Digital best practices

Contents

The foundation of digital best practices is to limit the reach of technology into your life. Try to limit your use of digital devices, in particular for sensitive activities. That said, there are a number of best practices that you can follow when using digital devices.

Do not use a phone, or leave your phone at home

A phone location is tracked at all times, its hardware identifiers and subscription information are logged by cell towers with every connection, and it can be hacked. If possible, do not use a phone. If you must use a phone:

Use security-oriented operating systems

Use:

Do not use Windows, MacOS, iPhones, and stock Android.

Encrypt your devices

Enable Full Disk Encryption on all your digital devices.

Use strong passwords

Most of your passwords (e.g. passwords you use to log in to websites) should be generated by and stored in a password manager — we recommend KeePassXC[7] — so that you don't have to remember them or even type them. They can be very long and random, say 40 random characters. You can generate such passwords with KeePassXC (select the “Password” tab when generating a password).

The passwords you enter when booting your encrypted devices and KeePassXC's password must be memorized. We recommend using Diceware[8] passwords of 5 to 7 words[9]. You can generate such passwords with KeePassXC (select the “Passphrase” tab when generating a password) or with physical dice[10]. You should use different passwords for each of your encrypted devices, but you can use the same password for all your KeePassXC databases.

For example, if you have an encrypted laptop, a Tails stick and an encrypted phone, you will have to remember 4 passwords of 5 to 7 words (one for each device and one for the KeePassXC databases). This is a lot! To make sure you don't forget all those passwords, you can:

Use Tor or a VPN

Use Tor[5] or a reputable Virtual Private Network (VPN) for your Internet activity. If you use Tor or a VPN and an adversary is monitoring your network traffic, it is more difficult for them to obtain data about your Internet activity, such as what websites you visit or what you do on those websites (it is also more difficult for them to target you with malware).

However, note that Tor and VPNs are not equivalent:

Therefore:

Unless you really know what you are doing, do not use both Tor and a VPN simultaneously[11].

Use end-to-end encrypted messaging applications

Use end-to-end encrypted messaging applications for all your digital communications:

Back up your digital data

Back up your digital data regularly, especially data you really don't want to lose, such as your password manager database. Encrypt your backups with Full Disk Encryption. A typical practice is to have two backups:

The advantage of the on-site backup is that it has a more recent version of your data. The advantage of the off-site backup is that it cannot be seized in the event of a house raid against your home.

Store your devices in a tamper-evident way

If an adversary physically accesses one of your digital devices, they could tamper with it, making it unsafe to use. To detect when an adversary has physically accessed a device, you can use tamper-evident preparation.

Buy your devices anonymously

Buying digital devices anonymously has two advantages:

If necessary, physically destroy your storage devices

If you want to ensure that an adversary can never access the data stored on a storage device (e.g. a laptop's hard drive, a USB stick, a SD card), the only solution is to physically destroy the storage device. This is because:

To physically destroy a storage device:

Techniques addressed by this mitigation

NameDescription
Alarm systems

When carrying out a cyber action, you can use defense evasion techniques[16] to prevent intrusion detection systems from detecting the action.

Door knocks

It is more difficult for an adversary to log who you contact after they come knocking if you use digital best practices.

Network mapping

Social networks can be obscured by limiting digital communications to end-to-end encrypted messaging on encrypted devices.

Service provider collaboration

Using a trusted service provider[14] means that they will refuse to comply with an adversary's requests to access your data, or build their service to make it technically impossible to comply with such requests. Using peer-to-peer applications such as Cwtch[12] and Briar[13] for communication or OnionShare[17] for file sharing avoids the need to trust a service provider.

Targeted digital surveillance
Authentication bypass

Using secure operating systems with Full Disk Encryption (FDE) and strong passwords should prevent authentication bypass. For example, on phones GrapheneOS implements encryption[18] to make brute-force password guessing impossible — after 140 failed attempts, each is delayed for a full day. On computers, the forensics department of the German federal police was unable to decrypt Linux FDE (called LUKS), used by many Linux systems such as Debian[1] and Tails[3], after a year of effort. FDE on MacOS, Windows, iPhone or stock Android should not be relied upon.

Malware

Using security-oriented operating systems and other digital best practices makes malware installation less likely. Phishing awareness is also important — don't open attachments or click on links sent to you by people you don't trust.

Network forensics

If you use Tor[5] or a VPN, it is harder for an adversary to analyze your network traffic.

Physical access

Don't take your phone with you if you're likely to be arrested, and ideally leave it at home as much as possible.

Forensics
Digital

To retrieve electronic data from a computer that has been turned off, the computer must contain traces of what it was used for. To prevent this, you can use Tails[3], an “amnesic” operating system designed to leave no trace on the computer it runs on. Tails is a forensic examiner's worst nightmare.

When investigating cyber actions, forensic methods are used to analyze the targets of the hack to determine where the attack came from (attribution) — this may include determining what tools were used and any other “signatures”. The use of popular rather than custom tools can help prevent attribution. If attribution is possible, discrete hacks can be linked together. Implementing operational security during the hack will get in the way of deanonymization — any Virtual Private Servers (VPSs) used should be purchased anonymously and accessed only through Tails[3].

Mass surveillance
Mass digital surveillance

Tor[5] renders mass digital surveillance ineffective by anonymizing Internet use. If Tor is not an option, using a VPN also increases your privacy by routing your Internet traffic through privacy-oriented services instead of your Internet Service Provider. Open-source and security-oriented operating systems and applications limit the data they store or collect about you as much as possible.

Covert surveillance devices
Video

Hidden cameras can film a computer or phone screen, or a computer keyboard. When using a computer or phone for sensitive activities, keep the device facing a wall that can be thoroughly searched for hidden cameras (rather than a window or TV, for example).

References

9. 

Use 5 words to be safe right now, and 7 words to be safer in the future. This recommendation is based on the assumption that you use the operating systems we recommend, on our best knowledge of our adversaries' capabilities, and on time and cost estimates of brute-forcing modern cryptosystems.

11. 

For more information on the benefits and drawbacks of doing this, see here.