Zabezpiecz Się
Checklisty
Uwierzytelnianie
Przeglądarki
Poczta elektroniczna
Komunikacja
Social Media
Sieć
Urządzenia mobilne
Komputer osobisty
Smart Home
Finanse
Aspekt ludzki
Ochrona fizyczna
GitHub
Digital Defense
Strona główna
GitHub
Checklists
Uwierzytelnianie
Przeglądarki
Poczta elektroniczna
Komunikacja
Social Media
Sieć
Urządzenia mobilne
Komputer osobisty
Smart Home
Finanse
Aspekt ludzki
Ochrona fizyczna
Articles
Why security matters?
Security List: Short Version
Helpful Links
Security Gadgets
Privacy-Respecting Software
About
Wkład
Licencja
Autor
Kontakt
More Apps
Ustawienia
O projekcie
Motyw
Motyw
Dark
Light
Night
Cupcake
Bumblebee
Corporate
Synthwave
Retro
Valentine
Halloween
Aqua
Lofi
Fantasy
Dracula
Postęp
Skasuj wszystko
Zamknij
Uwierzytelnianie
Używaj silnego hasła
Stosuj wszędzie różne hasła
Używaj bezpiecznego menedżera haseł
Unikaj udostępniania haseł
Włącz uwierzytelnianie dwuskładnikowe
Zabezpiecz kody zapasowe
Powiadomienia o wyciekach
Chroń swoje hasło/PIN
Okresowo aktualizuj ważne hasła
Nie zapisuj haseł w przeglądarkach
Unikaj logowania się na urządzeniu należącym do innej osoby.
Unikaj podpowiedzi dotyczących hasła
Nigdy nie odpowiadaj zgodnie z prawdą na pytania dotyczące bezpieczeństwa online
Nie używaj 4-cyfrowego kodu PIN
Unikaj używania SMS-ów do uwierzytelniania dwuskładnikowego (2FA)
Unikaj używania Menedżera Haseł do generowania jednorazowych haseł (OTP)
Unikaj odblokowywania twarzą
Uważaj na keyloggery
Rozważ zakup klucza U2F
Rozważ użycie menedżera haseł offline
Rozważ użycie unikalnych nazw użytkowników
View Full Checklist ➜
Przeglądarki
Blokuj reklamy
Zweryfikuj autentyczność strony
Uważaj na złośliwe oprogramowanie przeglądarki
Używaj przeglądarki respektującej prywatność
Użyj prywatnej wyszukiwarki
Usuń niepotrzebne dodatki przeglądarki
Aktualizuj przeglądarkę
Sprawdź, czy jest HTTPS
Use DNS-over-HTTPS
Multi-Session Containers
Use Incognito
Understand Your Browser Fingerprint
Manage Cookies
Block Third-Party Cookies
Block Third-Party Trackers
Beware of Redirects
Do Not Sign Into Your Browser
Disallow Prediction Services
Avoid G Translate for Webpages
Disable Web Notifications
Disable Automatic Downloads
Disallow Access to Sensors
Disallow Location
Disallow Camera/ Microphone access
Disable Browser Password Saves
Disable Browser Autofill
Protect from Exfil Attack
Deactivate ActiveX
Wyłącz WebRTC
Fałszywy HTML5 Canvas Sig
Fałszywy User Agent
Zignoruj DNT
Zapobieganie śledzeniu HSTS
Zapobieganie automatycznym połączeniom przeglądarki
Włącz izolację pierwszej strony
Usuwanie parametrów śledzenia z adresów URL
Bezpieczeństwo przy pierwszym uruchomieniu
Użyj przeglądarki Tor
Wyłącz JavaScript
View Full Checklist ➜
Poczta elektroniczna
Have more than one email address
Keep Email Address Private
Keep your Account Secure
Disable Automatic Loading of Remote Content
Use Plaintext
Don’t connect third-party apps to your email account
Don't Share Sensitive Data via Email
Consider Switching to a Secure Mail Provider
Use Smart Key
Use Aliasing / Anonymous Forwarding
Subaddressing
Use a Custom Domain
Sync with a client for backup
Be Careful with Mail Signatures
Be Careful with Auto-Replies
Choose the Right Mail Protocol
Self-Hosting
Always use TLS Ports
DNS Availability
Prevent DDoS and Brute Force Attacks
Maintain IP Blacklist
View Full Checklist ➜
Komunikacja
Only Use Fully End-to-End Encrypted Messengers
Use only Open Source Messaging Platforms
Use a "Trustworthy" Messaging Platform
Check Security Settings
Ensure your Recipients Environment is Secure
Disable Cloud Services
Secure Group Chats
Create a Safe Environment for Communication
Agree on a Communication Plan
Strip Meta-Data from Media
Defang URLs
Verify your Recipient
Enable Ephemeral Messages
Avoid SMS
Watch out for Trackers
Consider Jurisdiction
Use an Anonymous Platform
Ensure Forward Secrecy is Supported
Consider a Decentralized Platform
View Full Checklist ➜
Social Media
Secure your Account
Check Privacy Settings
Think of All Interactions as Public
Think of All Interactions as Permanent
Don't Reveal too Much
Be Careful what you Upload
Don't Share Email or Phone Number
Don't Grant Unnecessary Permissions
Be Careful of 3rd-Party Integrations
Avoid Publishing Geo Data while still Onsite
Remove metadata before uploading media
Implement Image Cloaking
Consider Spoofing GPS in home vicinity
Consider False Information
Don’t have any social media accounts
View Full Checklist ➜
Sieć
Use a VPN
Change your Router Password
Use WPA2, and a strong password
Keep router firmware up-to-date
Implement a Network-Wide VPN
Protect against DNS leaks
Use a secure VPN Protocol
Secure DNS
Avoid the free router from your ISP
Whitelist MAC Addresses
Change the Router’s Local IP Address
Don't Reveal Personal Info in SSID
Opt-Out Router Listings
Hide your SSID
Disable WPS
Disable UPnP
Use a Guest Network for Guests
Change your Router's Default IP
Kill unused processes and services on your router
Don't have Open Ports
Disable Unused Remote Access Protocols
Disable Cloud-Based Management
Manage Range Correctly
Route all traffic through [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor)
Disable WiFi on all Devices
View Full Checklist ➜
Urządzenia mobilne
Encrypt your Device
Turn off connectivity features that aren’t being used
Keep app count to a minimum
App Permissions
Only install Apps from official source
Be Careful of Phone Charging Threats
Set up a mobile carrier PIN
Opt-out of Caller ID Listings
Use Offline Maps
Opt-out of personalized ads
Erase after too many login attempts
Monitor Trackers
Use a Mobile Firewall
Reduce Background Activity
Sandbox Mobile Apps
Tor Traffic
Avoid Custom Virtual Keyboards
Restart Device Regularly
Avoid SMS
Keep your Number Private
Watch out for Stalkerware
Favor the Browser, over Dedicated App
Consider running a custom ROM (Android)
View Full Checklist ➜
Komputer osobisty
Keep your System up-to-date
Encrypt your Device
Backup Important Data
Be Careful Plugging USB Devices into your Computer
Activate Screen-Lock when Idle
Disable Cortana or Siri
Review your Installed Apps
Manage Permissions
Disallow Usage Data from being sent to the Cloud
Avoid Quick Unlock
Power Off Computer, instead of Standby
Don't link your PC with your Microsoft or Apple Account
Check which Sharing Services are Enabled
Don't use Root/Admin Account for Non-Admin Tasks
Block Webcam + Microphone
Use a Privacy Filter
Physically Secure Device
Don't Charge Devices from your PC
Randomize your hardware address on Wi-Fi
Use a Firewall
Protect Against Software Keyloggers
Check Keyboard Connection
Prevent Keystroke Injection Attacks
Don't use commercial "Free" Anti-Virus
Periodically check for Rootkits
BIOS Boot Password
Use a Security-Focused Operating System
Make Use of VMs
Compartmentalize
Disable Undesired Features (Windows)
Secure Boot
Secure SSH Access
Close Un-used Open Ports
Implement Mandatory Access Control
Use Canary Tokens
View Full Checklist ➜
Smart Home
Rename devices to not specify brand/model
Disable microphone and camera when not in use
Understand what data is collected, stored and transmitted
Set privacy settings, and opt out of sharing data with third parties
Don't link your smart home devices to your real identity
Keep firmware up-to-date
Protect your Network
Be wary of wearables
Don't connect your home's critical infrastructure to the Internet
Mitigate Alexa/ Google Home Risks
Monitor your home network closely
Deny Internet access where possible
Assess risks
View Full Checklist ➜
Finanse
Sign up for Fraud Alerts and Credit Monitoring
Apply a Credit Freeze
Use Virtual Cards
Use Cash for Local Transactions
Use Cryptocurrency for Online Transactions
Store Crypto Securely
Buy Crypto Anonymously
Tumble/ Mix Coins
Use an Alias Details for Online Shopping
Use alternate delivery address
View Full Checklist ➜
Aspekt ludzki
Verify Recipients
Don't Trust Your Popup Notifications
Never Leave Device Unattended
Prevent Camfecting
Stay protected from shoulder surfers
Educate yourself about phishing attacks
Watch out for Stalkerware
Install Reputable Software from Trusted Sources
Store personal data securely
Obscure Personal Details from Documents
Do not assume a site is secure, just because it is `HTTPS`
Use Virtual Cards when paying online
Review application permissions
Opt-out of public lists
Never Provide Additional PII When Opting-Out
Opt-out of data sharing
Review and update social media privacy
Compartmentalize
WhoIs Privacy Guard
Use a forwarding address
Use anonymous payment methods
View Full Checklist ➜
Ochrona fizyczna
Destroy Sensitive Documents
Opt-Out of Public Records
Watermark Documents
Don't Reveal Info on Inbound Calls
Stay Alert
Secure Perimeter
Physically Secure Devices
Keep Devices Out of Direct Sight
Chroń swój kod PIN
Sprawdź, czy nie ma skimmerów
Chroń swój adres domowy
Używaj kodu PIN, a nie danych biometrycznych
Ogranicz narażenie na działanie kamer CCTV
Odzież chroniąca przed rozpoznawaniem twarzy
Ogranicz narażenie na widzenie noktowizyjne
Chroń swoje DNA
View Full Checklist ➜