Skip to main content

TECHNOLOGY

We help you stay secure with resources, tools, and hardware.

Read the guide

The AI insider’s OpSec & Privacy Toolkit

Introduction

CONTEXT

Your Security Matters

At AIWI, we don’t just build tools to support you—we embed operational security and cybersecurity into everything we do.

That same robust commitment extends to helping you protect yourself and navigate the challenging environment a whistleblower must steer through.

Why We Built This Toolkit

We’ve carefully curated resources and best practices to help you improve your digital safety. This toolkit represents our commitment to sharing knowledge that keeps you secure during your disclosure journey.

For us, OpSec Comes First

We prioritize operational security (OpSec) as our preventative strategy because it provides the comprehensive framework for protection. It also encompasses all aspects of our operations.

What You’ll Find Here

We’ve organized practical checklists and proven best practices covering the most critical areas of digital security. Each section provides actionable steps you can take to improve your security posture.

DISCLAIMER

This toolkit provides carefully curated best practices and resources, but security isn’t one-size-fits-all. Your operational security is only as strong as its weakest link, and no collection of tools can guarantee absolute safety and security.

Use this as your guide, not your guarantee. Please note: We do not request or encourage potential whistleblowers to act unlawfully.

THREAT MODEL, ESSENTIAL DEFINTIONS & LANGUAGE

Protecting yourself starts with understanding your threat model. From there, you’ll need to elevate your privacy and operational security across all parts of your life.

Think of every place you leave traces or exchange data—whether with the outside world or between your own devices.

Below, we’ve provided essential context to help you map your threat model, along with recommended reading and carefully curated resources to support your next steps.

What Is a threat model?

Threat modelling is a systematic approach to gaining comprehensive understanding about potential risks to your operations. It helps you identify:

  • What could go wrong

  • Who might pose a threat

  • How they might act against you

  • When vulnerabilities might be exploited

  • What countermeasures you can implement

The goal is to look ahead and understand possible scenarios before executing your plans and operation, allowing you to implement efficient countermeasures and understand your risks.

Think of it as a proactive strategy to defuse threats rather than attempting damage control after the fact.

Core questions for threat assessment

Every effective threat model addresses four fundamental questions:

  1. What important assets do I have? (Assets)

  2. Who might try to compromise them? (Threat Actors)

  3. How could they compromise them? (Threats/Vulnerabilities)

  4. What can I do to stop them or make it harder for them? (Countermeasures)

 

The STRIDE framework

Another valuable approach to threat modeling is the STRIDE Framework, which categorizes threats into six types: SpoofingTamperingRepudiationInformation DisclosureDenial of Service, and Elevation of Privileges.

For whistleblowers and security-conscious individuals, these translate to:

  • Spoofing: Someone impersonating you or a trusted contact

  • Tampering: Evidence being altered or destroyed; communications being intercepted and modified

  • Repudiation: Being unable to prove that you sent a message, or an adversary denying your actions

  • Information Disclosure: Confidential communications, identity, or evidence being exposed

  • Denial of Service: Getting locked out of accounts or communication channels

  • Elevation of Privileges: An adversary gaining unauthorized access to your accounts or devices

Click to read more on threat modelling here

OpSec vs. CyberSec vs. InfoSec

Understanding the relationship between different security disciplines is crucial for building a comprehensive protection strategy.

Security disciplines: How they work together

OpSec vs. CyberSec vs. InfoSec are intertwined, with each influencing and supporting the others. Cybersecurity and information security often overlap, and their methodologies are frequently applied within the realm of operational security. To help clarify these connections, this guide provides official definitions, source references, and an explanation of how these concepts interrelate.

  • Operational Security (OpSec)

OpSec is the process by which potential adversaries can be denied information about capabilities and intensions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities. 

In practical terms, Operational Security encompasses the strategies and measures you apply to secure and identify important information, threats, risks, and weaknesses. By identifying and analyzing these elements, you can structure your operations to successfully defend against potential threat actors and achieve your goals—whether that’s maintaining personal security, preserving privacy or anonymity, or protecting sensitive assets and knowledge.

