The OPSEC Bible
Initializing search
nihilist/the-opsec-bible
Operational Security Advice
Operational Security Mistakes
Productivity
Hacking
The OPSEC Bible
nihilist/the-opsec-bible
Operational Security Advice
Operational Security Advice
You cannot be governed. You just didn't realize it yet.
The goal of The Opsec Bible
What's On-topic and Off-topic ?
Roadmap Progress (as of Q3 2025)
10 things you must do if you are pro-freedom
OPSEC Introduction
OPSEC Introduction
π Explaining Concepts
π Explaining Concepts
Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days
What is my Attack Surface ?
Governments, Centralisation, and Law Enforcement
Governments fear Decentralisation and Anonymity
Lawfare Explained
π Explaining OPSEC β
π Explaining OPSEC β
Opsec is real-life Chess
Audit your OPSEC and determine the appropriate internet use
Internet Usage Segmentation Setup
OPSEC: Using the right Technology and Behavior
How to Maintain Multiple Identities Online
Public Chats / Private Chats / Anonymous Chats / Deniable Chats
Why Dread isn't the place to go to for Opsec advice
Fallacies used to dissuade you from using Freedom technology
π Explaining Anarchy
π Explaining Anarchy
The State is the Enemy
Laws do not stop crimes
How the states manage to pass abusive laws
The Individual reigns supreme, no matter what the state says.
Everyone is a criminal
How your finance can be your downfall
Technology either serves you, or the state
Public media is funded propaganda
Corporations are the cancer of FOSS projects
π Explaining Agorism
π Explaining Agorism
What's Agorism ?
Why should I price goods and services in Monero directly ?
How to prepare for the arrival of CBDCs
The futility of talking OPSEC on Statist platforms
Corporate censorship: Steam forced to delist games
Protesting is not enough
OPSEC Level 1 | Privacy
OPSEC Level 1 | Privacy
π Explaining Privacy
π Explaining Privacy
What is Privacy ? Why is it Important ?
Privacy Laxism is real and it's part of the problem
Redditβs Decline for Real Privacy Discussions
The lack of Open Source Hardware (CPUs, Motherboards, GPUs)
Why can't I trust closed source software for Privacy?
E2EE Doesn't provide privacy if the software is closed-source
What if a FOSS Project Turns Malicious? (Building SimpleX from Source)
Why can't I trust Server-side Encryption ?
π» Clientside Privacy
π» Clientside Privacy
π» Host OS Setup
π» Host OS Setup
How to have Privacy on your Computer (Kicksecure Host OS)
Linux Basics
Why are we not recommending Qubes OS yet ?
How to have Privacy on your Phone (GrapheneOS)
Linux Hypervisor Setup (QEMU/KVM virtualisation)
DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?
How to get privacy from your ISP using a VPN
Prevent IP leaks using a VPN on the Host OS
Scheduled Automatic Server Randomization with Mullvad VPN CLI
π¦ Private VM Privacy
π¦ Private VM Privacy
Easy Private Chats - SimpleX
How to compile open source software + How to verify software integrity
File Verification
Ensuring Your Privacy is Intact with OpenSnitch
Password Management 101: How to use Keepass
One-on-One Large File Sharing (Syncthing over VPN)
Peer-to-Peer Large File Sharing (Torrents over VPN)
πΆ Private Local Network
πΆ Private Local Network
How to have privacy on your Router (OpenWrt)
How to route your entire network through a VPN on the router
π» Serverside Privacy (Self-Hosting)
π» Serverside Privacy (Self-Hosting)
Why should I self-host my own services?
Docker Intro: Installation, Setup and Basic Operations
How to Self-Host a server at Home
USB-triggered server shutdowns
Self-Hosting a Hypervisor on your Home Server
Prevent IP leaks using a VPN on the Home Server Host OS
How to hide your self-hosted service's home IP from the end users
π Serverside Privacy (Remote)
π Serverside Privacy (Remote)
How to encrypt files and messages (Age and PGP)
Remote Hosting SimpleX Servers
Backup data remotely without revealing contents to the VPS provider - BorgBackup
π₯· Privacy Frontends
π₯· Privacy Frontends
Privacy Frontends - Avoiding Centralized Tracking
Setting up Redlib to browse Reddit privately
Setting up SafeTwitch to watch Twitch privately
Setting up Invidious to watch YouTube privately
OPSEC Level 2 | Anonymity
OPSEC Level 2 | Anonymity
π Explaining Anonymity
π Explaining Anonymity
What is Anonymity ? Why is it Important ?
