Opsec-Bible
Opsec-Bible
DISCLAIMER .......................................................................................................... 1
WARNING ................................................................................................................ 3
Why Privacy Matters? ............................................................................................... 6
Threat Modelling, what does it Mean? ..................................................................... 6
CHECKLIST ............................................................................................................. 8
Password Strategy ................................................................................................... 12
RSS .......................................................................................................................... 17
Backup Protocol ...................................................................................................... 18
Metadata Cleaning Protocol .................................................................................... 19
Browser Protocol ..................................................................................................... 20
Ad Blocking ............................................................................................................ 21
Compartmentalize your Digital Life ....................................................................... 22
Encrypting Emails ................................................................................................... 23
Recommended Applications & Tools ...................................................................... 24
Messaging & SIM Protocol ..................................................................................... 31
On Phone Numbers ................................................................................................. 32
2FA BACKUPS ....................................................................................................... 45
Everyday Carry ....................................................................................................... 46
Portability ................................................................................................................ 47
Wearables ................................................................................................................ 47
Hosting .................................................................................................................... 48
Money Privacy ........................................................................................................ 49
Cryptocurrency ........................................................................................................ 49
Advanced Data Protection (ADP) ........................................................................... 50
Physical Security ..................................................................................................... 51
Travel Security Checklist ........................................................................................ 51
Facial Recognition................................................................................................... 51
Remote Devices Management................................................................................. 51
Incognito Voice........................................................................................................ 52
Vehicle Privacy ........................................................................................................ 53
Camera Sec .............................................................................................................. 53
Anti-Doxx Protocol ................................................................................................. 54
So, if you are an aspiring cartoon, your threat model should look like this:
People who have spent a reasonable time in privacy communities will object oon
the whatsapp suggestion. And to be honest, it is a justified one. Whatsapp is End to
end encrypted which means that Facebook/Meta doesn’t have your exact messages
but they still have your metadata which is more oil-y.
I want people to move away from apple’s walled garden & insecure-sms to
whatsapp.
The ideal messaging app is signal. Just peruse them on messaging features like
stickers and what not, bully them if you may but we have to bring people to signal,
its about time.
☐ Have VPN on work, Create Socials with Café Proxies and use them with VPN at
home.
☐ Encrypt your drives
☐ Setup secure communication lines
Tier 2
☐ Anonymous amazon (PO box, privacy.com/mysudo card, Alias email and fake
name)
☐ Harden your browser
☐ Learn to use Firefox containers
☐ Customize uBlockOrigin Extension
☐ Test browser uniqueness
☐ VOIP Phone number (jmp.chat, mysudo)
Tier 3
This is hiding behind company / layering
Tier 4
☐ Wipe HDD’s
☐ Home security and dash cams
☐ Integrity of files (sha256)
☐ Authenticity of files (gpg)
And talking about Multi Factor Authentication, you may want to read this fabulous
article about being locked out of your digital life. And you may want to think about
Single Point of failure.
How many passwords to remember?
Memory is your last defense and mostly depends on torture tolerance if you are
exposed to that kind of a threat (most aren’t), so memory will serve you good in
most cases.
I’d say memorize atleast 6-7 types of passwords and revise them by SRS (the more
you repeat them, more likely you will remember them, highly recommend using
Ankidroid for revision of certain information).
1. Banking Accounts - these should all have different passwords and you
shouldn’t use these passes anywhere else.
2. High-stake Accounts - Main email, Twitter, and the likes, just like banking
a/c, have different passwords.
3. Master passwords - your bitwarden and keepassXC passes go here.
4. Throwaway passwords - these are passwords you use where you won’t be
needing the accounts after you used them once (use it with temp-email 1 ).
You can have a pattern in your head like <some phrase>#<number> (these
patterns are not secure but for throwaway passwords they are quick). You
can use something like pashword for this use-case.
5. Codes - whatsapp 2fa, phone passwords, ATM pins (just rote learn a few and
rotate them)
Don’t create accounts that you will not be needing, use temp mail and throwaway
passwords for stuff that asks to create an account but you are not interested in
creating one (but need the stuff anyways).
If something is out there on the internet, chances are, it will stay forever. There are
services that automate deleting info off the internet but we don’t even have access
to the good ones (and others seem sketchy). I may or may not write a guide on
finding a good service for the same.
How strong the passwords should be?
1
just search google for “temp email”, use whatever that comes up.
