Security and Anonymity in the Digital Age: 13. Take Precautions With Your Email

Use secure email services when you can. Use a dummy email address when emailing people you do not trust and make sure that that dummy email is not attached to any of your real information (use a fake name, age, etc). You can also set up emails to reroute, so that you can receive them at your normal address – just make sure that you reply from the dummy account.

This is not particularly secure against government agencies but it is fairly secure against hackers. There are also free, disposable, temporary email services, such as Guerilla Mail, that allow users to create randomly generated accounts that get automatically deleted once the user ends their browser session, or after a time limit.

ProtonMail and Tutanota are both excellent options.

Operations Security (OPSEC)

This is adapted from a twitter thread.

OPSEC is short for operations or operational security. Basically, the better your OPSEC, the more difficult it is for outsiders to find out what you’re up to, whatever that may be.

One of the most vital aspects of OPSEC is situational awareness. That is, the ability to actively evaluate one’s surroundings and make detailed assessments about one’s environment.

All of the encryption in the world won’t save you if the thought police get their hands on you while you’re logged in and signed on. All of your careful planning amounts to nothing if a common street criminal lethally stabs you for your phone and wallet.

Situational awareness is a skill that can be practiced and developed. Take the time to practice this in your everyday life. Here’s a link for one page that has some exercises, but many more can be found with some basic research.

Part of situational awareness is an accurate sense of self awareness. Know where your strengths and weaknesses lie. Learn how to amplify your strengths and compensate for your weaknesses. You might not be aware of these traits yet, but others notice them and can take advantage.

Don’t be a target. Bad actors look for people who are unconfident and wrapped up in their own thoughts. When you’re in public, keep your chin up and your head on a swivel. Don’t walk around with earbuds in and/or staring at your phone.

This ties in to the grey man concept. If you don’t want attention, dress and act in a way that won’t attract it. Don’t walk around wearing a MAGA hat, a Daily Stormer T-shirt, and a swastika patch on your backpack. Don’t even wear a Glock branded hat. Be inconspicuous.

One can never be 100% secure, so don’t get lulled into a false sense of security just because you implement the tips in this thread. It’s all about reducing the likelihood that an outsider will be able to tell what you’re up to, not guaranteeing that.

For the love of all that is holy, DO NOT USE WINDOWS. OSX is marginally better, but Linux is your best bet for privacy and security. If you want to vidya, get a console, that’s what they’re for. Linux Mint is a good version to start with.

>but I did some 1337 h4x that makes Windows bulletproof
No you didn’t. Use Linux, pretty much everything electronic in this thread is virtually pointless otherwise.

Get a VPN and pay for it. If you use a free VPN, then you’re the product. (i.e. Opera VPN doesn’t count) Mullivad, Private Internet Access, and NordVPN are some decent options off the top of my head. It’s really not that expensive. (Mullivad is probably the most anonymous, but it’s also the most difficult one to use)

Also, learn how to use Tor. It’s another means of anonymous access to the internet, and it also allows you to access websites that you can’t access from your normal browser. Just be mindful of the links you click on in those realms.

Carefully maintain any online personas you might have. Don’t use similar usernames on your normie and WN accounts. Use very secure passwords, a manager like KeePass can help with that, but also use a strong password to secure that database. Don’t repeat passwords on multiple sites

This is as vital as not using Windows, DO NOT USE GMAIL. Don’t even use it for your normie stuff. Use Protonmail or Tutanota as your primary account. Set up a throwaway spam gmail account if you really need to access a certain service, but don’t use it as a primary.

Did I mention not to use Windows? It’s really not even worth reading this thread if you keep using it.

Take some time to get used to Linux, but eventually it is a good idea to do full disk encryption for your machine. That is an option during the Linux install, just be sure not to forget that password, because you will need to enter it every time you boot.

Yes, having good OPSEC is a lifestyle, but we can no longer afford the luxury of a “normal life”

Learn how to use cryptocurrency. I would specifically recommend looking into Bitcoin and Monero. Coinbase is the easiest way to buy Bitcoin, but be sure to move it off to a private wallet ASAP and don’t donate to right wingers straight from your Coinbase account.

Your bank likely sells your account transaction history to marketers. Use a service like privacy dot com to mitigate that. It lets you set up cards that can only be used with a single vendor as well as single use burners. Your account statement won’t show the vendors you use.

This should go without saying, but don’t use Google Chrome either. Use Firefox if you’re autistic enough to set it up properly or use Brave if you want something that’s usable out of the box. Also, don’t use Vivaldi or Edge.

Post Office boxes are a good way to protect your physical location, but virtual offices are even better. That will provide you with a physical address wherever you choose. You can even have mail sent for the staff to open and they will email you scans of the content.

Some banks will even let you deposit scanned checks. Some VO services will forward mail for you and others can provide phone answering. Depending on your needs and desired location, you can expect to pay anywhere from $10-$200/mo.

Security and Anonymity in the Digital Age: 6. Domain Name System (DNS) Leaks, What Are They?

When using an anonymity service, it is important that all the traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside the secure connection, anyone monitoring your traffic will be able to log your activity.

DNS is used to translate domain names such as into numerical IP addresses (e.g., which are required to route packets of data on the internet (send your data from A to B).

Whenever your computer needs to contact a server on the net, when you enter a URL into your browser for example, your computer contacts a DNS server and requests the IP address. Most internet service providers assign their customers a DNS server which they control and use for logging and recording your internet activities.

Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network.

DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

To check for DNS leaks when using Tor or other VPNs go to and run either the standard or extended test. The results displayed will detail how secure your connection is. It is also useful if you think someone is monitoring your traffic (through spyware etc).

Running a leak test on Tor etc will take quite some time, given how much your traffic is routed around. However, the URL below* lays out it simply. It is safe to say Tor Browser and a VPN are often secure against such DNS leaks.


Link Dump: 2019-03-06

Clown World



Illegal Immigration


Woke Tech


Artificial Intelligence