<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url> <loc>https://securityinabox.org/ar/404/</loc> </url>
<url> <loc>https://securityinabox.org/ar/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/ar/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/ar/about/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/ar/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ar/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ar/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/ar/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/ar/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/ar/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/key/</loc> </url>
<url> <loc>https://securityinabox.org/ar/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/ar/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ar/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/ar/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ar/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/ar/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/en/404/</loc> </url>
<url> <loc>https://securityinabox.org/en/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/en/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/en/about/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/en/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/en/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/en/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/en/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/en/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/key/</loc> </url>
<url> <loc>https://securityinabox.org/en/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/en/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/en/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/en/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/en/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/en/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/es/404/</loc> </url>
<url> <loc>https://securityinabox.org/es/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/es/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/es/about/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/es/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/es/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/es/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/es/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/es/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/es/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/key/</loc> </url>
<url> <loc>https://securityinabox.org/es/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/es/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/es/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/es/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/es/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/es/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/fa/404/</loc> </url>
<url> <loc>https://securityinabox.org/fa/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/fa/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/fa/about/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/fa/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/fa/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/fa/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/fa/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/fa/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/fa/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/key/</loc> </url>
<url> <loc>https://securityinabox.org/fa/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/fa/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/fa/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/fa/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/fa/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/fa/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/fr/404/</loc> </url>
<url> <loc>https://securityinabox.org/fr/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/fr/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/fr/about/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/fr/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/fr/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/fr/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/fr/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/fr/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/fr/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/key/</loc> </url>
<url> <loc>https://securityinabox.org/fr/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/fr/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/fr/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/fr/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/fr/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/fr/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/id/404/</loc> </url>
<url> <loc>https://securityinabox.org/id/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/id/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/id/about/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/id/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/id/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/id/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/id/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/id/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/id/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/key/</loc> </url>
<url> <loc>https://securityinabox.org/id/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/id/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/id/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/id/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/id/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/id/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/my/404/</loc> </url>
<url> <loc>https://securityinabox.org/my/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/my/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/my/about/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/my/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/my/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/my/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/my/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/my/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/my/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/key/</loc> </url>
<url> <loc>https://securityinabox.org/my/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/my/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/my/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/my/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/my/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/my/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/ps/404/</loc> </url>
<url> <loc>https://securityinabox.org/ps/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/ps/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/ps/about/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/ps/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ps/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ps/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/ps/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/ps/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/ps/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/key/</loc> </url>
<url> <loc>https://securityinabox.org/ps/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/ps/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ps/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/ps/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ps/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/ps/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/pt/404/</loc> </url>
<url> <loc>https://securityinabox.org/pt/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/pt/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/pt/about/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/pt/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/pt/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/pt/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/pt/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/pt/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/pt/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/key/</loc> </url>
<url> <loc>https://securityinabox.org/pt/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/pt/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/pt/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/pt/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/pt/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/pt/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/ru/404/</loc> </url>
<url> <loc>https://securityinabox.org/ru/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/ru/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/ru/about/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/ru/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ru/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ru/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/ru/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/ru/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/ru/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/key/</loc> </url>
<url> <loc>https://securityinabox.org/ru/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/ru/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ru/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/ru/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/ru/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/ru/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/tr/404/</loc> </url>
<url> <loc>https://securityinabox.org/tr/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/tr/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/tr/about/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/tr/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/tr/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/tr/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/tr/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/tr/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/tr/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/key/</loc> </url>
<url> <loc>https://securityinabox.org/tr/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/tr/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/tr/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/tr/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/tr/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/tr/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/vi/404/</loc> </url>
<url> <loc>https://securityinabox.org/vi/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/vi/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/vi/about/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/vi/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/vi/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/vi/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/vi/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/vi/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/vi/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/key/</loc> </url>
<url> <loc>https://securityinabox.org/vi/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/vi/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/vi/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/vi/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/vi/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/vi/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/zh/404/</loc> </url>
<url> <loc>https://securityinabox.org/zh/about/about/</loc> </url>
<url> <loc>https://securityinabox.org/zh/about/how/</loc> </url>
<url> <loc>https://securityinabox.org/zh/about/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/multiple-identities/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/physical-security/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/private-communication/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/safer-travel/</loc> </url>
<url> <loc>https://securityinabox.org/zh/assess-plan/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/2024-security-in-a-box-updates/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/2025-03-x-odus/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/2025-09-detentions/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/2025-10-windows10-eol/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/2025-Q1-Q2-updates/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/digital-protection-guides-survey-community-resources/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/dim-sum-guide/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/does-encryption-still-work/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/how-recently-was-security-in-a-box-updated/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/lets-encrypt-moving-towards-encrypted-web/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/lgbt-ugandans-physical-security-threats-often-translate-digital-threats-and-vice/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/observations-recent-india-censorship/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/pegasus-project-questions-and-answers/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/quick-security-recommendations-for-your-devices/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/truecrypts-security-flaws-what-now/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/why-we-still-recommend-signal-over-whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/zh/blog/workbook-security-practical-steps-human-rights-defenders-risk/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/account-compromise/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/secure-chat/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/secure-email/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/zh/communication/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/data-use-policy/</loc> </url>
<url> <loc>https://securityinabox.org/zh/disclaimer/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/backup/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/destroy-identifying-information/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/destroy-sensitive-information/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/secure-file-storage/</loc> </url>
<url> <loc>https://securityinabox.org/zh/files/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/anonymity/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/circumvention/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/how-the-internet-works/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/safer-browsing/</loc> </url>
<url> <loc>https://securityinabox.org/zh/internet-connection/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/key/</loc> </url>
<url> <loc>https://securityinabox.org/zh/passwords/2fa/</loc> </url>
<url> <loc>https://securityinabox.org/zh/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/zh/passwords/password-managers/</loc> </url>
<url> <loc>https://securityinabox.org/zh/passwords/passwords/</loc> </url>
<url> <loc>https://securityinabox.org/zh/passwords/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/android/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/ios/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/linux/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/mac/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/malware/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/phones-and-computers/windows/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/facebook/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/google/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/instagram/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/signal/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/telegram/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/tiktok/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/whatsapp/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/x-twitter/</loc> </url>
<url> <loc>https://securityinabox.org/zh/tools/youtube/</loc> </url>
<url> <loc>https://securityinabox.org/</loc> </url>
<url> <loc>https://securityinabox.org/blog/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/keepassdroid/android/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/pegasus-project-questions-and-answers/es/</loc> </url>
<url> <loc>https://securityinabox.org/en/blog/pegasus-project-questions-and-answers/ar/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/bo/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/th/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/riseup/web/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/ar/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/en/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/es/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/fa/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/fr/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/id/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/my/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/ps/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/pt/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/ru/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/tr/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/vi/guide/social-networking/web/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/riseup/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/smartphones/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/social-media/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/social-networking/</loc> </url>
<url> <loc>https://securityinabox.org/zh/guide/social-networking/web/</loc> </url>
</urlset>