OPSEC

From Filtered, Archived, Gaslit Wiki
Revision as of 09:59, 21 April 2025 by 103.75.11.78 (talk)
Jump to navigation Jump to search

OPSEC

Operational Security is not paranoia — it's pattern awareness.

This page serves as the main hub for OPSEC practices and philosophies across both physical and digital environments. Whether you're an activist, sysadmin, whistleblower, or just someone who values sovereignty in the modern surveillance state — this is your jump-off point.

What is OPSEC?

OPSEC (Operational Security) is the practice of identifying and protecting critical information from adversarial observation. It’s not just about encryption or burner phones — it’s about behavioral patterns, hardware trust, environmental awareness, and long-term risk reduction.

Modern threats are persistent and often built into the tools we use every day. True OPSEC starts by understanding the entire surface: from BIOS to browser, from speech patterns to USB ports.

Projects and Guides

  • Cord-cutters – How to minimize risk and prevent doxxing on Discord through identity discipline and behavioral awareness.
  • Digital Discipline – Anonymity best practices using ProtonMail, Mullvad VPN, and a secure password manager.
  • Ghost VM Ops – Best practices for creating, managing, and isolating virtual machines for security and privacy.
  • Sandbox Rituals – A guide to using Windows Sandbox for safely executing untrusted programs in a disposable environment.
  • Titus Cleanse – How to use Chris Titus’s Windows utility to debloat and secure your system with minimal configuration.
  • WPD Blackout – Detailed usage of WPD.app to disable Windows telemetry, background data collection, and unwanted services.
  • Pyongyang Night – A comprehensive guide to disabling Intel ME and AMD PSP for hardware-level OPSEC.
  • Fuck The Feds – Proton's manifesto

Useful Tools

  • Privnote – Send self-destructing, encrypted notes that don’t require signup.
  • System Informer – Advanced system monitor and process viewer (formerly Process Hacker).
  • VeraCrypt – Open-source disk encryption tool for securing your files and partitions.
  • Tor Browser – Defend against tracking and surveillance while browsing the web.
  • Tails OS – A live OS that preserves privacy and leaves no trace.
  • Kismet – Wireless network detector, sniffer, and intrusion detection system.
  • Simple DNSCrypt – Easy-to-use tool for encrypting DNS traffic on Windows.
  • SimpleWall – Lightweight firewall control for Windows to block outbound data.
  • ProtonMail & ProtonVPN – Encrypted email and VPN services from a privacy-first Swiss provider.
  • Bitwarden – Secure, open-source password manager with cross-device syncing.
  • CryptPad – End-to-end encrypted collaborative documents and spreadsheets.
  • Whonix – Anonymity-focused Linux distribution built to route all traffic through Tor.
  • DNS Leak Test (Surfshark) – Verify whether your VPN is leaking DNS queries.

Further Reading