OPSEC fundamentals
by fenetylline - Wednesday June 26, 2024 at 12:40 PM
#1
Hello everyone,
I'm writing this post because I read a lot of OPSEC related threads on BreachForums and found that a concerning amount of people had weak knowledge about how to correctly be anonymous over the internet. Old BreachForums databases leaks has showed that a lot of users used to log on the forum with their home IP.
That's why today I would like to share a few tips to everyone so they can have a better understanding on how to not get doxed or caught by federals.

1. Internet Usage
First of all, I would recommend everyone not currently using Mullvad VPN to quit ASAP any VPN provider they are using and switch for Mullvad VPN. The great thing about Mullvad is that they are based in Sweden and this country does not require VPN services to keep data which can be used to identify someone (Like IP addresses or email addresses, in our case Mullvad VPN does not require an email to register). Mullvad VPN doesn't keep information such as IP address used to connect to their servers, or anything to identify you. Which means they can't snitch on you, no law enforcement can force them to provide data they don't have.
Also remember that federals have all the keys to ask companies like Discord, Google, Proton to share all the information they gathered about you. They will share all of it. You have no privacy. Once federals find one of your socials that is linked to you by anything (name, email or IP), you're cooked.

2. Data Encryption
The best way to protect your data is encrypting it. To create encrypted partitions or to entirely encrypt your physical storage I would recommend to use VeraCrypt (https://veracrypt.fr). Use a strong password that is not used anywhere else (VERY IMPORTANT), 25-30 caracters long.

To securely encrypt sensitive information while sharing them with someone, use PGP (Pretty Good Privacy).
I won't explain how those things work because they are easy to understand and use if you can correctly read documentation.

3. Cleaning behind you
Cleaning behind you is an important step to create yourself a strong OPSEC. All social media or services that were used using a shit VPN (NordVPN, or any one that is not Mullvad) or your home IP are linked to you and most likely need to be left behind you, and to not re-use any aliases linked to them. Use them with caution and do not commit anything forbidden nor sharing sensitive information using them.

4. Brain (most important)
Think by yourself and do not do the mistake of sharing personal information to anyone, even the ones you trust the most. This lead to the downfall of a lot of people. :)
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Spamming | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you feel this is incorrect.
Reply
#2
Tails OS is a must as it routes all the traffic through the tor network + it cleans up after you as well. Overall good guide, very cool!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  The Ultimate OPSEC Guide for the Hyper-Vigilant Blue_Hawk 44 3,011 Yesterday, 03:40 PM
Last Post: jodjahsjdhak
  Emontions The Worst OPSEC Mistake Iceland 18 923 Yesterday, 10:32 AM
Last Post: Art10n
  The Art Of OPSEC by Zian XTN 80 6,444 08-08-2025, 01:57 PM
Last Post: jodjahsjdhak
  Basic OPSEC Tools infodump 52 2,861 08-08-2025, 01:32 PM
Last Post: n4cx
  Advanced OPSEC Persona Iceland 17 793 08-07-2025, 07:05 AM
Last Post: Masterx0x0

Forum Jump:


 Users browsing this thread: 1 Guest(s)