Operational Security Protocols
CRITICAL ADVISORY
Perfect anonymity does not exist. Even the most robust security practices can be compromised by human error, advanced surveillance capabilities, or zero-day exploits. Adjust your operational security measures according to your specific threat model—the higher the stakes, the more disciplined your approach must be.
Understanding Your Threat Model
Before implementing any security measures, you must assess who might target you, what they want, their capabilities, and what you're trying to protect. This framework will determine which countermeasures are appropriate for your situation.
Threat Actor Analysis
Different adversaries possess different capabilities and motivations:
- Casual Observers: Individuals with basic technical skills seeking information through publicly available tools.
- Commercial Entities: Companies tracking your data for advertising, analytics, or commercial intelligence.
- Sophisticated Criminals: Malicious actors with advanced technical capabilities seeking financial gain.
- Nation-State Actors: Government agencies with nearly unlimited resources, legal authority, and advanced capabilities.
Determine which category of adversary you need to protect against. The measures required to defend against casual observers differ significantly from those needed against state-level actors.
Risk Assessment Matrix
Evaluate your specific risks using this matrix:
Map your answers to determine which security measures are most important for your situation. Focus resources on protecting your most valuable assets against your most likely threats.
Security Tiers
Based on your threat model, select one of these security postures:
Tier 1: Basic Privacy — Protection from casual observation, tracking, and data collection. Suitable for routine browsing and low-stakes activities.
- Use Tor Browser with default settings
- Enable HTTPS everywhere
- Use basic password management
- Avoid personally identifying information
Tier 2: Enhanced Anonymity — Protection from targeted commercial tracking and baseline security against determined adversaries.
- Use Tor with security slider set to Safer
- Implement compartmentalization
- Use encrypted messaging
- Disable JavaScript when possible
- Use secure OS settings
Tier 3: Advanced Operational Security — Protection from sophisticated adversaries with significant resources.
- Use Tails OS or Whonix
- Maintain strict network isolation
- Implement air-gapped computing
- Use multiple layers of encryption
- Follow strict operational discipline
Tier 4: Counter-Intelligence Grade — Protection against state-level adversaries. Extremely demanding and potentially impractical for most users.
- Air-gapped Qubes OS with security-focused configuration
- Multiple nested routing layers
- Physical isolation and countersurveillance
- One-time communication channels
- Advanced metadata protection techniques
Securing Your Operating System
Your operating system is the foundation of your security posture. An insecure OS undermines all other security measures.
Operating System Selection
Choose your OS based on your threat model:
Tails OS
Amnesic live system that leaves no digital footprint. All Internet traffic routed through Tor. Memory wiped on shutdown.
Whonix
Dedicated OS designed for advanced anonymity. Uses multiple VM isolation for strong security guarantees. Requires more setup than Tails.
Qubes OS
Security-focused desktop OS using compartmentalization. Based on Xen hypervisor with multiple security domains.
OS SECURITY NOTICE
No special-purpose security OS can protect you if your hardware is already compromised. Consider using verified clean hardware when possible, especially for high-security operations.
System Hardening
Regardless of your chosen OS, implement these hardening measures:
- Encrypt your entire drive using strong encryption (LUKS, VeraCrypt, or built-in OS encryption)
- Disable unnecessary services, especially remote access services
- Keep all software updated with security patches
- Remove unnecessary applications to reduce attack surface
- Configure automatic updates for security patches
- Use non-admin accounts for daily operations
- Enable a firewall and configure strict outbound rules
Secure Boot Configuration
Your system's boot process requires special attention to prevent threats like evil maid attacks or boot-level malware.
DO
- Use UEFI Secure Boot when possible
- Set firmware/BIOS passwords
- Enable full disk encryption with pre-boot authentication
- Use Trusted Platform Module (TPM) if available
- Keep boot partitions on removable media for high-security setups
DON'T
- Leave unencrypted boot partitions exposed
- Enable boot from external media in public locations
- Store sensitive data on systems with questionable boot security
- Trust hardware that has been out of your physical control
- Ignore physical security warnings from secure boot
Securing Network Connections
Your network traffic contains valuable metadata that can compromise your identity even when the content is encrypted.
