Security-in-a-box blog

人权卫士的安全注意事项。

Quick security recommendations for your devices

BySecurity in a Box | 2023.10.17

See whare are few first effective steps one can take to better protect their Android, iOS/iPhone, Windows, Mac and Linux devices

延伸阅读

飞马项目问答

By穆罕默德·马斯卡蒂 | 2021.07.23

国际特赦组织和媒体平台“禁忌的故事”发表了以色列使用一种工具监视世界上许多人的调查。这项调查被称为飞马项目。

延伸阅读

数字保护指导手册:关于社群资源的调查

ByGus Andrews | 2021.03.24

综合介绍有关整体数字安全、物理安全,以及组织安全、隐私,和健康的各类资源。可以按语言、社群,或者话题浏览。

延伸阅读

How recently was Security In A Box updated? New in 2020

ByGus Andrews | 2021.02.01

Updates to tool guides on password managers, browser add-ons, and basic Android security.

延伸阅读

Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption

ByMaria Xynou & Chris Walker | 2016.05.23

WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

延伸阅读

Lets Encrypt - Moving Towards an Encrypted Web

ByMaria Xynou | 2015.12.03

Do you own a website? If so, as of today Let's Encrypt, a new non-profit certificate authority (CA), entered Public Beta and allows you to add HTTPS to your website for free and more easily than ever before.

延伸阅读

TrueCrypts Security Flaws - What Now?

ByMaria Xynou | 2015.10.08

In the last week, critical security flaws have been reported in TrueCrypt, the open source software for file and disk encryption. As a result, we are reviewing our advice on file and disk encryption and we now recommend users to consider other tools for secure file storage.

延伸阅读

Workbook on Security - Practical Steps for Human Rights Defenders at Risk

ByFront Line Defenders | 2015.03.13

The Workbook on Security is designed to raise awareness about security issues and to help human rights defenders consider how to mitigate threats. The workbook takes human rights defenders through the steps to producing a security plan - for individuals and for organisations.

延伸阅读

For LGBT Ugandans, physical security threats often translate into digital threats and vice versa

BySpyros E. Monastiriotis | 2015.03.13

Uganda has been in the news headlines around the world since 2009, when it introduced its first Anti-homosexuality Bill and there have been several attempts since then to increase penalties for LGBT people and those who help them.

延伸阅读

Does encryption still work?

ByChris Walker | 2015.03.11

In light of ongoing revelations about the global surveillance efforts of the US National Security Agency (NSA) and its intelligence allies, you might be wondering if any of this really matters anymore. Much of the recent media coverage appears to suggest that, not only are They recording everything we do and say on the Internet, but now They've defeated our encryption.

延伸阅读

Observations on recent India censorship

ByKaustubh Srikanth | 2015.01.06

On 17th December 2014, the Government of India's Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to block access to 32 websites, effective immediately.

延伸阅读