  •  Cybersecurity (CyberSec)

According to CISA, cybersecurity is “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.” 

Cybersecurity plays a crucial role in OpSec, as most of our work and information sharing occurs through computing devices and digital networks.

  • Information Security (InfoSec)

Information Security involves “the protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.” 

Information Security is fundamental to OpSec because, depending on your operation, you need to safeguard information, prevent unauthorized disclosure, or strategically control information release.

Safety Vs Safework

  • Safety focuses on protecting against unintentional harm. For example, poorly implemented privacy measures might unintentionally leak your identity.
  • Security addresses malicious acts by threat actors who intend harm or damage, with the goal of disrupting your operation or preventing its success.

Privacy vs. Anonymity

Privacy and anonymity are overlapping concepts that can be combined in various ways. Often, you’ll face situations where you cannot achieve both fully and simultaneously. This is where threat modeling becomes essential—it enables you to make informed decisions about where compromises may be necessary.

  • Privacy is the assurance that your data is only seen by the parties you intend to view it. In instant messaging, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. 
  • Anonymity is the ability to act without a persistent identifier. You might achieve this online with Tor, which allows you to browse the internet with a random IP address and network connection instead of your own. Pseudonymity is a related concept that allows you to have a persistent identifier without it being tied to your real identity. If everyone knows you as @GamerGuy12 online, but nobody knows your real name, that pseudonym provides a layer of protection. 

The Toolkit

CONTEXT

Name
Description
Links
Privacy Guides

Outstandingly well composed recommendations, articles, and a full knowledge database about securing your privacy. If you want to deep-dive, this is the right place to do so. Compared to the digital-defense guide, expect less hand-holding, no checklists, but comprehensive, highly detailed, and up to date articles provided by a strong community. A volunteer driven non-profit that we recommend anyone (whistleblower or not) to get familiar with.

Digital Defense Guide

If you are looking for a general purpose digital defense checklist that you can work through step-by-step, then this is your go-to.

EFF Surveillance Self-Defense

The Electronic Frontier Foundation fights for digital privacy, free speech, and innovation. They are a household name in the industry and a great resource. The Surveillance/Self-defense guide is a great starting point for any concerned individual.

EFF Surveillance Self-Defense

The Security section bundles concise, expert-written playbooks on both information and physical security for tech employees – especially anyone considering or engaged in whistleblowing. It walks you through practical digital-self-defense against employer surveillance, and offers a stepwise escalation plan for handling personal threats, so you can protect your data, privacy and physical safety while acting responsibly.

AIWI Recommendations

Top 5 privacy rules

Privacy protection is fundamental to securing your identity, your sources (if applicable), and any information you intend to disclose. The following five rules represent essential practices that deliver significant privacy improvements with relatively low effort.

Minimize your digital footprint

Rationale
Key Actions For You
Audit Your Online Presence
Secure Your Location Data
  • Disable location sharing features on social media platforms and mobile applications

  • Review photo metadata settings to prevent automatic location tagging

Control Public Information Sharing
  • Be mindful of sharing personal information on public forums or social media platforms, avoiding disclosure of sensitive details, routine patterns, or specific location data
  • Remember: Digital content may persist indefinitely, regardless of deletion attempts
  • Understand the limitations of data deletion rights – legal precedents have required technology providers to maintain data logs, and many organizations lack comprehensive deletion protocols
Implement Identity Separation
  • Utilize pseudonyms or anonymous accounts for sensitive online activities to create separation from your real identity

  • Pursue opt-out procedures with data brokers and public record services to reduce the availability of personal information in searchable databases

