

I use my computer on the train

What is the risk of my data when I use the public wi-fi on the train (or elsewhere)?
CONTEXT

Having a train ticket and being there sometimes means being able to access the open and “free” Wi-Fi service for the duration of the journey.

ADVICES
  1. Realize that anyone using the same Wi-Fi as me (therefore the network offered by the railway company but also the town hall, the fast food restaurant) can see what I am doing there.
    • ex : Without protection, everyone can see the sites I visit, my identifiers, ...
  2. Disable automatic Wi-Fi connection
  3. avoid carrying out banking transactions on this open network
  4. Connect to secure networks when possible
  5. Use a VPN to encrypt the data I send and receive.

BONUS : I turn off my bluetooth and pay attention to who is looking at my screen.

Activism

Help sheet I campaign for access to rights for people who are discriminated

I campaign for access to rights for people who are discriminated

How to campaign safely while preserving my identity?
What do i need to protect?

My rights to campaign and express myself in freedom.

Who do I need to protect myself from?

Usually, from anyone who does not agree with my beliefs and wishes to harm me.

ADVICES
  1. Practice pseudonymity or anonymity if possible
  2. Give priority to services outside GAFAM (Google, Amazon, Facebook, Apple, Microsoft)
  3. Use as much as possible networks with access by co-optation
  4. Use secure exchange applications (Signal, Wire, ...)
  5. Be vigilant about the metadata (date, place of the shooting) of the photos, videos that I post

The contents of the wiquaya.org site (logos, graphic elements, videos, etc.) are under the creative commons license CC-BY-NC-ND. More details in the legal notice.

Site created by:

© LB Website

Site designed by:

© Gheyme
Legal notices and terms of use of the site Sitemap
Top of the Page