Security And Freedom Essentials for Activists

The SAFE (Security And Freedom Essentials) Pack for Activists is being developed with activists, writers, human rights groups, and publishers to help people in repressive regimes securely organise and communicate in places where the internet is monitored, censored, or blocked. This project offers a low cost solution which is open-source and not for profit.

safe-banner

In simple terms, it is a secure phone, an encrypted PC on a USB drive, and an encrypted message network device that creates a local internet system.

The SAFE Pack for Activists offers:

  • Secure internet access that circumvents censorship and monitoring.
  • Encrypted messaging for safe and private communication.
  • Hidden file storage to keep sensitive information protected.
  • Direct funding through Bitcoin, ensuring financial support can be received safely.
  • Software for organising, writing, and publishing securely.
  • Plausible deniability if seized, meaning no incriminating evidence can be found. Decoy files can be revealed under interrogation, giving an illusion of compliance and increasing safety of the user.
  • Untraceable local message network to organise even if the internet and mobile coverage is switched off

The packs will be distributed through our partner human rights organisations, ensuring they reach those who need them most. These organisations will also customise the packs to suit the unique needs of each individual, providing tailored support to activists operating in different regions and circumstances.

The core packs are built and now in testing. We're working with activists and human rights groups to refine them. If your organisation wants to join, we can start helping you develop and test packs for your most at-risk writers and organisers today.


By enabling this widget as you read, you can help someone bypass censorship and reach the free internet.

This small, invisible tool—called Snowflake—lets your browser become a temporary, anonymous bridge for someone in a censored country like Iran, China, or Russia. It doesn’t affect your internet connection or expose your identity, and it turns off automatically when you leave the page.

  • Safe for you – your IP address is hidden, and no one can see who you're helping.
  • Essential for them – this may be their only way to access uncensored news or contact family abroad.

You can also install Snowflake as a free extension in your own browser. Just search for "Snowflake" in your browser’s extension/add-on store.

Core Components of the Pack

The pack includes a secure phone, a USB drive running a secure operating system on any PC, and an optional mesh radio for offline communication. These components work together to provide secure ways to organise, communicate, and stay productive. All components use open-source software checked by security professionals. They are designed with security and plausible deniability in mind.

SAFE%20Pack-4

1. Secure Phone

The hardened phone is set up with hidden profiles, encrypted storage, wipe codes (duress codes), custom VPN, Bitcoin wallet, encrypted messaging apps, secure email, and a secure web browser. It looks like a standard smart phone but hides sensitive content in a secret profile. If interrogated, the user can provide the PIN for the "clean" profile. If the hidden profile is exposed, a wipe code formats the phone, ensuring no traceable data remains.

  • Two user profiles: a decoy profile with harmless apps and a hidden profile with secure tools.
  • A wipe code that instantly erases the phone.
  • Dual internet access methods to ensure redundancy.
  • Pre-configured VPN, DNS, and Psiphon for bypassing censorship.
  • Encrypted apps:
    • Signal or Session for messaging.
    • ProtonMail for secure email.
    • Bitcoin wallet for anonymous transactions.
  • Timed system reset after multiple failed login attempts.

If the phone is seized, the user can provide the PIN for the clean profile, or no PIN, ensuring the data remains secure. If exposed to forensics, the wipe code can be used to delete sensitive information. A backup can be stored on the secure USB, allowing the user to wipe the phone before confiscation.

SAFE%20Pack-5

2. Secure PC on a USB Drive

The USB contains a secure portable operating system, which can run on most computers and without leaving a trace. It uses Tor for anonymous, encrypted internet access, with a custom bridge to disguise traffic and allow it to operate where Tor is normally blocked. The system includes tools for communication, organisation, writing, and media creation, along with a second Bitcoin wallet for receiving direct funding.

The USB drive includes hidden storage that is undetectable, even to advanced forensic tools. Only the password for the standard storage reveals dummy files; the hidden storage remains invisible.

  • The operating system, leaving no trace after use.
  • Hidden storage with decoy files for plausible deniability.
  • Pre-configured Tor, PGP Keys, and hidden storage.
  • Secure messaging apps using E2EE.
  • No real names on keys, emails, or messages.

