Complete project rebrand for better positioning in the press freedom and digital security space. FieldWitness communicates both field deployment and evidence testimony — appropriate for the target audience of journalists, NGOs, and human rights organizations. Rename mapping: - soosef → fieldwitness (package, CLI, all imports) - soosef.stegasoo → fieldwitness.stego - soosef.verisoo → fieldwitness.attest - ~/.soosef/ → ~/.fwmetadata/ (innocuous data dir name) - SOOSEF_DATA_DIR → FIELDWITNESS_DATA_DIR - SoosefConfig → FieldWitnessConfig - SoosefError → FieldWitnessError Also includes: - License switch from MIT to GPL-3.0 - C2PA bridge module (Phase 0-2 MVP): cert.py, export.py, vendor_assertions.py - README repositioned to lead with provenance/federation, stego backgrounded - Threat model skeleton at docs/security/threat-model.md - Planning docs: docs/planning/c2pa-integration.md, docs/planning/gtm-feasibility.md Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
3.3 KiB
Reporter Quick-Start Card
Audience: Field reporters using a FieldWitness Tier 1 bootable USB device. No technical background assumed.
Print this page on a single sheet, laminate it, and keep it with the USB stick.
Getting Started
- Plug the USB into any laptop
- Boot from USB (press F12 during startup, select the USB drive)
- Enter your passphrase when the blue screen appears (this unlocks your data)
- Wait for the browser to open automatically
You are now running FieldWitness. The laptop's own hard drive is never touched.
Taking and Attesting a Photo
- Transfer your photo to the laptop (USB cable, SD card, AirDrop, etc.)
- In the browser, click Attest
- Select your photo and click Sign
- The photo is now cryptographically signed with your identity
This proves you took this photo, where, and when. It cannot be forged later.
Hiding a Message in a Photo
- Click Encode in the browser
- Select a carrier image (the photo that will carry the hidden message)
- Select a reference photo (a photo both you and the recipient have)
- Type your message
- Enter your passphrase and PIN (the recipient needs the same ones)
- Click Encode
To send via WhatsApp, Signal, or Telegram, select the platform from the Transport dropdown before encoding. This ensures the message survives the platform's image compression.
Checking In (Dead Man's Switch)
If your admin has enabled the dead man's switch, you must check in regularly.
- Click Fieldkit in the browser
- Click Check In
Or from a terminal:
fieldwitness fieldkit checkin
If you miss your check-in window, the system will destroy all data after the grace period.
If you are unable to check in, contact your editor immediately.
Emergency: Destroying All Data
If you believe the device will be seized:
- Pull the USB stick -- the laptop retains nothing
- If you cannot pull the USB: click Fieldkit then Emergency Purge and
confirm with
CONFIRM-PURGE
Everything is gone. Keys, photos, attestations, messages -- all destroyed.
Shutting Down
- Close the browser
- Pull the USB stick
The laptop returns to its normal state. No trace of FieldWitness remains.
Troubleshooting
| Problem | Solution |
|---|---|
| Laptop does not boot from USB | Press F12 (or F2, Del) during startup to enter boot menu. Select the USB drive. Disable Secure Boot in BIOS if needed. |
| "Certificate warning" in browser | Normal for self-signed certificates. Click "Advanced" then "Accept the risk" or "Proceed." |
| Cannot connect to web UI | Wait 30 seconds after boot. Try refreshing the browser. The URL is https://127.0.0.1:5000. |
| Forgot passphrase or PIN | You cannot recover encrypted data without the correct passphrase and PIN. Contact your admin. |
| USB stick lost or broken | Get a new USB from your admin. If you had a backup, they can restore your keys onto the new stick. |
Key Rules
- Never leave the USB in an unattended laptop
- Check in on time if the dead man's switch is enabled
- Back up your USB -- your admin can help with this
- Verify fingerprints before trusting a collaborator's key
- Use transport-aware encoding when sending stego images through messaging apps