Recommended tools
Anonymous Email Services
  • Anonymous email accounts serve as your first line of defense against identity tracking.They enable the creation of untraceable social media and user accounts, while remaining detached from your personal identity. This helps you secure your operation, as it separates your email communication from the context of your work.Do make sure not to slip into accidentally using the wrong email account. One way of preventing this is always making sure to switch to their respective clients, and never integrate them into the same email client with your private emails.With Tuta this is impossible by default, but Proton allows the usage of a Bridge to load emails into your Thunderbird or other IMAP clients, we recommend against those practices since it bypasses encryption partially and makes it easier to send emails from private accounts held in the same client by accident.
    1. Mailbox – German-based email provider with robust privacy protections and integrated PGP encryption support for secure communications.
    2. ProtonMail – Swiss-based secure email with end-to-end encryption and anonymous account creation through cash paymentsAnonymous account creation is possible: you can sign up for a free account using a temporary email address (e.g., Guerrilla Mail) for the verification step, which has been successfully tested.
    3. Tuta – German secure email provider featuring comprehensive E2E encryption and zero-knowledge calendar integration for complete privacy protection.
Data Removal Resources
  • Data brokers continuously collect and sell personal information. Regular removal requests significantly reduce your digital footprint and limit unauthorized access to your data.

    1. Start Here:
      A great place to begin is the GitHub Data Broker Opt-Out List, which provides detailed instructions for opting out of various data broker sites.
    2. Opt-Out Tools & Services:
      For general-purpose opt-out tools and service providers (including both free and paid options), refer to the Privacy Guides’ section on data broker removals.

    3. More Reading:
      To better understand how to protect your privacy online, we recommend exploring these additional resources from Privacy Guides:

    A word of caution:

    When using data removal platforms, you will inevitably have to provide your personal information to the services that will attempt to remove them from broker lists. If you aren’t already on those lists, this is an unnecessary risk, since one more party now holds onto your data. It’s generally recommended to use broker/data removal services when you are already experiencing a flood of phishing attacks, scam, and advertisement calls/annoyances.

Temporary Email Services
Impact

Use strong, unique passwords and Two-Factor Authentication (2FA)

Rationale
Key Actions For You
  • Create unique passphrases for every account. Password managers generate and store complex credentials automatically. Strong passphrases combine random words rather than predictable patterns.

  • Enable 2FA on critical accounts first. Protect email, financial services, social media accounts, and other services you may use for whistleblowing activities. Use authenticator apps (TOTP) or hardware security keys over SMS-based 2FA where possible.

  • Secure your 2FA backup codes offline. Store 2FA recovery codes in a safe location separate from your devices. These codes restore access if your primary authentication method fails.

  • Choose a reputable password manager. This tool manages password complexity without requiring you to memorize dozens of unique credentials.

Impact

Using a password manager significantly reduces your risk of account takeover from threats like credential stuffing, password guessing, and phishing attacks. It protects the sensitive information stored in your online accounts.

A major vulnerability for many users is relying on a single, often weak, password across multiple services. If that password is exposed in a data breach, every account using it is at risk. A password manager solves this by automatically generating and storing strong, unique passwords for each service by eliminating the need for you to remember them all.

However, this convenience comes with a trade-off: the password manager itself becomes a high-value target. That’s why it’s crucial to secure it properly. Your master passphrase must be both extremely strong and memorable. In addition, the password manager account should be protected with the most secure form of two-factor authentication (2FA) available.

Hardware security keys offer the highest level of 2FA protection. Unlike SMS codes or authenticator apps, hardware keys are resistant to phishing and malware, making them the most robust defence against unauthorized access.

Depending on their threat model, individuals might have to consider creating strong passwords manually instead and storing them in a safe physical location – rather than on the cloud. EFF’s Dice-Generated Passphrases is a suitable method for this.

Encrypt your devices and data

Rationale
Key Actions For You
  • Enable disk encryption on all devices:
    Turn on full disk encryption (FDE) for your laptops (e.g., BitLocker for Windows with LVM, FileVault for macOS), smartphones (enabled by default on modern iOS and configurable on Android), and any external drives used for sensitive data or backups.
  • Use strong passphrases for encryption:
    The effectiveness of full disk encryption relies heavily on the strength of the passphrase you use to unlock the device. Choose a long, complex passphrase that’s hard to guess.
  • Encrypt sensitive files and backups individually:
    For added protection (especially when storing data in the cloud or on portable media), use file-level encryption tools like VeraCrypt or 7-Zip to secure specific files or backup archives.
Recommended tools
  • Linux: Use LUKS on LVM – The Arch Wiki provides an excellent guide.

