RIGHT TO CONNECT

Loading

Blog

  • RTC
  • Jan, Tue, 2024

RightsCon 2023

Representatives of RTC had active participation in the 12th edition of the world’s leading summit on human rights in the digital age, RightsCon 2023, which was led by Access Now. RightsCon 2023 was a central hub for discussions on the intersection of technology and human rights. A wide range of representatives of international organizations, journalists, HRDs, activists, policymakers, technologists, and representatives of private sector companies attended RightsCon 2023. The conference provided a vibrant platform for stakeholders to engage in dialogue, share their insights, and collaborate on strategies to address the most pressing issues facing our digital world.

  • RTC
  • Jan, Mon, 2024

The Global Info/Tegrity Network Event by NDI in Washington, DC

RTC had the honor of being invited by the National Democratic Institution (NDI) to the Global Info/Tegrity Network kick-off event held in Washington, DC, in November 2023. The significant gathering brought together RTC and experts representing 15 countries across Africa, Asia, Eurasia, Latin America, and the Middle East. The primary purpose of the event was to facilitate an exchange of ideas and the sharing of best practices aimed at promoting information integrity. The Global Info/Tegrity Network encompasses a diverse range of organizations and individuals dedicated to advancing digital literacy, countering information manipulation (including misinformation and disinformation), addressing online violence against women and marginalized groups, social media monitoring, fact-checking, cybersecurity, and related topics.

Participants from Afghanistan, Tanzania, Nigeria, South Africa, Mexico, Serbia, the Philippines, Moldova, Kosovo, Ukraine, Taiwan, Jordan, Belarus, and Ecuador forged a cross-regional partnership. This collaborative effort is geared toward building sustainable impact by sharing experiences, strategies, and opportunities and collectively working towards result-oriented approaches. This initiative reflects a commitment to addressing complex challenges associated with information integrity on a global scale, emphasizing cooperation and the pooling of resources to make a meaningful and lasting impact toward fostering democracy and human rights in the area of technological advancement.

Participants were introduced to international stakeholders, including U.S.-based experts, technology companies, and donors. Beyond networking, the event featured valuable capacity-development training sessions. These sessions covered a spectrum of crucial areas, including strategic communications, fact-checking, media engagement, research methods and tools, AI and digital literacy, social media monitoring, and the inclusion of gender and marginalized groups. This comprehensive approach reflects a commitment to equipping participants with the tools and knowledge necessary to tackle the multifaceted issues related to information integrity.

The National Democratic Institute (NDI) is a non-profit, non-partisan, non-governmental organization that works in partnership around the world to strengthen and safeguard democratic institutions, processes, norms, and values to secure a better quality of life for all. NDI envisions a world where democracy and freedom prevail, with dignity for all.

  • RTC
  • Feb, Sun, 2023

How to Use Signal Safe


Signal is a social media communication tool developed by Open Whisper SystemsSignal Foundation and released in 2014.


Signal features end-to-end encryption by default. Signal is made to never collect or store any private data. Signal calls and communications are always end-to-end encrypted, private, and secure, so neither Signal nor any other third parties can access them. For how to make sure, click here.


To maintain a clean communication history, use disappearing messages. Once the countdown expires, the message will be removed from your devices. This isn’t for cases where your contact is your adversary; after all, someone who receives a disappearing message may always use another camera to take a photo of the screen just before the message disappears if they really want a record of it. Click here for how to do it.


Editing & deleting all messages is possible on Signal. If you still want to erase the message that was sent to everyone in the conversation, you can do it even if it is seen. For how to do it, click here.


Set up the Lock Screen on Signal. The Screen Lock feature of Signal makes use of the pin, passphrase, or biometric authentication on your phone (e.g., a fingerprint, TouchID, or FaceID). For how to activate it, click here.


Signal PIN is a code that supports features like identifiers that are not based on phone numbers. This means that if you ever lose or swap devices, your PIN can help you retrieve your profile, settings, contacts, and blocked users. An optional registration lock that uses a PIN can stop someone else from registering your number on your behalf. For more information and PIN change, visit here.


Signal operates the existing keyboard or Input Method Editor (IME) on your mobile device. You can activate Incognito Keyboard to stop your virtual keyboard software from monitoring your typing patterns and using that information to tailor its service if you are concerned about it. Here is how to activate it.


You can blur faces on photos using Signal. All processing takes place locally, on your own device, to protect your privacy. To achieve that, switch on “Blur faces,” and faces will be automatically detected and hidden.

  • RTC
  • Feb, Sun, 2023

How to Use Skype Safe


Skype is a social media communication tool operated by Skype Technologies, a division of Microsoft. It was released in 2003.


