> The following is a living doc about resources for personal privacy best practices in 2025. This is particularly important if you are an activist, journalist, dissident, free-thinker, active in crypto or just a socially aware human in 2025. This content is strategically prompted by myself. I was trained by infosec researchers on OSINT, social engineering and cryptocurrencies in 2017 and was a photojournalist working occasionally in authoritarian regimes prior to that period (it's why I joined a hacker space, my personal opsec was terrible and I was clueless.) > > We'll start with the basics and go from there. [Please email me](mailto:[email protected]) with further questions or resource needs. Additional Links are here: [[Privacy Resource Page]] ## What is Personal OpSec? **Operational Security (OpSec)** refers to the practice of protecting sensitive information from adversaries. Personal OpSec is an individual’s approach to safeguarding their digital, financial, and physical security. It involves strategies to minimize exposure, prevent data leaks, and reduce risks from surveillance, doxxing, or targeted attacks. For activists, blockchain users, dissidents, and journalists, OpSec is **not just about cybersecurity—it’s about survival, anonymity, and control over your own narrative.** ### Why OpSec is Critical in 2025 (Especially in America) The 2025 political landscape in the U.S. is marked by escalating **authoritarian surveillance, corporate overreach, and political extremism**. Several factors are contributing to an **increased need for personal privacy**: #### **1. Escalating Government & Corporate Surveillance** - **Expansion of AI-powered monitoring:** Social media, blockchain transactions, and even **private messages** are increasingly scanned for dissenting opinions. - **CBDCs & Banking Control:** Governments worldwide, including the U.S., are exploring Central Bank Digital Currencies (CBDCs), which can provide unprecedented financial surveillance. - **Legislation Against Encryption & Privacy Tools:** Bills like the RESTRICT Act and potential anti-privacy laws are targeting **VPNs, encrypted communications, and non-KYC financial tools**. #### **2. Increased Crackdowns on Dissent & Journalism** - **Prosecution of Whistleblowers & Journalists:** We’re seeing a rise in **legal action against investigative journalists, whistleblowers, and leakers**. - **Targeting of Political Dissidents:** Those protesting government policies (climate activists, labor organizers, privacy advocates, blockchain developers, etc.) are being labeled as threats to "national security." - **Expansion of “Domestic Terrorism” Definitions:** The DHS and other agencies have broadened the definition of “domestic terrorism” to include more **activist movements**, allowing for broader surveillance and financial targeting. #### **3. Blockchain Surveillance & Crypto Crackdowns** - **KYC Enforcement & Wallet Blacklisting:** Government agencies are pressuring centralized exchanges to **flag and freeze funds** associated with politically inconvenient figures. - **De-anonymization of Blockchain Users:** Chainalysis and other blockchain forensic tools are being used to **trace pseudonymous crypto wallets** back to real-world identities. - **Legal & Financial Attacks on Privacy Coins:** Monero (XMR) and other privacy tools are being **delisted from exchanges**, while developers of privacy-focused tech (e.g., Tornado Cash) have been arrested. #### **4. Corporate & State Collusion in Data Collection** - **Big Tech Selling User Data:** Google, Apple, Meta, and Amazon **work directly with law enforcement** and intelligence agencies, often without warrants. - **Cloud-Based Communications at Risk:** If you’re using **Gmail, Slack, Zoom, or Google Drive**, assume that your conversations and data are **not private**. --- ### **OpSec Strategies for 2025** If you are an **activist, blockchain user, dissident, or journalist**, **your personal security is your responsibility.** Here are critical steps to **harden your OpSec**: #### **1. Digital Security & Communications** - **Use Encrypted Messaging Apps:** Signal (with safety numbers verified), **Session**, or Element (on a self-hosted Matrix server). - **Avoid Mainstream Email Providers:** Use ProtonMail, Tuta, or CTemplar (self-hosted email is even better). - **Use a Secure OS & Browser:** - GrapheneOS or CalyxOS (for mobile) - **Firefox with hardened privacy settings or Brave** (avoid Chrome at all costs) - **Tor Browser** for sensitive research - **Use a VPN & Tor:** ProtonVPN, Mullvad, or IVPN. Do **not** use free VPNs. - **Secure Your Social Media:** - **Use pseudonyms** when possible. - **Compartmentalize identities** between activism, work, and personal life. - **Delete old accounts** and scrub metadata from images before posting. #### **2. Financial Privacy & Crypto Hygiene** - **Use Privacy-Focused Wallets & Tools:** - **Wasabi Wallet or Samourai Wallet** (Bitcoin coinjoin tools) - **Phoenix or Mutiny Wallet** (Lightning for fast, private transactions) - **Monero (XMR) & Haven Protocol** for **truly private crypto transactions** - **Avoid KYC Exchanges:** Use **non-KYC peer-to-peer platforms** like Bisq, Robosats, or Hodl Hodl. - **Use Privacy-Preserving Payment Methods:** Cash, prepaid gift cards, or ZCash. #### **3. Device & Account Security** - **Enable Multi-Factor Authentication (MFA):** Preferably **hardware keys like YubiKey** over SMS-based authentication. - **Use Burner Phones for Activism & Journalism:** Do **not** register activism-related accounts with personal numbers. - **Compartmentalize Devices:** Keep **separate devices for work, activism, and personal use**. - **Disable Biometrics:** Face ID and fingerprints can be forced by police during detainment. #### **4. Physical & Social Security** - **Be Mindful of Geo-Tracking:** Disable **location tracking** on all apps and use **Faraday bags** when needed. Be cautious of technology in newer cars that tracks locations at all times. - **Maintain Secure Housing & Meeting Spaces:** Assume that **smart home devices, Ring cameras, and Alexa** are compromised. - **Practice Social Engineering Awareness:** Be cautious about who you trust—**infiltration is real** ### **Final Thoughts** **Privacy is a human right**, but in 2025, it’s a **necessity for survival** if you operate in activism, blockchain, journalism, or dissident movements. The political climate in America is shifting toward **corporate-state surveillance, financial control, and the suppression of free speech**. OpSec is about **taking control of your personal security before someone else does.** The more you implement now, the harder it will be for **authorities, corporations, or adversaries to track, silence, or financially cut you off**. The best time to start taking privacy seriously was yesterday. The second-best time is today. --- ## **Cryptocurrency Security Best Practices for Beginners** If you’re new to using cryptocurrency and digital wallets, **security is your responsibility.** Unlike banks, **there is no customer support for lost funds** in crypto. Once your assets are compromised, **they are gone.** Below is a guide to best practices and an explanation of **self-custody wallets vs. centralized exchanges (CEXs).** ### **1. Understanding the Difference: Self-Custody vs. CEX** **There are two main ways to store crypto:** | Feature | **Self-Custody Wallets** | **Centralized Exchanges (CEXs)** | | ----------------------- | ---------------------------------------- | -------------------------------------------------- | | **Who Controls Funds?** | **You** (100% control) | **The Exchange** (3rd party) | | **Private Keys?** | You **own and manage** your private keys | Exchange **holds** private keys for you | | **Security Risks?** | **Phishing, theft, loss of keys** | **Exchange hacks, government seizures, KYC leaks** | | **Access to Funds?** | Always (unless you lose your keys) | **Can be frozen** anytime | | **Regulation & KYC?** | No KYC (for most wallets) | Requires **government ID and personal data** | | **Best For?** | **Long-term storage & privacy** | **Frequent trading & fiat on-ramps** | #### **Key Takeaway:** 🔹 **"Not your keys, not your crypto."** If you don’t control your private keys, **your crypto is not truly yours**—it’s an IOU from an exchange. ### **2. Best Security Practices for Crypto Storage** 🔐 **To stay safe, follow these best practices when using a crypto wallet:** #### **1. Use a Hardware Wallet (Cold Wallet) for Long-Term Storage** - Hardware wallets (like **Ledger, Trezor, or Coldcard**) keep your **private keys offline**, making them immune to hacks. - **Never store large amounts** in a mobile, desktop, or exchange wallet. - Always **purchase hardware wallets directly from the manufacturer** to avoid tampered devices. #### **2. Secure Your Seed Phrase & Private Keys** - When setting up a wallet, you’ll receive a **12-24 word seed phrase** (your master backup). - **Never store your seed phrase online.** Write it down and keep it **offline in a secure location**. - Use **metal backups** (like Cryptosteel or Billfodl) to protect against fire or water damage. - **Never share your seed phrase.