0 0
Read Time:2 Minute, 48 Second

ZeroTrust – trust no one, not even yourself.

To get started, read about the ZeroTrust of a healthy person from the Greenhouse of Social Technologies:

https://te-st.ru/2022/09/19/zero-trust/

If you are a partisan, forget what is written there, this is not for you, but for peaceful activists. You need a paranoid level of ZeroTrust to operate and stay free:

  • 1. Any interlocutor can turn out to be a member of the special services.
  • 2. A person you trust may spill the beans and give you away.
  • 3. A member of your resistance cell can be arrested by accident or on purpose, and pull the rest of the guerrillas through the chain of acquaintances.
  • 4. Your smartphone, laptop, computer, tablet may be stolen/lost/broken/confiscated by employees.
  • 5. Any group chat with any access can be infiltrated by employees. The larger the group and the more extreme the activity of the group, the higher the probability.
  • 6. Contact address can be forged (eg admin and admln).
  • 7. A link to a seemingly safe resource can be forged (twitter twiter twittr)
  • 8. 100% secure and trusted interlocutor can be hacked or otherwise compromised.
  • 9. Your Russian internet/mobile provider records your traffic and sends it to the authorities (it’s not even paranoia, it’s a fact, google “SORM” if you don’t know).
  • Therefore, all your unencrypted conversations, including regular cellular communications (it is almost not encrypted by operators), are known”.
  • 10. All Russian Internet services are either already rerouting data or are about to do so.
  • 11. Centralized Whatsapp, Viber and other “unblocked” foreign messengers “cooperate” with the Russian security forces in various forms.

With Telegram, the situation is not entirely clear. On the one hand, the RKN fought with him and lost, and now Durov is putting a bolt on fines for “fake news about the Russian army and his own”.

On the other hand, there is the fact that Smart Voting was blocked in the last Duma elections, probably because of the hostages – employees in Russia who were threatened with physical violence.

At the moment, we have not been able to reach Telegram technical support since September 25th, and Durov himself is also not visible on the air.

How to survive if you are paranoid in such a situation?

  • 1. Always assume that your interlocutor is a true major who sews a case on you and all your words can become evidence.
  • 2. Don’t tell anyone anything that might deanonymize you. No personal details to anyone, even if you trust us – including.
  • 3. Do not tell anyone the details of your plans, which will accurately indicate the place and time of the action.
  • 4. Use completely anonymous accounts that are not linked in any way to your non-anonymous accounts and personal data.
  • 5. On local devices, keep a minimum of information related to the “partisan personality” or nothing at all, including anonymous messenger accounts. If you keep something, have a plan on how to quickly destroy the media/device.
  • 6. Store sensitive data and accounts in “clouds” and network folders in encrypted form. Links to these “clouds”, logins and passwords do not write down anywhere – remember.

Points 1-4 protect against linking the “partisan personality” to a real person. Paragraphs 5-6 allow “plausible deniability” in the event of a stop and search.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence