New website structure
- **Assess & Plan** - [ ] Threat modeling - [ ] Scenarios - Personas - [ ] Information security policy - [x] [Protect against physical threats](https://securityinabox.org/en/phones-and-computers/physical-security/) - [x] Travel policy - [x] Communications plan - [ ] How to choose software - [ ] How to choose operating system - **Protect** - [ ] Malware prevention (part of current [malware guide](https://securityinabox.org/en/phones-and-computers/malware/)) - [ ] Phishing prevention (part of current [passwords](https://securityinabox.org/en/passwords/) and [malware](https://securityinabox.org/en/phones-and-computers/malware/) guides) (issue #230) - [ ] Guide on self-care and prevention of social media anxiety - Toc in issue #241 - first in Communications section, then to be moved here - [**Passwords**](https://securityinabox.org/en/passwords/) - [x] [Create and maintain strong passwords](https://securityinabox.org/en/passwords/passwords/) - [x] [Manage your passwords safely](https://securityinabox.org/en/passwords/password-managers/) - [x] [Use two-factor authentication](https://securityinabox.org/en/passwords/2fa/) - **Organize** - [ ] Collaborative writing - [ ] File storage, sharing and transfer (issue #223) - [ ] Discussions - mailing lists, forums - [ ] Inform - newsletters, announcement channels - [ ] Coordinate - Spreadsheets, surveys, polls, calendars - [ ] Manage websites - CMS, static websites - **Accounts** - [x] [Protect yourself and your data when using social media](https://securityinabox.org/en/communication/social-media/) - [x] Managing multiple online identities - Pseudonymity; identity and reputation; how to create and protect a new identity online - issue #246 - [x] [Recover from possible account compromise](https://securityinabox.org/en/communication/account-compromise/) - **Communications** - [x] Secure communications - Communications plan & basics (will be linked from the Assess & Plan section when the latter is created) - ToC in issue #238 - [x] Safe email (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #236 - [x] Safe chat (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #239 - [ ] Safe video conferencing (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #240 - [ ] Guide on self-care and prevention of social media anxiety - Toc in issue #241 - to be moved to the Protect section when this is ready. - [ ] Safe video publishing - [ ] Safe streaming - **Devices** - [ ] Reaction to malware infections (part of current [malware guide](https://securityinabox.org/en/phones-and-computers/malware/)) - [x] [Protect your Android device](https://securityinabox.org/en/phones-and-computers/android/) - [x] [Protect your iOS device](https://securityinabox.org/en/phones-and-computers/ios/) - [x] [Protect your Windows device](https://securityinabox.org/en/phones-and-computers/windows/) - [x] [Protect your macOS device](https://securityinabox.org/en/phones-and-computers/mac/) - [x] [Protect your Linux device](https://securityinabox.org/en/phones-and-computers/Linux/) - [ ] Advanced OSs for malware prevention: live USBs, Tails, Qubes (for SiaB use cases) (see issue #234) - **Internet** - [x] Safe browsing (ToC in issue #242) - [x] How the internet works and how websites are blocked (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/)) - [x] Visit blocked websites - how to choose a VPN (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/)) (would address issue #178) - outline in issue #244 - [x] What is anonymity and how to anonymize your connections (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/)) (issue #177) - outline in issue #245 - **Data and metadata** - [x] [Protect your sensitive information](https://securityinabox.org/en/files/secure-file-storage/) - [x] [Back up and recover from information loss](https://securityinabox.org/en/files/backup/) - [x] [Destroy sensitive information](https://securityinabox.org/en/files/destroy-sensitive-information/) - [x] [Destroy identifying information](https://securityinabox.org/en/files/destroy-identifying-information/)
issue