drawn patterned graphics
Access to information Safety

Security in-a-box

Tactical Tech resources that show you how to remain anonymous online, how to protect your data and communications and how to set up the tools you need in order to achieve this.

Security in-a-box contains all you need to know about digital security. The eleven chapters of the Security in-a-box booklet show you how to remain anonymous online and how to protect your data and communications, while the hands-on guides teach you how to set up the tools you need.

Created for human rights advocates by Tactical Tech and Frontline Defenders, Security in-a-box is one of the most comprehensive and well-known toolkits on digital security around. It is available in English, Arabic, Russian, French, Spanish, Vietnamese, Chinese, Farsi, Burmese, Amharic, Bahasa and Tibetan, and can be downloaded as a PDF.

The website is updated frequently to keep you up to date with new tools and changes in already-existing ones.

If you want to jump right in, some of the resources featured in the Watching out for Yourself section of Exposing the Invisible link to specific chapters of Security in-a-box.

More about this topic

photo of the Exposing the Invisible - The Kit's cover
Access to information Safety
Verification Data Mapping Metadata Research

Exposing the Invisible - The Kit

The Kit is a collaborative, self-learning resource that makes investigative techniques and tools use...
black and white abstract painting
Access to information
Metadata Research Data

Digital Resources for Citizen Investigators: Our recommendations

Many of us currently live and work in a challenging physical isolation imposed on us by the COVID-19...
Safety Conflict and Power

Risk Assessment Is a Mindset, Not a Checklist

Conducting investigations is risky. Unfortunately, individual investigators rarely have the resource...
gloomy cloudy sky

Technology Is Stupid: How to choose tech for remote working

This article addresses questions about which tech is good, safe and appropriate to use in these comp...
illustration of a computer and USB flash drive on a gray background

From Tails to Whiskers: How We Created a Secure Investigation Framework

At Tactical Tech we sometimes experiment with creating tools and software that we think are needed b...


The operating system designed to preserve your privacy and anonymity.

GPG Encryption for Your Emails

A tool allowing you to encrypt the content of your emails if the person you write to also uses it.

Tor Browser

A tool to browse the web securely.