<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.sncapedia.org/index.php?action=history&amp;feed=atom&amp;title=The_Ultimate_OPSEC_Guide</id>
	<title>The Ultimate OPSEC Guide - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.sncapedia.org/index.php?action=history&amp;feed=atom&amp;title=The_Ultimate_OPSEC_Guide"/>
	<link rel="alternate" type="text/html" href="https://www.sncapedia.org/index.php?title=The_Ultimate_OPSEC_Guide&amp;action=history"/>
	<updated>2026-04-15T11:49:43Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://www.sncapedia.org/index.php?title=The_Ultimate_OPSEC_Guide&amp;diff=30249&amp;oldid=prev</id>
		<title>Suznetsov: Created page with &quot;{{Tw|{{CIA}}|{{NeedsImages}}}} Have you ever wanted to not only feel safe online, but also &#039;&#039;be&#039;&#039; safe too? A large majority of &#039;teens know they could be doing better: reusing weak passwords, bragging about your potentially illegal activities to literal whos, sharing personal information online, and many more acts that leave you stranded out in the middle of Hackleburg for the CIA and Quote to datamine you. Thi...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.sncapedia.org/index.php?title=The_Ultimate_OPSEC_Guide&amp;diff=30249&amp;oldid=prev"/>
		<updated>2026-04-13T03:44:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Tw|{{CIA}}|{{NeedsImages}}}} Have you ever wanted to not only feel safe online, but also &amp;#039;&amp;#039;be&amp;#039;&amp;#039; safe too? A large majority of &amp;#039;teens know they could be doing better: reusing weak passwords, bragging about your &lt;a href=&quot;/wiki/Raid/&quot; class=&quot;mw-redirect&quot; title=&quot;Raid/&quot;&gt;potentially illegal activities&lt;/a&gt; to &lt;a href=&quot;/wiki/Literal_who&quot; title=&quot;Literal who&quot;&gt;literal whos&lt;/a&gt;, sharing personal information online, and many more acts that leave you stranded out in the middle of &lt;a href=&quot;/wiki/Alabama&quot; title=&quot;Alabama&quot;&gt;Hackleburg&lt;/a&gt; for the &lt;a href=&quot;/wiki/CIA&quot; title=&quot;CIA&quot;&gt;CIA&lt;/a&gt; and &lt;a href=&quot;/wiki/Quote&quot; title=&quot;Quote&quot;&gt;Quote&lt;/a&gt; to &lt;a href=&quot;/wiki/Cloudflare&quot; title=&quot;Cloudflare&quot;&gt;datamine&lt;/a&gt; you. Thi...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Tw|{{CIA}}|{{NeedsImages}}}}&lt;br /&gt;
Have you ever wanted to not only feel safe online, but also &amp;#039;&amp;#039;be&amp;#039;&amp;#039; safe too? A large majority of &amp;#039;teens know they could be doing better: reusing weak passwords, bragging about your [[raid/|potentially illegal activities]] to [[Literal who|literal whos]], sharing personal information online, and many more acts that leave you stranded out in the middle of [[Alabama|Hackleburg]] for the [[CIA]] and [[Quote]] to [[Cloudflare|datamine]] you. This page shall serve as a guide to teach you about cybersecurity and why it&amp;#039;s important.&lt;br /&gt;
&lt;br /&gt;
== Why you should care about OPSEC (and other privacy-related measures) ==&lt;br /&gt;
Most normgroids and ignorant people will usually bring up the same two excuses whenever you bring up cybersecurity, that being (((they))) need permission to see what you have been doing and/or that they have nothing to hide.&lt;br /&gt;
Obviously, both of these arguments are stupid and if you have said these exact same things before, you have a [[Jews|yiddish brainworm]] digging around inside your frontal lobe turning you into a good little &amp;quot;upstanding samaritan&amp;quot; that does not question THE HIGHER AVTHQRITY. A dox can be achieved by someone looking at the info surrounding you (i.e. usernames, breaches, verbatim from you), and this &amp;quot;someone&amp;quot; can be ANYONE, from glowniggers to [[Foodist|failtrolls]]. &lt;br /&gt;
&lt;br /&gt;
