Scanning your connection...
Back to Glossary
Security

What is Offline Security?

Protecting data and systems that are not connected to the internet. Offline security addresses physical access, device theft, and local attacks. When data never touches a network, it can't be hacked remotely—but it can be stolen, seized, or compromised in person.

What happens when the network isn't the attack vector? Offline security covers everything that protects data and systems from physical and local threats.

Offline Threats

  • Device theft: Laptop, phone, backup drive stolen
  • Physical access: Someone uses your unlocked computer
  • Seizure: Law enforcement or adversaries take your devices
  • Shoulder surfing: Someone watches you enter a password
  • Hardware tampering: Keyloggers, modified devices
  • Social engineering: Tricking you into revealing secrets offline

Offline Security Measures

Encryption

  • Full-disk encryption (BitLocker, FileVault, LUKS)
  • Encrypted backups
  • Encrypted volumes for sensitive files (VeraCrypt)

Physical Security

  • Secure location for devices and backups
  • Safe or safe deposit box for critical items
  • Destroy sensitive documents and drives properly

Access Control

  • Strong passwords and PINs
  • Screen lock with short timeout
  • Biometric as second factor (not sole factor)

Air-Gapped Systems

  • Critical operations on never-connected computers
  • Data transfer via USB (verified, scanned)
  • No wireless—Bluetooth, WiFi disabled
  • Used for: key generation, signing, cold storage

When Offline Security Matters

  • Handling highly sensitive data
  • Crypto key management
  • Whistleblower or journalist work
  • Protecting against nation-state adversaries
  • Long-term archival of sensitive information

Related Terms

Have more questions?

Use our guided flow to get the right next privacy step for Offline Security.

Open Guided Flow