Estimated reading time: 10 minutes
Imagine this: You're on the road, the weather is perfect, you're driving along a country road at 80 km/h - and then it happens. Your cell phone falls out of your pocket, shatters into several pieces and can no longer be saved. Sounds like a bad movie? That's exactly what happened to a friend of mine.
What followed was a digital state of emergency:
- No more landline phone.
- No spare cell phone or tablet.
- Work laptop available, but cannot be used for private purposes.
- No access to online banking - two-factor authentication was only possible via the lost smartphone.
- No current backup because the memory was full shortly before. Important photos and data: gone.
It only lasted a few seconds, but the consequences were felt for days.
For detailed instructions and an explanation of all configuration options, I recommend the YouTube video linked below. In this video, every single setting is explained in detail so that you receive comprehensive instructions for the exact setup. You can find any code from the video in this article so that you can use it directly without having to type it in.
Why digital order is so important
We secure our homes with locks, smoke alarms and insurance. But we often leave our digital world unprotected - without functioning backups, without a contingency plan. This is risky, as our digital lives are now often tied to a single device.
But what does that mean in concrete terms?
- Without order, you won't find anything in an emergency
Imagine you lose your smartphone and immediately need the PIN for your replacement SIM. If it's somewhere deep in an untitled file or in an unsynchronized app, you're incapacitated. - No backup means: data is gone - forever
Birthday photos, chat histories, important documents - it's often the things you take for granted that you can never recover. - Lack of redundancy makes you dependent
If everything is connected to a single device (banking, passwords, authentication, contacts), all it takes is one defect or theft and you are digitally cut off. - Stress factor and loss of control
Disorganization leads to chaos in an emergency. Instead of taking targeted action, you spend hours or days setting up devices, resetting passwords and restoring access.
Digital order is therefore not a "nice-to-have" - it is a protective shield that decides whether you can continue working calmly or are completely blocked in an emergency.



Your digital emergency plan
Target: RTO ≤ 60 minutes (so quickly fit for work again) and RPO ≤ 24 hours (max. 1 day data loss) - realistic for private households.
To prevent such a scenario from happening to you, I recommend the following steps:
1) Identities & access
- Master e-mailSecure your "central account" (the address you use to reset passwords everywhere) with a strong password + 2FA (hardware key preferred).
- Account inventoryList of all important accounts (e-mail, bank, mobile, cloud, social, insurance).
- Recovery options: Deposit Backup e-mail, trustworthy contacts (where possible) and Backup codes (printed out).
- SIM/eSIM strategy: Second SIM/eSIM prepared; PUK noted; hotline/customer numbers in paper folder.
2) Passwords & 2FA
- Password manager (e.g. Vaultwarden, see below) with random, unique passwords.
- 2FA priorityWhere possible FIDO2/hardware keys > TOTP app > SMS.
- 2FA backupsAt least two independent factors (e.g. hardware key + Aegis on second device) and Backup codes offline.
3) Communication
- Replacement deviceOld smartphone ready for use (loaded, basic apps, password manager, 2FA, messenger without chat history requirement).
- Offline contact listImportant numbers (family, bank, cell phone, work, insurance) printed.
- Emergency e-mail access: Webmail access data stored in the paper folder.
4) Finances
- Banking recoveryEmergency numbers of the bank, card blocking, IBAN/customer numbers on paper.
- 2FA alternative for banking (TAN generator/chip TAN or 2nd device).
- Cash bufferAt least 1-2 weeks of everyday costs if digital payment fails.
5) Data & backups (3-2-1-1-0 rule)
- 3 Copies your important data
- 2 different media (e.g. NAS + external SSD)
- 1 offsite copy (other apartment/locker/cloud storage)
- 1 Offline/immutable (e.g. weekly, staked drive or object lock)
- 0 ErrorBackups Automated testing & recovery rehearse
- Versioning (Syncthing/Nextcloud/NAS snapshots).
- PhotosInstant upload from mobile (Syncthing or Nextcloud Auto-Upload) + daily server backup.
