security in-a-box

digital security tools and tactics

  • Assess & Plan
    • Protect against physical threats
    • Protect the privacy of your online communication
    • Protect your information and devices while traveling
    • Related Tools
  • Passwords
    • Create and maintain strong passwords
    • Manage your passwords safely
    • Use two-factor authentication
    • Related Tools
  • Communication
    • Create and protect multiple online identities
    • Recover from possible account compromise
    • Secure your email communications
    • Protect yourself and your data when using social media
  • Phones & Computers
    • Protect against malware
    • Protect your Android device
    • Protect your iOS device
    • Protect your Windows computer
    • Protect your Mac computer
    • Protect your Linux computer
    • Related Tools
  • Internet Connection
    • How the internet works and how it can be censored
    • Browse the web more securely
    • Circumvent internet blockages and monitoring
    • Anonymize your connections and communications
    • Related Tools
  • Files
    • Protect your sensitive information
    • Back up and recover from information loss
    • Destroy sensitive information
    • Destroy identifying information
    • Related Tools
  • About
    • About Security-in-a-Box
    • How does Security in a Box work?
  • English
    • العربية
    • English
    • Español
    • فارسی
    • Français
    • Bahasa
    • မြန်မာဘာသာ
    • پښتو
    • Português
    • Русский
    • Türkçe
    • Tiếng Việt
    • 简体中文

Assess & Plan

Assess & Plan

  • Protect against physical threats
  • Protect the privacy of your online communication
  • Protect your information and devices while traveling
  • Related Tools

security in-a-box

digital security tools and tactics

  • Disclaimer
  • Data Use Policy
  • Twitter
  • Blog

This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Security-in-a-Box is a project of Front Line Defenders

↑