Is Tor a Honeypot ?
Why isnβt Privacy enough for Anonymous Use?
The Adversary also benefits from Anonymity
Phone Numbers are incompatible with Anonymity
Why is Metadata detrimental to Anonymity?
The main source of Anonymity: The Tor Network
Anonymity - Why can't I use Signal to chat anonymously?
The German and Netherlands Tor Nodes problem
π§ Exploring the Darknet
π§ Exploring the Darknet
Why is the Darknet superior to the Clearnet ?
How to explore the Darknet? (Visibility and Discoverability)
π» Clientside Anonymity
π» Clientside Anonymity
Anonymous VM Setup - Whonix QEMU VMs
Using the Tor browser to browse the web Anonymously
Anonymity - Easy Anonymous Chats Using SimpleX
How to Receive Anonymous SMSes (Remote SMSes as a Service)
How to Get an Email Account Anonymously (Emails as a Service)
ποΈβπ¨οΈ Hiding your Anonymity from the ISP
ποΈβπ¨οΈ Hiding your Anonymity from the ISP
Where are VPNs, Tor, Monero and SimpleX Legal ?
Using Tor Safely: Tor through VPN or VPN through Tor?
How to access Tor when you are in a heavily-censored country using v2ray (vmess / vless)
Disguising Tor traffic with Cloak
Routing the network through Cloak using OpenWRT router
ποΈβπ¨οΈ Hiding your Anonymity from the service
ποΈβπ¨οΈ Hiding your Anonymity from the service
How to Anonymously access websites that block Tor
How to get and use residential proxies anonymously
π€ Using AI to protect your Anonymity
π€ Using AI to protect your Anonymity
Stylometry Protection (Using Local LLMs)
π» Anonymous File Sharing
π» Anonymous File Sharing
How to share files anonymously using OnionShare
One on One large file sharing (Syncthing over Tor)
Peer-to-Peer Large File Sharing (Torrents over I2P)
πͺ Decentralized Finances β
πͺ Decentralized Finances β
The True Goal of Cryptocurrency
How to setup your Monero wallet
Why can't I trust Centralised Exchanges, and random Monero nodes ?
How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
Haveno DEX Direct Fiat to Monero transactions
Haveno Decentralised Exchange Dispute resolution (Fiat -> XMR)
Haveno DEX Bank Transfer (ex: SEPA) -> XMR transaction
Haveno DEX Cash by Mail -> XMR transaction
Convert Monero into other Cryptocurrencies Anonymously (XMR -> LTC)
How to Get a Credit Card Anonymously (Credit Cards as a Service)
Prevent scams using Multisig 2of3 Monero wallets
β οΈ Outdoors Anonymity
β οΈ Outdoors Anonymity
The postal system explained
How to remain Anonymous during a protest
π§ Serverside Anonymity (remote)
π§ Serverside Anonymity (remote)
Renting Remote VPS Servers Anonymously (non-KYC cloud resellers)
Monero Inheritence Management (VaultWarden Emergency Contacts)
π§ Anonymous Hidden Services
π§ Anonymous Hidden Services
Where to host Anonymous Hidden Services ?
How to have a custom .onion address for your Hidden Service (Vanity V3)
How to redirect your clearnet audience to the Darknet
How to Verify One's Identity While Maintaining Anonymity Using PGP Canaries
Forgejo .onion Setup (Anonymous Code Repositories and Collaboration)
Git LFS over Tor - Proof of Concept
Anonymous Server Monitoring (Grafana, Prometheus, Node-exporter)
How to anonymously recieve alerts (via SimpleX)
π§ Anonymous Clearnet Services
π§ Anonymous Clearnet Services
Where to Host Anonymous Clearnet Services ?
