Helping Somali Civil Society operate securely and safely online.
Explore and download recommended tools for secure communication, privacy, advocacy, and more. Click the download links to access the official sources directly.
| Category | Tool | Purpose | Download |
|---|---|---|---|
| Secure Communication | Signal | Phone-based E2EE chat & calls. | Download |
| Secure Communication | Widely used E2EE messaging and calls. | Download | |
| Secure Communication | Session | Anonymous E2EE without SIM. | Download |
| Secure Communication | Element/Matrix | Large encrypted rooms bridging multiple platforms. | Download |
| Password Hygiene & MFA | Bitwarden | Stores & syncs strong passwords. | Download |
| Password Hygiene & MFA | Aegis Authenticator | Generates one-time 2FA codes. | Download |
| Password Hygiene & MFA | Authy | Generates one-time 2FA codes. | Download |
| Device Hardening & Backup | VeraCrypt | Encrypts full disks or vaults. | Download |
| Device Hardening & Backup | ClamAV | Blocks malware (open-source antivirus). | Download |
| Device Hardening & Backup | Duplicati | Automates encrypted 3-2-1 backups to USB, NAS, or cloud. | Download |
| Privacy & Circumvention | Tor Browser | Routes traffic through onion relays for anonymity. | Download |
| Privacy & Circumvention | Outline VPN | Self-hosted Shadowsocks VPN for secure access. | Download |
| Privacy & Circumvention | uBlock Origin | Removes ads and trackers. | Download |
| Encrypted Email | ProtonMail | Encrypted email service. | Download |
| Encrypted Email | Tutanota | Encrypted email service. | Download |
| Digital-Violence Response | Digital First Aid Kit | Step-by-step survivor help for digital incidents. | Visit |
| Digital-Violence Response | Take Back The Tech | Feminist resources for digital safety. | Visit |
| Digital-Violence Response | KoboToolbox | Offline-capable incident reporting forms. | Download |
| Digital-Violence Response | GlobaLeaks | Encrypted whistle-blowing portal. | Download |
| Phishing Drills & Learning | Gophish | Sends safe simulated phishing attacks. | Download |
| Phishing Drills & Learning | H5P Quiz | Creates short quizzes for training. | Download |
| Full Disk Encryption | BitLocker | Windows built-in full disk encryption. | Built-in (Windows) |
| Full Disk Encryption | FileVault | macOS built-in full disk encryption. | Built-in (macOS) |
| Mobile Security | Google Play Protect | Android built-in security scanning. | Built-in (Android) |
| Mobile Security | iVerify | Security scanning for iPhone. | Download |
| Counter-Disinformation | InVID & WeVerify | Browser plug-in for video verification and reverse-image search. | Download |
| Counter-Disinformation | Hoaxy | Visualizes hashtag/URL spread to counter fake news. | Visit |
| Advocacy Content | Canva for NGOs | Designs share-ready graphics. | Visit |
| Advocacy Content | Flourish | Builds interactive charts and maps. | Visit |
| Advocacy Content | Buffer | Schedules multi-platform posts and tracks engagement. | Visit |
| Shared Resource Hub | Nextcloud Hub | Hosts toolkit and user files with E2EE. | Download |
| Shared Resource Hub | GitBook | Mirrors docs for low-bandwidth reading. | Visit |
| Shared Resource Hub | Matrix Server | Offers 24/7 encrypted help-desk via Element. | Download |