Skip to content

🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024

License

Notifications You must be signed in to change notification settings

Lissy93/personal-security-checklist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Personal Security Checklist

The ultimate list of tips to secure your digital life
🌐 digital-defense.io




👉 Read the Checklist 👈


Contents

The Checklist

You can read the full checklist in CHECKLIST.md.
To view/edit the raw data, see personal-security-checklist.yml


The Website

The easiest method for consuming the checklist is via our website: digital-defense.io

Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress ☺️).

About

The source for the website is in web/.
The site is built with Qwik, using TypeScript and some components from DaisyUI.

Developing

To run the app locally, or to make code changes, you'll need Node and Git installed.

  1. Grab the code: git clone git@github.com:Lissy93/personal-security-checklist.git
  2. Navigate into the source: cd personal-security-checklist/web
  3. Install dependencies: yarn
  4. Start the development server: yarn dev

Alternatively, just open this repo in Code Spaces, where everything is already configured and ready to go.

Deploying

To deploy the app, follow the developing steps above, then run yarn build, yarn build.static. You can then deploy it by copying the dist/ directory to any CDN, web server or static hosting provider of your choice.

Alternatively, fork the repo and import it into your providers' dashboard. Or use the link below for an easy 1-click deployment 😉


The API

We also make all the data available via a free API, which you can use however you wish.

Usage

All endpoints are documented in our OpenAPI spec, you can view these and try them out via our Swagger docs.

Base: digital-defense.io/api

/api/checklists /api/checklists/[name-or-index] /api/checklists/[name]/[point-index] /api/search/[searchterm]

Contributing

All checklist data is stored in personal-security-checklist.yml. This is pulled in the website at build-time and referenced by the API, and is also dynamically inserted into the markdown Checklist page.

So if you only wish to make changes to the data, this is the only file you need to edit.

Important: When submitting your pull request, provide references backing up any information that you're adding/amending/removing.

For modifying the website or API source, see the developing sections above for instructions on running locally.

Before submitting an issue or PR, please ensure you've followed the community guidelines and followed the Code of Conduct.


Credits

Thank you to all who have contributed to, or sponsored this project!

Sponsors

vincentkoc
Vincent Koc
AnandChowdhary
Anand Chowdhary
shrippen
Shrippen
bile0026
Zach Biles
UlisesGascon
Ulises Gascón
digitalarche
Digital Archeology
InDieTasten
InDieTasten
araguaci
Araguaci
bmcgonag
Brian McGonagill
vlad-tim
Vlad
helixzz
HeliXZz
patvdv
Patrick Van Der Veken
john-bampton
Master Yoda
MioOgbeni
Tomáš Novák
mryesiller
Göksel Yeşiller
sushibait
Shiverme Timbers
forwardemail
Forward Email - Open-source & Privacy-focused Email Service (2023)
semiceau
GT
Bastii717
Bastii717
getumbrel
Umbrel
OlliVHH
HamburgerJung
frankdez93
Frankdez93
terminaltrove
Terminal Trove
st617
St617
nrvo
Nrvo
hudsonrock-partnerships
Hudsonrock-partnerships

If you've found this repository helpful, consider sponsoring me on GitHub if you're able 💜

Contributors

Lissy93
Alicia Sykes
liss-bot
Alicia Bot
matkoniecz
Mateusz Konieczny
lucadidomenico
Luca Di Domenico
gitetsu
Gitetsu
aarontorres0
Aaron
0xnbk
Nbk
alxndrv
Andrey Aleksandrov
hypogram
Hypogram
b3pio
₿ӠⱣłØ
rusty-snake
Rusty-snake
marjamis
Marjamis
ansuz
Ansuz
zacharyraber
Zachary Raber
sirodoht
Theodore Keloglou
ilesinge
Alexandre G.-Raymond
ba32107
Balazs Gyurak
dmbaturin
Daniil Baturin
mwleeds
Phaedrus Leeds
pndyjack
Pndyjack
kdenhartog
Kyle Den Hartog
dextermallo
Dexter
zeusalmighty717
Zeus Almighty
WairimuMaringa
Wairimu Maringa
tim-v3
Tim Weber
ThomasRettig
Thomas Rettig
spikecodes
Spike O'Carroll
Silvhr
Silvhr
rorymbyrne
Rory Byrne
yaxollum
Peter Ye
sjamaan
Peter Bex
pdelfino
Pedro Delfino
Oymate
Oymate
nickali
Nick Ali
mschwrdtnr
Max S.
lordpansar
Magnus Sundström
lukecarr
Luke Carr
elesiuta
Eric Lesiuta
fireneat
Fireneat
ignoramous
Ignoramous
jxdv
Jxdv
kevodwyer
Kevodwyer
notthewave
Axel
ogoregen
Oğuzhan
omahs
Omahs
pablo03v
Pablo03v
partoneoftwo
Partoneoftwo
pipboy96
Pipboy96
theblackmallard
Theblackmallard
titanism
Titanism
0x192
W1nst0n
101lols
101lols
boushley
Aaron Boushley
Adv4n6
Adv4n6
ajdumanhug
Aj Dumanhug
ndsvw
Alex
austinhuang0131
Austin Huang
ben-thul
Ben Thul
BBlackwo
Benjamin B
BrunoBernardino
Bruno Bernardino
wallies
Cameron
chemmi
Christian Hemminghaus
Compr0mzd
Compr0mzd
DaShoe
DaShoe
danielgtaylor
Daniel G. Taylor
dim1119
Dimitris Lazarakis
VoDmAl
Dmitry Vorobyev
federicoviceconti
Federico
mrfelpa
Mrfelpa
fkohrt
Florian Kohrt
freddy-m
Freddy
hw4n
Hwanhee Chae
jacobneplokh
Jacob Neplokh
gongjason
Jason G
mxygem
Gemini Smith
monkeywithacupcake
Jess
openjck
John Karahalis
edelbluth
Juergen Edelbluth
fetzu
Julien
seclution
Kai Biebel
koirand
Kazuki Koide
Kotbenek
Dominik Piątkowski
leon-costa
Leon Costa

License

Lissy93/Personal-Security-Checklist is licensed under MIT © Alicia Sykes 2024.
For information, see TLDR Legal > MIT

Expand License
The MIT License (MIT)
Copyright (c) Alicia Sykes <alicia@omg.com> 

Permission is hereby granted, free of charge, to any person obtaining a copy 
of this software and associated documentation files (the "Software"), to deal 
in the Software without restriction, including without limitation the rights 
to use, copy, modify, merge, publish, distribute, sub-license, and/or sell 
copies of the Software, and to permit persons to whom the Software is furnished 
to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included install 
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANT ABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

© Alicia Sykes 2024
Licensed under MIT

Thanks for visiting :)