{"id":3039,"date":"2026-04-20T18:32:15","date_gmt":"2026-04-20T18:32:15","guid":{"rendered":"https:\/\/digitalscholarship.library.cornell.edu\/?p=3039"},"modified":"2026-04-20T21:03:38","modified_gmt":"2026-04-20T21:03:38","slug":"research-security","status":"publish","type":"post","link":"https:\/\/digitalscholarship.library.cornell.edu\/?p=3039","title":{"rendered":"Research Security"},"content":{"rendered":"\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Modelling<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What do you have to protect?<\/li>\n\n\n\n<li>Who do you have to protect it from?<\/li>\n\n\n\n<li>How likely is it that you will need to protect it?<\/li>\n\n\n\n<li>What are the consequences if you fail? <\/li>\n\n\n\n<li>How much hassle are you willing to go through to prevent those consequences?<\/li>\n<\/ul>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Remember that &#8230;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>No one tool or software is a panacea against every security threat. All tools have strengths and weaknesses, and their effectiveness depends on how you use them and whether it&#8217;s the right tool for a given threat.<\/li>\n\n\n\n<li>You don&#8217;t have to do <em>everything<\/em> in order to increase your safety and security. Don&#8217;t fall prey to overwhelm. Small steps help.<\/li>\n\n\n\n<li>We are here to help! Bring your questions and your particular situation to us at cul-privacy@cornell.edu<\/li>\n<\/ul>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypted Communication with Research Subjects and Collaborators<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Instant Messaging <\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The most secure all-purpose instant message app is <a href=\"https:\/\/signal.org\/\">Signal<\/a>. <br><\/li>\n\n\n\n<li>Every once in a while, there&#8217;s a misleading social-media panic about Signal&#8217;s effectiveness. Learn more about to effectively use Signal:\n<ul class=\"wp-block-list\">\n<li>&#8220;<a href=\"https:\/\/www.wired.com\/story\/signalgate-isnt-about-signal\/#intcid=_wired-right-rail_11d90a34-9b55-4e9f-8642-b74379b57ade_popular4-2\">SignalGate Isn&#8217;t About Signal<\/a>,&#8221; <em>WIRED. <\/em>26 March 2025.<\/li>\n\n\n\n<li>&#8220;<a href=\"https:\/\/www.nytimes.com\/wirecutter\/reviews\/signal-secure-messaging-app\/\">Why Signal Is Still Our Favorite Messaging App (And why no messaging app is perfectly secure),<\/a>&#8221; <em>NYTimes Wirecutter.<\/em> 4 Feb 2026.<\/li>\n\n\n\n<li><a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/9932632052378-How-to-protect-yourself-on-Signal\">How to Protect Yourself on Signal<\/a>, Signal User Support.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>If it&#8217;s not possible to use Signal, choose a different app. iMessage (when two iPhones text each other) and WhatsApp both offer end-to-end encryption by default, which is more secure than plain text SMS or Telegram.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Collaborative Writing on Shared Documents<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cryptpad.fr\/\">CryptPad<\/a>  (no fee to use)<\/li>\n\n\n\n<li><a href=\"https:\/\/mailbox.org\/en\/\">Mailbox.org<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/proton.me\/drive\">Proton Drive<\/a>  (montly subscription fee)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Email<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/proton.me\/mail\">Proton Mail<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/mailbox.org\/en\/\">Mailbox Mail<\/a><\/li>\n<\/ul>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Storing and Moving Files<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/freedom.press\/digisec\/blog\/border-security\/\">Preparing Devices for Travel through a US Border<\/a>, Freedom of the Press Foundation. 12 June 2025. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The shared drive software options listed above are all options for encrypted cloud storage. A search will reveal additional encrypted cloud drives as well. In addition, depending on your threat model and use case, consider physical thumb drives or hard drives for back up and\/or long-term storage. Inexpensive, and you don&#8217;t have to worry you&#8217;ll forget to pay the monthly subscription fee. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Modelling Remember that &#8230; Encrypted Communication with Research Subjects and Collaborators Instant Messaging Collaborative Writing on Shared Documents Email Storing and Moving Files<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3039","post","type-post","status-publish","format-standard","hentry","category-privacy"],"_links":{"self":[{"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/posts\/3039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3039"}],"version-history":[{"count":4,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/posts\/3039\/revisions"}],"predecessor-version":[{"id":3043,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=\/wp\/v2\/posts\/3039\/revisions\/3043"}],"wp:attachment":[{"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalscholarship.library.cornell.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}