Opsec Measures: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
Line 5: Line 5:


== OPSEC Tools ==
== OPSEC Tools ==
* https://www.qubes-os.org/
There is no silver bullet when it comes to protecting yourself, staying safe and anonymous. It's important to know how to use the tools we rely on to keep us safe and free. Below you will find industry standard tools that will help keep your hacktivity private and secure.
* https://www.whonix.org/
 
* https://tails.boum.org/
When communicating with journalists or other hackers it's important to keep all communication end-to-end encrypted, network connection over Tor and to not use aliases or emails that lead back to your real world identity.
 
* https://www.qubes-os.org
* https://www.whonix.org
* https://tails.boum.org
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
* Use veracrypt to encrypt your virtual machines and hard drive. https://veracrypt.fr/
* Use veracrypt to encrypt your virtual machines and hard drive. https://veracrypt.fr
* https://www.torproject.org/
* Tor browser: https://www.torproject.org
* Disable javascript (set Security Level to "Safest" in Tor Browser)
* Disable javascript (set Security Level to "Safest" in Tor Browser)
* If you plan on transacting you should always start from monero and swap your XMR to another coin. This reduces traceability (over Tor). https://www.getmonero.org/
* If you plan on transacting you should always start from monero and swap your XMR to another coin. This reduces traceability (over Tor). https://www.getmonero.org

Revision as of 16:40, 4 April 2023

Recommended Measures

Here you will find resources that will help you from a technological operational security perspective. OPSEC is much more than simply what networks and technology you use.

Make sure that you use a separate and fully encrypted computer to work from. This can be a virtual machine, USB, external drive or a throw away laptop. All of your network traffic should be routed entirely over Tor (whonix is the best for this). See Phineas fishers operational security practices.

OPSEC Tools

There is no silver bullet when it comes to protecting yourself, staying safe and anonymous. It's important to know how to use the tools we rely on to keep us safe and free. Below you will find industry standard tools that will help keep your hacktivity private and secure.

When communicating with journalists or other hackers it's important to keep all communication end-to-end encrypted, network connection over Tor and to not use aliases or emails that lead back to your real world identity.