OP Posted at 11-02-2025, 10:49 PM
(This post was last modified: 13-02-2025, 07:29 PM by HighQuality.)
This post has huge precious informations that will help you in your journey!
ALL CREDITS GO TO ZIAN
[ Hidden Content! ]
1.1 – Who am I
I'm just another echo in the void.
1.2 – Definition of Operational Security
By definition operational security was derived from military term procedural security, originated as a term that described strategies to prevent potential adversaries from discovering critical operations-related d1ta. Which is an analytical process that classifies information assets and determines the control required to provide these assets.
You might wonder why I choose to write about both physical and digital operational security? Simplest answer is they’re intertwined and can’t be separated in my opinion. If you have one but not the other it’s just like you don’t have any.
2 – Misinformation Warfare
2.1 – Ancient Misinformation
Since the dawn of men, misinformation has been used as weapon and the most effective on at that. If you are a book worm like me I suggest you read “The Art of War” by Sun Tzu, that book even after thousands of years since it was written has theories and practices that can be applied in the modern world. Why am I telling you this? Because we will kick this off with one of his quotes.
One of the most egregious examples of this takes us back to ancient Rome and to the very end of the Republic, when almost a century of civil war, chaos and political assassinations had led the Roman government to the brink of collapse. It was the time of the so-called Second Triumvirate. Around 2000 years ago, the Roman Republic was facing a civil war between Octavian, the adopted son of the great general Julius Caesar, and Mark Anthony, one of Caesar’s most trusted commanders. To win the war, Octavian knew he had to have the public on his side – winning important battles helped, but if the people didn’t like him, he would not be a successful ruler.
To get public backing, Octavian launched a ‘fake news’ war against Mark Anthony. He claimed Anthony, who was having an affair with Cleopatra, the Egyptian Queen, didn’t respect traditional Roman values like faithfulness and respect. Octavian also said he was unfit to hold office because he was always drunk. Octavian got his message to the public through poetry and short, snappy slogans printed on to coins. Octavian eventually won the war and became the first Emperor of Rome, ruling for over 50 years. But, I digress so let’s get back to what you came here for.
Today it’s much easier to conduct misinformation warfare than 2000 years ago, obviously. Now, to skip history lessons and move to the modern era here is example of misinformation. Markets that want to conduct exit-scam will usually disable withdrawals due to some “technical problems” on their end – meanwhile keeping deposits working while they siphon funds to some off-site wallet.
2.2 – How are you being tracked
In dystopian society we live today, surveillance is major part of how governments keep the common folk in line. To understand how we can use misinformation against them we first must understand how are we being tracked.
Entities that track us (government agencies, tech conglomerates and d1ta mining companies) rely on you to leak little pieces of d1ta which they use to profile you online and match the username to actual user. It’s simple matter to match content in d1tabases if there is some sort of index to the content. Most common pieces of d1ta used to track you on clear-net and dark-net are:
It’s important to understand that just by using two elements out of all of these is enough for them to track you. So your job it to deny them from getting two pieces of real d1ta if you wish to stay anonymous.
2.3 – How to use misinformation in your favor
Okay, we know how we’re being tracked. Let’s briefly talk about how can we use misinformation to make it much harder for these entities to track you.
Everything I said here is a type of misinformation in one way or another. Using these techniques makes you appear as several individuals instead of just one. But all of these won‘t help you if you don‘t make proper use of compartmentalization.
2.4 – Compartmentalization
Why is Qubes OS https://www.qubes-os.org/ considered one of the most secure operating systems available today? Becuase it makes use of compartmentalization. Keeping things separate is probably the best way to avoid anyone from tracking you.
What do I mean by that? Let‘s say you bought a burner phone and a sim card, with cash, at location with no security cameras and you plan to use it as a trap-phone. You can safely assume that phone is anonymous as far as you‘re concerned. But, if you called your mother, spouse or child with that phone it‘s instantly burnt. There is a log somewhere out there about that call and you can rest assured that it‘s going to be found by law enforcement.
Doesn‘t matter if you‘re a hacker, market admin, forum admin, regular user or just a privacy conscious individual, becuase this goes for everyone. Same way you don‘t tell you‘re family you‘re selling cocaine online, apply that to every aspect of your digital life.
I'm just another echo in the void.
1.2 – Definition of Operational Security
By definition operational security was derived from military term procedural security, originated as a term that described strategies to prevent potential adversaries from discovering critical operations-related d1ta. Which is an analytical process that classifies information assets and determines the control required to provide these assets.
You might wonder why I choose to write about both physical and digital operational security? Simplest answer is they’re intertwined and can’t be separated in my opinion. If you have one but not the other it’s just like you don’t have any.
2 – Misinformation Warfare
2.1 – Ancient Misinformation
Since the dawn of men, misinformation has been used as weapon and the most effective on at that. If you are a book worm like me I suggest you read “The Art of War” by Sun Tzu, that book even after thousands of years since it was written has theories and practices that can be applied in the modern world. Why am I telling you this? Because we will kick this off with one of his quotes.
