High resistance OpSec guide for activists - check different laptops google “qubes certified computers” not included in post
High‑Resilience OPSEC Guide for Activists High‑Resilience OPSEC Guide for Activists This guide outlines practical operational security (OPSEC) practices for activists focused on reducing attack surfaces, compartmentalisation, and deniability. It assumes a realistic threat model (state surveillance, device seizure, social graph analysis) and prioritises reliable security over exotic tricks. Table of Contents Hardware Physical Attack Surface Reduction Networking: Tor & Whonix Messaging Browsing & Research VPN Router Passwords & Secrets Identity Compartmentalisation Behavioural OPSEC Threat Model Reality Check 1. Hardware: Start by Being Boring Dumb Phones (Primary Phone) Use a dumb phone as your only daily-carry phone . Calls + SMS only, no apps. No location tracking or social graph harvesting. Do not log into activist accounts or pair with laptops. Keep contacts minimal and non-descriptive. ...