OPSEC Tutorial #1: Device Security Basics — Securing Your Phone and Computer

OPSEC Tutorial #1: Device Security Basics — Securing Your Phone and Computer

Series: Operational Security (OPSEC) Fundamentals
Author: Vivaed
Published: March 27, 2026
Category: Education / Security


Introduction

Your phone and computer contain more sensitive information than ever before—messages, photos, financial data, location history, and access to your online accounts. Securing these devices is not just for security experts; it is a fundamental skill for anyone who values their privacy and safety.

This tutorial covers practical, actionable steps to secure your mobile devices and computers. We reference guidance from the Electronic Frontier Foundation (EFF), official platform documentation, and leading security researchers. All recommendations prioritize free, accessible tools.

:warning: Legal Disclaimer: This guide is for educational and protective purposes only. Use these techniques responsibly and in compliance with all applicable laws. Security measures should protect your rights, not facilitate harmful activities.


Part 1: Phone Security (iOS and Android)

:locked_with_key: Lock Screen & Authentication

What to do:

Action iOS Android
Passcode Settings → Face ID & Passcode → Turn Passcode On (use 6+ digits or alphanumeric) Settings → Security → Screen lock → PIN/Password (6+ digits)
Biometrics Enable Face ID or Touch ID as secondary auth Enable Fingerprint or Face Unlock
Auto-lock Set to 30 seconds or 1 minute Set to 1 minute or less
Lock screen notifications Disable sensitive content preview Hide sensitive content on lock screen

Why it matters: A strong passcode is your first line of defense. The EFF notes that law enforcement can often bypass biometrics legally (via court orders), but passcodes have stronger constitutional protection in many jurisdictions.

:white_check_mark: Checklist:

  • 6+ digit PIN or alphanumeric password (avoid 123456, 000000, birth years)
  • Biometrics enabled for convenience (but understand legal implications)
  • Auto-lock set to 1 minute or less
  • Lock screen notifications hide message content
  • “Erase data after 10 failed attempts” enabled (iOS)

:mobile_phone: Encryption

Good news: Modern phones encrypt by default when you set a passcode.

Platform Status Verification
iOS Enabled automatically with passcode (iOS 8+) Settings → Privacy & Security → Data Protection
Android Enabled by default (Android 10+) Settings → Security → Encryption

:white_check_mark: Checklist:

  • Passcode is set (this enables encryption)
  • Phone is running recent OS version (iOS 15+ or Android 10+)
  • Backup encryption enabled (iCloud/Google One with 2FA)

:shield: App Permissions

What to review:

  1. Location Access

    • iOS: Settings → Privacy & Security → Location Services
    • Android: Settings → Privacy → Permission manager → Location

    Set apps to “While Using” instead of “Always” where possible. Remove location access from apps that do not need it (games, calculators, etc.)

  2. Camera & Microphone

    • iOS: Settings → Privacy & Security → Camera/Microphone
    • Android: Settings → Privacy → Permission manager

    Review which apps have access. Disable for apps that do not require it.

  3. Contacts, Photos, Files

    • Grant access only to apps that genuinely need it
    • Use “Selected Photos” instead of “All Photos” when available (iOS 14+)
  4. Tracking

    • iOS: Settings → Privacy & Security → Tracking → Disable “Allow Apps to Request to Track”
    • Android: Settings → Privacy → Ads → Delete advertising ID / Opt out of ads personalization

:white_check_mark: Checklist:

  • Location set to “While Using” for most apps
  • Camera/mic access reviewed and restricted
  • App tracking disabled (iOS) or ad ID reset (Android)
  • Unused apps deleted

:mobile_phone_with_arrow: App Installation Best Practices

  • Only install from official stores: App Store (iOS) or Google Play (Android)
  • Check app permissions before installing: Does a flashlight app need your contacts?
  • Read recent reviews: Look for security or privacy complaints
  • Keep apps updated: Enable automatic updates
  • Avoid sideloading: Do not install APKs from unknown sources unless absolutely necessary

Part 2: Computer Security (Windows, Mac, Linux)

:locked: Full Disk Encryption

Why: If your device is lost or stolen, encryption prevents attackers from accessing your data.

OS Tool How to Enable
Windows BitLocker (Pro/Enterprise) or Device Encryption (Home) Settings → Privacy & Security → Device Encryption → On
Mac FileVault System Settings → Privacy & Security → FileVault → Turn On
Linux LUKS (during install) or fscrypt Best enabled during OS installation

:warning: Critical: Save your recovery key in a secure location (password manager, printed copy in safe). If you lose it, your data is unrecoverable.

