Difference between revisions of "OPSEC"

From Filtered, Archived, Gaslit Wiki
Jump to navigation Jump to search
(Created page with "Pyongyang night")
 
Line 1: Line 1:
[[Pyongyang night]]
+
= OPSEC =
 +
 
 +
''Operational Security is not paranoia — it's pattern awareness.''
 +
 
 +
This page serves as the main hub for OPSEC practices and philosophies across both physical and digital environments. Whether you're an activist, sysadmin, whistleblower, or just someone who values sovereignty in the modern surveillance state — this is your jump-off point.
 +
 
 +
== What is OPSEC? ==
 +
 
 +
OPSEC (Operational Security) is the practice of identifying and protecting critical information from adversarial observation. It’s not just about encryption or burner phones — it’s about behavioral patterns, hardware trust, environmental awareness, and long-term risk reduction.
 +
 
 +
Modern threats are persistent and often built into the tools we use every day. True OPSEC starts by understanding the entire surface: from BIOS to browser, from speech patterns to USB ports.
 +
 
 +
== Projects and Guides ==
 +
 
 +
== Projects and Guides ==
 +
 
 +
* [[Pyongyang Night]] – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC.
 +
* [[Cordcutters]] – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness.
 +
* [[Burner Discipline]] – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization.
 +
* [[Ghost VM Ops]] – Best practices for creating, managing, and isolating virtual machines for security and privacy.
 +
* [[Sandbox Rituals]] – A guide to using Windows Sandbox for safely executing untrusted programs in a disposable environment.
 +
* [[Titus Cleanse]] – How to use Chris Titus’s Windows utility to debloat and secure your system with minimal configuration.
 +
* [[WPD Blackout]] – Detailed usage of WPD.app to disable Windows telemetry, background data collection, and unwanted services.
 +
 
 +
 
 +
== Further Reading ==
 +
 
 +
* [https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2071424/operational-security-what-it-is-and-how-to-practice-it/ NSA: What is OPSEC?]
 +
* [https://www.eff.org/pages/secure-communication EFF: Secure Communication Guides]
 +
* [https://ssd.eff.org/ Surveillance Self-Defense Toolkit – EFF]
 +
* [https://en.wikipedia.org/wiki/Operations_security Wikipedia: OPSEC]

Revision as of 09:00, 21 April 2025

OPSEC

Operational Security is not paranoia — it's pattern awareness.

This page serves as the main hub for OPSEC practices and philosophies across both physical and digital environments. Whether you're an activist, sysadmin, whistleblower, or just someone who values sovereignty in the modern surveillance state — this is your jump-off point.

What is OPSEC?

OPSEC (Operational Security) is the practice of identifying and protecting critical information from adversarial observation. It’s not just about encryption or burner phones — it’s about behavioral patterns, hardware trust, environmental awareness, and long-term risk reduction.

Modern threats are persistent and often built into the tools we use every day. True OPSEC starts by understanding the entire surface: from BIOS to browser, from speech patterns to USB ports.

Projects and Guides

Projects and Guides

  • Pyongyang Night – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC.
  • Cordcutters – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness.
  • Burner Discipline – Step-by-step instructions on maintaining anonymity using ProtonMail, Mullvad VPN, and operational compartmentalization.
  • Ghost VM Ops – Best practices for creating, managing, and isolating virtual machines for security and privacy.
  • Sandbox Rituals – A guide to using Windows Sandbox for safely executing untrusted programs in a disposable environment.
  • Titus Cleanse – How to use Chris Titus’s Windows utility to debloat and secure your system with minimal configuration.
  • WPD Blackout – Detailed usage of WPD.app to disable Windows telemetry, background data collection, and unwanted services.


Further Reading