  • Windows: Enable BitLocker – See Microsoft’s official article here.

  • macOS: Use FileVault – Apple’s documentation is available here.

  • Android/iOS: Rely on the built-in encryption features provided by the operating system.

Impact

Full-disk encryption (FDE) protects your data at rest (when your device is powered off) against unauthorized physical access. If your device is lost or stolen, encryption keeps your data confidential.

FDE should be considered a non-negotiable baseline for security. Fortunately, most modern operating systems make it straightforward to enable.

However, it’s important to recognize the limits of FDE:

  • It does not protect data on a device that is already powered on and unlocked.

  • Therefore, using a strong password or PIN and enabling auto-lock features is equally critical.

Finally, don’t forget your backups, especially those stored off-site or in the cloud. Backups must be encrypted as well. An unencrypted backup can be just as dangerous as an unsecured device, particularly if it contains sensitive communications or evidence.

Control And sanitize your metadata

Rationale
Key Actions For You
  • Assume metadata is present. Nearly all digital files include it.

  • Remove metadata from all shared files before sharing them, especially evident: Use metadata removal tools or built-in OS features.

  • Disable location tagging on your smartphone camera.

  • Be mindful when photographing documents. Avoid including reflections, identifying items, or background details that could reveal your identity.

Recommended tools
  • Basic Removal: Use built-in tools like Windows File Explorer or macOS Preview.
  • Advanced Removal: Tools like ExifTool or MAT2 (note: these may require more technical skill).
  • PDF-Specific Tools: Online options like PDF24 Tools or Smallpdf.
Impact

Metadata clean up and sanitization prevent accidental exposure of identifying information embedded within your files. This practice protects your anonymity and maintains the confidentiality of your activities.

Digital files carry two types of signatures that can identify you. The content itself, the “facts are their signature,” can point to you through context and details. Metadata adds a technical signature, revealing the “who, when, where, and how” of file creation.

Specific examples include:

  • EXIF data in photos containing GPS coordinates of capture location

  • Camera model and serial number identification

  • Document properties listing author names and creation software

  • Timestamps establishing patterns of your digital activity

When you submit a document with your name in the author field, or share a photo with GPS data pointing to your location, your anonymity is immediately compromised. Removing this metadata creates an essential security barrier before sharing any evidence or sensitive files.

Use privacy-focused browsing practices

Rationale
Why This Matters

Websites and advertisers deploy multiple tracking techniques across the internet. These include cookies, browser fingerprinting, and embedded tracking scripts that monitor your every move. Browser fingerprinting presents a particular threat because it collects specific details about your browser configuration—fonts, plugins, user agent strings—to create a unique digital signature. This identifier persists even when you disable cookies.

The risk: Adversaries can use this tracking data to build comprehensive profiles of your activities and potentially link them to your disclosure activities.

Key Actions For You
Choose a Privacy-Respecting Browser

Primary recommendation: Firefox with enhanced privacy configuration provides strong foundational protection. Configure it following established privacy guidelines to maximize security.

Alternative options:

  • LibreWolf: A Firefox fork with built-in privacy features that eliminate manual configuration requirements
  • Mullvad Browser: Designed to make all users appear identical, providing protective anonymity through crowd blending
  • Brave: Offers built-in tracker blocking, though it operates on Chromium and connects to cryptocurrency systems—disable advertisement features immediately

Avoid: Chrome and Edge maintain extensive tracking mechanisms that compromise your privacy.