:white_check_mark: Checklist:

  • Full disk encryption enabled
  • Recovery key backed up securely
  • Encryption status verified (may take hours to complete initially)

:bust_in_silhouette: User Accounts

Best practices:

  1. Use a standard account for daily use (not administrator)

    • Windows: Settings → Accounts → Family & other users → Add account
    • Mac: System Settings → Users & Groups → Add account (set as “Standard”)
    • Linux: Create non-root user during installation
  2. Enable a strong administrator password

    • Use 12+ characters with mixed case, numbers, symbols
    • Never use the same password across multiple accounts
  3. Disable or password-protect guest accounts

:white_check_mark: Checklist:

  • Daily account is “Standard” not “Administrator”
  • Admin password is strong and unique
  • Guest accounts disabled or secured
  • Automatic login disabled

:counterclockwise_arrows_button: System Updates

Keep your OS and software current:

OS How to Enable Automatic Updates
Windows Settings → Windows Update → Advanced → Automatic (recommended)
Mac System Settings → General → Software Update → Automatic Updates
Linux Enable unattended-upgrades (Debian/Ubuntu): sudo apt install unattended-upgrades

Also update:

  • Web browsers (Chrome, Firefox, Safari, Edge)
  • Productivity software (Office, LibreOffice)
  • Security software

:white_check_mark: Checklist:

  • Automatic OS updates enabled
  • Browser set to auto-update
  • Critical software updates applied within 7 days of release

Part 3: Browser Security

:detective: Private Browsing

What it does: Prevents local history, cookies, and form data from being saved on your device.

Browser Private Mode Keyboard Shortcut
Chrome Incognito Ctrl+Shift+N (Win/Linux) or Cmd+Shift+N (Mac)
Firefox Private Window Ctrl+Shift+P (Win/Linux) or Cmd+Shift+P (Mac)
Safari Private Browsing Cmd+Shift+N (Mac)
Edge InPrivate Ctrl+Shift+N (Win)

Limitations: Private browsing does NOT hide your activity from:

  • Your internet service provider (ISP)
  • Your employer/school network
  • Websites you visit
  • Law enforcement with appropriate legal process

:white_check_mark: Checklist:

  • Use private browsing for sensitive searches
  • Understand limitations (not anonymous from network observers)

:cookie: Cookie Management

Recommended settings:

Chrome:
Settings → Privacy and Security → Cookies and other site data

  • Select “Block third-party cookies”
  • Enable “Clear cookies and site data when you close all windows” (optional)

Firefox:
Settings → Privacy & Security → Enhanced Tracking Protection

  • Set to “Strict”
  • Enable “Delete cookies and site data when Firefox is closed” (optional)

Safari:
Settings → Privacy

  • Enable “Prevent cross-site tracking”
  • Enable “Block all cookies” (may break some sites)

:white_check_mark: Checklist:

  • Third-party cookies blocked
  • Tracking protection enabled
  • Consider auto-clear on close for sensitive use

:prohibited: Tracker Blocking

Free tools:

Tool Type Platforms Notes
uBlock Origin Browser extension Chrome, Firefox, Edge, Safari Most efficient ad/tracker blocker
Privacy Badger Browser extension Chrome, Firefox, Edge EFF’s tracker blocker, learns automatically
DuckDuckGo Privacy Essentials Browser extension + search All major browsers Includes tracker blocking + private search

Installation:

  1. Visit your browser’s extension store
  2. Search for “uBlock Origin” (by Raymond Hill)
  3. Click “Add to Browser”
  4. No configuration needed—works out of the box

:white_check_mark: Checklist:

  • uBlock Origin installed
  • Privacy Badger installed (optional, complementary)
  • Extensions kept updated

Part 4: Essential Security Apps and Tools (Free)

:key: Password Managers

Why: Reusing passwords is one of the biggest security risks. A password manager generates and stores unique passwords for every account.

