Useful Opsec Links | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

Useful Opsec Links

Useful Opsec Links

LV
1
 

minecraftplayernum1

Member
Joined
Mar 13, 2024
Threads
11
Likes
11
Awards
4
Credits
2,811©
Cash
0$
Let’s first begin with an introduction to OPSEC,

Operations Security (OPSEC) is a critical aspect of personal and organisational security, and it's essential to be aware of the ways in which you may be leaving an online footprint. Here is a comprehensive guide on how to prevent leaving an online footprint, disappear online, and wipe all your traces.

Preventing an Online Footprint:
- Use a Virtual Private Network (VPN) to encrypt your internet connection and hide your IP address.
- Use Tor Browser to browse the internet anonymously.
- Use a password manager to generate and store strong, unique passwords for all your online accounts.
- Be mindful of the information you share online, and limit the amount of personal information you put on social media or other publicly accessible platforms.
- Use two-factor authentication (2FA) to add an extra layer of security to your online accounts.
- Clear your browser history and cookies regularly.

Disappearing Online:
- Delete your social media accounts and any other online profiles that you no longer use.
- Remove yourself from online directories, white pages, and other lists that may have your personal information.
- Reach out to websites that have your personal information and request that they delete it.
- Use a disposable email address and phone number when signing up for online accounts.
- Use a burner phone or SIM card instead of your primary phone number
.
Wiping your Traces:
- Use specialized software to wipe your hard drive, such as DBAN or CCleaner.
- Use a file shredder to permanently delete files and folders.
- Use a data destruction service to physically destroy your devices.
- Remove all SIM cards and memory cards from your devices before disposing of them.

Please note that some of the methods provided may not be legal in your jurisdiction. It is important to always comply with your local laws and regulations.

It's important to note that even with all the steps taken, there still could be traces of your online presence. Therefore, it's essential to always be mindful of the information you share online and to consider the potential consequences before sharing anything

Here are is the list with links that I find useful for people that are beginning with optimising their OPSEC:

Uncategorised:

Opsec 101: https://opsec101.org/ - covers a good amount of basic knowledge about this topic.

Open Security Training: https://opensecuritytraining.info/ - This site provides free online courses on a variety of cybersecurity topics, including OPSEC.

HaveIBeenPowned:
https://haveibeenpwned.com/ - Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

TailsOS:
https://tails.boum.org/ -
TailsOS is a free, open-source, privacy-focused operating system that can be run on any computer from a USB drive or DVD. It routes all internet connections through the Tor network, and automatically deletes all data when shut down.

The Center for Internet Security (CIS) Control: https://www.cisecurity.org/controls/ - CIS provides a set of 20 critical security controls that organizations can use to improve their cybersecurity posture, including controls related to OPSEC.

Donkey Defender:
https://gitlab.com/regen-open-developmen...y-defender - A cross-browser extension designed to resist phishing attacks by blocking fake links such as amaz0n.com

Backroundchecks.org: https://backgroundchecks.org/justdeleteme/ - A directory of direct links to delete your account from web services.

Billdietrich: https://www.billdietrich.me/ComputerSecu...ivacy.html - Very good beginner tips

PrivacyTools:
https://www.privacytools.io/ - Lots of tools

The Privacy Rights Clearinghouse: https://www.privacyrights.org/consumer-guides - This organization provides a variety of resources and guides on protecting your personal information and privacy online, including guides on OPSEC.

Tor Project:
https://www.torproject.org/ - Tor is a free and open-source software that enables anonymous communication. It is a powerful tool for protecting your online privacy.

Messaging:

Signal:
https://signal.org/ - Signal is a free and open-source end-to-end encryption messaging application, it's an excellent tool for secure communication.

Matrix:
https://matrix.org/ - a free and open-source decentralized communication platform that uses end-to-end encryption for secure messaging and peer-to-peer communication, providing additional layers of security and privacy.

WickR:
https://wickr.com/ - Wickr is a single end-to-end encrypted service that provides a full suite of collaboration capabilities on any device. (Used for governmental communication before)

Password management:

Keepass:
https://keepass.info/ - KeePass is a free, open-source password manager that can generate and store strong, unique passwords for all your online accounts.

Bitwarden:
https://bitwarden.com/ - Bitwarden is an open-source password manager that securely stores your passwords and personal information. It is available for free and also has a paid version with additional features.

Myki
https://myki.com/ - Myki is a password manager that securely stores your passwords and personal information. It is available as a free version and a paid version with additional features.

KeePassXC:
https://keepassxc.org/ - is a secure open-source password manager for Linux. It is a community-driven fork of the popular KeePass password manager and offers a wide range of features such as password generation, password database encryption, and a built-in password manager.

Disk Encryption:

TrueCrypt:
https://www.truecrypt.org/ - TrueCrypt is a free and open-source disk encryption software that can encrypt your entire hard drive or a removable storage device, such as a USB flash drive.

GuardianProject: https://guardianproject.info/archive/luks/ - Disk Encryption for Linux

Veracrypt: https://www.veracrypt.fr/en/Home.html - Encryption for Windows

VPN’s and Proxies:

OpenVPN:
https://openvpn.net/ - OpenVPN is a free and open-source software that enables you to create a secure, encrypted connection to another network over the internet. It can be used to encrypt your internet connection and improve your online privacy.

ProtonVPN:
https://protonvpn.com/ - ProtonVPN offers a free version of its VPN service with unlimited data usage, although it has some limitations compared to the paid version.

TunnelBear:
https://www.tunnelbear.com/ - TunnelBear offers a free version of its VPN service with a data usage limit of 500MB per month.
Windscribe:
https://windscribe.com/ - Windscribe offers a free version of its VPN service with a data usage limit of 10GB per month.

Hotspot Shield: https://www.hotspotshield.com/ - Hotspot Shield offers a free version of its VPN service with a data usage limit of 500MB per day.

Hide.me:
https://hide.me/en/free-vpn - Hide.me offers a free version of its VPN service with a data usage limit of 2GB per month.

HideMyAss:
https://www.hidemyass.com/ - HideMyAss offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

KProxy:
https://www.kproxy.com/ - KProxy offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

FilterBypass:
https://filterbypass.me/ - FilterBypass offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

Please note that while these resources can provide a free VPN or proxy service, they should not be considered an exhaustive list. Additionally, some of the free VPNs have limitations and might not be as secure as a paid VPN and their privacy policy should be read carefully. It is essential to do your own research and to consider the specific needs of your organization or personal situation when selecting a VPN or proxy service.

Interesting Articles:

6 OPSEC don’ts:
https://www.military.com/spousebuzz/blog...s.html/amp

Similar OPSEC guide as mine: https://gist.github.com/JohnTroony/42686...ae52b7cff2

OPERATIONS SECURITY (OPSEC)
EDITION SEPTEMBER 2017:
https://media.defense.gov/2020/Oct/28/20...C-2017.PDF
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips

Similar threads

Top Bottom