** If someone gets it, they **own your funds**. #### **3. Use a Strong, Unique Password & 2FA for Hot Wallets** - **Use a strong password** (16+ characters with symbols & numbers) for your wallet apps. - **Enable 2FA (Two-Factor Authentication)** for added security, but **never use SMS-based 2FA** (use an app like **Authy or a YubiKey** instead). - Avoid using the same password for multiple platforms. #### **4. Beware of Phishing Scams** - **NEVER** enter your seed phrase online, even on sites that look "official." - **Always verify URLs** before connecting your wallet (attackers create fake MetaMask or Phantom login pages). - **Do not click random links** in emails, Discord, Telegram, or Twitter (scammers impersonate wallet support teams). #### **5. Use a Multi-Signature Wallet for Extra Protection** - **Multi-sig wallets (like Gnosis Safe or Casa)** require multiple approvals to send funds. - Great for **protecting large amounts** of crypto or shared team funds. #### **6. Regularly Update Wallet Software** - Keep your wallet apps and firmware **up to date** to avoid vulnerabilities. - Only download wallets from **official websites or app stores**. #### **7. Never Store Crypto on an Exchange (Unless Actively Trading)** - **CEXs are honeypots for hackers.** Billions of dollars have been lost in exchange hacks (FTX, Mt. Gox, Binance leaks). - Exchanges can **freeze accounts or block withdrawals** during government crackdowns. #### **8. Use a Privacy-Focused Wallet** - For Bitcoin, use **Wasabi Wallet** (coinjoin for privacy) or **Samourai Wallet** (stealth transactions). - For Ethereum, use **MetaMask + a hardware wallet** or privacy-enhanced wallets like **Frame or Rabby**. - For Monero (XMR), use **Cake Wallet or Feather Wallet** (Monero is one of the most private cryptos). #### **9. Use a VPN & Privacy Tools** - Avoid exposing your IP when making crypto transactions. - Use a **VPN (Mullvad, ProtonVPN, IVPN)** and **privacy browsers** (Brave, Tor) when accessing wallets. #### **10. Double-Check Transactions Before Sending** - **Crypto transactions are irreversible.** Once you send funds, you **can’t get them back.** - Verify addresses manually before sending large amounts. ### **3. Best Crypto Wallets (Based on Security & Use Case)** |**Wallet Type**|**Recommended Wallets**|**Best For**| |---|---|---| |**Hardware Wallets (Cold Storage)**|Ledger Nano X, Trezor Model T, Coldcard|**Long-term storage, high security**| |**Mobile Wallets (Hot Wallets)**|MetaMask, Trust Wallet, Edge Wallet|**Daily transactions, DeFi, NFTs**| |**Bitcoin Privacy Wallets**|Wasabi Wallet, Samourai Wallet|**Private Bitcoin transactions**| |**Multi-Sig Wallets**|Gnosis Safe, Casa|**Team funds, high security**| |**Monero Wallets (Privacy)**|Cake Wallet, Feather Wallet|**Anonymous transactions**| ### **4. How to Stay Safe While Using DeFi & DApps** If you’re using **DeFi (Decentralized Finance)**, follow these extra security steps: 1. **Use a Burner Wallet for Risky Transactions** - Create **a separate wallet** for **airdrops, minting NFTs, or testing new DeFi protocols**. - This protects your **main funds from potential exploits.** 2. **Verify Smart Contracts Before Approving Transactions** - Read **contract permissions** before approving token swaps or transactions. - Use **Revoke.cash** ([https://revoke.cash](https://revoke.cash/)) to remove **risky smart contract approvals.** 3. **Be Wary of Airdrops & Free Tokens** - If you receive **random tokens in your wallet, do NOT interact with them.** - Scammers use **"dusting attacks"** to trick users into signing malicious transactions. 4. **Watch Out for Fake Tokens & Rug Pulls** - Check **CoinGecko, CoinMarketCap, or DexTools** before buying new tokens. - Avoid **projects with anonymous developers** or **no audits**. --- ### **Final Thoughts** 💡 **Self-custody is the key to financial freedom—but it comes with responsibility.** By securing your **private keys, using a hardware wallet, and avoiding scams,** you can safely navigate the crypto world without losing funds. 🚀 **TL;DR** ✔ **Use a hardware wallet for savings** ✔ **Never share your seed phrase** ✔ **Avoid storing funds on exchanges** ✔ **Use privacy wallets & VPNs** ✔ **Double-check transactions before signing** ✔ **Beware of phishing, fake airdrops, and smart contract scams** **The crypto world is full of opportunity—but only if you protect yourself.