Use a password manager. Create a complex password and change it repeatedly. Never use an old password and the same password for several accounts. Here are some useful password managers:

Nordpass Keeper RoboForm Dashlane 1Password LastPass Passwarden


You can utilize end-to-end encryption on Skype. Voice, video, file transfers, and instant messages between Skype-to-Skype users are all encrypted. This protects you from conceivable listening in by malevolent individuals. The part of your call that passes through the PSTN (the conventional phone network) when you call mobile and landline phones from Skype is not encrypted. For how to do it, click here.


Skype is a property of Microsoft. Microsoft’s two-step verification security feature works to keep your Skype account safe by making it harder for unauthorized users to access your Microsoft account. Here is how to activate it.

If your account is compromised and or hacked, please visit how to recover a hacked or compromised Microsoft account.


People can search for you using your phone number to connect with you and start speaking if you use a phone number to sign up or log into Skype or if you have one listed in your profile. If you choose to make your phone number unsearchable, you can do this at any moment. For how to do it, click here.


You have control over who can access the details of your Skype profile and presence status. Some information is public, but if you don’t want it to be displayed in your profile, you can leave it blank. Your email address is not displayed on Skype. No one can see it when looking at your profile. Your email address cannot be used to be found by anyone other than friends who already know it. Here is how to do it.


Log into your Skype account safely if using a computer that is not yours. You can use a Virtual Private Network (VPN) for more private use of internet. First, verify the security of the browser. Do not select remember the password option. Once you’re finished, log out of the account.

  • RTC
  • Feb, Sun, 2023

How to Use Telegram Safe


Telegram is a social media communication tool released in 2013.


You can hide your phone number on Telegram. You can send messages in groups and in private chats on Telegram without revealing your phone number. By default, only the contacts you’ve added to your address book as contacts can see your phone number. Nonetheless, you can hide it. For how to do it, click here.


On Telegram, you can have a secret chat. The user whose profile you want to contact should be opened. Click “…” and then “Start Secret Chat.” Keep in mind that Telegram’s private chats are device-specific. On one of your devices, if you and a friend start a private conversation, just that device will have access to it. All of your private chats will be lost once you check out. You can make as many different private chats with the same contact as you like. For how to do it, click here.


You can enjoy end-to-end encryption on Telegram. The participating devices use the so-called Diffie-Hellman key exchange to exchange encryption keys when a secret chat is created. Following the creation of the secure end-to-end connection, we create a graphic that represents the encryption key for your chat. When you compare this image to your friend’s, If the two photos are the same, you may be certain that the secret conversation is secure and that a man-in-the-middle assault cannot succeed. Click here for how to do it.


Telegram has two-step verification, and you can turn it on. Although using an SMS code to log in is a messaging industry standard, if you want more protection or have reasons to be suspicious of your mobile carrier or government, you can secure your cloud chats with an additional password. For how to do it click here.


Alas, everyone can find you on Telegram and view your profile and pictures. Everyone who is a member of the group can see your name on the member list. You can receive messages from anyone. For more information, click here.

  • RTC
  • Feb, Sun, 2023

How to Use WhatsApp Safe


WhatsApp is a social media communication tool released in 2009.


Never divulge your WhatsApp verification code to anyone. The SMS verification code issued to your phone number is required to take control of your account if someone tries to do so. Without this code, anyone trying to authenticate your phone number will be unable to do so and use your number on WhatsApp. This implies that your WhatsApp account is still under your control. For more information, click here.


Enable two-step verification and enter your email address so you may receive reminders if you lose your PIN. For how to do it, click here.


You can set a device code. It’s not necessary to keep your phone connected in order to use WhatsApp on up to four connected devices at once. On WhatsApp, one phone at a time can be connected. For how to do it, click here.


WhatsApp offers end-to-end encryption for all messages you send and receive in order to ensure that only you and the person you’re talking to can read or listen to your personal messages. For how to activate it, click here.


The steps listed here could help you regain access to your WhatsApp account if you were tricked into disclosing your WhatsApp code and lost access to that.


You can hide chats on WhatsApp if you need. You can better organize your talks by hiding a specific individual or group chat from your chats list using the archive chat feature. For how to do it, click here.


For more details on safety and security of your chats on WhatsApp please visit here.

  • RTC
  • Feb, Sat, 2023

How to Use Messenger Safe


Messenger is a Meta Messaging Platform developed as Facebook Chat in 2008.


Use end-to-end encryption in your Messenger. In a conversation, end-to-end encryption adds additional security and protection so that only you and the other person can see, hear, or read the messages and calls you exchange. Messenger no longer supports Vanish Mode. In an end-to-end encrypted chat, users can still send disappearing messages. For how to do it, click here.