How to Rent Remote Domains Anonymously (Registrar Resellers)
Remote anonymous access setup (SSH through Tor)
bind9 DNS setup
π§ Serverside Anonymity (Self-Hosting)
π§ Serverside Anonymity (Self-Hosting)
Why should I use Whonix for Self-hosted Hidden services ?
How to use Docker containers on the whonix workstation
Making Your Home Server Reachable via a Hidden Service (SSH + Cockpit + VNC via Tor)
Restricting Onion Service Access with Client Authorization
Nextcloud .onion Setup (Anonymous File Hosting)
Mounting a remote drive over Tor (using SFTP)
Anonymity - Self-Hosted LLM Hidden Service
The Private and Anonymous Email Fallacy
Anonymous self-hosted clearnet mail server Setup
π«Ά Contributing to Anonymity
π«Ά Contributing to Anonymity
How to run a Tor relay node
TOR Bridge (November 2024 update)
TOR Exit Node
How to run your own Darknet Lantern for Visibility and Discoverability
Anonymous Simplex SMP & XFTP Servers setup
Monero Node Setup
How to mine Monero easily using Gupax
Mine Monero with p2pool and xmrig
How to run a Haveno Seed Node
OPSEC Level 3 | Deniability
OPSEC Level 3 | Deniability
π Explaining Plausible Deniability
π Explaining Plausible Deniability
Our stance on sensitive activities
The Dangers of ordering Drugs online
What is Plausible Deniability ? Why is it Important ?
Why isnβt Anonymity enough for Sensitive Use?
How to transfer activities across identities
π» Clientside Deniability
π» Clientside Deniability
Temporary Sensitive use
Temporary Sensitive use
Tails OS for Easy Temporary Sensitive Use
SimpleX Deniable Chats
Long-Term Sensitive Use
Long-Term Sensitive Use
Using the Host-OS in live-mode to enable Sensitive Use
The main source of Plausible Deniability: Deniable Encryption
Sensitive VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)
How to safely use the Sensitive VM
Black Hat Hacking Sensitive VMs Tutorial
USB-triggered emergency shutdowns
Introduction
Sensitive Data Backups
Sensitive Data Backups
Sensitive Critical Data Backup Procedure
Destructive Deniability (Duress Mechanisms)
Destructive Deniability (Duress Mechanisms)
Mobile Duress Mechanism (GrapheneOS Duress PIN)
Desktop Duress Mechanism (Kicksecure + CryptKill + Detached LUKS Header + Duress password)
π Steganography - Hiding secrets in plain sight
π Steganography - Hiding secrets in plain sight
Other sources of Plausible Deniability: Steganography
Using Steghide to hide data in images
Hiding files in videos (small or large files) with zuluCrypt
πͺ Decentralised Finances
πͺ Decentralised Finances
Where to hide your Monero Wealth ?
π§ Serverside Deniability (Self-Hosted)
π§ Serverside Deniability (Self-Hosted)
Electrical Failover (basic UPS setup)
Plausible Deniability Protection for an .onion Service (WIP)
π§ Serverside Deniability (Remote)
π§ Serverside Deniability (Remote)
Sensitive .onion Services: Self-Host or Host Remotely ?
When the Adversary is the cloud provider himself
Deniably Renting a VPS from the Sensitive-Use VM
Sensitive Remote Servers Organization
π§ High Availability for Deniability
π§ High Availability for Deniability
Why is High Availability Important for Deniability ?