The USB appears as a normal memory stick. If found looks non-functional. If analysed it will appear to be a fresh operating system. If examined forensically, the user can reveal non-sensitive files to interrogators, but the hidden volume is undetectable.

SAFE%20Pack-6

3. Off-Grid Communicator

This optional part of the pack offers a LoRa radio to send encrypted messages without the need for internet or mobile networks. Each radio only has a range of a few kilometres, but with enough of them in a region or city, it allows secure communication over long distances and bypassing internet shutdowns. Each radio is a stepping stone for E2EE messages to jump between until they reach their destination.

This device operates securely, making it ideal for activists who need to organise even when traditional networks are unavailable.

  • Interfaces with the phone via Bluetooth or Wi-Fi using an app.
  • Secure E2EE messaging, invisible to surveillance.
  • Off-grid communication ideal for protests or blackouts.

Education: Essential Knowledge for Activists

A vital component of the SAFE Pack for Activists is the education provided alongside the tools. Partners will play a key role in delivering ongoing training to ensure users can effectively secure their devices and data. The pack will include clear, easy-to-follow instructions and tasks to teach users how to:

  • Backup Devices: Simple steps for securely backing up critical data to prevent loss in case of device confiscation.

  • Act When Devices Are Seized: Guidance on how to handle devices during searches, including using wipe codes or revealing decoy data to protect sensitive information.

  • Recognise Compromised Devices: Instructions on identifying signs of tampering, with steps to take if a device is suspected of being compromised.

  • Store and Manage Passwords: Best practices for securely storing passwords, including the use of password managers and hidden methods.

Each device will come pre-set with instructions that guide users through essential security tasks, including setting up backups, using wipe codes, recognising compromised devices, and securing passwords. This ensures users not only have the right tools but also the knowledge to use them safely and effectively.

Through this integrated approach, we empower activists with both technology and the education needed to stay secure under repressive conditions.

Join the Project

Partners are essential for refining and distributing the SAFE Pack for Activists. By collaborating, we can ensure that these tools reach those who need them most.

We invite you to join us in testing, shaping, and distributing the SAFE Pack for Activists to protect the voices of activists, journalists, and human rights defenders around the world.

Frequently Asked Questions (FAQs)

  1. Why don’t you distribute the packs directly to activists?
    Because direct distribution could be dangerous. Local human rights organisations understand the specific needs, risks, and operating conditions of those they support. They are essential to customising, distributing, and delivering training for the packs. This ensures the tools are effective—and that they do not fall into the wrong hands.

  2. Who is this pack designed for?
    The SAFE Pack is intended for activists, writers, organisers, and human rights defenders in repressive environments where surveillance, censorship, and internet shutdowns are common. It helps users work securely, communicate safely, and protect themselves and their work.

  3. What if the devices are seized by authorities?
    Each element of the pack is designed for plausible deniability. The phone includes a decoy profile and a wipe code that instantly erases sensitive data. The USB appears ordinary and reveals only dummy files under inspection. Hidden storage and secret profiles remain undetectable.

  4. Can these tools be traced back to the user?
    The SAFE Pack is designed to avoid this. No real names are used, tracking is disabled, and all communications use end-to-end encryption. The USB system leaves no trace on any computer. Tools like Tor, Psiphon, and PGP are pre-configured to maximise anonymity.

  5. What is the education component?
    Security tools are only effective if they are used correctly. That’s why each pack includes clear, step-by-step instructions and built-in security tasks. These teach users how to:

    • Back up their device safely
    • Use wipe codes and decoy files
    • Recognise compromised devices
    • Manage passwords securely

    Partner organisations will also offer training sessions and ongoing support.

  6. How can I get involved?
    There are several ways:

    1. Partner organisations can help distribute and customise the packs.
    2. Security professionals and developers can volunteer to help test, improve, and grow the project.
      If you're interested, contact us at
  7. What makes this different from commercial privacy tools?
    This project isn’t about everyday privacy—it’s about maximum security for people under threat, delivered at the lowest possible cost. It’s open-source, not-for-profit, and developed with input from those who’ve lived through surveillance and censorship. The SAFE Pack is built to survive interrogation, searches, and shutdowns—and to keep working afterward.