** 🛡️ --- ## Protesting & Privacy >Attending protests in 2025 requires careful preparation to protect your personal safety and digital privacy. Drawing from the Electronic Frontier Foundation's (EFF) guidelines, here are essential best practices. Additional resource links can be found here: [[[Privacy Resource Page]]] ### 1. Secure Your Devices - **Enable Full-Disk Encryption**: Ensure all data on your devices is encrypted to protect against unauthorized access if confiscated or lost. - **Use Strong Passwords**: Implement robust, unique passwords for device access. - **Disable Biometric Unlock Features**: Turn off fingerprint or facial recognition unlocks, as they can be forcibly used to access your device. ### 2. Protect Your Communications - **Use Encrypted Messaging Apps**: Communicate through apps like Signal, which offer end-to-end encryption. - **Turn Off Message Previews**: Prevent message content from displaying on your lock screen to maintain privacy. ### 3. Manage Data and Media - **Back Up Data Before Attending**: Save important information securely before the event. - **Be Cautious with Photos and Videos**: Consider blurring faces and removing metadata before sharing images to protect identities. ### 4. Understand Surveillance Risks - **Recognize Surveillance Technologies**: Familiarize yourself with tools like facial recognition and cell-site simulators that may be used to monitor protests. - **Limit Location Tracking**: Disable GPS and consider leaving devices that can be tracked at home. ### 5. Plan for Contingencies - **Develop a Security Plan**: Outline steps to take if devices are seized or compromised, including isolating affected accounts and notifying contacts. - **Use Peer-to-Peer Communication Tools**: In case of network disruptions, apps like Briar can facilitate communication without relying on centralized networks. By implementing these practices, you can enhance your security and privacy while exercising your right to protest. --- ## International Travel Traveling internationally in 2025 necessitates heightened awareness of both physical safety and digital privacy, especially given the current political climate. Here are essential best practices to consider: ### 1. **Stay Informed About Travel Advisories** - **Regularly Check Official Sources**: Before planning your trip, consult the U.S. Department of State's travel advisories to understand potential risks in your destination country. - **Enroll in STEP**: Register with the Smart Traveler Enrollment Program (STEP) to receive real-time updates and alerts about your destination. ### 2. **Ensure Valid Travel Documentation** - **Passport Validity**: Confirm that your passport is valid for at least six months beyond your planned return date. - **Understand Entry Requirements**: Be aware of new travel authorizations, such as the European Travel Information and Authorization System (ETIAS) for Europe and the UK's Electronic Travel Authorization (ETA), both expected to be implemented in 2025. ### 3. **Protect Your Digital Privacy** - **Back Up and Encrypt Data**: Before traveling, back up essential data and encrypt sensitive information on your devices to prevent unauthorized access. - **Minimize Data on Devices**: Consider removing non-essential data from your devices or using temporary devices to reduce exposure during border inspections. - **Use Strong Passwords and Disable Biometric Access**: Implement robust passwords and disable features like fingerprint or facial recognition to prevent forced access. ### 4. **Be Cautious with Public Wi-Fi** - **Avoid Unsecured Networks**: Public Wi-Fi can be a hotspot for cyber threats. Use a Virtual Private Network (VPN) to secure your internet connection when accessing sensitive information. - **Turn Off Automatic Connections**: Disable settings that allow your device to automatically connect to available networks. ### 5. **Maintain Physical Security of Devices** - **Keep Devices with You**: Avoid leaving electronics unattended or in checked luggage. - **Be Wary of Public Charging Stations**: Use your own chargers and avoid public USB ports, which can be compromised. ### 6. **Understand Border Search Policies** - **Know Your Rights**: Familiarize yourself with policies regarding device searches at international borders. - **Prepare for Inspections**: Be ready for the possibility of device searches and consider carrying a copy of the EFF's Border Search Pocket Guide for reference. ### 7. **Post-Travel Security Measures** - **Change Passwords**: Upon returning, update passwords for accounts accessed during your trip. - **Scan Devices for Malware**: Use reputable security software to check for and remove any malicious software that may have been acquired. By adhering to these practices, you can enhance your safety and privacy while navigating international travel in 2025.