CRITICAL KNOWLEDGE

Advanced Operational Security

Operational Security (OPSEC) encompasses the practices, protocols, and mindset required to protect sensitive activities from adversarial observation. In the context of anonymous networks, OPSEC failures have led to virtually every major darknet arrest. Understanding these principles is essential for security researchers, journalists, and privacy advocates.

Threat Modeling

Effective OPSEC begins with understanding your threat model:

Who is your adversary?

Casual observers? Corporations? Law enforcement? Nation-states? Each requires different countermeasures.

What are you protecting?

Identity? Location? Communications? Activities? Financial information?

What are the consequences?

Embarrassment? Job loss? Legal action? Physical danger?

What's the realistic risk?

Paranoia wastes resources. Assess actual likelihood of different threats.

PRINCIPLE

Your security is only as strong as your weakest link. A single mistake can unravel years of careful OPSEC. Most failures come from human error, not technical compromise.

Compartmentalization

The most critical OPSEC principle: never mix identities.

Identity Separation

  • Separate devices for separate activities
  • Unique usernames per context (never reuse)
  • Different writing styles/languages
  • Distinct operational patterns
  • No cross-referencing between identities
identity_separation.txt

[IDENTITY A - Professional]

Device: Work laptop

Network: Office/Home WiFi

Email: real.name@company.com

Browser: Chrome (logged in)

[IDENTITY B - Anonymous Research]

Device: Dedicated hardware

Network: Tor/VPN (never home)

Email: random@proton.me

Browser: Tor Browser only

⚠ NEVER CROSS THESE STREAMS

Famous Compartmentalization Failures

Person Failure Consequence
Ross Ulbricht Used personal email in forum post FBI identified DPR
Alexandre Cazes Used personal email in password reset FBI identified Alpha02
Hector Monsegur Logged into IRC without Tor once FBI identified Sabu

Technical OPSEC

Operating System

Tails OS

The Amnesic Incognito Live System (Tails) is the standard for anonymous operations:

  • Boots from USB, leaves no trace on host computer
  • All traffic routed through Tor automatically
  • RAM wiped cryptographically on shutdown
  • Blocks non-Tor connections

Whonix

Alternative for persistent workstation:

  • Two-VM architecture (Gateway + Workstation)
  • IP leaks physically impossible
  • Can run persistently with security updates

Hardware Considerations

  • Dedicated devices: Never use personal devices
  • Cash purchases: Buy hardware anonymously
  • No biometrics: Disable fingerprint/face unlock
  • Remove microphones/cameras: Physical removal if needed
  • MAC randomization: Change hardware addresses

Network OPSEC

Connection Guidelines

  1. Never use home network for sensitive activities
  2. Public WiFi with no cameras or registration
  3. Consider distance from regular locations
  4. Randomize connection times and locations
  5. Use external WiFi adapter that can be destroyed

VPN Considerations

VPNs Are Not Anonymous

VPNs shift trust from your ISP to the VPN provider. For true anonymity against sophisticated adversaries, VPNs are insufficient. However, they may be useful as an additional layer:

  • VPN → Tor (hides Tor usage from ISP)
  • Must be paid anonymously (crypto)
  • No-log claims are unverifiable

Behavioral OPSEC

Technical measures are useless without behavioral discipline.

Communication Patterns

  • Timing: Don't operate at predictable hours matching your timezone
  • Language: Consistent language use across identities reveals connections
  • Writing style: Stylometry can identify authors—consider intentional variation
  • Response time: Immediate responses reveal availability patterns

Information Discipline

  • Never reveal personal details, even seemingly innocuous ones
  • Avoid discussing weather, local events, or time-specific information
  • Don't reference past activities that could be correlated
  • Assume everything is logged and may be analyzed later
CRITICAL RULE

The most common OPSEC failure is talking too much. Every piece of information shared is a potential correlation point. When in doubt, don't share.

Physical OPSEC

Location Security

  • Avoid patterns in operational locations
  • Be aware of cameras (phones can detect IR)
  • Don't carry trackable devices (phone) to operational locations
  • Consider cell tower logs, license plate readers, credit card records

Physical Evidence

  • Encrypted devices should use strong passwords (not biometrics)
  • Consider full-disk encryption with hidden volumes
  • Secure destruction of compromised hardware
  • No written notes, passwords, or seeds

OPSEC Checklist

opsec_checklist.txt

[x] Threat model defined

[x] Identities strictly compartmentalized

[x] Dedicated hardware obtained anonymously

[x] Tails/Whonix configured properly

[x] No personal info in usernames/passwords

[x] Network connection strategy planned

[x] Communication protocols established

[x] Physical security measures in place

[x] Emergency response plan ready

[x] Regular OPSEC review scheduled

Educational Purpose Only

DarkWiki is a research and educational resource. We do not promote, facilitate, or encourage any illegal activities. All information is provided for academic, journalistic, and cybersecurity research purposes only. Historical onion addresses shown are no longer active and are included solely for historical documentation.