Toolkits · Training

Privacy-First Publishing

Drill-based training to reduce accidental identification risk (“doxxing-by-detail”) while keeping meaning intact. Education only. Not legal advice. No case review. No outcomes sold.

De-identification drills Safe rewrite habits Privacy-first No outcomes sold

Why this training exists

Most harm comes from avoidable publishing mistakes: leaking identifiers through time/place/role combinations, posting raw screenshots with metadata, or writing text that becomes searchable in unintended ways.

  • Goal: build repeatable habits that reduce accidental exposure.
  • Not a goal: case strategy, document review, or outcome prediction.
  • Default rule: keep raw evidence private; publish the pattern and defensible claims.

Who it’s for

  • Individuals publishing online who want “privacy hygiene” that holds up under scrutiny.
  • Creators documenting events where identities can be triangulated from details.
  • Anyone who needs a safer default than screenshots and exact dates/places.

Who it is not for

  • Legal advice, emergency services, or case-specific guidance.
  • Evidence verification or document review.
  • Publishing minors/vulnerable people in identifiable ways.

What you’ll learn (skills)

  • Direct vs. indirect identifiers (and why combinations matter).
  • Rewrite drills: keep meaning, remove unique markers.
  • Safe handling of timelines, locations, roles, and screenshots.
  • How to reduce searchability (paraphrase, precision control).
  • A repeatable pre-publish workflow you can run in minutes.

Course structure (outline)

Short modules with drills. Built to be applied immediately, not “theory-only.”

Module 1
Re-identification risk basics
How people become identifiable from detail combinations (time + place + role + unique event).
Module 2
Safe rewrite patterns
Generalize precision; keep meaning; remove searchable/verbatim fragments.
Module 3
Timelines & locations
Precision control that preserves sequence without leaking addresses/unique venues.
Module 4
Screenshots & attachments
Common metadata leaks; safer defaults; what to keep private.
Module 5
Publish-safe framing
Separate what is known vs. not known; label limits; reduce over-claiming.
Module 6
Corrections readiness
How to update responsibly without silently rewriting history.

Preview drill (fictional example)

Fictional example for education. Goal: preserve meaning while removing identifying combinations.

Before (too identifying)
“On a specific date at 8:40am, I met a named role at an exact building near a unique intersection. They used a distinctive phrase. I have screenshots and an email thread.”
After (de-identified)
“In early 2025, I raised concerns in a workplace setting. The response included dismissive language in front of others. Records exist, but identifying details and raw screenshots are not published here.”
  • Exact time/place removed; precision generalized.
  • Rare titles generalized to reduce one-person identification.
  • Searchable/verbatim phrasing removed.
  • Evidence referenced as privately retained, not posted raw.

Limits & safety boundaries

  • Education only. Not legal advice.
  • No case review: no document review, no “tell me what to file,” no strategy.
  • No guarantees: risk can be reduced, not eliminated in all contexts.
  • Do not send sensitive personal data: avoid names, addresses, IDs, private records, and identifiable screenshots.
  • Editorial firewall: purchases and support do not buy coverage, outcomes, or favourable treatment.
If you want to understand the standards this training aligns with, read Principles and Corrections.

FAQ

Is this legal advice?

No. Education only. Not legal advice.

Will WitnessBC review my documents or situation?

No. No case review and no outcomes sold.

Is this only for journalists?

No. It is designed for anyone publishing public-interest material online.

Should I publish screenshots as proof?

Screenshots often contain identifiers/metadata. A safer default is to describe that records exist and retain them privately.

What should I do first?

Start with the free checklist: Privacy-First Publishing Checklist (Free). Upgrade to training for drills and habit-building.

Does buying training influence coverage?

No. Purchases and support do not buy coverage or outcomes.

Next step

If you publish more than once, habit-building is the leverage: run the free checklist, then use training to reduce repeat mistakes.