Tool Platform Cost Notes
Bitwarden All platforms Free (premium optional) Open source, highly recommended
KeePassXC Windows, Mac, Linux Free, open source Local storage, no cloud sync
Built-in (iCloud Keychain / Google Password Manager) iOS/Android Free Convenient but less portable

Getting started with Bitwarden:

  1. Visit bitwarden.com and create a free account
  2. Install browser extension and mobile app
  3. Create a strong master password (write it down and store securely)
  4. Enable two-factor authentication (2FA)
  5. Start changing your most important passwords (email, banking, social media)

:white_check_mark: Checklist:

  • Password manager installed on all devices
  • Master password is strong and memorized
  • 2FA enabled on password manager
  • Critical accounts updated with unique passwords

:shield: Antivirus / Anti-Malware

Windows:

  • Microsoft Defender (built-in, free) — Now ranks among top paid solutions in independent tests
  • Ensure it is enabled: Settings → Privacy & Security → Windows Security → Virus & threat protection

Mac:

  • macOS has built-in protections (Gatekeeper, XProtect)
  • For additional protection: Malwarebytes for Mac (free version available)

Linux:

  • Generally lower risk, but consider ClamAV for scanning files that may be shared with Windows users

Mobile:

  • iOS: No antivirus needed (App Store sandboxing is effective)
  • Android: Stick to Google Play Store; avoid “antivirus” apps that are often scams

:white_check_mark: Checklist:

  • Windows Defender enabled and updated (Windows)
  • Malwarebytes installed (Mac, optional)
  • Avoid shady “antivirus” apps on mobile

:locked_with_key: Two-Factor Authentication (2FA) Apps

Why: 2FA adds a second verification step beyond your password.

Tool Platform Cost Notes
Authy All platforms Free Cloud backup, multi-device
Google Authenticator iOS, Android Free Simple, widely supported
Raivo OTP iOS Free, open source Local storage, iCloud backup optional
Aegis Authenticator Android Free, open source Local storage, encrypted backups

Setup priority:

  1. Email accounts (primary email is the key to resetting everything else)
  2. Password manager
  3. Financial accounts
  4. Social media
  5. Cloud storage

:white_check_mark: Checklist:

  • 2FA app installed
  • 2FA enabled on email account(s)
  • 2FA enabled on password manager
  • Backup codes saved securely

:globe_with_meridians: VPN (Virtual Private Network)

When to use:

  • On public Wi-Fi (cafes, airports, hotels)
  • When you want to hide browsing from your ISP
  • When traveling in restrictive regions

Free options (with caveats):

  • Proton VPN — Free tier with unlimited data, no ads, based in Switzerland
  • Windscribe — Free tier with 10GB/month limit

:warning: Warning: Avoid “free unlimited VPN” services—they often sell your data. Paid services like Mullvad, IVPN, or Proton VPN have transparent privacy policies.

:white_check_mark: Checklist:

  • VPN installed if you use public Wi-Fi regularly
  • Understand that VPN ≠ anonymity (you are still visible to websites)
  • Avoid free VPNs with unclear business models

Part 5: What NOT to Do (Common Mistakes)

:cross_mark: Password Mistakes

  • Do not reuse passwords across multiple accounts
  • Do not use personal information (birthdays, pet names, addresses)
  • Do not store passwords in plain text (Notes app, spreadsheets, sticky notes)
  • Do not share passwords via email, SMS, or messaging apps

:cross_mark: Update Mistakes

  • Do not ignore update notifications for weeks or months
  • Do not disable automatic updates unless you have a specific reason
  • Do not use unsupported software (Windows 7, macOS versions older than 3 years)

:cross_mark: App & Download Mistakes

  • Do not sideload apps from unknown sources (especially on Android)
  • Do not click “Install” on pop-up ads claiming your device is infected
  • Do not grant admin/root access to apps unless you understand why it is needed
  • Do not install browser extensions from unknown developers

:cross_mark: Network Mistakes

  • Do not use public Wi-Fi without a VPN for sensitive activities (banking, email)
  • Do not leave Wi-Fi or Bluetooth on when not in use (tracking risk)
  • Do not connect to networks with names like “Free Airport Wi-Fi” without verification

:cross_mark: Phishing Mistakes

  • Do not click links in unexpected emails or texts, even from known contacts
  • Do not enter passwords on pages you reached via email links
  • Do not trust caller ID (it can be spoofed)
  • Do not rush—scammers create urgency to bypass your judgment

:cross_mark: Backup Mistakes

  • Do not rely on a single backup (device + cloud is ideal)
  • Do not skip encryption on backups containing sensitive data
  • Do not forget to test restoration periodically