Websites these days will make you add upper case, number and special character.
So, you should just use a password phrase, make the first character upper case and
add ‘#’ at the end with some numbers.
The sections below maybe too advanced for normies, be warned. Just switch on
ADP on Apple devices and you will be just fine without reading the below
sections. Don’t forget to print the backup key and update your recovery contacts.
Use Proton for email, contacts, calendar and you are golden.
Encrypt stuff
Math is the last frontier of human progress that the government will regulate so
trusting math is the best strategy. If you encrypt stuff, nobody can have access to it
even if they have a warrant. The caveat ofcourse is that if you forget the password,
nobody can help you.
Turn on ADP on your Iphones, print the backup key and store it somewhere safe
AND update your recovery contacts. Email, contacts and calendar are not
encrypted, you should use Proton for that anyways. (contacts aren’t natively synce
though)
Turn on full disk encryption on your desktops NOW (Bitlocker on windows,
Filevault on Mac, LUKS on Linux). Mobile device is encrypted by default and
they are more secure than desktops by far. Don’t use face or thumb unlocks, they
are convenient but they are just not secure enough.
Don’t use cloud providers (cries in gdrive) directly, use cryptomator. If you prefer
IOS, switching on ADP is the best thing you can do as it encrypts the Icloud. If you
want to encrypt a single file, this web service is pretty handy. If you want to
encrypt stuff and manage keys on android, it doesn’t get better than openKeychain.
Encrypting Emails (PGP)
Download the public key and import it into the "keyring" of whatever PGP
software you're using (GnuPGP cli, Kleopatra, OpenKeychain, etc).
In Thunderbird, check "Encrypt (PGP/MIME)" and it selects the keys for each
recipient. In gmail and the likes, you need to first encrypt the message with an
external application and paste the encrypted stuff in the body.
Android
iPhone
Metapho - https://apps.apple.com/us/app/metapho/id914457352
Mac / Linux
Mat2 - https://0xacab.org/jvoisin/mat2
Windows
https://exiftool.org/
Watermark removal – you can use ffmpeg for removing logos in videos,
use history brush in photoshop for images, for pdf’s just copy text to
.txt file, save it and export to pdf from there.
Edge kinda has the best in-place Translation. Though firefox translations is getting
there.
Testing tools:
1. deviceinfo.me: Check Browser leakages.
2. ipinfo.io: Check which IP you are operating with.
3. GRC Shield Up: Check which ports are open of the (home) network.
• You should use uBlock extension for all your desktop browsers.
• For YouTube you can use NewPipe on android, aYou+ and Freetube on
Desktops.
• For Spotify you can use Xmanager on Android and SpotX for Desktops
• You can also block ads on your whole home network by setting up Adguard
Home or just setting up NextDNS as your default DNS in your home router.
Windows - GPG4Win
IOS - CanaryMail
Mac - GPGSuite
Thunderbird as your primary email client on desktop and K-9 on android.
Local AI
• Upscayl – 4x resolution your Bing AI pics.
• https://ai.meta.com/llama/
Cloud AI
• Tldv.io – summarize videos.
• Voice.io / Eleven Labs – text to human voice
• Perplexity AI – search and get answers without links.
• Adobe Firefly- genAI on context.
AI Writing
If you never wrote before, please learn writing before then use tools to leverage.
• Editor – Scrivener + Hemingway
• Grammer – ProWritingAid
• Copy - SwipeBuilder
Screen Management
• Macos - night shift and lunar
• Windows - IRIS
• Android - inbuilt (night light + bedtime mode + extra dim)
• Linux - f.lux
• iPhone - guide
Web Extensions
• Ublock** – block ads and annoyances, https://rentry.org/filterstalker
• Libdirect** – direct all your staple websites to their privacy frontends
• Consentomatic – automatically clicks “I disallow cookies”, superficial but
increases web UX anyhow.
• Don’t use cookies auto delete, just enable “delete cookies on close” in
browser and create exceptions for staple sites by clicking lock button in the
address bar.
Cross Platform
• Calibre – Ebook Management
• Bleachbit – delete residue after uninstalling
• Jdownloader2 – downloader we all needed, its not open source though.
• VLC – The OG video Player / MPV – Best Subtitles support
• Qbittorrent – The OG GUI torrent client
• Bitwarden - best for cross device passwords
• Veracrypt** – encrypt files and folders, by making a vault file.
