OPSEC Guide


1. Digital Hygiene

Use Secure Operating Systems: Choose a secure, privacy-focused operating system like Tails or Qubes OS. These systems are designed to leave minimal digital footprints and offer strong encryption.

Avoid Using Your Real Identity: Create an alias and use it consistently. Avoid linking this alias to any of your previous accounts or activities.

Use a Virtual Machine (VM): When accessing the internet, do so through a VM to help isolate your activity from your host operating system.

Use Tor or VPNs: Always use the Tor network or a reputable VPN to mask your IP address and location. Note that using both Tor and a VPN together can increase anonymity but may also raise suspicion depending on your activities.

Avoid Social Media: Delete all your social media accounts. These platforms are major sources of data collection and can be used to track your activities and preferences.

Encrypt Communications: Use end-to-end encrypted messaging apps such as Signal or Element (Matrix) for communication. Avoid using mainstream services like SMS, WhatsApp, or Messenger.

Use Disposable Emails: For any online registrations, use disposable or temporary email addresses (like ProtonMail or Tutanota for more secure options).

Secure Your Browsing: Use privacy-focused browsers like Tor Browser or Firefox with plugins like NoScript, Privacy Badger, and uBlock Origin. Avoid using Google Chrome or any browser linked to a big tech company.

2. Financial Anonymity

Use Cash: Whenever possible, use cash for transactions. Avoid using credit or debit cards, as these can be tracked.

Cryptocurrency for Online Payments: For online transactions, use privacy-focused cryptocurrencies like Monero (XMR) or Zcash (ZEC). Ensure you use privacy-enhancing techniques like CoinJoin or mixing services to obscure the source of your funds.

Avoid Regular Banking Channels: Avoid using bank accounts or payment services tied to your real identity. If necessary, use offshore accounts or pseudonymous services, but be aware of legal and ethical concerns.

Cancel Subscriptions and Services: Cancel all subscriptions, memberships, and services that use your real identity or are linked to your previous life.

Never Save Payment Information: Do not save payment information for social media accounts, websites, or anything that asks you to save your payment information.

3. Communication Security

Burner Phones: Use prepaid burner phones with no contracts. Pay in cash and avoid providing personal information during purchase. Regularly switch phones to avoid being tracked by cell tower triangulation.

Use Encrypted Voice Calls: If you must use voice communication, use encrypted voice services like Signal. Avoid traditional phone networks and VoIP services that are not encrypted.

4. Online Presence and Data Management

Delete Old Accounts and Data: Use services like JustDeleteMe or Deseat.me to find and delete old accounts. Contact sites to remove your data where necessary.

Remove Your Data from Data Brokers: Opt-out from data brokers like Spokeo, Whitepages, and others that sell your information. Use services like DeleteMe to help with this.

Use False Information: When signing up for new services or accounts, use a pseudonym, false date of birth, and other fictitious information.

5. Physical Security and Behavior

Change Your Routine: Make your daily routine unpredictable. Avoid patterns that can be easily tracked or recognized.

Stay Off the Grid: Limit your interaction with government services or utilities that require your real identity. This includes registering a vehicle, voting, or applying for government benefits.

Use a P.O. Box or Anonymous Address: For any necessary mail, use a P.O. Box or a mail forwarding service that does not require your home address.

Stay Vigilant: Avoid being photographed or videoed in public spaces. Be aware of CCTV cameras and facial recognition technologies.

Monitor Your Surroundings: Be cautious of people who may be following you or taking an unusual interest in your activities.

6. Travel Anonymity

Avoid Digital Tickets: When traveling, use cash to purchase tickets and avoid loyalty programs that can track your movements.

Stay in Anonymous Accommodations: Use services that do not require a credit card for booking, such as motels that accept cash.

Avoid Public Wi-Fi: Do not use public Wi-Fi networks as they can be monitored or used to track your device.

Avoid Public Charging Ports: Do not use charging ports you find in public spaces as they can be used to install software on your device.

7. Phone and Device Security

Turn Off Location Services: Disable GPS and other location services on all devices.

Use Secure Devices: Consider using devices that are specifically designed for privacy, like the Purism Librem 5 or a de-Googled phone.

Regularly Update Software: Ensure all your software, including operating systems and apps, is up to date to protect against known vulnerabilities.

8. Social Engineering Awareness

Do Not Share Personal Information: Avoid sharing any personal information online, over the phone, or in person.

Be Wary of Phishing Attacks: Always verify the identity of people or organizations contacting you. Do not click on links in unsolicited emails or messages.

Use Strong, Unique Passwords: Use a password manager to create and store strong, unique passwords for all your accounts.

9. Legal Considerations

Understand the Law: Familiarize yourself with the legal implications of disappearing or hiding your identity. Some actions, like using false information or avoiding taxes, may have serious legal consequences.

Consult an Attorney: If you're serious about disappearing, consult an attorney who specializes in privacy law to understand your rights and risks.

10. Long-Term Strategy

Establish a New Identity: Consider creating a new identity in a different country or state. This is a complex and often illegal process but may be necessary for complete anonymity.

Live Minimally: Adopt a minimalist lifestyle that does not require reliance on traceable utilities, memberships, or digital services.

Build a Support Network: Trust only a few people and ensure they understand the importance of your privacy. Having a small, trusted network can help you remain secure.