6) Devices & replacement
- Replacement smartphone (with cover/glass), Spare charger, Powerbank.
- Second notebook (can be used/old) or at least Live USB stick (bootable Linux) with browser + VPN client.
- Replacement SIM sealed, PIN/PUK noted separately.
7) Documents & emergency folder (physical)
- Quick guide "First 60 minutes" (see runbook below).
- Backup codes, Important contract data, Serial numbers, Device IMEIs.
- InstructionsHow to connect to the home network (VPN/tailscale), how to retrieve backups.
8) Network & remote access
- Secure remote accessTailscale/ZeroTier (without ports to the Internet), alternatively reverse proxy with TLS (Caddy/Traefik).
- DynDNS only if necessary - rather VPN.
- UPS (uninterruptible power supply) for NAS/router, Clean shutdown script.
9) Recovery runbook (first 24 hours)
Minute 0-15
- Device loss? Lock SIM (Hotline).
- Change password manager master password (if compromised), check critical accounts.
- Location services check, delete devices if necessary (iOS/Android "Find my device").
Minute 15-60
4. Replacement device activate, restore password manager & 2FA (Aegis/hardware key/backup codes).
5. Banking access reactivate with alternative 2FA.
6. Contacts Call from paper list (work/insurance/family).
Hour 2-24
7. Set up new main device (from backup).
8. Verify backupsreload the last gaps manually.
9. Incident notes make: What was missing? What measure will prevent this next time?
10) Maintenance & exercises
- WeeklyCheck photo upload, check password manager sync.
- MonthlyRestore test (randomly), check UPS log.
- Quarterly"Game Day" - simulate device loss, stop the time until you are able to work again.
- AnnuallyUpdate emergency folder, test hardware key, securely delete old devices.
The consequences of a lack of digital preparation
Anyone who thinks "I have everything in the cloud" is often underestimating:
- Cloud access can also be blocked - For example, if your password is compromised and you cannot authenticate yourself.
- Two-factor authentication can lock you out - when the only factor is a lost smartphone.
- Provider hotlines often need data that is only stored in the cell phone - such as customer numbers or contract details.
- Without an up-to-date backup, you are in data nirvana in the event of theft or a defect - and insurances do not replace personal data.
Self-hosting - more control, less dependency
Self-hosting means operating your digital tools and data yourself - on your own server or NAS at home.
The advantages are obvious:
- You are not dependent on the availability of a cloud provider.
- You decide where your data is stored and who has access to it.
- You can log in from any device worldwide without having to rely on external servers.
Especially in an emergency, this can make the difference between "all gone" and "everything will be up and running again in an hour".
Vaultwarden (Bitwarden-compatible password manager, lightweight)
For what?
Passwords, secure notes, TOTP seeds (optional), shared safes (family/team).
Why is it helpful in an emergency?
You can access your passwords anywhere via browser or app - without Third-party cloud if your server is accessible (or you have an encrypted offline export file as a fallback).
Short setup (crash barriers)
- Deployment via Docker; before Vaultwarden a Reverse proxy (Caddy/Traefik) with HTTPS.
- Admin token set, SMTP for password resets/invitations.
- WebSocket activate (real-time sync).
- BackupsDatabase + Config + Attachments daily save (and test).
Security
- Strong master password, 2FA for the Vault (TOTP or better FIDO2).
- Brute force protection (fail2ban/proxy rate limit).
- None unchecked expose of the admin page on the Internet.
Typical errors
- No backups/restore samples, missing SMTP (password reset hangs), admin panel open on the Internet.
Syncthing (peer-to-peer file sync, serverless)
For what?
Automatic Instant upload of cell phone photos/videos to your NAS/PC; synchronization of important folders between devices.
Why is it helpful in an emergency?
Photos and documents land Without cloud directly on your second device/NAS; if you lose your cell phone, the last recordings are already backed up.
Short setup (crash barriers)
- Install on all devices, Device IDs authorize each other.
- Folder with Versioning (e.g. "Staggered") can be configured.
- At least. Two goalse.g. desktop + NAS.
Security
- TLS is integrated; only allow Known devices.
