personal-security-checklist
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Top Related Projects
Protect your data against global mass surveillance programs.
Guide to securing and improving privacy on macOS
A huge list of alternatives to Google products. Privacy tips, tricks, and links.
A list of Free Software network services and web applications which can be hosted on your own servers
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
Quick Overview
The Lissy93/personal-security-checklist repository is a comprehensive guide to personal cybersecurity best practices. It provides a curated list of tips, tools, and resources to help individuals improve their digital security and protect their privacy online. The project aims to educate and empower users to take control of their digital lives.
Pros
- Extensive and well-organized information covering various aspects of personal cybersecurity
- Regularly updated with new information and community contributions
- Includes both basic and advanced security measures for users of all skill levels
- Provides links to recommended tools and further reading for each topic
Cons
- May be overwhelming for beginners due to the sheer amount of information
- Some recommendations may require technical knowledge or significant time investment to implement
- Certain suggested tools or practices may not be suitable for all users or situations
- The project's effectiveness relies on users actively implementing the recommendations
Note: As this is not a code library, the code example and quick start sections have been omitted.
Competitor Comparisons
Protect your data against global mass surveillance programs.
Pros of privacyguides.org
- Comprehensive website with detailed guides and explanations
- Regularly updated with community contributions
- Covers a wide range of privacy-related topics and tools
Cons of privacyguides.org
- Less focused on personal security practices
- May be overwhelming for beginners due to its extensive content
- Requires more time to navigate and find specific information
Code comparison
While both repositories primarily contain documentation rather than code, here's a brief comparison of their structure:
personal-security-checklist:
# Personal Security Checklist
## Contents
- [Password Security](#password-security)
- [Authentication](#authentication)
...
privacyguides.org:
---
title: "Privacy Guides"
description: "Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy."
---
The personal-security-checklist uses a simple markdown structure, while privacyguides.org employs a more complex Jekyll-based website structure with YAML front matter.
Both repositories focus on privacy and security, but personal-security-checklist offers a more concise, checklist-style approach, while privacyguides.org provides in-depth guides and explanations. The choice between them depends on the user's needs and preferred level of detail.
Guide to securing and improving privacy on macOS
Pros of macOS-Security-and-Privacy-Guide
- Highly focused on macOS, providing in-depth, system-specific guidance
- Includes advanced topics like FileVault, Gatekeeper, and Xcode
- Regularly updated with macOS version-specific information
Cons of macOS-Security-and-Privacy-Guide
- Limited to macOS, not applicable for users of other operating systems
- Less comprehensive in covering general online security practices
- Lacks visual aids or infographics for easier understanding
Code Comparison
macOS-Security-and-Privacy-Guide:
# Disable Bonjour multicast advertisements
sudo defaults write /Library/Preferences/com.apple.mDNSResponder.plist NoMulticastAdvertisements -bool YES
personal-security-checklist:
- [ ] Use a privacy-respecting DNS provider
- [Cloudflare](https://1.1.1.1/) (1.1.1.1 and 1.0.0.1)
- [Quad9](https://www.quad9.net/) (9.9.9.9 and 149.112.112.112)
The macOS-Security-and-Privacy-Guide provides specific terminal commands for enhancing security on macOS, while personal-security-checklist offers more general, cross-platform recommendations in a checklist format.
Both repositories aim to improve user security and privacy, but they differ in scope and presentation. macOS-Security-and-Privacy-Guide is tailored for macOS users seeking advanced system-level protections, while personal-security-checklist provides a broader, more accessible approach to personal digital security across various platforms and online services.
A huge list of alternatives to Google products. Privacy tips, tricks, and links.
Pros of degoogle
- Focused specifically on alternatives to Google products and services
- Includes a comprehensive list of Google products and their alternatives
- Provides explanations and reasons for degoogling
Cons of degoogle
- Limited scope compared to personal-security-checklist's broader security focus
- Less frequent updates and maintenance
- Fewer contributors and community engagement
Code comparison
Not applicable for these repositories, as they primarily consist of markdown files with lists and explanations rather than code.
Summary
personal-security-checklist is a comprehensive guide covering various aspects of personal security and privacy, while degoogle focuses specifically on alternatives to Google products and services. personal-security-checklist offers a broader scope, more frequent updates, and higher community engagement. degoogle provides a more targeted approach for those specifically looking to reduce their reliance on Google services.
Both repositories serve valuable purposes in promoting digital privacy and security. personal-security-checklist is better suited for users seeking a comprehensive security guide, while degoogle is ideal for those specifically looking to minimize their use of Google products.
A list of Free Software network services and web applications which can be hosted on your own servers
Pros of awesome-selfhosted
- Broader scope, covering a wide range of self-hosted software categories
- Larger community with more frequent updates and contributions
- Includes additional information like demo links and related projects
Cons of awesome-selfhosted
- Less focused on security-specific tools and practices
- May be overwhelming for users specifically looking for security-related information
- Doesn't provide detailed explanations or guidelines for implementation
Code comparison
While both repositories are primarily curated lists, they don't contain significant code samples. However, here's a comparison of their list structures:
personal-security-checklist:
## Category Name
- [ ] Item description
- [ ] Another item description
awesome-selfhosted:
### Category Name
- [Project Name](https://project-url) - Short description. (`License`) `Programming Language`
The awesome-selfhosted repository uses a more structured format with links, license information, and programming language details, while personal-security-checklist focuses on a checklist-style format with more detailed descriptions.
