Original text in English by Tactical Tech, translations & adaptations by partners:

Examining and Sharing Your Findings

Now that you’ve collected and documented the data, you’re ready to examine your findings--and that’s exactly what you’ll do in this module. You’ll also explore whether reporting and sharing your findings is right for you.

  • Lesson 1

    Be a Mindful Digital Enquirer

    Learn how to become a careful Digital Enquirer by being aware of your thought patterns and biases.

  • Lesson 2

    Expose the Invisible

    Explore and preserve the behind-the-scenes information (metadata) of photos, videos, and documents.

  • Lesson 3

    Dive Deeper Into Data

    Responsibly and verifiably draw conclusions from your data and save your digital evidence.

  • Lesson 4

    Report and Share Your Digital Enquiry

    Decide whether reporting and sharing your findings is right for you and get some fresh ideas to reach your audiences.

  • Lesson 5

    Put It All Together

    Take a short quiz and test your examination skills.

  • Resource Center

    Digital Enquirer Kit

    • Guidebook: This is a how-to guide to equip educators, community leaders, and civil society organizations with tips on using and adapting the resource to train Digital Enquirers in their own local community.
    • Video: Instructional strategies for digital security training: In this session, we will dig deeper into Digital Security trainings, answering questions such as: what are the particularities of this topic? What do learners often fear or are sceptical about? What could be the different ways to approach it?


    Conspiracy theories on social media:

    Exposing the Invisible: The Kit:

    Save evidence:


    Tools to keep/view metadata: 

    • ExifTool 
    • ProofMode 
    • Exif viewers (caution: do not upload potentially sensitive content, as the website operator may be able to view anything uploaded to their site) such as VerExifMetadata2GoJeffrey's Image Metadata Viewer (caution: this website does not use HTTPS, so anyone on the network can see what images are being uploaded)

    Tools to remove metadata: 

    Geolocation and Maps:




    Free WHOIS data services:

    • IANA WHOIS Service (works via Tor Browser and doesn’t have CAPTCHA)
    • WHO.IS  (works via Tor Browser and doesn’t have CAPTCHA)
    • WHOIS.com (works via Tor Browser and has CAPTCHA)
    • GoDaddy WHOIS  (works via Tor Browser and has CAPTCHA)
    • WHOIS Lookup (limited free search, works via Tor Browser and doesn’t have CAPTCHA)


    Fact-checking resources:

    Therapy and psycho-social resources:

    Learn more