Jump to navigation Jump to search
Here you will find resources that will help you from a technological operational security perspective. OPSEC is much more than simply what networks and technology you use.
Make sure that you use a separate and fully encrypted computer to work from. This can be a virtual machine, USB, external drive or a throw away laptop. All of your network traffic should be routed entirely over Tor (whonix is the best for this). See Phineas fishers operational security practices.
- The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
- Use veracrypt to encrypt your virtual machines and hard drive. https://veracrypt.fr/
- If you plan on transacting you should always start from monero and swap your XMR to another coin. This reduces traceability (over Tor). https://www.getmonero.org/