The Tor Network
Tor remains the foundation of anonymous browsing, but must be used correctly:
TOR USAGE WARNING
The Tor Browser Bundle is carefully configured to prevent identity leaks. Modifying settings or using Tor without the official browser can compromise your anonymity. Never use Tor Browser for both anonymous and non-anonymous activities.
Tor Browser Security Settings
Default security level. Most sites work normally. JavaScript enabled.
Disables some features. JavaScript disabled on non-HTTPS sites. Recommended for general use.
Maximum security. JavaScript disabled everywhere. Many sites will not function correctly.
Advanced Network Protection
For enhanced security, consider these additional network protection techniques:
VPN + Tor Configurations
DNS Leak Protection
DNS requests can reveal your browsing activity even when using Tor:
- Use DNS over HTTPS or DNS over Tor
- Check for DNS leaks at regular intervals
- Consider a local DNS resolver with encryption
- Verify DNS settings after system updates
Traffic Correlation Countermeasures
To defend against traffic analysis and correlation attacks:
- Use multiple entry nodes or bridges
- Implement scheduled connectivity rather than continuous
- Avoid consistent usage patterns
- Consider high-latency anonymous networks for non-time-sensitive communications
Multi-layered Network Security Architecture
For maximum security, implement a defense-in-depth network strategy:
Layer | Technology | Purpose | Implementation |
---|---|---|---|
Physical Layer | Hardware firewalls, air gaps | Physical network isolation | Dedicated hardware, physical network separation |
Link Layer | MAC address randomization | Prevent device fingerprinting | macchanger, NetworkManager settings |
Network Layer | IP obfuscation, VPNs | Hide source IP address | VPN chains, Tor bridges |
Transport Layer | TLS, SOCKS proxies | Encrypt traffic, bypass censorship | Stream isolation, TLS verification |
Application Layer | Tor, I2P, Freenet | Anonymous routing | Tor Browser Bundle, specialized clients |
Content Layer | End-to-end encryption | Message privacy | PGP, OTR, Signal Protocol |
Compartmentalization & Identity Management
The foundation of effective OPSEC is strict separation between different identities and activities.
Identity Compartmentalization
Create separate, isolated personas for different activities:
IDENTITY HYGIENE WARNING
A single mistake in identity compartmentalization can permanently link your separate identities. Assume that advanced adversaries can connect personas that share any common elements. Mistakes cannot be undone.
Pseudonym Creation & Maintenance
Follow these guidelines when establishing online identities:
- Generate random usernames without personal significance using tools like pwgen -s 12
- Create backstories that are generic enough to be unmemorable but specific enough to be consistent
- Use different writing styles, vocabulary, and syntax patterns for different identities
- Maintain separate email addresses, cryptocurrency wallets, and accounts for each identity
- Document your pseudonym details in encrypted storage accessible only by you
- Establish access schedules and never deviate (e.g., never access identity A and B on the same day)
Stylometry Countermeasures
Advanced adversaries can identify you through writing style analysis:
- Use different vocabulary, sentence structures, and idioms for each identity
- Consider using machine translation to alter writing style (e.g., translate to another language and back)
- Avoid distinctive phrases, punctuation patterns, or word choices
- For high-security needs, use collaborative writing or text generation tools
Browser Fingerprinting Defenses
Modern browsers leak identifying information through numerous channels:
Fingerprinting Vector | Information Leaked | Countermeasure |
---|---|---|
User Agent | Browser, OS, version | Use Tor Browser with default settings |
Canvas/WebGL | Hardware rendering differences | Use canvas blocker or disable JavaScript |
Fonts & Plugin Data | Installed system fonts | Use only standard font set, block font enumeration |
Screen Resolution | Display specifications | Use common resolution or resize window |
Timezone/Locale | Geographic location | Set to UTC or common timezone |
WebRTC | Internal IP addresses | Disable WebRTC or use WebRTC blocker |
Browser Storage | Previous visits, behavior | Clear storage between sessions, use private browsing |
Hardware Sensors | Device orientation, battery | Disable sensor APIs |
FINGERPRINTING WARNING
Attempting to make your browser unique by installing many privacy extensions can backfire, making you more identifiable. The Tor Browser is specifically designed to make all users look identical. Avoid customizing it unless you fully understand the implications.