- For mobile operation "Only charging during power/WLAN" set.
Typical errors
- Only "Sync" thought instead of backup → always combine with versioning + external backup.
- A single target → lack of redundancy.
Nextcloud (files, calendar, contacts, photos - your private cloud ecosystem)
For what?
Central file storage, Auto-upload from smartphoneCalendar (CalDAV), Contacts (CardDAV), Notes, optional Talk.
Why is it helpful in an emergency?
You get your Work interface from anywhereincl. current photos/documents - self-hosted.
Short setup (crash barriers)
- Docker or AIO installer; reverse proxy with HTTPS.
- Object storage/Consider external data carriers for large photo archives.
- Cron jobs correctly (background jobs!).
- AppsPhotos, Contacts, Calendar, External Storage, Passwords if applicable only if no separate manager is used.
Security & Performance
- Strong admin passwords, 2FA, File scans (ClamAV optional).
- Caching (Redis), generate previews.
- Backups: Data + DB + config.php; Restore samples.
Typical errors
- No cron → processes hang.
- A single hard disk → none RAID/no offsite.
- Public shares without expiry/password.
Aegis (Android app for TOTP - local 2FA vaults)
For what?
Generated One-time codes locally on the smartphone - offline, open-source.
Why is it helpful in an emergency?
You manage 2FA independent from proprietary clouds. With encrypted backups you can in case of device loss Restore quickly.
Best Practice
- Encrypting the safe (strong password + biometrics only additionally).
- Regular, encrypted exports (Aegis backup) to Secondary device + NAS/Nextcloud (encrypted).
- Labeling & organizing (folder/tags), notes for recovery (e.g. which account, which provider).
- At least. two factors keep available: Aegis and Hardware key or Backup codes.
Typical errors
- Aegis only on one Device, no backups → Lockout.
- Unencrypted export files.
2FAuth (self-hosted TOTP administration in the browser)
For what?
Self-hosted interface for managing/displaying 2FA codes - useful for Shared service accounts or as Emergency fallback.
Why is it helpful in an emergency?
If your cell phone is away, you can access it (via VPN/HTTPS) in your browser. Your 2FA codes access - under your control.
Important safety information
Centrally stored TOTP seeds increase the need for protection! Use 2FAuth only:
- behind VPN or Zero Trust (Tailscale/Cloudflared Tunnel),
- with strong login + own 2FA and
- encrypted backups.
Short setup (crash barriers)
- Docker container; secure persistent volumes; reverse proxy + HTTPS.
- Access internal/VPN only; Basic-Auth at proxy level additionally if necessary.
- Regular Encrypted exports.
Typical errors
- Open Internet access without VPN, no backups, weak passwords.
How everything fits together (Reference architecture - compact)
- Devices: Main smartphone + spare smartphone, notebook + spare boot stick.
- Data flow:
- Smartphone → Syncthing/Nextcloud Auto-Upload → NAS
- NAS → Daily backup (local + offsite, immutable)
- Additions:
- Passwords in Vaultwarden (2FA active),
- 2FA primary Aegis, Fallback Hardware key + Backup codesoptional 2FAuth (only behind VPN).
- Remote access: Tailscale on NAS/server/clients; no open port required.
- ControlMonthly Restore test, quarterly Game Day.
YouTube video implementation
Conclusion
A lost smartphone can completely paralyze you - if you're not prepared. You can significantly reduce the risk with a few targeted measures: Backups, redundancy, self-hosting and a clear emergency plan.
Start today.
Set up a replacement device. Back up your data. Print out your most important numbers.
Because the question is not, whether something happens - but when.
Bonus: Common scenarios & what you do
- Cell phone stolenLock SIM → Locate/delete device → Install replacement device + Aegis backup → Rotate passwords of critical accounts.
- House fire/burglaryPull offsite backup → restore new device from Restore → Vaultwarden + Nextcloud.
- Ransomware on the PCDisconnect network → clean restart → immutable offsite backup play back.
- SIM swap attackSwitch banking & e-mail to FIDO2/APP-2FA immediately, set provider lock password.
0 Comments