security in-a-box

outils et tactiques de sécurité numérique

  • Mots de passe
    • Create and maintain strong passwords
    • Outils liés
  • Communications
    • Protect the privacy of your online communication
    • Recover from possible account compromise
    • Protect yourself and your data when using social media
    • Outils liés
  • Téléphones et Ordinateurs
    • Protect against physical threats
    • Protect against malware
    • Protect your Android device
    • Protect your iOS device
    • Protect your Windows device
    • Protect your MacOS device
    • Protect your Linux device
    • Outils liés
  • Connexion Internet
    • Visit blocked websites and browse anonymously
    • Outils liés
  • Fichiers
    • Protect your sensitive information
    • Backup and recover from information loss
    • Destroy sensitive information
    • Outils liés
  • Français
    • العربية
    • Bahasa
    • English
    • Español
    • فارسی
    • Français
    • Português
    • Русский
    • ภาษาไทย
    • Türkçe
    • Tiếng Việt
    • 简体中文
    • Tibetan
    • ភាសាខ្មែរ
    • Burmese

What do you need to protect?

Vos mots de passe

  • Create and maintain strong passwords
  • Outils liés

Vos communications

  • Protect the privacy of your online communication
  • Recover from possible account compromise
  • Protect yourself and your data when using social media
  • Outils liés

Vos téléphones et ordinateurs

  • Protect against physical threats
  • Protect against malware
  • Protect your Android device
  • Protect your iOS device
  • Protect your Windows device
  • Protect your MacOS device
  • Protect your Linux device
  • Outils liés

Votre connexion internet

  • Visit blocked websites and browse anonymously
  • Outils liés

Vos fichiers

  • Protect your sensitive information
  • Backup and recover from information loss
  • Destroy sensitive information
  • Outils liés

Articles de blog

  • ByMohammed Al-Maskati | 2021.07.23

    Pegasus Project Questions and Answers
  • ByGus Andrews | 2021.03.24

    Digital protection guides - A survey of community resources
  • ByGus Andrews | 2021.02.01

    How recently was Security In A Box updated? New in 2020
  • ByMaria Xynou & Chris Walker | 2016.05.23

    Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
  • ByMaria Xynou | 2015.12.03

    Lets Encrypt - Moving Towards an Encrypted Web
  • ByMaria Xynou | 2015.10.08

    TrueCrypts Security Flaws - What Now?
  • ByFront Line Defenders | 2015.03.13

    Workbook on Security - Practical Steps for Human Rights Defenders at Risk
  • BySpyros E. Monastiriotis | 2015.03.13

    For LGBT Ugandans, physical security threats often translate into digital threats and vice versa
  • ByChris Walker | 2015.03.11

    Does encryption still work?
  • ByKaustubh Srikanth | 2015.01.06

    Observations on recent India censorship

security in-a-box

outils et tactiques de sécurité numérique

  • A propos
  • Contact
  • Avertissement
  • Politique d'utilisation des données
  • Glossaire
  • Twitter
  • Blog

Ces guides sont sous licence Creative Commons Attribution-Share Alike 3.0 Unported License.

Security-in-a-Box est un project conjoint de Front Line Defenders

↑