• KeepassXC** – best local password manager
• Joplin** – cross device notes app
• Ankiweb – Learn Cram anything quickly
Adobe Alts
• Premier – Davinci
• After Effects – no alt, maybe blender.
• Photoshop – Affinity Photo / Gimp
• Illustrator – Affinity Designer
• Dreamviwer (lollll) – Webflow
• Indesign – Kindle Create
Video Games
• ProtonDB – Linux/SteamDeck Support
• AIO VC Redist
Windows
• Optimize your Windows for Privacy - SophiApp**
• Win11 optimizer – Chris Titus**
• Ungoogled Chromium - When Firefox is blocked by piece of shits
• Musicbee - Best Music Player
• Rainmeter - Best Widgets System
• SumatraPDF – OG pdf Reader
• JpegView – best in class image viewer
• Notepad++ - notepad on steroids
Android
• Universal Android Debloater
• Tasker- Automations
• collabora-office
• coreIRC Go – IRC is not dead, can bridge with matrix and use Schildichat.
• Cromite – Good Browser
• Fdroid – alternate app store
• Aurorastore** – Install Apps from google play with somewhat more privacy.
• Feeder – RSS Reader
• k-9 – mail client
Prepared exclusively for jaylreynolds0@gmail.com Transaction: 0136619027
• Fairmail – the OG Mail Client
• Moneroju – Monero Wallet
• mozc – Japanese keyboard
• florisboard - Keyboard
• libretorrent – open-source torrent client, but no frills is prob Flud
• mpv – best in class subtitles
• vlc – OG video player
• QKSMS – OG Open-source SMS Client
• SD Maid – OG cleaner
• Signal – use with burner, usernames will change the game.
• Voice** – audiobook player
• Yet another call blocker** – privacy respecting spam blocker, it uses
crowdsourced Database shouldianswer
• Appmanager – the OG
• Cheogram – Telegram client with in-line translations.
• DeepL – Best in class Translator specially for Spanish.
• Duolingo – the OG Language app
• FFupdater** – Update all your browsers in one place
• Gmaps WV** – Gmaps in a sandbox
• HexViewer – Hex Editor
• Jiten – Best Japanese Dictionary
• Longshot – automatic scrolling screenshot
• Memegen Pro – good meme generator but imgflip does the job
• Nextdns** – on-device DNS + Firewall done right
• SimpleNotes** - nice temp notes app
• Obtainium** – directly update apps from github releases and other sources
• OpenScan – Open Source CamScanner
• BinaryEyes – Open Source QR Scanner
• Tachiyomi – the OG Manga Reader
• Windscribe** – Good Free VPN (30GB)
Rooted Android:
(Note Root is a less secure state, don’t do it on a daily driver)
• Proxydroid – Proxy on individual Apps
• AuroraService - Aurora Store Silent Installs
• Fdroid Priv – F-droid Silent installs
• OpenEUICC – Open source eSim
• Shamiko – hide root
• Neobackup – best app backup solution
IOS
• https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/
• Canary Mail** - PGP on iPhone
• Backup** via Finder (Mac) or iTunes (Windows)
• PhotoMath
• Add custom apps – Altstore
• hyperweb.app** – only safari extension you need
• Color Widgets – OG Widgets
• Teleprompter
• Pro Camera
Jailbroken:
(Note ipa’s can be installed via altstore as well – no jailbreaking needed)
(Note Jailbroken is a less secure state, don’t do it on a daily driver)
• ios.cfw.guide
• uYou+ - YouTube client
• Spotify++ (w/ Sposify)
• iTorrent
• ipaspot.app
YouTube Channels
• iDeviceMovies
• CrackUriDevice
Shortcuts:
Open the Link and click on “Add Shortcut”, and access them from shortcuts app.
• Removes water from the speaker grills
• Dictate text to notes
MacOS
• https://forum.keyboardmaestro.com/t/getting-started-with-keyboard-
maestro-and-the-forum/6
• Littlesnitch - OG firewall
• Backup and Restore
• Productivity Suite - Aptonic
• Better Apple Music client - cider.sh
• MacOS Cleaner - Clean-Me
• Clipboard manager - Maccy
• ScreenSavers
• macosicons.com
• dynamicwallpaper.club
• https://github.com/drduh/macOS-Security-and-Privacy-Guide**
• https://github.com/notAperson535/OneClick-macOS-Simple-KVM
• macscripter.net
• Mac randomization - LinkLiar**
• Neofetch for mac - macfetch
• https://github.com/sveinbjornt/Sloth Nice GUI for lsof.
