Proper OPSEC | 2021

Zero Trace Support · April 10, 2021

As you probably know already, this series is about operational security (OPSEC), which refers to the process of denying adversaries information that could be potentially used to compromise you or what you are doing.

People who work in certain fields may have different views as to who the adversaries might be. To a cyber-security analyst, it would be hackers. For military people, it would be enemy military forces. To a person on the darknet, it would be law enforcement. However, one of the most important things to understand about OPSEC is that anyone who does not need to be involved with what you are doing should be viewed as an adversary.

This is because people who are not your primary adversaries can still cause major problems for you if they know you are doing something that is illegal, taboo, or requires confidentiality. And nothing beneficial to you can come from others knowing that you are doing something along those lines.

Maintaining good operational security is a lot more complicated than simply using tor browser and PGP to encrypt messages. It’s a long journey that requires a lot of work and really understanding all of the aspects, technical and otherwise, of doing things with the most discretion and anonymity as possible.

It should be noted that government agencies around the world are always actively attempting to de-anonymize tor users and that proper procedures need to be taken when using anonymity networks like tor or else you risk being de-anonymized.

Course Content

Introduction
Using The Right Hardware and Preventing Attacks
Choosing The Right OS, Hardening It And Configuring Your Privacy Software
Maintaining Anonymous Wireless Connectivity
Using Cryptocurrency Anonymously

About Instructor

+30 enrolled
Not Enrolled

Course Includes

  • 14 Lessons