Quote:“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”
One of the most egregious examples of this takes us back to ancient Rome and to the very end of the Republic, when almost a century of civil war, chaos and political assassinations had led the Roman government to the brink of collapse. It was the time of the so-called Second Triumvirate. Around 2000 years ago, the Roman Republic was facing a civil war between Octavian, the adopted son of the great general Julius Caesar, and Mark Anthony, one of Caesar’s most trusted commanders. To win the war, Octavian knew he had to have the public on his side – winning important battles helped, but if the people didn’t like him, he would not be a successful ruler.
To get public backing, Octavian launched a ‘fake news’ war against Mark Anthony. He claimed Anthony, who was having an affair with Cleopatra, the Egyptian Queen, didn’t respect traditional Roman values like faithfulness and respect. Octavian also said he was unfit to hold office because he was always drunk. Octavian got his message to the public through poetry and short, snappy slogans printed on to coins. Octavian eventually won the war and became the first Emperor of Rome, ruling for over 50 years. But, I digress so let’s get back to what you came here for.
Today it’s much easier to conduct misinformation warfare than 2000 years ago, obviously. Now, to skip history lessons and move to the modern era here is example of misinformation. Markets that want to conduct exit-scam will usually disable withdrawals due to some “technical problems” on their end – meanwhile keeping deposits working while they siphon funds to some off-site wallet.
2.2 – How are you being tracked
In dystopian society we live today, surveillance is major part of how governments keep the common folk in line. To understand how we can use misinformation against them we first must understand how are we being tracked.
Entities that track us (government agencies, tech conglomerates and d1ta mining companies) rely on you to leak little pieces of d1ta which they use to profile you online and match the username to actual user. It’s simple matter to match content in d1tabases if there is some sort of index to the content. Most common pieces of d1ta used to track you on clear-net and dark-net are:
- Names (both real and usernames)
- IP addresses
- Browser fingerprint
- E-mail address
- Location (exact or approximate)
- Phone numbers
- Date of birth (or any other PII)
- Stylometry
- Facial recognition
It’s important to understand that just by using two elements out of all of these is enough for them to track you. So your job it to deny them from getting two pieces of real d1ta if you wish to stay anonymous.
2.3 – How to use misinformation in your favor
Okay, we know how we’re being tracked. Let’s briefly talk about how can we use misinformation to make it much harder for these entities to track you.
- Names – don’t use your real name anywhere on the internet and avoid websites that require one. Rely on aliases, pseudo anonymous is better than being caught with your pants down.
- IP address – Mask your IP address by using Tor, VPN, VPS, RDP or proxies. Depending on what you’re actually doing you might want to combine some of these. The point being use whats at your disposal to make their lives harder.
- Browser fingerprint – this one is probably hardest to conceal if you are not tech-wizard. But, you can always use several browsers with different plugins to make it appear as if you’re several persons.
- Phone numbers – stop linking your personal phone number to services such as instant messengers, social media applications and two-factor authentication on services. Either go ahead and purchase VOIP number with crpyto or use things such as Yubi Key for-two factor authentication.
- E-mail addresses – probably the easiest, use several e-mails under different names for different purposes. Keep things separate!
- Stylometry – is the application of the study of linguistic style. For example I can say 10% or 10 percent or ten percent. Each of these are different and can be used to mask your true identity. Also, when I wrote this post, I could have easily gone to some translation service and done this. Translate from English to Russian, Russian to Spanis, Spanish to Finnish, Finnish to English. This will tumble the text and make it very different(stylometry wise) from what you originaly wrote, you just have to spell-check it.
- Deception and lies – not the kind you‘re expecting. So let‘s say you‘re Dread user and you want to mention a pet you have for making some point in a discussion. Now, it considered bad OPSEC to say „Hey, I have a black cat!“, instead say you have a white dog. That way you can still say my pet has done X, Y or Z. But without divluging actual intel about you. Making such subtle chagnes to details is crucial if you want to stay hidden.
Quote:“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
Everything I said here is a type of misinformation in one way or another. Using these techniques makes you appear as several individuals instead of just one. But all of these won‘t help you if you don‘t make proper use of compartmentalization.
2.4 – Compartmentalization
Why is Qubes OS https://www.qubes-os.org/ considered one of the most secure operating systems available today? Becuase it makes use of compartmentalization. Keeping things separate is probably the best way to avoid anyone from tracking you.
What do I mean by that? Let‘s say you bought a burner phone and a sim card, with cash, at location with no security cameras and you plan to use it as a trap-phone. You can safely assume that phone is anonymous as far as you‘re concerned. But, if you called your mother, spouse or child with that phone it‘s instantly burnt. There is a log somewhere out there about that call and you can rest assured that it‘s going to be found by law enforcement.
Doesn‘t matter if you‘re a hacker, market admin, forum admin, regular user or just a privacy conscious individual, becuase this goes for everyone. Same way you don‘t tell you‘re family you‘re selling cocaine online, apply that to every aspect of your digital life.
Quote:“If your enemy is secure at all points, be prepared for him. If he is in superior strength, evade him. If your opponent is temperamental, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. If sovereign and subject are in accord, put division between them. Attack him where he is unprepared, appear where you are not expected .”
ALL CREDITS GO TO ZIAN
Not ratedThis leak has not been rated yet, be careful when downloading.
CLICK HERE
TO JOIN CHAT!
HACKING/CRACKING RELATED CHAT
TO JOIN CHAT!
HACKING/CRACKING RELATED CHAT