• https://alt-tab-macos.netlify.app/
• https://saurabhs.org/advanced-macos-commands
• https://betaprofiles.com/ - no-frills beta installs
• https://macmenubar.com/
• https://github.com/Yelp/osxcollector (unmaintained)
• https://apphousekitchen.com/ charge Limiter App
• https://github.com/corpnewt/USBMap
Linux
• Fedora Silverblue – best Desktop distro yet (prob something like nixos &
immutable is the future)
• Usbguard - protect you from usb attacks
• Timeshift - the OG backup solution (use btrfs partition)
• conky - system info on desktop
• okular -good pdf viewer
Hardware
• Open-Deck
• coreboot + Qubes on Thinkpad t440p
• OpenWRT on TP-Link Archer A7
• Yubikey Series-5 NFC (Hardware keychain)
• AsteroidOS Smartwatch
• Privacy Filter
Numbers:
1. Physical SIM for Gov ID / Banking – nobody knows about
2. Google fi for family, close friends and travel
3. Jmp chat number for business
4. Jmp chat number for spam
5. Sms verification – smspool.net, others
2FA
You shouldn’t be using your mobile number as 2FA mechanism that’s just counter-
productive; I recommend Ente Auth for IOS and Authenticator Pro for Android
(Privacy community likes aegis). Just make sure to switch on auto backup and save
the file somewhere safe.
Verification
For throwaway accounts, smspool.net is nice.
For others, can use jmp.chat (5$ per month) and ironvest (5$ gives you 1 phone
number, 50 emails & 35 masked cards) or some shady Russian site/Forum (Tread
carefully).
The full proof way is to get google fi (30$) and port it into jmp chat in the same
month only (additional number costs 2.5$ not 5$)
Security
The apex of secure P2P communication is Burner + Signal. Nothing comes close.
Vendor Lock-in
2
They tried to secure SMS against MITM attacks after 2G but even 5G seem to have problems. More info here.
Flagged as VOIP
But the problem is, a lot of VOIP numbers are sold at pennies to untrusting parties
and hence aren’t really good for verification. That’s why companies have
Databases (or API from some service) that prevent you from using a “bad” VOIP.
The best course of action is to buy a physical SIM and port it into a VOIP service.
Google Voice takes 20$ to port it. Jmp Chat offers porting as well.
Area Codes
\( +\hspace{1mm}y_1y_2y_3\hspace{1mm}
(z_1z_2z_3)\hspace{1mm}a_1a_2a_3\hspace{1mm}b_1b_2b_3b_4\)
z’s → are used for specific function, eg. corporate, toll-free etc.
a’s → are used for area code
As an example, you can checkout UK’s.
A corporation builds Infrastructure from the ground up and sign up a contract with
the government. Different Corps and gov decide which areas would get how many
Prepared exclusively for jaylreynolds0@gmail.com Transaction: 0136619027
numbers and area codes are assigned on the basis of geography, population and
spectrum.
Services use this as a filtration mechanism to discard the numbers that are not
allowed for verification.
eSIM
eSim helps to load mutliple carrier data remotely and you can switch between them
without doing anything physical.
Price Comparison - esimdb
For Devices that don’t support eSim - esim.me & esim.5ber.com
DIY - https://xdaforums.com/t/a-tricky-way-to-use-esim-on-cn-in-variant.4609543/
Open-Source Implementation - https://gitea.angry.im/PeterCxy/OpenEUICC
Anonymous eSIM - silent.link
eSim Kinda tries to solve these 2 problems (as you can switch between profiles
easily):
1. Coverage: If you travel a lot, you know some areas have different signals for
different carrier networks. Satellite Internet solves this. Or you could just get
each of every Carrier.
2. International Roaming - If you travel a lot internationally, you know it costs
a lot to get coverage for your number in another country. Google Fi is a
pretty cool option that tackles this problem for US Residents.
JMP Chat
This is the king of VOIP, but onboarding is somewhat not user friendly so here I
will try to explain it.
It works with XMPP Clients. What is XMPP? It’s just like eMail but for Instant
Messaging. It’s a protocol that can have multiple clients (Apps) that can
communicate with each other (just like eMail). (Technically its jabber not XMPP,
but it doesn’t matter)
I will take an Android Client “Cheogram” as an example here. Because you get
snikket instance (server for your clients) and phone number attached to it upon
If you are more curious about jmp chat, you can check out their FAQ and blog. If
you are curious about how they developed this stuff, check out their team’s wiki
here.