Because of some shitty law made in 2001 after the September 11 attacks, the [[CIA|FBI and NSA]] are allowed to spy on you for the rest of your lives if you somehow ever interact with a terrorist or cartel member at least once. For example, lets say you&amp;#039;re in a group chat talking with your friends when you accidentally tag Abu Bakr al-Baghdadi in your message. As if that wasn&amp;#039;t already a horrible mistake, you now have the government scowering all of your social media accounts, your hard drives (which includes your &amp;#039;cado folder), and every other aspect of your life until the day you drop dead.&lt;br /&gt;
&lt;br /&gt;
On the warrants, internet surveillance permissions are granted by FISA courts. However, if you aren&amp;#039;t an idiot, you&amp;#039;ll realize [[Fact|99.97% of FISA court applications are accepted.]] (33,942 out of 33,954 from 1978 to 2012) IE, 99.97% of the time, Judge [[Janny]] lets the [[CIA|feds]] take a good peek at your hard drive.&amp;lt;ref&amp;gt;https://www.wsj.com/articles/SB10001424127887324904004578535670310514616&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You may also not think about it, but companies are also harvesting your data so much they make entirely new companies for the sole purpose of creating a data profile for you and monitoring your day-to-day life.&amp;lt;ref&amp;gt;https://www.forbes.com/sites/bernardmarr/2017/09/07/where-can-you-buy-big-data-here-are-the-biggest-consumer-data-brokers/#394bdc846c27&amp;lt;/ref&amp;gt; Usually these data-collecting methods range from questionable to BLATANTLY ILLEGAL,&amp;lt;ref&amp;gt;https://arstechnica.com/tech-policy/2019/10/35-billion-facial-recognition-lawsuit-against-facebook-moving-forward/&amp;lt;/ref&amp;gt; collecting information nobody would consent to if they knew it was being collected. This data is usually sold to advertising agencies and foreign governments like China, Egypt, and Morocco to spy on journalists and activists.&amp;lt;ref&amp;gt;https://www.reuters.com/article/us-china-cyber-uighurs/china-hacked-asian-telcos-to-spy-on-uighur-travelers-sources-idUSKCN1VQ1A5/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.theregister.com/2019/10/04/egypt_smartphone_spying/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet Usage ==&lt;br /&gt;
{{Tip|{{Bantext|Do not use the same username, email address, AND IP address (whether or not it&amp;#039;s on a VPN, it doesn&amp;#039;t matter) twice. (You), yourself have most likely screwed up on this.}}}}&lt;br /&gt;
&lt;br /&gt;
If you are going to browse the web, you should NOT use Chrome or Edge, those are bloated pieces of shit that WILL datamine you. Instead, you should use a pre-hardened browser or a manually hardened one (preferably Firefox for manually hardened).&lt;br /&gt;
=== Browsers ===&lt;br /&gt;
;[https://librewolf.net/ LibreWolf]&lt;br /&gt;
:An open-source FireFox derived browser that implements a lot of good features regarding fingerprinting{{Note|the non-soysphere word for datamining}}, such as uBlock Origin being already installed and anti-tracking measures already installed.&lt;br /&gt;
;[https://torproject.org TOR]&lt;br /&gt;
:{{Tip|There was a historical security vulnerability in TOR that was codenamed by the CIA as &amp;quot;EGOTISTICALGIRAFFE&amp;quot;. Read more [https://nsarchive.gwu.edu/sites/default/files/documents/3512469/Document-01-National-Security-Agency-Peeling.pdf here].}}&lt;br /&gt;
:Not only does TOR anonymize you by routing your connection through multiple nodes, but it also encrypts the connection However, do not log into personal accounts or use it alongside identifying information as Tor is for anonymity, not convenience. To further strengthen your privacy, consider using &amp;#039;&amp;#039;&amp;#039;a trusted no-log VPN&amp;#039;&amp;#039;&amp;#039; like Mullvad in combination with Tor (meds using a VPN with Tor can fuck shit up). This setup depending on the configuration, adds an extra layer of encryption and prevents your ISP or network administrator from even knowing that you&amp;#039;re using Tor.&lt;br /&gt;
