To protect yourself and your information, please follow the security practices below.
For more detailed information there is an entire page dedicated to Open Source Security and Intelligence here: OSintSec .
We are committed to fostering a safe and secure online environment for all. Protect yourself and your digital identity by following these detailed guidelines:
1. Protect Your Identity
- NEVER use your full or real name on online profiles. Always choose a pseudonym or alias instead.
- Avoid using US based services or allowing US based companies access to your confidential activities.
- Use an anonymous, privacy-focused, non US based email provider like ProtonMail , Startmail , Tuta or Mailfence for registrations and communication.
- Consider using a virtual service to restrict access to your actual phone number. Several options are Hushed , Burner Freepone.io , Freezvon , Texttasy even Google Voice for online registration or sharing. Many of these are NOT anonymous however they will help to hide your actual phone number from scammers, marketers or maybe the IRS.
- Consider using non cached, stored, tracked search engines such as DuckDuckGo or Startpage .
2. Strengthen Your Digital Security
- Use Strong Passwords:
- Enable Two-Factor Authentication (2FA):
- Activate 2FA for all accounts, using an authenticator app like Authy or Google Authenticator.
3. Browse Anonymously
- Use privacy-centric browsers like Brave or Firefox.
- Enable browser extensions to block ads and trackers, such as uBlock Origin or Privacy Badger.
- Use a Virtual Private Network (VPN) to encrypt your internet connection and mask your location. Reputable options include NordVPN or ProtonVPN.
4. Safeguard Personal Information/Activity
- A cell phone is your biggest security risk that allows all technologies, corporations, law enforcement or intelligence agencies to track your activities and movements.
- Do NOT install apps on your phone unless absolutely necessary!
- Never share sensitive information like your full name, address, telephone number, or financial details on any platform.
- Be cautious about sharing information, photos, or documents that could reveal your or your family members, identity, school, work site, work location, personal location, or any other personal/private details.
5. Avoid Phishing and Scams
- Scrutinize email addresses and links before clicking. Hover over links to view their actual destination.
- Use tools like Have I Been Pwned to check if your email or account details have been compromised.
- Avoid unsolicited messages that request sensitive information or encourage you to download attachments.
6. Maintain Device and Account Security
- Purchase a Faraday Bag to keep or store your phone while you are traveling or commuting to keep your movements from being tracked by cell towers.
- Keep all software, operating systems, and apps updated to the latest versions.
- Regularly review and adjust your privacy settings on platforms you use.
- Only allow GEO location for services for specific applications, only while using the applications.
7. Think Before You Share
- Assume that anything you post online could become public. Refrain from sharing content you wouldn’t want widely disseminated.
- Use secure messaging apps like Session or Briar for private and anonymous communication.
8. Monitor Your Digital Footprint
- Periodically search for your name or username online to see what information is publicly available.
- Use tools like DeleteMe to remove personal information from data brokers.
9. Immediately Block Suspicious Activity
- Immediately report any suspicious messages, profiles, or content to the community moderators.
- Block any user who engages in harassment, scams, or other harmful behavior.
10. Educate Yourself
- Stay informed about the latest cybersecurity threats and scams. Trusted sources include Krebs on Security , Cybersecurity & Infrastructure Security Agency (CISA) , Secure Messaging Apps.