Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   305

[Guide] Quick and Dirty Technical opsec Guide

by SherlockHemredge - 06 April, 2022 - 04:06 PM
This post is by a banned member (SherlockHemredge) - Unhide
41
Posts
15
Threads
4 Years of service
#1
(This post was last modified: 07 April, 2022 - 04:05 AM by SherlockHemredge. Edited 6 times in total.)
Basic Self Online Protection:

1. Apply full disk encryption to your host OS
2. Make an encrypted volume with VeraCrypt
3. Inside the encrypted volume install Whonix
4. Use a WIFI connection that isn't your own (Cantenna, Aircrack, & Reaver). If at home then use Ethernet over WIFI
5. Communicate via safe and encrypted means. I prefer jabber/xmpp with OMEMO encryption over anything else however if on forums then use PGP

Using Whonix as your base and then connecting to infrastructure such as RDP's/VPS is near fail-safe on the side of IP security.

Having your whonix VM installed inside of an encrypted volume means that all your VM metadata is all contained within the encrypted volume and having it inside of the volume means that once you dismount your VM you can keep your laptop/PC open and do other things and can worry less if/when you get raided because your criminal shit is secure. Follow common sense! Use strong passwords and don't recycle blah blah blah.
This post is by a banned member (SherlockHemredge) - Unhide
41
Posts
15
Threads
4 Years of service
#2
This is a bump
This post is by a banned member (PYL7T0NPQj) - Unhide
0
Posts
0
Threads
2 Years of service
#3
Thank you for the leak

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)