;[https://brave.com Brave Browser]&lt;br /&gt;
:Bloated crypto coal browser, but has the best fingerprinting protection out of the box.&lt;br /&gt;
;[https://helium.computer/ Helium]&lt;br /&gt;
:It&amp;#039;s basically LibreWolf but it also removes trackers from Jewgle and the Jewgle search engine. Not as good as Brave in terms of fingerprinting protection however.&lt;br /&gt;
=== Extensions ===&lt;br /&gt;
;[https://i2p.net/en/ I2P]&lt;br /&gt;
:Just like TOR, I2P anonymizes you by routing your connection through multiple nodes, but it also encrypts the connection However, do not log into personal accounts or use it alongside identifying information as I2P, just like TOR{{Cn|oh my heckin science its like recursion}} is for anonymity, not convenience. Like TOR, it is recommended that something like Mullvad in combination with I2P, and depending on the configuration, adds an extra layer of encryption and prevents your ISP or network administrator from even knowing that you&amp;#039;re using I2P. I2P and LibreWolf go together like peanut butter and jelly. They have websites that can only be accessed by I2P, which end in .i2p, of which are called &amp;quot;eepsites&amp;quot;.&lt;br /&gt;
;[https://ublockorigin.com/ uBlock Origin]&lt;br /&gt;
:A must-have for cybersecurity, as it blocks ads and trackers, which is a basic necessity on the web nowadays. Also, enable the &amp;#039;&amp;#039;&amp;#039;AdGuard URL Tracking Protection&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Block Outsider Intrusion into LAN&amp;#039;&amp;#039;&amp;#039; filters for more protection.&lt;br /&gt;
;[https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher/ User Agent Switcher and Manager]&lt;br /&gt;
:{{Tip|Depending on how you configure this extension, you may actually make your browser fingerprint more unique!}} Allows you to spoof your user-agent, a string of text which identifies what browser, operating system, processor architecture, type of device &amp;#039;&amp;#039;(i.e. Desktop, Mobile, etc.)&amp;#039;&amp;#039; you&amp;#039;re currently using. Will cause the infamous &amp;quot;[[You look like a bot]]&amp;quot; error when posting on the sharty if enabled. &lt;br /&gt;
== Hardware ==&lt;br /&gt;
Normally, any piece of hardware works. (AS LONG AS ITS NOT MADE BY APPLE)&amp;lt;ref&amp;gt;https://securelist.com/triangledb-triangulation-implant/110050/&amp;lt;/ref&amp;gt; However if you&amp;#039;re serious about cybersecurity, I suggest you use these for your devices. Also, I think it&amp;#039;s pretty obvious, but do not buy any devices online and do NOT buy smart devices at all. If you&amp;#039;re a &amp;quot;Person of Interest,&amp;quot; the NSA will stop your package mid-transit and install spyware on your device before it arrives to you.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/ANT_catalog&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Computers ===&lt;br /&gt;
I highly recommend not getting a whole PC setup, rather have a bunch of cheap laptops and one main laptop you can use everyday. &lt;br /&gt;
&lt;br /&gt;
Some good cheap laptops would probably be the IBM ThinkPads, they&amp;#039;re very common and very affordable for the average shmuck. DO NOT get any ThinkPad (or any computer in general due to CPU backdoors) made after around 2011; IBM sold the idea to Lenovo and the build quality went down the shitter, it got even worse after 2012. A good main laptop you can get would be an ThinkPad X200, as they can be GNU booted/CanoeBooted/LibreBooted to remove Intel ME.&lt;br /&gt;
&lt;br /&gt;
=== Phones ===&lt;br /&gt;