In Messenger, you can manage your privacy by deciding who can see your Active Status, selecting the audience for your Stories, using secret conversations, and more. For how to manage your Messenger privacy, click here.


You can control who reaches your chat list. You will get a message request if someone sends you a message on Facebook but you are not linked with them. Remember that responding to a message request establishes a connection between you and the sender and makes any content they sent you visible. To find out how to limit who in Messenger can start a new chat with you, click here and here.


If there are individuals, you don’t want to hear from, block, hide, or mute them. You can control messenger notifications for all conversations. To finds out how to mute, or block individuals in Messenger, click here.


On your smartphone, you can lock the app. You can enable Messenger’s app lock feature for your Android or iOS device to provide your Messenger account extra security and privacy. For more information click here.

For more security and safety of Messenger, please click here.


Note: You may access Messenger using your Facebook account as it is linked to Facebook. Both Messenger and Facebook are the property of Meta.  Please refer to Facebook’s details for additional information about the security and safety of your Messenger.

  • RTC
  • Feb, Fri, 2023

How to Keep Your Yahoo Mail Safe


Yahoo! Mail is a Free Email Service Launched in 1997, by Yahoo, Inc.


Avoid using your full name in your Yahoo account. You should keep your first and last names private on Yahoo. A false name or a sending name must be provided. In Yahoo Mail, alter your sending name by using the following steps:

  • Login to Yahoo Mail;
  • Click the Settings menu icon;
  • Tap Mailboxes;
  • Choose the account that needs editing;
  • To change or remove your sending name, click the “Your name” link; and
  • Press Save.

For more information, click here.


Your first line of defense against hackers and imposters is a strong password. Here are some helpful hints for making a strong password that will keep your data safe. To Create a strong password:

  • Use unique words;
  • Have 12 or more characters;
  • Don’t be obvious by using personal information like your name, your Yahoo ID, your birthday, etc.;
  • Avoid sequences or repeated characters;
  • Use a different password for each account;
  • Use a passphrase;
  • Don’t recycle old passwords;
  • Use antivirus software for your computer;
  • Keep your password fresh by Changing it regularly;
  • Look for yahoo.com to log in;
  • Be cautious – If you’re being asked to change your password;
  • Type out the URL into your browser’s address bar instead of clicking a link in an email; and
  • Use your Yahoo Account Key – If you’re concerned about your password being stolen.

For more information, click here.


Use a password manager. Create a complex password and change it repeatedly. Never use an old password and the same password for several accounts. Here are some useful password managers:

Nordpass Keeper RoboForm Dashlane 1Password LastPass Passwarden


Yahoo values your right to privacy. You can view and manage several aspects of how your information is used with Yahoo products via the Privacy Dashboard. For more information click here.


Enable two-step verification to demand a code in addition to your password when a login attempt is performed from a new device or browser. To use two-step Verification, you must disable Yahoo Account Key if you currently use it to log in. For how to do it, click here.


Log into your Yahoo account safely if using a computer that is not yours. You can use a Virtual Private Network (VPN) for the more private use of the internet. First, verify the security of the browser. Do not select remember the password option. Once you’re finished, log out of the account. For more information, click here.


If you assume your account has been compromised, follow the below steps to secure it.

  • Immediately change your password;
  • Remove app passwords you don’t verify;
  • Check to see if your recovery options are up to date;
  • Retreat your mail settings if changed;
  • Ensure you have antivirus software installed and updated on your PC; and
  • Use an Account Key or two-step verification to ensure your account has an extra layer of security.

For more information, click here.


please note that Yahoo doesn’t offer the most secure email service. It may not encrypt your messages end-to-end.

  • RTC
  • Feb, Fri, 2023

How to Keep Your Gmail Account Safe


Gmail is a free email service launched by Google in 2004.


Avoid using your full name in your Gmail account. You should keep your first and last names private on Gmail. A false name or your pen name must be provided. For more information, click here.


Use a password manager. Create a complex password and change it repeatedly. Never use an old password and the same password for several accounts. Here are some useful password managers:

Nordpass Keeper RoboForm Dashlane 1Password LastPass Passwarden


Managing your online privacy on all Google services is your priority. Some information on your Google Account can be made public or private. You may then decide who can access information like your birthday or phone number across all Google services. For more information, click here.


Two-factor authentication is key factor in securing your Gmail and or google accounts. Use two-step verification/ two-factor authentication to secure your google accounts. Add another layer of protection to your account to keep hackers out. When you sign in, two-step verification aids in ensuring the privacy, security, and safety of your personal information. For more information, click here.


