English

Original text in English by Tactical Tech, translations & adaptations by partners:

Verifying Online Information

In this module, you’ll take the next step in developing your Digital Enquirer Mindset: how to verify trustworthy information, and measures you can take to stay safe and organized when researching online.


  • Lesson 1

    The Scientific Method

    Learn how to structure your research using the Scientific Method.


  • Lesson 2

    Digital Security Basics

    Discover digital security basics such as setting up screen locks and strong passwords.


  • Lesson 3

    Information You Can Count On

    Explore the features of credible sources and begin your online search.


  • Lesson 4

    Assess Authenticity

    Get to know inauthentic sources of information: bots, botnets, incentivized reviews, and click farms.


  • Lesson 5

    What's in a Picture?

    Focus on assessing visual information and getting to the root of a picture by conducting a reverse image search.


  • Lesson 6

    When: It's a Matter of Time

    Familiarize yourself with the publication date of information and how you can filter search results to find patterns.


  • Lesson 7

    Put It All Together

    Take a short quiz and test your newly acquired verification skills.



  • Resource Center


    Digital Enquirer Kit

    • Guidebook: This is a how-to guide to equip educators, community leaders, and civil society organizations with tips on using and adapting the resource to train Digital Enquirers in their own local community.
    • Video: Securing Your Online Accounts: Everything you want to know about how to keep your online accounts secure, including: how to maximize privacy settings, set up advanced protection (what exactly is 'two-factor authentication'?), use a password manager, monitor your account for signs of take-over, and stay safe against phishing attacks.
    • Video: All About VPNs: We've probably all heard about them, but what are VPNs, exactly? When is a good time to use them, and when is it better not to? And finally, when picking a VPN to use, how do you pick one that's right for you?

    Exposing the Invisible:

    Data Detox Kit:

    Password managers:

    Two-factor authentication instructions:

    Privacy-oriented browsers:

    VPNs:

    Online document editors:

    Cloud services:

    Learn more about bots:

    Incentivized reviews:

    Fact-checking resources:

    Reverse image search tools:

    Signal App


    Learn more