cross-posted from: https://lemmy.ml/post/25679666

I recently put together a detailed opsec guide that covers practical steps for reducing your digital footprint, securing communications, and avoiding common pitfalls people make when trying to stay private online.

The goal was to create something that’s actually useful and not just the usual “use a vpn and tor” advice. I tried to break down realistic methods that can help both beginners and people already familiar with opsec.

Id love to get some feedback from the community - what’s missing, what could be improved, and if there’s anything you disagree with.

  • Tiger
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    9 hours ago

    I think it’s good you tell people to check their threat model, but then on the other hand some of the advice comes across for those in an extreme category of the spectrum, which most people aren’t.

    For example, most people aren’t whistleblowers or political dissidents sharing news online and needing to hide from state governments - they’re regular working folks who need to be more worried about falling prey to the everyday phishing and social engineering attacks aiming for their bank accounts and credit cards.

    It’s cool to know the extreme parameters for top security, but it’s important to get the daily, small stuff right, too. Like using password managers, MFA, being vigilant looking out for all chances of scams, not using shady websites, services or pirated software, leaving software and devices unpatched, etc.

    • whoszycher@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      51 minutes ago

      Hey, thanks for feedback! I will rewrite it a bit - expand the threat model and maybe will add some security “level” thing.