Part 6: Quick Reference Checklists

:mobile_phone: Phone Security Checklist

☐ Strong passcode (6+ digits, not obvious patterns)
☐ Biometrics enabled (understand legal implications)
☐ Auto-lock set to 1 minute or less
☐ Full disk encryption verified (enabled by default with passcode)
☐ App permissions reviewed (location, camera, mic, contacts)
☐ App tracking disabled (iOS) or ad ID reset (Android)
☐ Only official app stores used
☐ Automatic updates enabled
☐ Password manager installed
☐ 2FA enabled on critical accounts
☐ VPN installed for public Wi-Fi use
☐ Unused apps deleted

:laptop: Computer Security Checklist

☐ Full disk encryption enabled (BitLocker/FileVault/LUKS)
☐ Recovery key backed up securely
☐ Standard user account for daily use (not admin)
☐ Strong administrator password
☐ Automatic OS updates enabled
☐ Browser set to auto-update
☐ Third-party cookies blocked
☐ Tracker blocker installed (uBlock Origin)
☐ Antivirus enabled (Windows Defender / Malwarebytes)
☐ Password manager installed
☐ 2FA enabled on critical accounts
☐ Regular backups configured

:globe_with_meridians: Browser Security Checklist

☐ Private browsing used for sensitive searches
☐ Third-party cookies blocked
☐ Tracking protection enabled (Strict mode in Firefox)
☐ uBlock Origin installed
☐ Privacy Badger installed (optional)
☐ Passwords not saved in browser (use password manager instead)
☐ Extensions reviewed and minimized
☐ Browser updated to latest version

Part 7: Sources and Further Reading

Credible Sources Referenced

Recommended Ongoing Education

For Advanced Users


Conclusion

Device security is not a one-time task—it is an ongoing practice. Start with the high-impact items (strong passcode, encryption, password manager, 2FA) and work through the checklists over time.

Remember:

  • Security is about risk reduction, not perfection
  • Small, consistent improvements compound over time
  • Share this knowledge with friends and family

The next tutorial in this series will cover Secure Communications—encrypting your messages, calls, and emails.


This tutorial was created by Vivaed as part of an ongoing OPSEC education series. Content is based on publicly available guidance from security organizations and platform documentation as of March 2026.

:warning: Legal Notice: This guide is for educational purposes. Always comply with applicable laws and regulations in your jurisdiction. Security tools should be used to protect your rights and privacy, not to facilitate illegal activities.

9 Likes

OPSEC Tutorial #2: Phone Security Lockdown - iOS & Android

Difficulty: Beginner-Intermediate
Time to Complete: 30-45 minutes


Overview

Your phone is the single biggest surveillance device you carry. This tutorial covers comprehensive phone security for both iOS and Android.


IMMEDIATE ACTIONS (Do These Today)

1. Enable Strong Authentication

  • Use 6+ digit passcode (not 4 digits)
  • Enable biometric lock (fingerprint/face)
  • Disable lockscreen notifications (prevents preview)
  • Set auto-lock to 1 minute or less

2. Review App Permissions

  • Settings > Privacy > check each category
  • Revoke microphone, camera, location for apps that don’t need them
  • Pay special attention to social media apps

3. Update Everything

  • Install latest OS updates
  • Update all apps
  • Enable automatic updates

iOS-SPECIFIC HARDENING

Privacy Settings:

  • Settings > Privacy > Analytics > Disable “Share iPhone Analytics”
  • Settings > Privacy > Location Services > System Services > Disable “Important Locations”
  • Settings > Safari > Clear History and Website Data
  • Settings > Safari > Block All Cookies (optional, breaks some sites)

App Store:

  • Settings > iTunes & App Stores > Disable “Automatic Downloads”
  • Review app purchases/subscriptions regularly

Find My iPhone:

  • Keep enabled (anti-theft)
  • But disable “Find My network” if concerned about location tracking

ANDROID-SPECIFIC HARDENING

Privacy Settings:

  • Settings > Privacy > Permission manager > Review all permissions
  • Settings > Google > Ads > Opt out of Ads Personalization
  • Settings > Google > Location > Disable “Location History”
  • Developer Options > Disable USB debugging (when not in use)

App Sources:

  • Settings > Security > Disable “Install unknown apps” for all apps
  • Only use Google Play Store (or F-Droid for privacy-focused)

Google Services:

  • Consider limiting Google account sync
  • Use alternative browsers (Firefox, Brave)
  • Consider de-Googling for advanced users

APP RECOMMENDATIONS

Secure Messaging:

  • Signal (end-to-end encrypted)
  • Session (no phone number required)
  • Wire (business-focused)

Secure Browser:

  • Firefox Focus (iOS/Android)
  • Brave (blocks trackers by default)
  • Tor Browser (maximum anonymity)

Password Manager:

  • Bitwarden (open source)
  • 1Password (commercial)
  • KeePassXC (local storage)

AVOID:

  • Facebook, Instagram (data harvesters)
  • TikTok (Chinese surveillance)
  • Apps with excessive permissions

LOCATION TRACKING PROTECTION

Reduce Location Exposure:

  • Disable location services when not needed
  • Use “While Using App” instead of “Always”
  • Disable geotagging in camera settings
  • Use offline maps when possible

Advanced:

  • Faraday bag for complete signal blocking
  • Burner phone for high-risk activities
  • Leave phone at home when possible

CALL & TEXT SECURITY

SMS is NOT Secure:

  • SMS can be intercepted
  • Use Signal for all communications
  • Enable disappearing messages

Call Security:

  • Signal calls are encrypted
  • WhatsApp calls are encrypted (but Meta-owned)
  • Avoid regular calls for sensitive conversations

Voicemail:

  • Set a strong voicemail PIN
  • Many carriers default to weak/blank PINs

PHYSICAL SECURITY

When Phone is Seized:

  • Biometric lock can be forced (finger/face)
  • Passcode has stronger legal protection (5th Amendment)
  • Consider disabling biometrics in high-risk situations

Power Off:

  • Some phones require passcode after reboot
  • Use this feature for additional protection

Stolen Phone:

  • Remote wipe capability (Find My / Find My Device)
  • Report to carrier (IMEI blacklist)
  • Change all passwords immediately

DETECTING COMPROMISE

Warning Signs:

  • Battery draining faster than usual
  • Phone getting hot when idle
  • Unusual data usage
  • Apps crashing frequently
  • Strange background noises on calls
  • Phone turning on/off by itself

If Compromised:

  • Backup important data
  • Factory reset
  • Change all passwords from different device
  • Monitor accounts for suspicious activity

This is Tutorial #2 of the OPSEC Series.

Sources: EFF Surveillance Self-Defense, Electronic Privacy Information Center, NIST Mobile Security Guidelines

1 Like

OPSEC Tutorial #4: Password Security

Strong passwords are critical for account security.

Key Points:

  • Use 16+ character passwords
  • Unique password for every account
  • Use a password manager (Bitwarden, 1Password)
  • Enable 2FA everywhere possible
  • Hardware keys are best (YubiKey)
  • Authenticator apps are good (Raivo, 2FAS)
  • Avoid SMS when possible

OPSEC Series - Tutorial #4

2 Likes

OPSEC Tutorial #5: Browser Fingerprinting & Anti-Detection TechniquesDifficulty: Advanced

