About the Security Checklist

The objective of this project is to give you practical guidance on how to improve your digital security, and protect your privacy online.

The checklist is a living document, and will be updated regularly to reflect the latest threats and best practices. This is made possible by open sourcing the content, and making it a community maintained resource, meaning that anyone can suggest changes, make additions or update the guidance. All edits are then reviewed by maintainers before being merged and going live.

Credits

Sponsors

Huge thanks to the following sponsors, for their ongoing support 💖

Contributors

This project exists thanks to all the people who've helped build and maintain it.
Special thanks to the below, top-100 contributors 🌟

About the Author

This project was originally started by me, Alicia Sykes- with a lot of help from the community.


Alicia Sykes

I write apps which aim to help people escape big tech, secure their data, and protect their privacy.


I have a particular interest in self-hosting, Linux, security and OSINT.
So if this type of stuff interests you, check out these other projects:

  • Web-CheckWeb-Check - OSINT tool for analysing any website
  • DashyDashy - Dashboard app, for organising your self-hosted services
  • Email ComparisonEmail Comparison - Objective comparison of private/secure mail providers
  • Awesome PrivacyAwesome Privacy - A list of privacy-respscting software and services
  • Portainer-TemplatesPortainer-Templates - Compiled repository of 1-click Docker apps for self-hosting
  • AdGuardianAdGuardian - CLI tool for monitoring your networks traffic and AdGuard DNS stats
  • Bug-BountiesBug-Bounties - Database of websites which accept responsible vulnerability discolsure
  • Git-InGit-In - Tools and resources to help beginners get into open source

For a more open source apps I've published, see apps.aliciasykes.com, or follow me on GitHub

License

This project is split-licensed, with the checklist content (located in personal-security-checklist.yml) being licensed under CC BY-NC-SA 4.0. And everything else (including all the code), licensed under MIT.

The MIT License (MIT)
Copyright (c) Alicia Sykes <[email protected]> 

Permission is hereby granted, free of charge, to any person obtaining a copy 
of this software and associated documentation files (the "Software"), to deal 
in the Software without restriction, including without limitation the rights 
to use, copy, modify, merge, publish, distribute, sub-license, and/or sell 
copies of the Software, and to permit persons to whom the Software is furnished 
to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included install 
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANT ABILITY, 
FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL 
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

What does this means for you?

This means that for everything (except the checklist YAML file), you have almost unlimited freedom to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of this software. All that we ask is that you include the original copyright notice and permission notice in any copies of the software

And for the security-list content you can share and adapt this content as long as you give appropriate credit, don't use it for commercial purposes, and distribute your contributions under the same license.