Get a Google Pixel 8A or 9A locally from a small family owned business, covering up as much of your face as possible. Due to the implementation of ARM hardware memory tagging, a feature that significantly reduces vulnerability to remote exploits from Pixels since pixel 8, Always prefer a recent pixel like 8 or 8a or 9 series. Pay in cash. Give as little information as necessary and do not order with a carrier. Do not use a SIM card inside of your phone. Keep Airplane Mode on at all times If you have to make calls, get a physical burner with a cheap one-use SIM. Even when not connected to any internet, cell towers can track your position down to the room you&amp;#039;re in.&amp;lt;ref&amp;gt;https://www.qualcomm.com/videos/5g-multi-cell-positioning-ota-demonstration&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.ericsson.com/en/blog/2018/11/lte-positioning-and-rtk-precision-down-to-the-centimeter&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.cisa.gov/resources-tools/resources/overview-risks-introduced-5g-adoption-united-states&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Or just don&amp;#039;t get a smartphone in general, and only use an old, old cellphone for calls if you REALLY need to. Those things were designed as spyware machines from the very start this time. A old phone you could use is the Samsung Galaxy SIII with [https://replicant.us/ Replicant], a fully free [[Android]] ROM, although if you want to use WiFi you will need USB adapter that DOES NOT need proprietary drivers, some are listed on Replicant&amp;#039;s site.&lt;br /&gt;
&lt;br /&gt;
=== Before you even turn on your devices: ===&lt;br /&gt;
FOLLOW THESE TASKS!!!&lt;br /&gt;
&lt;br /&gt;
*Check to see if your device has been tampered with. (Especially the screws. See if they&amp;#039;ve been stripped or worn in anyway.)&lt;br /&gt;
*Physically remove the camera from your device.&lt;br /&gt;
*Physically remove the speaker from your device.&lt;br /&gt;
*If unable to remove camera, cover it in tape.&lt;br /&gt;
*If unable to remove speaker, keep volume always muted.&lt;br /&gt;
&lt;br /&gt;
== Software ==&lt;br /&gt;
[[File:GrapheneGODS.png|thumb|Depiction of the average GrapheneGOD.]]&lt;br /&gt;
&lt;br /&gt;
=== Computers ===&lt;br /&gt;
For computers use either Linux, de-bloated Windows, ReactOS, or QubesOS. In either case you should enable full disk encryption.&lt;br /&gt;
Do {{Bantext|NOT}} use BitLocker, as Macroslop hands out BitLocker encryption keys like candy to the feds&amp;lt;ref&amp;gt; https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
QubesOS is an operating system that heavily relies on using Virtual Machines (VM&amp;#039;s) for everything, and having a special VM for each daily activity or purpose called &amp;quot;Qubes.&amp;quot; QubesOS may seem a bit overkill for most, but remember that the government has unlimited resources and that they WILL NOT CUT CORNERS. Do not underestimate them.&lt;br /&gt;
&lt;br /&gt;
If you are willing to try out SecureBlue which is a hardened fedora distro, you are also good. It uses the same hardened malloc as GrapheneOS.&lt;br /&gt;
&lt;br /&gt;
Double aryan points if you use a fully libre Linux distro with 0 proprietary components or blobs, such as [https://pureos.net/ PureOS], [https://www.parabola.nu/ Parabola GNU/Linux-Libre], [https://www.hyperbola.info/ Hyperbola], [https://guix.gnu.org/ Guix] or any distro found [https://www.gnu.org/distros/free-distros.html here,] as it&amp;#039;s 95% impossible of being backdoored, 99% if you use a Libre UEFI&amp;lt;sup&amp;gt;&amp;#039;&amp;#039;[or a BIOS if your PC is older than {{Dusttext|dust...}}]&amp;#039;&amp;#039;&amp;lt;/sup&amp;gt; such as [https://libreboot.org/ LibreBoot],{{Keyedtext|[https://www.gnu.org/software/gnuboot/index.html GNU boot]}} or [https://canoeboot.org/ CanoeBoot.]&lt;br /&gt;
If you decide to flash the firmware mentioned, {{RedText|READ THE FUCKING MANUAL OR ELSE YOU WILL BRICK YOUR PC.}}{{Note|Some enthusiast motherboards have a &amp;quot;backup&amp;quot; BIOS you can switch to. That would make this more safe to experiment with.}} If you really value security, consider using GRUB as the payload and follow the LibreBoot/CanoeBoot GRUB Hardening Guide ([https://canoeboot.org/docs/linux/grub_hardening.html CanoeBoot version] / [https://libreboot.org/docs/linux/grub_hardening.html LibreBoot version])&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t want to use [[Tranny|Code of Conduct]]-infested shit, use [https://openbsd.org OpenBSD] or [https://freebsd.org FreeBSD] instead. OpenBSD is especially aryan btw. [http://oqptm57xf2g6mziwphlf7eqmkdg3ni6qneuuf3wbqzhdfcjufhumaxyd.onion/ Here is a CVS repo with OpenBSD guides, scripts, configuration files, etc. (tor only, you need to use Tor Browser)]&lt;br /&gt;
&lt;br /&gt;
{{Glow|If you don&amp;#039;t want to use Linux, you can de-bloat Windows 10/11 by using O&amp;amp;O ShutUp10++, a tool able to [[Lie|fully control]] Windows data-collecting and other features that (((MiKKKro$lop))) loves to hide.}} However, a more keyed alternative that is like Windows is [https://reactos.org ReactOS] a mostly open-source alternative to Kikedows that is debloated by default.&lt;br /&gt;
&lt;br /&gt;
You could also use &amp;#039;&amp;#039;&amp;#039;Tails OS&amp;#039;&amp;#039;&amp;#039; (The Amnesic Incognito Live System) a portable, bootable Linux distro designed for total anonymity. It runs entirely from a USB stick or DVD, &amp;lt;s&amp;gt;leaves no trace on the host machine&amp;lt;/s&amp;gt;{{CitationNeeded|Meds now}}&amp;lt;ref&amp;gt;https://gitlab.tails.boum.org/tails/tails/-/issues/5356&amp;lt;/ref&amp;gt;&amp;lt;s&amp;gt;,&amp;lt;/s&amp;gt; and routes all internet traffic through Tor by default. Just don&amp;#039;t forget your persistent storage passphrase, or everything is gone. {{Keyedtext|Even the keyed Aryan {{Gemtext|[[Edward Snowden]]}} who made {{Glow|Glowies}} leak by releasing classified documents revealing the existence of global surveillance programs}} once highly recommended it.&lt;br /&gt;
&lt;br /&gt;
=== Phones ===&lt;br /&gt;
&lt;br /&gt;
Phones are terrible for any type of privacy, and if you can, you should probably not get one, although if you need to...&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;GRAAAAAPHEEEENEEEEE!!!!&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
GrapheneOS is a custom-built ROM of Android letting you have full control over your phone, ranging from auto-rebooting at a certain time to toggling a pin to pop-up whenever you try to open an app. Very useful! Remember to enable duress PIN which will wipe your device once you enter it. A quality Google Pixel goes well with it (they are in a partnership with Motorola now, in 2027 some graphene Motorola phones will be realesed so stay tuned).&lt;br /&gt;
&lt;br /&gt;
=== Communication ===&lt;br /&gt;
{{Tip|{{Bantext|Glowies can recover your Signal messages, even if you have the app deleted&amp;lt;ref&amp;gt;https://www.techradar.com/phones/iphone-owners-urged-to-change-this-key-privacy-setting-after-fbi-recovers-suspects-deleted-signal-messages&amp;lt;/ref&amp;gt;.}} To remedy this, go into &amp;quot;Settings&amp;quot;, &amp;quot;Notification&amp;quot;, and then &amp;quot;Notification Content&amp;quot; and select either &amp;quot;No Name or Content&amp;quot; or &amp;quot;No Content&amp;quot; if [[(You)]] want to know who sent you that message.}}&lt;br /&gt;
Use &amp;#039;&amp;#039;&amp;#039;Signal&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;Threema&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;Session&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref&amp;gt;session re-added perfect forward secrecy &amp;lt;/ref&amp;gt;  or &amp;#039;&amp;#039;&amp;#039;Simplex&amp;#039;&amp;#039;&amp;#039; for encrypted messaging. Signal is widely vetted and open-source&amp;lt;ref&amp;gt;https://github.com/signalapp&amp;lt;/ref&amp;gt;, though it relies on phone numbers. Threema is also open-source&amp;lt;ref&amp;gt;https://github.com/threema-ch&amp;lt;/ref&amp;gt;, though you have to pay 6 USD/EUR/CHF for a one-time personal-use license&amp;lt;ref&amp;gt;https://threema.com/en/pricing&amp;lt;/ref&amp;gt;, does not require email or phone-number&amp;lt;ref&amp;gt;https://threema.com/en/faq/privacy-protection&amp;lt;/ref&amp;gt;, it will generate a random ID for you once you signed up. Simplex, on the other hand, is a decentralized messenger that does not require a phone number at all.&lt;br /&gt;
&lt;br /&gt;
Avoid [[Discord]], [[Telegram]], and other similar services, they are compromised or easily subpoenaed and are full of [[Furry|Furries]] and [[Tranny|trannies]]. Email should be hosted on secure, anonymous services like cock.li.&lt;br /&gt;
&lt;br /&gt;
Use &amp;#039;&amp;#039;&amp;#039;PGP (Pretty Good Privacy)&amp;#039;&amp;#039;&amp;#039; for encrypting emails and files. PGP can also be used if you must use the earlier mentioned services, however don&amp;#039;t share your public key through them{{Margerald}}. There is a good guide by a literal who named Kevin that goes over on how to set it up [https://kevinsguides.com/guides/security/software/pgp-encryption/ here]. You could also use thunderbird which will allow you to easily create and manage your PGP keys and proxy your email through Tor&amp;lt;ref&amp;gt;https://wiki.archlinux.org/title/Tor#Proxy_Configuration&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Don&amp;#039;t use Matrix, as it is related to the {{Mossad|(((Isreali government.)))}}&amp;lt;ref&amp;gt;https://web.archive.org/web/20201219014215/https://samba.noblogs.org/post/2018/08/27/matrix-org-a-federated-app-funded-by-a-mossad-company/&amp;lt;/ref&amp;gt; Use XMPP instead.&lt;br /&gt;
&lt;br /&gt;
=== Software Practices ===&lt;br /&gt;
*Always verify checksums and GPG signatures when downloading files.&lt;br /&gt;
*Avoid sketchy third-party installers.&lt;br /&gt;
*Use open-source software where possible.&lt;br /&gt;
*Stay updated, but wait a few days to avoid being the test dummy for new bugs.&lt;br /&gt;
&lt;br /&gt;
Use &amp;#039;&amp;#039;&amp;#039;Virtual Machines&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;sandboxing tools&amp;#039;&amp;#039;&amp;#039;, or even &amp;#039;&amp;#039;&amp;#039;dedicated hardware&amp;#039;&amp;#039;&amp;#039; for risky tasks. Everything that runs is a potential {{Glow|backdoor}}, treat it that way.&lt;br /&gt;
&lt;br /&gt;
=== {{glowmore|Intel ME}} and {{glowmore|AMD PSP}} ===&lt;br /&gt;
&lt;br /&gt;
One of the biggest with modern cybersecurity is Intel ME. It is a gigantic backdoor that has {{glow|full access to your computer (operates in ring zero), is ALWAYS on, runs a proprietary separate OS and has network access.}} &lt;br /&gt;
&lt;br /&gt;
{{Glow|AMD PSP}} is the same shit, but it is slightly better becuse it does not have network access. It&amp;#039;s still a backdoor so just remove it as well.&lt;br /&gt;
&lt;br /&gt;
To remove it, consider using one of these options:&lt;br /&gt;
&lt;br /&gt;
*[https://libreboot.org/ LibreBoot]&lt;br /&gt;
*[https://www.gnu.org/software/gnuboot/index.html GNU boot]&lt;br /&gt;
*[https://canoeboot.org/ Canoeboot]&lt;br /&gt;
*[https://osresearch.net/ Heads]&lt;br /&gt;
*[https://www.coreboot.org/ CoreBoot]&lt;br /&gt;
&lt;br /&gt;
== Apps ==&lt;br /&gt;
Apps are a very core aspect of cybersecurity. Most mainstream apps are usually closed-source or &amp;quot;proprietary&amp;quot; software. Apps or websites such as Youtube, Chrome, Facebook and even Spotify do not allow their users to view the source code of their apps. This is usually to hide their methods of data-collection and any backdoors they may be hiding. There are however alternative apps that can be used that are &amp;quot;open-source&amp;quot; where the code is easily accessible and can be reviewed by anybody who knows how to read it. Be careful! Just because it&amp;#039;s open source, doesn&amp;#039;t mean its safe. Learn how to read code to make sure any apps you&amp;#039;re using aren&amp;#039;t subtly {{Glow|glowing.}}&lt;br /&gt;