Cryptographic Tools & Practices
Strong encryption is essential for securing communications and data, but must be implemented correctly.
PGP: Email & Data Encryption
OpenPGP remains the standard for secure communications:
PGP SECURITY NOTES
Remember that PGP does not hide metadata (who is communicating with whom). Subject lines are not encrypted. Use anonymous communication channels in conjunction with PGP for full protection.
Key Management Best Practices
- Generate keys on an air-gapped computer
- Store master private keys offline
- Use subkeys for daily operations
- Back up private keys securely, preferably on encrypted media
- Verify signatures on public keys before trusting them
- Have a revocation plan ready before you need it
Secure Messaging Protocols
For real-time communications, consider these encrypted messaging options:
Signal
End-to-end encrypted messaging with perfect forward secrecy. Requires phone number, so use with caution for anonymous communications.
Session
Decentralized messenger built on Lokinet. No phone number required, uses public keys as identifiers.
XMPP with OMEMO
Federated messaging protocol with modern encryption. Multiple server options, including self-hosting.
Evaluating Cryptographic Claims
When selecting security tools, beware of misleading claims:
- Prefer open-source solutions with independent security audits
- Look for established cryptographic algorithms (e.g., AES, RSA, Curve25519)
- Verify that the implementation has been professionally audited
- Be skeptical of "military-grade encryption" or similar marketing terms
- Check if the protocol provides forward secrecy and deniability
Cryptocurrency Privacy Practices
Using cryptocurrency securely requires special attention to privacy:
DO
- Use privacy-focused cryptocurrencies like Monero for sensitive transactions
- Generate new addresses for each transaction
- Use coin mixing/tumbling services cautiously and with research
- Allow sufficient confirmation blocks before considering transactions final
- Use hardware wallets for significant holdings
- Verify recipient addresses through multiple channels
DON'T
- Assume Bitcoin or other public ledger cryptocurrencies are anonymous
- Reuse wallet addresses for multiple transactions
- Connect wallets to your real identity
- Use exchange wallets for anonymous transactions
- Discuss your holdings or transactions publicly
- Rely on a single mixing service
Monero Security Configuration
Protecting Your Physical Environment
Digital security is meaningless if your physical environment is compromised. Physical security is often the most overlooked aspect of OPSEC.
Hardware Security
Your devices are vulnerable to physical tampering:
- Maintain physical control of hardware at all times
- Use tamper-evident seals on device seams
- Disable AutoRun/AutoMount features
- Lock BIOS with a strong password
- Consider using USB data blockers for charging in public
- Disable all unnecessary hardware ports
- Physically disable webcams and microphones when not in use
EVIL MAID ATTACK WARNING
If an adversary gains physical access to your device, even temporarily, it should be considered potentially compromised. Hotels, border crossings, and repair shops present high-risk scenarios.
