Safety Checklist for Kenyan Bloggers (2025)
Protect yourself from digital, physical, and legal risks while blogging in Kenya. Click on each section to explore protective measures and stay safe in a challenging environment.
- Strong Passwords + Two-Factor Authentication (2FA):
- Use complex, unique passwords (at least 16 characters, mixing letters, numbers, and symbols).
- Enable 2FATwo-Factor Authentication adds an extra layer of security by requiring a second form of verification. with apps like Authy or Google Authenticator, or hardware security keys for email, social media, and blogging platforms.
- Why: Prevents unauthorized access, especially with rising surveillance threatsKenya’s government uses tools like FinFisher to monitor online activity. targeting bloggers.
- Use a Virtual Private Network (VPN): Employ a reputable NordVPN or ProtonVPN to encrypt traffic and mask your IP address.
- Avoid Public Wi-Fi: Refrain from using unsecured Wi-Fi in cafes or malls to prevent data interception.
- Encrypt Messaging: Use end-to-end encrypted apps like Signal or WhatsApp for sensitive communications.
- Why: Kenya’s NEWSNetwork Early Warning System, used for surveillance by authorities. and proposed laws increase monitoring risks.
- Recognize Phishing Tricks: Be cautious of suspicious emails or links; verify sender legitimacy.
- Hover Over Links: Check URLs before clicking to avoid phishing sites.
- Update Software Often: Keep blogging platforms, devices, and antivirus software updated.
- Why: Cybercrime lawsE.g., Computer Misuse and Cybercrimes Act, 2018, used to target bloggers. increase risks of malware and phishing attacks.
- Use Pseudonyms: Publish sensitive content anonymously to protect your identity.
- Mix Routines: Vary travel routes and posting schedules to reduce predictability.
- Secure Travel: Use secure transport, avoid real-time location sharing, and inform trusted contacts.
- Why: Bloggers face arrests and abductions, as seen in cases like Albert Ojwang and Boniface Mwangi.
- Know Data Protection and Cybercrime Laws:
- Data Protection Act, 2019: Mandates consent and secure storage; fines up to KSh 5 million.
- Computer Misuse and Cybercrimes Act, 2018: Criminalizes false publications.
- Monitor proposed 2025 BillKenya Information and Communications (Amendment) Bill, 2025, may require ID-linked registration..
- Why: Arbitrary law enforcement targets bloggers, as noted by Article 19.
- Engage with Organizations:
- Join BAKE for advocacy and legal support.
- Collaborate with MCK for journalistic rights.
- Seek support from Paradigm Initiative and Article 19.
- Why: These groups combat legal and surveillance threats.
- Travel Safe: Avoid police-heavy areas, use encrypted communication, and travel in groups.
- Stay Aware: Monitor updates via BAKE on X.
- Leave Traceable Backups: Store content in Proton Drive or with trusted contacts.
- Why: Protests like 2024’s Finance Bill led to violence and internet blackouts.
Additional Notes
Contextual Risks: Reports (2019–2024) highlight increased blogger deaths and arrests due to legal, political, and technological threats like FinFisherSpyware used for surveillance in Kenya..
Legal Challenges: Vague laws, like the Cybercrimes Act, target bloggers, as seen in Cyprian Nyakundi’s arrests.
Digital Literacy: Low cybersecurity awareness increases risks; training is essential.
Protest Safety: Cases like Albert Ojwang’s death underscore the need for secure practices during protests.
Implementation Tips
- Tools: Use Tor Browser, VeraCrypt, and ProtonMail for anonymity and security.
- Training: Attend Paradigm Initiative or BAKE workshops.
- Legal Awareness: Follow Article 19 for updates on restrictive laws.
No comments:
Post a Comment