Log into your Gmail account safely if using a computer that is not yours. You can use a Virtual Private Network (VPN) for more private use of internet. First, verify the security of the browser. Brows in private. Do not select remember the password option. Once you’re finished, log out of the account. For more information, click here.


A compromised Gmail account can be fixed. If your Gmail may have been hacked, taken over, or somehow compromised, to recover your Gmail you can follow some instructions to recover it. For how to recover it, click here.


Safe your Gmail account against phishing. Phishing is the use of phony emails, messages, advertising, or websites that mimic legitimate websites you often visit in an effort to steal personal information or gain access to online accounts. They usually:

  • Ask about your financial or personal details.
  • Ask you to download software or click on websites.
  • Pose as a reputable company, such as your bank, a social media platform you use, or your job site.
  • Pretend to be an individual you know, such as a relative, acquaintance, or coworker.
  • Exactly like a message you would get from a source you trust.

Use these tips to assist you in steering clear of misleading requests and messages.

  • Pay attention to Google’s warnings.
  • Never provide personal information when requested.
  • Never input your password after clicking a message link.
  • Be wary of communications that seem urgent or too good to be true.
  • Before you click, stop and think.
  • To spot phishing emails, use Gmail.
  • Use Chrome’s Safe Browsing feature.
  • Verify any suspicious saved passwords.
  • Protect your Google Account password by setting a 2-Step Verification.
  • Send a report to Google if you received a Phishing email.

For more information, click here.


Strengthen the security of your account. Google is committed to online safety. We strongly advise regularly carrying out the measures listed below in order to safeguard your Google Account.

  • Perform a security check.
  • A software update.
  • Use secure, one-of-a-kind passwords.
  • Remove any unnecessary browser extensions and apps.
  • Defend against shady messaging and content.

For more information, click here.


Please note that Google doesn’t offer the most secure email service. it may not encrypt your messages end-to-end.

  • RTC
  • Feb, Fri, 2023

How to Use YouTube Safe


YouTube is Google owned Social Media Video Sharing Platform. Released in 2005.


Use two-factor authentication or two-step verification to increase the safety and security of your Google accounts, including your YouTube account. By doing this, you can strengthen the security of your account in the event that your password is compromised. Once activated, you can access your account using either your phone or your password. For how to do it, click here.


Turn on YouTube’s Safety Mode by tapping the Safety Mode setting on YouTube. This function can assist in filtering out possibly objectionable mature content that you or other users of your devices may want to avoid seeing. For how to do it, click here.


Use a password manager. Create a complex password and change it repeatedly. Never use an old password and the same password for several accounts. Here are some useful password managers:

Nordpass Keeper RoboForm Dashlane 1Password LastPass Passwarden


Log into your YouTube account safely if using a computer that is not yours. You can use a Virtual Private Network (VPN) for the more private use of the internet. First, verify the security of the browser. Do not select remember the password option. Once you’re finished, log out of the account.


A compromised YouTube account can be fixed. YouTube is the property of Google. If you assume your YouTube account on Google may have been hacked, taken over, or somehow compromised to recover your Gmail or Google Account, you can follow some instructions to recover it. For how to recover it, click here.


YouTube is the property of Google. You can improve the safety of your YouTube account by strengthening the security and safety of your Gmail account linked to your YouTube. For how to do it, click here.


Safe your account from phishing. Phishing is when a hacker poses as a reliable individual to steal personal information. Personal data may include fiscal details, social security number/national ID, and numbers on credit cards. Usually, hackers may utilize emails, texts, or websites to pose as organizations, relatives, or coworkers. You should notice YouTube will never request your password, email address, or any other account information. So if someone contacts you and acts from YouTube, don’t fall for it. For more information, click here.


If you feel insecure and unsafe, hide and or delete your YouTube channel. You have the option of completely deleting your channel or temporarily hiding some content on it. Note that your community posts, comments, and replies will be permanently deleted if you hide or deactivate a YouTube channel. For more information, click here.


Finally, as aforesaid, keeping your YouTube account secure reduces the risk of it or your channel being hacked, taken over, or compromised. Learn how to safeguard your account if you believe it has been compromised. Below are the most important steps in securing your account:

  • Create a complex password and remember it.
  • Protect your password against hackers.
  • Keep track of your passwords.
  • Don’t use an old password.
  • Don’t use the same password for numerous accounts.
  • Never divulge your sign-in details.
  • Conduct routine security checks.
  • Update or add options for account recovery
  • Set two-step verification on.
  • Remove suspicious users from your account and remove unnecessary websites and programs
  • Update your software, and create account backups
  • Stay away from suspicious requests
  • Stay away from suspicious websites
  • Report phishing or spam.