  8. Can my organisation help test or distribute the packs?
    Yes. We are actively seeking trusted partners to test, adapt, and distribute the packs in different regions. If you work with high-risk individuals or communities, we’d love to collaborate.

  9. Is this project finished?
    No—it's in active development. The core systems are functional and being tested with real users. We are refining them based on feedback, and always looking to improve. Once finalised, the packs will be open-source and customisable, allowing human rights organisations replicate or adapt them for local needs.

  10. Why not just let activists build the packs in their own countries?
    While some technically experienced users may be able to assemble secure systems locally, doing so in authoritarian countries introduces significant risks. Internet connections may be too slow or monitored, and some of the required open-source tools are actively targeted or blocked by regimes using fake download sites to compromise users. SAFE Packs are assembled and tested in trusted environments to ensure maximum security before distribution.

  11. What kind of customisation is possible?
    The USB drive is preinstalled with secure software for writing, video editing, podcast recording, music making, coding, finance, and even free-hand painting. Additional software can include tools for website building, robotics, teaching, and language learning. Offline libraries of encyclopedias, history books, novels, documentaries, and exam preparation materials can be added as needed to match the user’s needs and region.

  12. What is the total cost per pack?
    The cost depends on configuration and local hardware availability.

    • A reconditioned phone: €120–€250 / $130–$270
    • A high-quality USB stick (32–64 GB): €10–€25 / $10–$30
    • An optional LoRa radio device (e.g. Heltec, TTGO): €30–€60 / $35–$65

    The full SAFE Pack (with LoRa) typically costs €160–€335 / $175–$365 per unit, depending on chosen components. All software is open-source and provided free of charge.

  13. Is the SAFE Pack legal?
    The software itself is open-source and legal in most countries. However, in some authoritarian regimes, using encrypted tools, VPNs, or mesh radios may be restricted or criminalised. That’s why we’ve prioritised plausible deniability, allowing users to present a "clean" device if stopped or searched.

  14. Can the SAFE Pack connect to the internet in heavily censored countries?
    Yes. The phone and USB drive are preconfigured with censorship-circumvention tools like:

    • Tor bridges
    • Psiphon
    • Custom VPN profiles
    • Domain fronting techniques

    These allow access to blocked content and services even in countries with advanced internet firewalls. Tools are regularly updated based on real-world feedback.

  15. Can this help during internet shutdowns or blackouts?
    Yes. The optional LoRa communicator enables secure messaging without internet or mobile service. Using the Meshtastic app, messages can hop between devices across several kilometres, forming a mesh network for team coordination during shutdowns, protests, or crises.

  16. What happens if the hardware fails or is lost?
    The SAFE Pack supports:

    • Encrypted backups
    • Device cloning
    • Recovery instructions

    Users are encouraged to keep a hidden backup USB or SD card. If a phone is seized, data can be restored from the USB drive. Instructions are built in, and training ensures users know how to act quickly.

  17. Can users be trained remotely?
    Yes. Each pack includes step-by-step training materials and security walkthroughs. Partner organisations can also provide support via remote sessions, videos, or in-person workshops. Materials can be localised and adapted for different languages and literacy levels.

  18. Why does this project focus so much on plausible deniability?
    In many countries, being caught with secure tools can be dangerous. The SAFE Pack is designed so that:

    • The phone shows only harmless content in the visible profile
    • The USB reveals only non-sensitive files
    • Hidden data is invisible, even to forensic inspection
    • Users can reveal a decoy and appear compliant if interrogated

    This protects not only the user, but also their contacts, sources, and wider activist network.

  19. Why can’t we just make these packs ourselves (as an organisation)?
    You can—and that’s exactly what we’re encouraging. The SAFE Pack is open-source and fully replicable. Our goal is to support organisations like yours by sharing tested configurations, best practices, and security guidance across the network. You don’t need to start from scratch. By working together, we can improve the packs, avoid common mistakes, and ensure maximum safety for those who need them most.