The OpSec Manual

Chapters

10 in total.

Intro to OpSec

Your basic introduction to Operational Security, commonly known as OpSec. Learn what OpSec is all about and why it is important.

Read

Basic threat modeling

A basic plain and simple guide to threat modeling. Get to know who your adversary is and how to effectively counter your adversary.

Read

Choosing the right tools

Learn about the common well tested tools used for anonymity, privacy, and security. Learn how to choose the tools that will be most effective for you.

Read

Encryption

All about encryption, learn about strong popular algorithms and algorithms you should avoid. Learn what to look for before using software or hardware for encrypting your data.

Read

Metadata

Learn what metadata is and how it can be *****d and how you can avoid creating metadata or remove how to remove metadata from files such as documents and images.

Read

Mobile device location tracking

How mobile devices such as Phones and Laptops can be used to track your location and possible methods on how to avoid these types of location tracking.

Read

Security through isolation

Learn about security through isolation and how you can apply it. Learn about Virtual Machines and Qubes OS and how security through isolation is used almost everywhere today.

Read

Defense in depth

Learn about defense in depth and layered approaches to security including how to apply defense in depth in an efficient and effective manner.

Read

Myths

Common myths reguarding Operational Security. Sometimes called FUD, these myths include a variety of things you should avoid and things that are just flat out incorrect.

Myths

Common mistakes

Learn about the most common operational security mistakes and how you can avoid them. A simple mistake can have big consquences depending on what you are trying to protect.

Read