Click a layer to see tools

OPSEC tools organised into 7 practical layers.

Each section groups your favourite tools and services by what they protect: devices, network, messaging, browsing, monitoring, data, and behaviour/virtualisation.

1
Device & Disk
2
Network
3
Messaging
4
Browsing & IDs
5
Comms / Monitoring
6
Mail & Cloud
7
VMs & Cleanup

Core OPSEC Reminders

These points are high-level operational-security and privacy habits, presented for educational and research purposes only.

Educational content only. Follow all applicable laws and regulations; do not use this page to plan or conduct illegal activity.

1. Device and disk protection

Tools to encrypt data at rest and manage secrets on your endpoints.

Tools

  • Disk and container encryption; creates encrypted volumes or full‑disk encryption so data at rest is unreadable without the key.
    Encryption
  • Open‑source password manager; encrypts your vault locally and syncs across devices using zero‑knowledge cloud storage.
    Passwords
  • Local, file‑based password manager; stores an encrypted password database you control, often synced via your own storage.
    Passwords
  • GUI for GnuPG; manages keypairs and lets you encrypt/sign files and mail using OpenPGP public‑key cryptography.
    PGP

2. Network and traffic protection

VPNs, firewalls, and secure tunnels that shape how your traffic leaves your devices.

Tools

  • No‑log VPN; uses account numbers instead of emails and tunnels all traffic through encrypted servers.
    VPN
  • Privacy‑focused VPN; supports WireGuard/OpenVPN and multi‑hop routing to hide traffic paths.
    VPN
  • Activist‑oriented VPN; encrypts traffic and aims to resist logging and commercial tracking.
    VPN
  • Lightweight outbound firewall for Windows; lets you whitelist or blacklist processes’ network access.
    Firewall
  • Network monitor and firewall UI; visualizes traffic per app and allows blocking suspicious connections.
    Monitoring
  • SSH client with tunnelling and SFTP; wraps traffic in encrypted SSH sessions for remote access and port forwarding.
    SSH

3. Messaging and calling

Messengers and sharing tools with strong encryption and varying metadata profiles.

Tools

  • End‑to‑end encrypted messaging and calls; uses the Signal Protocol with minimal metadata retention by design.
    E2EE
  • E2EE messaging over independent relays; no global identifiers or contact discovery, each contact uses separate routes.
    Metadata‑min
  • P2P messenger using Tor, Bluetooth, or LAN; syncs messages directly without central servers.
    P2P
  • Tox‑protocol client; fully P2P encrypted chats and calls with no central server infrastructure.
    P2P
  • Runs a temporary Tor onion service to share files, chats, or websites anonymously, directly from your machine.
    Tor share
  • Decentralized messenger on the Oxen network; uses Session IDs instead of phone numbers and onion‑routed messages.
    Decent.
  • Federated protocol and client; supports E2EE rooms using Olm/Megolm and self‑hosted homeservers.
    Federated
  • Open XMPP chat with OMEMO extension for E2EE; decentralized servers with client‑side encryption.
    XMPP
  • Team collaboration platform with E2EE messaging and calls; aimed at business and enterprise users.
    Collab
  • Cloud messenger; only “Secret Chats” are E2EE, normal chats are server‑stored with weaker OPSEC defaults.
    Caution
  • Encrypted chat, file store, and identity proofs; largely deprecated but still used by some for key handling.
    Legacy

4. Browsing, tracking, and identity separation

Browsers that harden privacy and help keep identities compartmentalised.

Tools

  • Firefox fork with hardened privacy defaults; strips telemetry and ships with strong tracking‑protection presets.
    Browser
  • Anti‑fingerprinting browser built with the Tor Project; standardizes fingerprints and pairs well with any VPN.
    AF‑resist
  • Routes traffic through the Tor network; hides IP and resists tracking at cost of speed and compatibility.
    Tor
  • Base for many browsers; default config is not privacy‑hardened and needs manual tweaks and extensions.
    Tweak
  • Mobile‑focused privacy browser; blocks trackers and isolates sites to reduce profiling.
    Mobile

5. Comms security and signalling

Voice tools and signalling methods with very different OPSEC properties.

Tools

  • SIP softphone; uses your SIP provider’s encryption options (SRTP/TLS) for VoIP, security depends on provider.
    VoIP
  • Encrypted VoIP; routes calls through its service with end‑to‑end or transport‑layer encryption (implementation‑dependent).
    VoIP
  • Google Voice
    Cloud telephony service; convenient but heavily tied to your Google account and metadata, not OPSEC‑safe for sensitive roles.
    Avoid
  • DTMF (tone dialing)
    Old‑school in‑band signaling tones; plain audio on the line, offers no confidentiality by itself.
    Legacy

6. Mail, identities, and cloud storage

Where your identities live long‑term: mailboxes and file storage.

Tools

  • Encrypted email provider; stores mail with zero‑access encryption and supports PGP for end‑to‑end where used.
    Email
  • Email client; supports local encryption and integrates with OpenPGP or S/MIME for encrypted mail workflows.
    Client
  • Encrypted cloud storage; files are encrypted client‑side so Proton sees ciphertext, not your raw data.
    Storage
  • Collective‑run mail for activists; focuses on minimal logging and political safety rather than mainstream features.
    Email
  • Mail2Tor
    Tor‑only anonymous email service; accessible via .onion, designed to hide origin IP but depends on operator’s OPSEC.
    Tor mail

7. Virtualisation and cleanup

VMs and system cleaners you can use to compartmentalise and reduce residual traces.

Tools

  • Type‑2 hypervisor; runs virtual machines for sandboxed OS environments, useful for risky tasks or identity isolation.
    VM
  • Virtualization platform; runs multiple OSes as VMs with snapshots, good for testing and compartmentalization.
    VM
  • System cleaner; deletes temp files, history, and cached data—must be used carefully and not relied on alone for privacy.
    Cleanup
  • BleachBit
    Open‑source system cleaner and shredder; removes caches and can overwrite free space to reduce simple recovery.
    Cleanup