Configure Critical Browser Settings

Your browser requires specific security configurations to protect your activity:

  • Enable strict tracking protection: Set Firefox’s Enhanced Tracking Protection to “Strict” mode
  • Block third-party cookies: Prevents cross-site tracking mechanisms
  • Activate HTTPS-Only mode: Ensures encrypted connections to all websites
  • Disable telemetry: Stops data collection by browser developers
  • Clear browsing data regularly: Remove history, cookies, and cache if not using private browsing exclusively
Search Engine Security

Recommended privacy-respecting alternatives:

  • Oaisis Search : Specialized privacy-focused search engine
  • DuckDuckGo: Established no-tracking search provider
  • Startpage: Provides Google results without tracking
  • Brave Search: Independent search index with privacy protections

Security principle: These alternatives claim not to track your searches, preventing the creation of search-based behavioral profiles.

Essential Privacy Extensions

Install these critical security tools:

  • uBlock Origin: Comprehensive ad and tracker blocking system
  • Privacy Badger: Blocks non-consensual tracking mechanisms automatically

Note: LibreWolf includes these protections by default. Mullvad Browser incorporates similar protections in its base configuration.

Advanced Protection Measures

For high-sensitivity critical research activities, consider Tor Browser. This provides additional anonymity layers through encrypted routing networks.

Ephemeral environments offer maximum protection for sensitive work:

  • Whonix: Isolated virtual machine environment
  • Tails: Amnesic operating system that leaves no traces
  • Qubes: Compartmentalized security architecture

Hardware support: Contact us for assistance with secure hardware provisioning if needed.

Impact

Implementing these practices delivers multiple security benefits:

  • Reduces tracking exposure: Minimizes data collection about your browsing patterns

  • Prevents profile building: Makes it significantly harder for adversaries to construct behavioral profiles

  • Breaks activity correlation: Disrupts attempts to link your research to whistleblowing activities

Websites and advertisers use a variety of methods to track you online, including cookies, browser fingerprinting, and tracking scripts embedded in web pages. Browser fingerprinting, for example, gathers detailed information about your browser (such as installed fonts, plugins, and user agent) to create a unique identifier, even if cookies are disabled.

Privacy-focused browsers and extensions are designed to block these tracking methods and reduce how unique your browser appears. One example is Mullvad Browser, which aims to make all users look the same, creating a uniform digital identity that helps you blend in. This kind of anonymity is especially valuable if you’re researching sensitive topics related to your disclosure.

AIWI Recommendations

Top 3 operational security (OpSec) hygiene rules for whistleblowers

Operational Security (OpSec) is the contextual process of identifying critical information, analyzing potential threats, assessing vulnerabilities, and implementing measures to protect that information and associated activities. As a whistleblower, OpSec safeguards your communications, evidence, and disclosure methods you use.

Communicate securely and anonymously when necessary

Rationale
Key Actions For You
Use end-to-end encrypted (E2EE) messaging apps

Signal is a widely recommended option for your E2EE calls and messages

Harden Your Messaging Setup

After connecting on Signal, tap on your contact’s name and select “Verify Safety Number”. This ensures you’re talking to the right person — not an imposter or a man-in-the-middle intercepting your messages.

Use Secure Email Services
  • Choose services with built-in E2EE, like Proton Mail or Tuta
  • Sign up anonymously (ideally via Tor Browser)
  • For external recipients, use password-protected E2EE options
Understand Metadata Risks

Even with E2EE, some information (like who you contacted, how often, and when) can still be visible via:

  • Service provider logs
  • Network traffic analysis

Always assume metadata is not private.

Treat accounts as disposable

Treat all accounts as if they are ephemeral and ready to be burned at any time. Whether due to a compromise or because a provider may comply with a cease and desist order.

Always operate under a zero trust policy.

Never use your work-related email or devices for any whistleblowing-related communication.

This includes:

  • Personal devices that have been used in a work context, and
  • BYOD (Bring Your Own Device) hardware that you carry into your employer’s environment.
Use Anonymous Communication Channels

For high anonymity:

For maximum anonymity:

  • Use Tails or Whonix on a dedicated device used only for whistleblowing activity.

Need help? We provide preconfigured devices for individuals in need.

Additionally: Exchange a PGP key with your partner, encrypt your messages, and share only the encrypted content as a payload across all communication channels.

