Three words:
OPSEC! OPSEC! OPSEC!!
Handy Info for Reference.
IntelTechniques | Secure | E2EE Comms | Comparison | Beta v. 0.1 | October 2020 | |||||||||
Messaging | Confide | Dust | Jitsi | iMessage | Matrix/Element | Session | Signal | Sudo | Telegram | Threema | Wickr | Wire | Notes | |
E2EE Messaging (In-Network) | YES | YES | YES | YES | OPTIONAL | YES | YES | YES | YES | YES | PARTIAL* | YES | YES | *Whatsapp cloud (Google) backups are not E2EE |
Country of Ownership | USA | USA | USA | USA | UK | Australia | USA | USA | UAE | Switzerland | USA | USA | USA | Many other cloud backups (Google, iCloud, etc) may not be E2EE |
14-Eyes Association | YES | YES | YES | YES | YES | YES | YES | YES | NO | NO | YES | YES | YES | |
Open Source | NO | NO | YES | NO | YES | YES | YES | NO | YES | PARTIAL | NO | PARTIAL | YES | |
3rd-Party Metadata | YES | YES | YES | YES | NO | NO | NO | NO | YES | NO | YES | YES | NO | |
3rd-Party Analytics | YES | YES | YES | YES | NO | NO | NO | NO | YES | NO | YES | YES | NO | |
Funding | Various | Mark Cuban | 8×8 | Apple | Matrix/Element | Loki | Signal | Anonyome Labs | Various | Threema | Various |
View original post 723 more words
When talking about OPSEC as it pertains to the Armed Civilian, here is what I mean:
Operations Security, or OPSEC,is the process by which we protect unclassified information that can be used against us. OPSEC should be used to protect information, and thereby deny the adversary the ability to act. Nearly 90% of the information collected comes from “Open Sources”. Any information that can be obtained freely, without breaking the law, is Open Source. It is social network sites, tweets, text messages, blogs, videos, photos, GPS mapping, newsletters, magazine or newspaper articles, your college thesis, or anything else that is publicly available.
In the age of social media, people are more at risk of being exploited regarding OPSEC than ever before. Think how many times you have seen a person’s tweets or Facebook post and in a span of eight hours or so have been able to basically draw a detailed GPS map of where they have been, who they talked to and in some instances what they did exactly. This is not good folks. Not good at all. And it’s not because most people have something to hide or are criminals per se, it is the opposite actually; it is because people with nefarious intentions could use this information to their advantage in a number of criminal misadventures. Now I know what most of you are going to say: “But I only have my FRIENDS able to see my post, people that I Know and Trust…” The problem with that kind of thinking folks is that even though you may know and trust them, your friends may not practice good OPSEC. They may “accidentally” talk to people you may not know; and most of the time it is not done in a vindictive manner, it is just something that slips out. How many times have you been in an elevator, lobby or doctors waiting room and you overhear a phone conversation that is just a bit TMI (Too Much Information)? Believe it or not folks there are people (criminals) that troll public places listening and looking for juicy intel just like this everyday of the week. Sometimes it may be targeted, other times it may be accidental.
Some recent examples of bad OPSEC includes:
So bottom line guys Be Smart about what you say online, and who you say it too.
Stay Alert, Stay Armed and Stay Dangerous!
You must be logged in to post a comment.