Time to Complete: 45-60 minutes—### OverviewEven with cookies blocked and trackers stopped, websites can identify you through browser fingerprinting. This tutorial explains fingerprinting and how to minimize your digital fingerprint.—### WHAT IS BROWSER FINGERPRINTING?Definition: Collecting information about your browser and device to create a unique identifier.Data Points Collected:- User agent string (browser version, OS)- Screen resolution and color depth- Installed fonts- Browser plugins and extensions- Time zone and language settings- Canvas rendering (graphics fingerprint)- WebGL fingerprint- Audio context fingerprint- Hardware concurrency (CPU cores)- Device memory- Touch supportUniqueness: Studies show 90%+ of browsers have unique fingerprints.—### FINGERPRINTING TECHNIQUESCanvas Fingerprinting:- Website draws hidden image- Your GPU renders it slightly differently- Result is unique to your hardware- Nearly impossible to spoof completelyWebGL Fingerprinting:- Similar to canvas but uses 3D graphics- Reveals GPU model and driver details- Very difficult to maskFont Detection:- Website checks which fonts you have installed- Font combinations are highly unique- Changes with every font install/uninstallAudio Fingerprinting:- Tests audio processing capabilities- Unique to your sound hardware- Relatively new technique—### PROTECTION METHODSFirefox Hardening (about:config):privacy.resistFingerprinting = trueprivacy.trackingprotection.enabled = trueprivacy.window.name.update.enabled = falsewebgl.disabled = truemedia.peerconnection.enabled = falseBrowser Extensions:- CanvasBlocker (randomizes canvas output)- Chameleon (Firefox fingerprint spoofing)- Privacy Possum (decoy data)- User-Agent Switcher (changes browser identity)Best Browsers for Anti-Fingerprinting:| Browser | Protection Level | Notes ||---------|-----------------|-------|| Tor Browser | Maximum | All users look identical || Firefox (hardened) | High | Requires configuration || Brave | Medium-High | Built-in protection || Mullvad Browser | Maximum | From Tor Project team || Chrome/Edge | Poor | Actively fingerprint |—### TOR BROWSER (Maximum Protection)Why Tor Browser:- All users have identical fingerprint- Automatically resists fingerprinting- Routes traffic through Tor network- No additional configuration neededLimitations:- Slower than regular browsing- Some websites block Tor- Not for everyday use (banking, etc.)- Window size affects fingerprintBest Practices:- Don’t maximize window (use default size)- Don’t install additional extensions- Keep browser updated- Use security slider (set to Safest for maximum)—### PRACTICAL APPROACHTiered Strategy:****Tier 1 - High Security (Tor Browser):- Sensitive research- Whistleblowing activities- Accessing censored content- Maximum anonymity neededTier 2 - Daily Driver (Hardened Firefox):- Regular browsing- Social media- Shopping- Good balance of privacy/usabilityTier 3 - Isolated (Separate Browser/Profile):- Banking and financial- Government services- Sites requiring full functionality- Keep completely separate—### ADDITIONAL PROTECTIONVirtual Machines:- Isolate browsing from main system- Different fingerprint per VM- Can snapshot and restore- Resource intensiveBrowser Profiles:- Separate profiles for different activities- Different extensions per profile- Compartmentalization reduces trackingRegular Reset:- Clear all browser data regularly- Reinstall browser periodically- Change fingerprint over time- Use fresh profiles—### DETECTING FINGERPRINTINGTools:- Panopticlick (panopticlick.eff.org)- Cover Your Tracks (coveryourtracks.eff.org)- BrowserLeaks.com (comprehensive testing)- Am I Unique? (amiunique.org)What to Look For:- How unique is your fingerprint- Which techniques are being used- What information is exposed- Comparison to other users—### QUICK REFERENCE: Anti-Fingerprinting ChecklistImmediate Actions:- Install privacy-focused browser- Enable anti-fingerprinting settings- Install CanvasBlocker extension- Disable WebGL if not needed- Test fingerprint at browserleaks.comOngoing Practices:- Keep browser updated- Don’t install unnecessary extensions- Use Tor for sensitive activities- Separate browsers for different purposes- Regular fingerprint testing—*OPSEC Series - Tutorial #5 (Browser Fingerprinting)*Sources: EFF Cover Your Tracks, W3C Fingerprinting Guidance, Tor Project Documentation, Academic Research on Browser Fingerprinting

1 Like

OPSEC Tutorial #6: Social Media Lockdown & Privacy

Difficulty: Beginner
Time to Complete: 45-60 minutes


Overview

Social media platforms collect extensive data and can be vectors for privacy breaches. This tutorial covers locking down your social media presence.


AUDIT YOUR PRESENCE

Search for Yourself:

  • Google your name, email, phone number, username
  • Search each platform directly
  • Note all accounts (including forgotten ones)

Decide Your Strategy:

  • Complete Deletion (maximum privacy)
  • Minimal Presence (keep 1-2 locked down)
  • Compartmentalized (separate personal/professional)
  • Anonymous (pseudonyms, no personal info)

PRIVACY SETTINGS BY PLATFORM

Facebook:

  • Privacy: Friends only (not Public)
  • Limit past posts
  • Disable facial recognition
  • Turn off location history
  • Review tags before posting
  • Hide friends list
  • Disable ad personalization

Instagram:

  • Set account to Private
  • Hide story from specific people
  • Disable activity status
  • Turn off location tagging

Twitter/X:

  • Protect your tweets
  • Disable photo tagging
  • Turn off location information
  • Limit who can reply

LinkedIn:

  • Set profile to private mode
  • Hide connections
  • Disable activity broadcasts

CONTENT CLEANUP

Delete or Hide:

  • Posts with personal information
  • Photos showing home/location
  • Check-ins and location data
  • Photos of family (especially children)
  • Old posts that no longer represent you

Review:

  • Tagged photos (untag or request removal)
  • Friend/follower lists (remove unknown accounts)
  • Connected apps (revoke unnecessary access)

ONGOING PRACTICES

Before Posting:

  • Does this reveal my location?
  • Does this show my home/vehicle?
  • Am I revealing routine/schedule?
  • Could this be used for social engineering?