&lt;br /&gt;
Before you can install some of the apps below, you&amp;#039;ll need an app called F-Droid. F-Droid is an app store that only hosts open-source apps. You need an Android phone to install this app, as iPhones can&amp;#039;t install APK files. Apps that can only be installed on F-Droid will be in bold.&lt;br /&gt;
&lt;br /&gt;
=== Alternatives ===&lt;br /&gt;
*Youtube - &amp;#039;&amp;#039;&amp;#039;NewPipe&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;PipePipe&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*Google Play - &amp;#039;&amp;#039;&amp;#039;F-Droid or Aurora Store&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*Browser - Librewolf or Tor Browser &amp;#039;&amp;#039;(Remember to disable Javascript!)&amp;#039;&amp;#039;&lt;br /&gt;
*2FA - &amp;#039;&amp;#039;&amp;#039;Freeotp++&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;Aegis&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*VPN - Mullvad, Proton VPN&lt;br /&gt;
*Disk Wiping - &amp;#039;&amp;#039;&amp;#039;Extirpater&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*Exif Remover - &amp;#039;&amp;#039;&amp;#039;Scrambled Exif&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*{{Brimtext|[[Discord|Der &amp;#039;Cord]]}} - &amp;#039;&amp;#039;&amp;#039;&amp;lt;s&amp;gt;IRC&amp;lt;/s&amp;gt; Signal, Mumble, XMPP, Woodchipper&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*Mail - Proton Mail, Tuta mail&lt;br /&gt;
&lt;br /&gt;
== Metadata and EXIF Data ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Metadata&amp;#039;&amp;#039;&amp;#039; is invisible information embedded in files such as images that reveals details like the operating system used, timestamps, and device-specific info. Most people know about EXIF in photos, but almost every file type can leak something.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;EXIF data&amp;#039;&amp;#039;&amp;#039; (Exchangeable Image File Format) is a type of metadata used by cameras and smartphones. It can include:&lt;br /&gt;
* GPS coordinates of where a photo was taken  &lt;br /&gt;
* Device make and model  &lt;br /&gt;
* Shutter speed and aperture  &lt;br /&gt;
* Time, date, and more  &lt;br /&gt;
&lt;br /&gt;
To remove it:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;PC&amp;#039;&amp;#039;&amp;#039; – [https://www.bleachbit.org BleachBit]  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Android&amp;#039;&amp;#039;&amp;#039; – &amp;#039;&amp;#039;&amp;#039;Scrambled Exif&amp;#039;&amp;#039;&amp;#039; (available on F-Droid)&lt;br /&gt;
=== Document Metadata ===&lt;br /&gt;
PDFs, Word files, and similar docs may include:&lt;br /&gt;
* Author names&lt;br /&gt;
* File paths&lt;br /&gt;
* Edit history&lt;br /&gt;
* Software info&lt;br /&gt;
&lt;br /&gt;
To remove it:&lt;br /&gt;
* Use PDF printers or LibreOffice “Export as PDF”&lt;br /&gt;
* Use &amp;#039;&amp;#039;&amp;#039;MAT2&amp;#039;&amp;#039;&amp;#039; (Metadata Anonymization Toolkit)&lt;br /&gt;
=== Audio/Video Metadata ===&lt;br /&gt;
Media files can include:&lt;br /&gt;
* Recording device&lt;br /&gt;
* GPS (on phones)&lt;br /&gt;
* Editing software&lt;br /&gt;
&lt;br /&gt;
To remove it:&lt;br /&gt;
* Use &amp;#039;&amp;#039;&amp;#039;FFmpeg&amp;#039;&amp;#039;&amp;#039; with `-map_metadata -1`&lt;br /&gt;
* Or run them through BleachBit&lt;br /&gt;
&lt;br /&gt;
=== Archives and Code ===&lt;br /&gt;
ZIPs, scripts, and code can leak:&lt;br /&gt;
* Timestamps&lt;br /&gt;
* Directory paths&lt;br /&gt;
* Author names&lt;br /&gt;
* Git commit history&lt;br /&gt;
Always assume that anything you share might be revealing more than you intend. When in doubt, strip it out.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[CIA]]&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
{{Notelist}}&lt;/div&gt;</summary>
		<author><name>Suznetsov</name></author>
	</entry>
</feed>