How to setup a basic NGINX / PHP / MySQL app
How to setup a MySQL Master-Master replication over Tor
OnionBalance for .onion domains load balancing
EndGame V3 Setup
π«Ά Contributing to the project
π«Ά Contributing to the project
How to write good Criticism
The Quality Standard
How to become a Contributor
How to become a Maintainer
How to run the Opsec Bible Yourself
Template Tutorial Title
π Miscellaneous
π Miscellaneous
Recommended Movies and Series to Watch
Recommended Documentaries to Watch
Recommended Books to Read
π·οΈ All Tags
The Nowhere Community and our services
Legal Disclaimer
Operational Security Mistakes
Operational Security Mistakes
OPSEC Mistake Template
Realistic OPSEC Mistakes and Threat Scenarios
Identity Segmentation Fails: Emails, Usernames, and Passwords
Being lured into telegram for sensitive use
Being lured into meeting someone IRL
Never tell your bank that you bought crypto
Canadian truckers protesters' bank accounts frozen
Improper Monero Usage
The Bayrob malware gang downfall
Deanonymization by Sharing YouTube Links
The Downfall of Eldo Kim
Bragging too much (The ego problem)
π Darknet Market Downfalls
π Darknet Market Downfalls
The Downfall of Silk Road
The Downfall of AlphaBay
The Downfall of Incognito Market
π Other Darknet Exposures
π Other Darknet Exposures
Man arrested for donating to a terrorist organization
The Downfall of IntelBroker
The Downfall of Pompompurin
LAPSUS$ OPSEC Mistakes
πͺͺ Consequences of bad OPSEC
πͺͺ Consequences of bad OPSEC
Solitary Confinement
Being forced into violence by gangs
Being forced into becoming an Informant
Productivity
Productivity
Productivity: Health and Work Organisation
Introduction to Nihilism
Productivity Introduction
Productivity Introduction
The Poison of Modern Times
Discipline over Comfort
Preparing the Body and Mind
Preparing the Body and Mind
Yoga to stretch the entire body
Preparing the Body - Diet to favor cerebral activity
Nihilism β
Nihilism β
Nihilism: Mantras to reset the Mind
Opus Nihil: Dissolving Compulsions
Scio Nihil: Dissolving Beliefs
Sum Nihil: Dissolving the Self
Strategies to unwind addictions
Cold Exposure: Where Discipline takes over Comfort
Planning the Work
Planning the Work
The General Workflow (Visualize, Plan, Do, and Review the Work)
The right thing to do: What is the reason behind your actions?
Macro Workflow: Listing Projects that truly matter
Macro Time Management: Project Priorization and Calendar Scheduling
Micro Workflow: Todo Listing, Contextualizing, and Ordering Tasks
Collaborative Project Management (Kanban in Forgejo)
Zero Email Workflow (in Thunderbird)
Doing the Work
Doing the Work
Mental Energy: How good are you at spending it ?
Workspace Preparation: Focus Optimisation
The Morning Routine
Pomodoro Focus times (Intentional pauses to prevent burnouts)
Reflecting on the Work
Reflecting on the Work
Reflecting: How to use graphs to help Brainstorming ideas (draw.io)
Reflecting: Brainstorming Ideas while on the run
Hacking
Hacking
Offensive Security Writeups (NO LONGER MAINTAINED)
HackTheBox Writeups
HackTheBox Writeups
Easy Boxes
Easy Boxes
BOXNAME Writeup
Lame Writeup
Blocky Writeup
Blue Writeup
Mirai Writeup
Shocker Writeup
Sense Writeup
Bashed Writeup
Nibbles Writeup
Valentine Writeup
Sunday Writeup
Bounty Writeup
Legacy Writeup
Jerry Writeup
Active Writeup
Access Writeup
Frolic Writeup
Curling Writeup
Irked Writeup
Teacher Writeup
Help Writeup
Friendzone Writeup
Netmon Writeup
Devel Writeup
LaCasaDePapel Writeup
Bastion Writeup