Environmental Security
Your surroundings can betray your activities:
Visual Privacy
- Use privacy screens to prevent shoulder surfing
- Position screens away from windows and doorways
- Be aware of security cameras in public spaces
- Check for reflective surfaces that might expose screen contents
Audio Privacy
- Be mindful of ambient noise levels when discussing sensitive information
- Use white noise generators or music to mask conversations
- Remove smart speakers and IoT devices from sensitive areas
- Consider acoustic isolation for highly sensitive discussions
RF/EM Emissions
- Use Faraday bags for devices when not in use
- Remove batteries when possible for long-term storage
- Be aware that air-gapped computers can leak data via EM emissions
- Consider TEMPEST shielding for extremely sensitive operations
Secure Destruction Protocols
Properly destroying sensitive data and hardware is critical:
Media Type | Secure Destruction Method | Verification |
---|---|---|
HDDs | Multiple-pass secure wiping followed by physical destruction | Use dd if=/dev/urandom of=/dev/sdX multiple times, then disassemble and destroy platters |
SSDs | ATA Secure Erase, then physical destruction | Use manufacturer utilities for secure erase, then physically destroy NAND chips |
USB Drives | Secure wiping followed by physical destruction | Multiple passes with shred -vfz -n 10, then physically destroy |
SD Cards | Secure wiping followed by incineration | Multiple passes with secure erase utilities, then burn |
Paper Documents | Cross-cut shredding and/or incineration | Mix shredded material before disposal or burn completely to ash |
Mobile Devices | Factory reset, then physical destruction | Multiple factory resets, then destroy storage components |
DATA RECOVERY WARNING
Advanced forensic techniques can recover data from media that appears erased. When in doubt, physical destruction is the only guaranteed method. For high-security needs, combine multiple destruction methods.
Advanced OPSEC Techniques
These advanced methodologies are for users with sophisticated threat models and technical expertise.
ADVANCED EXPERTISE REQUIRED
The techniques in this section require significant technical knowledge and careful implementation. Misconfiguration can create a false sense of security while actually increasing vulnerability. Proceed with caution.
Air-Gapped Computing
Physically isolating computers from networks provides maximum security:
Air-Gap Jumping Countermeasures
Advanced attackers use several techniques to breach air gaps:
- Acoustic isolation to prevent sonic covert channels
- Faraday shielding to block electromagnetic emissions
- Control all removable media with strict protocols
- Disable or physically remove unnecessary hardware components
- Consider optical isolation for necessary data transfers
- Implement strict physical access controls
Deniable Encryption
Create plausibly deniable hidden volumes:
Advanced Authentication Methods
Multi-factor authentication options for high-security systems:
- Hardware security keys (YubiKey, Nitrokey)
- Smart cards with PKI infrastructure
- One-time pad authentication systems
- Challenge-response protocols with offline verification
- Biometric authentication with liveness detection (only on air-gapped systems)
Counter-Surveillance Techniques
Methods to detect and counter surveillance:
Digital Counter-Surveillance
- Regularly audit network connections and processes
- Monitor system resource usage for anomalies
- Use intrusion detection systems on sensitive networks
- Set up canary tokens to detect compromise
- Analyze outbound traffic patterns for unexpected communications
- Routinely scan for unknown wireless networks and devices
Physical Counter-Surveillance
- Implement irregular movement patterns and timings
- Use cover for action and cover for status techniques
- Practice SDR (surveillance detection routes)
- Verify meeting locations before sensitive discussions
- Be aware of choke points and surveillance cameras
- Conduct regular sweeps for physical tracking devices
Secure Communication Dead Drops
For the highest security communications:
Emergency Response Procedures
Prepare for security incidents before they occur. Having established procedures can mean the difference between minor compromise and catastrophic failure.
Compromise Response Checklist
- Disconnect affected systems from all networks immediately
- Document all observations and indicators of compromise
- Activate alternate communication channels based on compromise severity
- Implement identity migration if pseudonyms are compromised
- Revoke and replace cryptographic keys through secure channels
- Execute secure data destruction protocols for compromised information
- Analyze the breach to improve future security measures
Duress Protocols
Prepare for scenarios involving coercion or forced access:
- Establish duress signals or codes for trusted contacts
- Configure duress passwords that disclose limited information
- Consider systems with automatic secure wiping after specific triggers
- Have legally compliant responses prepared for common scenarios
- Create geographical "canary zones" that trigger security protocols if entered