Operational Security (OpSec)
Data Encryption, Storage, and Destruction
Comprehensive guide to protecting data at rest through encryption, managing secure backups, scrubbing metadata, and permanently destroying sensitive information to prevent forensic recovery.
Device Hardening and Hygiene
Comprehensive guide to securing mobile and desktop devices against physical seizure, forensic extraction, and digital surveillance within the Iranian threat landscape.
High-Risk Operations: Protests and Travel Security
A comprehensive guide for Iranian activists and high-risk individuals on maintaining digital and physical security during protests, direct actions, and travel. Includes strategies for device sanitization, border crossings, and emergency response.
Holistic and Organizational Security Strategy
A comprehensive guide to integrating digital, physical, and psycho-social security for individuals and organizations operating in high-risk environments like Iran.
Identity, Authentication, and Account Security
Comprehensive guide on securing digital identities for Iranian users, covering strong authentication, compartmentalization, and protection against state-sponsored account compromise.
Internet Privacy: Browsers, VPNs, and Tor
A comprehensive guide to securing your web browsing, selecting trustworthy VPNs, and using Tor to bypass censorship and surveillance in the Iranian context.
Secure Communication Tools
A comprehensive guide to selecting and using secure communication tools in Iran, focusing on bypassing censorship, avoiding surveillance, and mitigating risks associated with popular platforms like Telegram.
Social Media Security and Migration
Comprehensive guide for Iranian users on securing social media accounts, managing online identities, and migrating to privacy-focused alternatives to mitigate state surveillance.