SwagShop Writeup
Writeup Writeup
Haystack Writeup
Safe Writeup
Heist Writeup
Writeup
Forest Writeup
Postman Writeup
Beep Writeup
Traverxec Writeup
OpenAdmin Writeup
Nest Writeup
Traceback Writeup
Remote Writeup
ServMon Writeup
Admirer Writeup
Blunder Writeup
Tabby Writeup
Buff Writeup
Optimum Writeup
Omni Writeup
Doctor Writeup
Academy Writeup
Laboratory Writeup
Luanne Writeup
Delivery Writeup
Toolbox Writeup
Sauna Writeup
ScriptKiddie Writeup
Armageddon Writeup
Arctic Writeup
Spectra Writeup
Love Writeup
Cap Writeup
Knife Writeup
Previse Writeup
Paper Writeup
BountyHunter Writeup
Explore Writeup
Horizontall Writeup
Backdoor Writeup
Grandpa Writeup
Driver Writeup
Secret Writeup
Granny Writeup
Bank Writeup
Medium Boxes
Medium Boxes
Writeup
Popcorn Writeup
Nineveh Writeup
Apocalyst Writeup
SolidState Writeup
Node Writeup
Enterprise Writeup
Jeeves Writeup
Inception Writeup
FluxCapacitor Writeup
Chatterbox Writeup
Aragog Writeup
Bastard Writeup
Bart Writeup
Stratosphere Writeup
Celestial Writeup
Silo Writeup
Poison Writeup
Canape Writeup
Olympus Writeup
TartarSauce Writeup
DevOops Writeup
Hawk Writeup
Tenten Writeup
Waldo Writeup
SecNotes Writeup
Giddy Writeup
Ypuffy Writeup
Carrier Writeup
Vault Writeup
RedCross Writeup
Lightweight Writeup
Chaos Writeup
Querier Writeup
Cronos Writeup
Arkham Writeup
Unattended Writeup
Luke Writeup
Jarvis Writeup
Craft Writeup
Bitlab Writeup
Wall Writeup
Json Writeup
AI Writeup
Sniper Writeup
October Writeup
Mango Writeup
Obscurity Writeup
Monteverde Writeup
Book Writeup
Cascade Writeup
Magic Writeup
Cache Writeup
Fuse Writeup
SneakyMailer Writeup
OpenKeyS Writeup
Lazy Writeup
Worker Writeup
Passage Writeup
Jewel Writeup
Bucket Writeup
Time Writeup
Ready Writeup
Tenet Writeup
Ophiuchi Writeup
TheNotebook Writeup
Sneaky Writeup
Haircut Writeup
Europa Writeup
Hard Boxes
Hard Boxes
Writeup
Joker Writeup
Dropzone Writeup
Reel Writeup
Dab Writeup
Oz Writeup
Zipper Writeup
Conceal Writeup
FluJab Writeup
Helpline Writeup
OneTwoSeven Writeup
Ghoul Writeup
Calamity Writeup
Ellingson Writeup
Chainsaw Writeup
Player Writeup
RE Writeup
Scavenger Writeup
Zetta Writeup
Registry Writeup
Control Writeup
Patents Writeup
Oouch Writeup
Charon Writeup
ForwardSlash Writeup
Quick Writeup
Travel Writeup
Blackfield Writeup
Intense Writeup
Unbalanced Writeup
Feline Writeup
Compromised Writeup
Reel2 Writeup
Sharp Writeup
Shrek Writeup
Mantis Writeup
Tally Writeup
Kotarak Writeup
CrimeStoppers Writeup
Falafel Writeup
Linpeas
Recurrent Tricks
Recurrent Tricks
Setup
Burpsuite Setup
File Transfers
SSH Tunnels
xc Setup
Binary Exploitation Writeups
Binary Exploitation Writeups
Binary Exploitation
Learning Assembly
Learning Assembly
Assembly x86_64 -
Assembly x86_64 - Hello World!
Assembly x86_64 - Hello World Explained
Assembly x86_64 - Jumps, Calls
Assembly x86_64 - User Input
Assembly x86_64 - Math operations
Assembly x86_64 - CLI Arguements
Assembly x86_64 - Spawning a Shell
Binary Exploitation
GDB + GEF
Ghidra
Python Pwntools
Binary Exploitation
CSAW 2019 Beleaf
Helithumper Reverse Engineering
Binary Exploitation
Binary Exploitation
Csaw 2019 babyboi
CSAW 2018 Quals Boi
BKP 2016 SimpleCalc
DCQuals 2016 FeedMe
CSAW 2018 Get It
Binary Exploitation
Tokyo Western 2017 - Just Do It!
Facebook CTF 2019 Overfloat
CSAW 2017 Pilot
TAMU 2019 pwn1
TAMU 2019 Pwn3
TuCTF 2018 Shella-Easy
Utc 2019 shellme
DCQuals 2019 speed
Csaw 2017 SVC
TUCTF 2017 VulnChat
CSAW 2016 Warmup
Binary Exploitation
h3 time
Sunshine CTF 2017 Prepared
hsctf 2019 tux talk show
404 - Not found