But I have found one provider that was able to give a “trusted” carrier number.
There are probably others, so let me know by DM’ing through Twitter if you found
one too.
It’s Andrew’s and Arnold, you set this up in XMPP clients by following this guide.
Just test the number before adding any deposit. You can copy paste each number
during sign-up in twitter’s “account information” to see if it goes through.
iMessage
1. Blue Bubbles vs Green Bubbles: Explained! | Marques Brownlee
2. iPhone gets RCS
3. iMessage between iPhone and iPhone is E2EE but icloud backups aren’t, so
enable ADP please.
Appendix B – Data
When a corp builds up an Infra it invests a lot of money and then some, for the
marketing and other usual business stuff. They cover their costs from end users for
some years and then reap profits.
But what happens is, they never decrease their prices and only increase them even
when they have cooped a lot of cash. So the overall market culture decides the
prices in the end.
Price of data over the world has this infographic.
3
https://about.fb.com/news/2020/02/two-billion-users/
When you register a site for 2FA, you get backup codes
Hacker Kit
Glytch's Hacker EDC Bag - Version 2.0 | Hak5
Self Defense
What Does A CIA Spy Carry Every day? | Shawn Ryan Show
Wearables
This is probably the next best spyware if you don’t use your mobiles securely.
Otherwise, you can get any fitness tracker that is supported by these guys:
https://gadgetbridge.org/
https://foundation.mozilla.org/en/privacynotincluded/categories/fitness-trackers/
I may provide readymade home servers that I service remotely, let me know
through twitter DM’s if you are interested.
https://www.anonstrategies.com/p/anonpay
https://www.anonstrategies.com/p/identity-buffer
Cryptocurrency
Best setup for fiat to crypto is always an offshore bank with crypto support.
Panama Bank – MEXC
• https://dexscreener.com/
• https://app.uniswap.org/swap
• https://raydium.io/swap
Facial Recognition
https://www.anonstrategies.com/p/face
Camera Sec
https://www.synology.com/en-global/surveillance
1. Don’t Panic.
2. Delete everything you can from the internet related to that specific identity
(accounts, comments …).
3. Delete everything offline you have related to that identity including the
backups.
4. (If using a physical SIM) Destroy the SIM card and trash it in a random
trash can somewhere.
5. (If using a physical Burner Phone) Erase then destroy the Burner phone and
trash it in a random trashcan somewhere.
6. Securely erase the laptop hard drive and then ideally proceed to physically
destroy the HDD/SSD/Laptop and trash it somewhere.
7. Do the same with your backups.
8. Keep the details of your lawyer nearby or if needed, call them in advance to
prepare your case if needed.
Return to your normal activities and hope for the best.
You can use café WIFI’s (that are not commercial IP’s, not mcd for e.g.)
to create anonymous social accounts rather than buying Proxy IP’s that
may or may not work.
It’s always beneficial to hide things in plain sight rather than making
special space for them, add things in a book in a shelf for e.g.
Safe Word
Ask your loved ones to tell you something that only the 2 of you are
aware of, if you think they are compromised.
Death Kit
1. Have a Traditional Will.
2. Have a Living Will.
3. Have a Living Trust.
4. Digital Vault (Password Manager and Veracrypt Container)
5. Have banking, trusts, llc, exchange nominees.
6. Have Digital Accounts Strategy (Data Release & Destruction
Plan)
Recommended Services
1. 1984.hosting
2. njal.la for domains
3. Proxies - rainproxy.io (residential), Gridpanel (mobile proxies)
4. VoIP Number - jmp.chat
5. fi.google.com/about – get this and port to jmp chat. Though Fi is pretty great
for international roaming.
6. if you can trust google, google voice is the cheapest voip option – though
doesn’t work everywhere.
VPN
Fully anonymous – Mullvad with Monero for TOR level Shit.
Free – Windscribe (30GB)
Paid Daily driver – Proton
Honorable mention – IVPN
anonshop.io/telegram – 25$
anonshop.io/windows – 9 $
anonshop.io/apple – 9 $
If you need any more info, or want me to cover something else as well,
you can reach out to me on email contact@bowtiedanon.com or on
Twitter ( @bowtiedanon_ ).