Difference between revisions of "OPSEC"
Line 15: | Line 15: | ||
== Projects and Guides == | == Projects and Guides == | ||
− | * [[Pyongyang Night]] – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC. | + | * [[Pyongyang_night|Pyongyang Night]] – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC. |
* [[Cordcutters]] – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness. | * [[Cordcutters]] – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness. | ||
* [[Burner Discipline]] – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization. | * [[Burner Discipline]] – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization. |
Revision as of 09:01, 21 April 2025
OPSEC
Operational Security is not paranoia — it's pattern awareness.
This page serves as the main hub for OPSEC practices and philosophies across both physical and digital environments. Whether you're an activist, sysadmin, whistleblower, or just someone who values sovereignty in the modern surveillance state — this is your jump-off point.
What is OPSEC?
OPSEC (Operational Security) is the practice of identifying and protecting critical information from adversarial observation. It’s not just about encryption or burner phones — it’s about behavioral patterns, hardware trust, environmental awareness, and long-term risk reduction.
Modern threats are persistent and often built into the tools we use every day. True OPSEC starts by understanding the entire surface: from BIOS to browser, from speech patterns to USB ports.
Projects and Guides
Projects and Guides
- Pyongyang Night – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC.
- Cordcutters – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness.
- Burner Discipline – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization.
- Ghost VM Ops – Best practices for creating, managing, and isolating virtual machines for security and privacy.
- Sandbox Rituals – A guide to using Windows Sandbox for safely executing untrusted programs in a disposable environment.
- Titus Cleanse – How to use Chris Titus’s Windows utility to debloat and secure your system with minimal configuration.
- WPD Blackout – Detailed usage of WPD.app to disable Windows telemetry, background data collection, and unwanted services.