Opsec Measures: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
No edit summary
Line 10: Line 10:
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
* https://veracrypt.fr/
* Use veracrypt to encrypt your virtual machines and hard drive. https://veracrypt.fr/
* https://www.torproject.org/
* https://www.torproject.org/
* Disable javascript (set Security Level to "Safest" in Tor Browser)
* Disable javascript (set Security Level to "Safest" in Tor Browser)
* If you plan on transacting you should always start from monero and swap your XMR to another coin. This reduces traceability (over Tor). https://www.getmonero.org/

Revision as of 17:45, 27 March 2023

Recommended Measures

Here you will find resources that will help you from a technological operational security perspective. OPSEC is much more than simply what networks and technology you use.

Make sure that you use a separate and fully encrypted computer to work from. This can be a virtual machine, USB, external drive or a throw away laptop. All of your network traffic should be routed entirely over Tor (whonix is the best for this). See Phineas fishers operational security practices.

OPSEC Tools