security in-a-box

digital security tools and tactics

  • Assess & Plan
    • Protect against physical threats
    • Protect the privacy of your online communication
    • Protect your information and devices while traveling
    • Related Tools
  • Passwords
    • Create and maintain strong passwords
    • Manage your passwords safely
    • Use two-factor authentication
    • Related Tools
  • Communication
    • Create and protect multiple online identities
    • Recover from possible account compromise
    • Secure your email communications
    • Protect yourself and your data when using social media
  • Phones & Computers
    • Protect against malware
    • Protect your Android device
    • Protect your iOS device
    • Protect your Windows computer
    • Protect your Mac computer
    • Protect your Linux computer
    • Related Tools
  • Internet Connection
    • How the internet works and how it can be censored
    • Browse the web more securely
    • Circumvent internet blockages and monitoring
    • Anonymize your connections and communications
    • Related Tools
  • Files
    • Protect your sensitive information
    • Back up and recover from information loss
    • Destroy sensitive information
    • Destroy identifying information
    • Related Tools
  • About
    • About Security-in-a-Box
    • How does Security in a Box work?
  • English
    • العربية
    • English
    • Español
    • فارسی
    • Français
    • Bahasa
    • မြန်မာဘာသာ
    • پښتو
    • Português
    • Русский
    • Türkçe
    • Tiếng Việt
    • 简体中文

What do you need to protect?

Assess & Plan

  • Protect against physical threats
  • Protect the privacy of your online communication
  • Protect your information and devices while traveling
  • Related Tools

Your Passwords

  • Create and maintain strong passwords
  • Manage your passwords safely
  • Use two-factor authentication
  • Related Tools

Your Communication

  • Create and protect multiple online identities
  • Recover from possible account compromise
  • Secure your email communications
  • Protect yourself and your data when using social media

Your Phones & Computers

  • Protect against malware
  • Protect your Android device
  • Protect your iOS device
  • Protect your Windows computer
  • Protect your Mac computer
  • Protect your Linux computer
  • Related Tools

Your Internet Connection

  • How the internet works and how it can be censored
  • Browse the web more securely
  • Circumvent internet blockages and monitoring
  • Anonymize your connections and communications
  • Related Tools

Your Files

  • Protect your sensitive information
  • Back up and recover from information loss
  • Destroy sensitive information
  • Destroy identifying information
  • Related Tools

Blog posts

  • By Security in a Box | 2025.03.18

    Considering an X-odus? Here are some tips
  • By Security in a Box | 2025.02.18

    On the latest Security in a Box updates
  • By Haven | 2025.02.12

    The Dim Sum Guide - digital security advice for Chinese-speaking readers
  • By Security in a Box | 2024.11.28

    Quick security recommendations for your devices

security in-a-box

digital security tools and tactics

  • Disclaimer
  • Data Use Policy
  • Twitter
  • Blog

This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Security-in-a-Box is a project of Front Line Defenders

↑