![]() ![]() If you follow this, technically you can use any browser! Y browser has a function that warns you from accidentally sharing your home address on forms, but ultimately this is up to you to control by being vigilant and no single tool or solution will ever be a silver bullet for security. Here's a good answer to explains why it's good for your specific threat model and also teaches the mindset of OPSEC: You should use X browser because it is the most secure. Here's a bad answer (it depends on trusting that user entirely and doesn't help you learn anything on your own) that you should report immediately: I don't want to have anyone find my home address on the internet while I use it. Here's an example of a good question that explains the threat model without giving too much private information: Here's an example of a bad question that is far too vague to explain the threat model first: "I want to buy drugs on the internet").ĭon't post without mentioning your threat model, unless it's a post about how to threat model.Ĭongratulations on your first post in r/opsec! OPSEC is a mindset and thought process, not a single solution - meaning, when asking a question it's a good idea to word it in a way that allows others to teach you the mindset rather than a single solution. "you can't get arrested if you use Tor")ĭon't ask for help or help others in illicit and unlawful activities (e.g. VPN, bitcoin, Signal) when the threat model isn't clearĭon't give bad, ridiculous, or misleading advice (e.g. ![]() If you proceed to give advice when the OP has not explained their threat model, you will be banned.ĭon't offer single tool solutions (e.g. /r/privacy - Dedicated to the intersection of technology, privacy, and freedom in the digital world.ĭon't post without reading the rules thread or your post will be removed, and you may be banned.ĭon't give advice without knowing the user's threat model first./r/netsec - A community for technical news and discussion of information security and closely related topics.The Operations Security Professional's Association (OSPA)ĭefense Security Service OPSEC Awareness Course The OPSEC Two-Step: Know what to protect and know how to protect it. Understand your own risk/threat model: Who is your adversary? What needs protecting? Identify the information you need to protect It includes elements of INFOSEC, APPSEC, NETSEC, COMSEC, PHYSEC, and (CO)INTEL. ![]() OPSEC isn't a list of rules, and it's not as simple as using a VPN and keeping your mouth shut. This includes law enforcement, computer and network security, home safety, travel, and so much more. It's also a mindset that can be applied to any mission or plan.Īlthough the term originated in the military, OPSEC is now used for so much more. It's a systematic and proven process that we can use to deny adversaries information they need to do us harm or interrupt our plans. Operations Security, or OPSEC, OPSEC is about minimizing attack surfaces and single points of failure through proper habits and policies. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |