security in-a-box
digital security tools and tactics
Passwords
Create and maintain strong passwords
Manage your passwords safely
Use two-factor authentication
Related Tools
Communication
Create and protect multiple online identities
Protect the privacy of your online communication
Recover from possible account compromise
Secure your email communications
Protect yourself and your data when using social media
Related Tools
Phones & Computers
Protect against physical threats
Protect against malware
Protect your Android device
Protect your iOS device
Protect your Windows computer
Protect your Mac computer
Protect your Linux computer
Related Tools
Internet Connection
How the internet works and how it can be censored
Browse the web more securely
Circumvent internet blockages and monitoring
Anonymize your connections and communications
Related Tools
Files
Protect your sensitive information
Back up and recover from information loss
Destroy sensitive information
Destroy identifying information
Related Tools
About
About Security-in-a-Box
How does Security in a Box work?
English
العربية
English
Español
فارسی
Français
Bahasa
မြန်မာဘာသာ
پښتو
Português
Русский
Türkçe
Tiếng Việt
简体中文
What do you need to protect?
Your Passwords
Create and maintain strong passwords
Manage your passwords safely
Use two-factor authentication
Related Tools
Your Communication
Create and protect multiple online identities
Protect the privacy of your online communication
Recover from possible account compromise
Secure your email communications
Protect yourself and your data when using social media
Related Tools
Your Phones & Computers
Protect against physical threats
Protect against malware
Protect your Android device
Protect your iOS device
Protect your Windows computer
Protect your Mac computer
Protect your Linux computer
Related Tools
Your Internet Connection
How the internet works and how it can be censored
Browse the web more securely
Circumvent internet blockages and monitoring
Anonymize your connections and communications
Related Tools
Your Files
Protect your sensitive information
Back up and recover from information loss
Destroy sensitive information
Destroy identifying information
Related Tools