Regular Maintenance:

  • Monthly privacy setting review
  • Quarterly friend/follower audit
  • Annual content cleanup

OPSEC Series - Tutorial #6 (Social Media Privacy)

Sources: EFF Surveillance Self-Defense, Privacy International, Platform Privacy Policies

OPSEC Tutorial #8: Document Storage & Secure Shredding

Difficulty: Beginner
Time to Complete: 30-45 minutes


Overview

Proper document storage and destruction protects your privacy and prevents identity theft.


HOW LONG TO KEEP DOCUMENTS

Keep Indefinitely:

  • Birth certificates
  • Marriage/divorce certificates
  • Citizenship papers
  • Military discharge (DD-214)
  • Social Security cards
  • Passports (expired)

Keep 7 Years:

  • Tax returns and supporting docs
  • Bank statements
  • Investment records
  • Loan documents (after payoff)
  • Medical bills

Keep 1-3 Years:

  • Utility bills (1 year)
  • Credit card statements (1 year)
  • Medical records (3+ years)
  • Warranties (life of product)

Shred Immediately:

  • Pre-approved credit offers
  • Old statements
  • Documents with SSN
  • Documents with account numbers
  • Junk mail with personal info

STORAGE OPTIONS

Fireproof Home Safe:

  • Fire rating: 1 hour at 1700F minimum
  • Water resistance
  • Bolt to floor/wall
  • Hidden location
  • Cost: $100-500+

Safe Deposit Box:

  • Maximum security
  • Off-site protection
  • Annual fee: $50-200
  • Limited access hours

SHREDDING

Shredder Types:

  • Strip-cut: Low security (avoid)
  • Cross-cut: Medium (minimum for home)
  • Micro-cut: High (recommended)

Security Levels:

  • P-3/P-4: Personal documents
  • P-5: Sensitive data
  • P-6/P-7: Maximum security

Alternatives:

  • Professional shredding services
  • Community shred days (free)
  • Burn (if legal/safe)

DIGITAL STORAGE

Best Practices:

  • Scan at 300 DPI minimum
  • Save as searchable PDF
  • Encrypt cloud storage
  • 3-2-1 backup rule

OPSEC Series - Tutorial #8 (Document Security)

Sources: IRS Publication 552, FTC Identity Theft Guidelines, DIN 66399 Standards

OPSEC Tutorial #13: Username & Email Hygiene

Difficulty: Beginner
Time to Complete: 45-60 minutes


Overview

Your usernames and email addresses are key identifiers that can track you across the internet and link your accounts.


RISKS

Tracking and Profiling:

  • Same username across sites = easy to link accounts
  • Email address used for tracking across services
  • Data brokers compile profiles based on identifiers

Attack Vectors:

  • Username enumeration (finding your accounts)
  • Email-based phishing
  • Password reset attacks
  • Social engineering

EMAIL STRATEGY

Recommended Structure:

Type Purpose
Primary Banking, government, critical
Personal Friends, family
Shopping Online purchases
Newsletters Subscriptions
Disposable One-time use

Privacy Providers:

  • Proton Mail (Switzerland, free tier)
  • Tutanota (Germany, free tier)
  • Mailbox.org (Germany, $1/mo)
  • Fastmail (Australia, $3/mo)

EMAIL ALIASES

Services:

  • SimpleLogin (Free-$10/mo)
  • AnonAddy (Free-$12/mo)
  • Apple Hide My Email (iCloud+)
  • Firefox Relay (Free-$1/mo)

Benefits:

  • Disable alias if spam starts
  • Track which service sold your data
  • Real email never exposed

USERNAME BEST PRACTICES

DO:

  • Use different usernames for different contexts
  • Generate random usernames for non-critical accounts
  • Use password manager to track

DONT:

  • Use real name unless required
  • Use same username across sites
  • Include personal info (birth year, location)

ACCOUNT AUDIT

  1. Search your email for “welcome”, “verify”
  2. Review password manager logins
  3. Google your usernames
  4. Check haveibeenpwned.com
  5. Delete unused accounts

OPSEC Series - Tutorial #13 (Email Hygiene)

Sources: EFF, Privacy International, Email Provider Documentation