The ultimate list of tips to secure your digital life
digital-defense.io
Read the Checklist ?
You can read the full checklist in CHECKLIST.md.
To view/edit the raw data, see personal-security-checklist.yml
The easiest method for consuming the checklist is via our website: digital-defense.io
Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress
The source for the website is in web/.
The site is built with Qwik, using TypeScript and some components from DaisyUI.
To run the app locally, or to make code changes, you'll need Node and Git installed.
git clone [email protected]:Lissy93/personal-security-checklist.gitcd personal-security-checklist/webyarnyarn devAlternatively, just open this repo in Code Spaces, where everything is already configured and ready to go.
To deploy the app, follow the developing steps above, then run yarn build, yarn build.static. You can then deploy it by copying the dist/ directory to any CDN, web server or static hosting provider of your choice.
Alternatively, fork the repo and import it into your providers' dashboard. Or use the link below for an easy 1-click deployment
We also make all the data available via a free API, which you can use however you wish.
All endpoints are documented in our OpenAPI spec, you can view these and try them out via our Swagger docs.
Base: digital-defense.io/api
/api/checklists /api/checklists/[name-or-index] /api/checklists/[name]/[point-index] /api/search/[searchterm]
All checklist data is stored in personal-security-checklist.yml. This is pulled in the website at build-time and referenced by the API, and is also dynamically inserted into the markdown Checklist page.
So if you only wish to make changes to the data, this is the only file you need to edit.
Important: When submitting your pull request, provide references backing up any information that you're adding/amending/removing.
For modifying the website or API source, see the developing sections above for instructions on running locally.
Before submitting an issue or PR, please ensure you've followed the community guidelines and followed the Code of Conduct.
Thank you to all who have contributed to, or sponsored this project!
|
Vincent Koc |
Anand Chowdhary |
Shrippen |
Zach Biles |
Ulises Gascón |
Digital Archeology |
|
InDieTasten |
Araguaci |
Brian McGonagill |
Vlad |
HeliXZz |
Patrick Van Der Veken |
|
Tomáš Novák |
Göksel Yeşiller |
Shiverme Timbers |
Forward Email - Open-source & Privacy-focused Email Service (2023) |
Umbrel |
HamburgerJung |
|
Frankdez93 |
Terminal Trove |
St617 |
Nrvo |
Hudsonrock-partnerships |
If you've found this repository helpful, consider sponsoring me on GitHub if you're able ?
|
Alicia Sykes |
Alicia Bot |
Mateusz Konieczny |
Luca Di Domenico |
Gitetsu |
Aaron |
|
Nbk |
Andrey Aleksandrov |
Hypogram |
₿ӠⱣłØ |
Rusty-snake |
Marjamis |
|
Ansuz |
Zachary Raber |
Theodore Keloglou |
Alexandre G.-Raymond |
Balazs Gyurak |
Daniil Baturin |
|
Phaedrus Leeds |
Pndyjack |
Kyle Den Hartog |
Dexter |
Zeus Almighty |
Wairimu Maringa |
|
Tim Weber |
Thomas Rettig |
Spike O'Carroll |
Silvhr |
Rory Byrne |
Peter Ye |
|
Peter Bex |
Pedro Delfino |
Oymate |
Nick Ali |
Max S. |
Magnus Sundström |
|
Luke Carr |
Eric Lesiuta |
Fireneat |
Ignoramous |
Jxdv |
Kevodwyer |
|
Axel |
Oğuzhan |
Omahs |
Pablo03v |
Partoneoftwo |
Pipboy96 |
|
Theblackmallard |
Titanism |
W1nst0n |
101lols |
Aaron Boushley |
Adv4n6 |
|
Aj Dumanhug |
Alex |
Austin Huang |
Ben Thul |
Benjamin B |
Bruno Bernardino |
|
Cameron |
Christian Hemminghaus |
Compr0mzd |
DaShoe |
Daniel G. Taylor |
Dimitris Lazarakis |
|
Dmitry Vorobyev |
Federico |
Mrfelpa |
Florian Kohrt |
Freddy |
Hwanhee Chae |
|
Jacob Neplokh |
Jason G |
Gemini Smith |
Jess |
John Karahalis |
Juergen Edelbluth |
|
Julien |
Kai Biebel |
Kazuki Koide |
Dominik Piątkowski |
Leon Costa |
Lissy93/Personal-Security-Checklist is licensed under MIT © Alicia Sykes 2024.
For information, see TLDR Legal > MIT
The MIT License (MIT)
Copyright (c) Alicia Sykes <[email protected]>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished
to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included install
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANT ABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
© Alicia Sykes 2024
Licensed under MIT
Thanks for visiting :)