Both repositories serve different purposes: personal-security-checklist is tailored for individual security practices, while awesome-selfhosted is a comprehensive list of self-hosted software options across various categories.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Pros of the-book-of-secret-knowledge
- Broader scope, covering a wide range of IT topics beyond security
- More extensive collection of resources and tools
- Includes cheat sheets and one-liners for quick reference
Cons of the-book-of-secret-knowledge
- Less focused on personal security practices
- May be overwhelming for beginners due to its extensive content
- Not as well-organized into specific categories as personal-security-checklist
Code Comparison
While both repositories primarily consist of markdown files with lists and resources, they don't contain significant code snippets. However, here's an example of how they structure their content:
personal-security-checklist:
## 📱 Mobile Devices
- [ ] Enable auto-updates for OS and apps
- [ ] Use a strong PIN or password, not biometrics
the-book-of-secret-knowledge:
#### CLI Tools
<p>
:small_orange_diamond: <a href="https://github.com/sharkdp/bat"><b>bat</b></a> - a cat clone with wings.<br>
:small_orange_diamond: <a href="https://github.com/ogham/exa"><b>exa</b></a> - a modern replacement for ls.
</p>
Both repositories use markdown formatting, but the-book-of-secret-knowledge uses more HTML elements for styling, while personal-security-checklist focuses on a simpler, checklist-style format.
A collection of various awesome lists for hackers, pentesters and security researchers
Pros of Awesome-Hacking
- Broader scope, covering various hacking topics and tools
- Larger community with more contributors and stars
- Regularly updated with new resources and tools
Cons of Awesome-Hacking
- Less focused on personal security and privacy
- May be overwhelming for beginners due to its extensive list
- Lacks detailed explanations or guides for implementing security measures
Code Comparison
While both repositories are primarily curated lists, they don't contain significant code samples. However, here's a comparison of their list structures:
Personal-security-checklist:
## 🔐 Authentication
- Use a password manager
- Enable 2-factor authentication
- Use strong passwords
Awesome-Hacking:
### Tools
* [Nmap](https://nmap.org/) - Free Security Scanner For Network Exploration
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer
Both repositories use markdown formatting, but Personal-security-checklist tends to organize content into more specific categories with actionable items, while Awesome-Hacking focuses on listing tools and resources without detailed explanations.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Personal Security Checklist
The ultimate list of tips to secure your digital life
ð digital-defense.io
ð Read the Checklist ð
The Checklist
You can read the full checklist in CHECKLIST.md
.
To view/edit the raw data, see personal-security-checklist.yml
The Website
The easiest method for consuming the checklist is via our website: digital-defense.io
Here you can browse lists, filter by your threat model and tick items off once complete (plus, there are pretty charts to make you feel good about your progress âºï¸).
About
The source for the website is in web/
.
The site is built with Qwik, using TypeScript and some components from DaisyUI.
Developing
To run the app locally, or to make code changes, you'll need Node and Git installed.
- Grab the code:
git clone git@github.com:Lissy93/personal-security-checklist.git
- Navigate into the source:
cd personal-security-checklist/web
- Install dependencies:
yarn
- Start the development server:
yarn dev
Alternatively, just open this repo in Code Spaces, where everything is already configured and ready to go.
Deploying
To deploy the app, follow the developing steps above, then run yarn build
, yarn build.static
. You can then deploy it by copying the dist/
directory to any CDN, web server or static hosting provider of your choice.
Alternatively, fork the repo and import it into your providers' dashboard. Or use the link below for an easy 1-click deployment ð
The API
We also make all the data available via a free API, which you can use however you wish.
Usage
All endpoints are documented in our OpenAPI spec, you can view these and try them out via our Swagger docs.
Base: digital-defense.io/api
/api/checklists /api/checklists/[name-or-index] /api/checklists/[name]/[point-index] /api/search/[searchterm]
Contributing
All checklist data is stored in personal-security-checklist.yml
. This is pulled in the website at build-time and referenced by the API, and is also dynamically inserted into the markdown Checklist page.
So if you only wish to make changes to the data, this is the only file you need to edit.
Important: When submitting your pull request, provide references backing up any information that you're adding/amending/removing.
For modifying the website or API source, see the developing sections above for instructions on running locally.
Before submitting an issue or PR, please ensure you've followed the community guidelines and followed the Code of Conduct.
Credits
Thank you to all who have contributed to, or sponsored this project!
Sponsors
If you've found this repository helpful, consider sponsoring me on GitHub if you're able ð
Contributors
License
Lissy93/Personal-Security-Checklist is licensed under MIT © Alicia Sykes 2024.
For information, see TLDR Legal > MIT
Expand License
The MIT License (MIT)
Copyright (c) Alicia Sykes <alicia@omg.com>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished
to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included install
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANT ABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
© Alicia Sykes 2024
Licensed under MIT
Thanks for visiting :)
Top Related Projects
Protect your data against global mass surveillance programs.
Guide to securing and improving privacy on macOS
A huge list of alternatives to Google products. Privacy tips, tricks, and links.
A list of Free Software network services and web applications which can be hosted on your own servers
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot