Previous Page

nihilist@mainpc - 2024-06-08

Audit your OPSEC and determine the appropriate internet use

In this tutorial we're going to explore how you can audit your own level of Operational Security (also known as opsec), using the following 6 parameters:Complexity, Transparency, Surveillance, Centralisation, Onymity, and Deniability. The goal is to determine the level of Privacy, Anonymity and Deniability of your operations online to determine what you can do safely.

Based on those, we are able to determine the most appropriate Internet use.

Auditing your own OPSEC is an essential skill that you must possess, we're going to audit the 4 different setups below, to be able to determine where they fit.

To do so, we are going to simplify it down to 4 OPSEC levels: Public, Private, Anonymous and Sensitive.

Sidenote: If your setup is suitable only for public internet use, you CANNOT use it for any private use, and so on.

Bob's Setup: Public Internet Use

Complexity: Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.

Transparency: Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.

Surveillance: Since bob uses closed-source software, he is under constant surveillance while using his computer.

Centralisation: Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services

Onymity: Because there is no privacy, anonymity is impossible for Bob.

Deniability: Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.

Conclusion: Bob's setup is suitable only for Public internet use, as he is under constant surveillance while using it.

Alice's Setup: Private Internet Use



Complexity: Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.

Transparency: Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.

Surveillance: Alice has verified that the open source software that she was using wasn't spying on her

Centralisation:Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised.

Onymity: Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.

Deniability: Alice cannot deny that she has used her current setup

Conclusion: Alice's setup is suitable for Private use, as she managed to remove surveillance from her setup.

Charlie's Setup: Anonymous Internet Use



Complexity: Charlie is willing to go at great lengths to improve his OPSEC

Transparency: Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.

Surveillance: Charlie has verified that the software he is using, is not surveilling what he's doing

Centralisation: Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse

Onymity: Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser

Deniability: Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.

Conclusion: Charlie's setup is suitable for Anonymous use, as he managed to implement anonymity technologies into his setup.

Dave's Setup: Sensitive Internet Use



Complexity: Dave is willing to go at great lengths to improve his OPSEC

Transparency: Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.

Surveillance: Dave has verified that the software he is using, is not surveilling what he's doing

Centralisation: Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse

Onymity: Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser

Deniability: Dave can deny that he has committed any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of.

Conclusion: Dave's setup is suitable for Sensitive use, as he managed to implement plausible deniability on top of anonymity technologies into his setup.

Recap of the 4 basic OPSEC levels



Now as you can see, the higher the opsec level, the more complexity one must be willing to bear with, in order to increase their own operational security.

Take the 6 parameters into account before trying to use a specific setup for an inappropriate internet usage. If you want to have all of those 4 setups at once, check out my tutorial on VM-based internet usage segmentation

Nihilism

Until there is Nothing left.

About nihilist

Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


Contact: nihilist@contact.nowhere.moe (PGP)