Recommended tools
Impact
What to avoid:
What to use instead:
A Note on Metadata:

Use secure browsing for your anonymous research and submissions

Rationale
Key Actions For You
Choose a Secure Operating Environment:

Use one of the following privacy-focused systems for your research:

Download Tor Browser Safe

Get Tor Browser only from the official website on your available device: https://www.torproject.org

Use Tor for All Sensitive Activity

When conducting sensitive online research related to your whistleblowing, always use Tor Browser to protect your anonymity.

Stay Anonymous While Using Tor
Handle Downloads via Tor with Caution

Files downloaded through Tor (especially PDFs or Word docs), might make external network connections. To stay safe:

  • Open files on a device that is offline, or
  • If using Qubes OS, open them in an offline Qube
  • Use a tool like Dangerzone to convert risky files into safe PDFs 
Be Aware of Network Visibility

While Tor hides your IP from websites, your ISP can see you’re using Tor (unless you’re using a Tor bridge). If this is a concern:

  • Move into proximity of a location with a public wi-fi, such as near a café (e.g., Starbucks)

  • Do not enter the location to avoid their CCTV recording your presence, and use the public wi-fi

For High-Risk Situations:
Recommended tools
Impact

Makes it significantly harder for your online research or anonymous submissions to be traced back to your real IP address and identity.

How It Works:
What It Does:
Important to Know:

Secure your evidence meticulously

Rationale
Key Actions For You
Secure Evidence Early

Act before suspicion to your whistleblowing activities arises. Once your intentions are detected, access could be revoked or materials destroyed.

Store Your Evidence Securely

Encrypt everything. Use tools like VeraCryptencrypted USB drives, or if absolutely necessary, encrypted cloud storage only if you’ve configured it securely yourself.

Store physical documents in a safe, discreet place.

Consider hardware-encrypted USBs (e.g., Aegis Secure Key) for high security.

Avoid Removing Original Documents (if possible)

Especially unclassified documents.

  • Take photos using your personal, non-work phone
  • Strip metadata from images and files before storing or sharing
  • For digital files, copy them to a secure, isolated device that only you control
Always Sanitize Metadata

Before sharing any digital file, remove identifying metadata (timestamps, author info, location data, etc.).

Use Burner or “Clean” Devices

Use burner phonesclean laptops, or similar tools exclusively for handling and transmitting highly sensitive evidence.

Never use work-issued or personal devices tied to your identity. (Refer back to Rule 2: Use Secure Browsing for Your Anonymous Research and Submissions for more on this.)

Special Note on Classified Information

If your evidence involves classified data, you must only disclose it via authorized, secure channels to designated recipients.

Mishandling classified information could result in severe legal consequences.

Recommended tools
  • LUKS (linux),
  • VeraCrypt,
  • Encrypted USB drives,
  • Secure physical storage,
  • Metadata removal tools,
  • Burner phones/computers (we can provide you with burner phones and computers if you are an individual in need).
Impact

Protects the integrity and confidentiality of your evidence and minimizes the risk of the evidence being traced back to you through careless handling or digital forensics.

The act of you acquiring or copying evidence is often a high-risk phase. Common actions like accessing files on a work network, copying to a USB drive, or printing documents can all leave behind digital logs that your employer might scrutinize during an investigation, such as:

  • File access logs

  • Printer history

  • USB connection records

Using your personal phone to photograph documents might seem safer. It avoids work system logs, but there is a risk you should be aware of. If your phone is later compromised, or if you forget to remove photo metadata, it can still link the evidence back to you.

That’s why planning your method of evidence collection is critical to minimize these traces, considering the surveillance capabilities of the organization. The concept of “plausible deniability” applies. If the evidence you gathered cannot be irrefutably tied to you through digital fingerprints or other means, it provides a crucial layer of protection, even if suspicion falls on you. This ties back to the idea that “facts are their signature”; if your handling of those facts also leaves a traceable signature, your deniability is significantly weakened.

CONTACT & OTHER OFFERINGS

Need secure collaboration or expert knowledge?

Our current technology offerings and projects include:

Questions or Feedback?

Reach out to us