Digital best practices

Contents

The foundation of digital best practices is to limit the reach of technology into your life. Try to limit your use of digital devices, in particular for sensitive activities. That said, there are a number of best practices that you can follow when using digital devices.

Do not use a phone, or leave your phone at home

A phone location is tracked at all times, its hardware identifiers and subscription information are logged by cell towers with every connection, and it can be hacked. If possible, do not use a phone. If you must use a phone:

Use security-oriented operating systems

Use:

Do not use Windows, MacOS, iPhones, and stock Android.

Encrypt your devices

Enable Full Disk Encryption on all your digital devices.

Use strong passwords

Most of your passwords (e.g. passwords you use to log in to websites) should be generated by and stored in a password manager — we recommend KeePassXC[7] — so that you don't have to remember them or even type them. They can be very long and random, say 40 random characters. You can generate such passwords with KeePassXC (select the “Password” tab when generating a password).

The passwords you enter when booting your encrypted devices and KeePassXC's password must be memorized. We recommend using Diceware[8] passwords of 5 to 7 words[9]. You can generate such passwords with KeePassXC (select the “Passphrase” tab when generating a password) or with physical dice[10]. You should use different passwords for each of your encrypted devices, but you can use the same password for all your KeePassXC databases.

For example, if you have an encrypted laptop, a Tails stick and an encrypted phone, you will have to remember 4 passwords of 5 to 7 words (one for each device and one for the KeePassXC databases). This is a lot! To make sure you don't forget all those passwords, you can:

Use Tor or a VPN

Use Tor[5] or a reputable Virtual Private Network (VPN) for your Internet activity. If you use Tor or a VPN and an adversary is monitoring your network traffic, it is harder for them to obtain data about your Internet activity, such as what websites you visit or what you do on those websites (it is also harder for them to target you with malware).

However, note that Tor and VPNs are not equivalent:

Therefore:

To make it harder for the State to know that you are using Tor, you can use both Tor and a VPN simultaneously by connecting to a VPN before Tor[11]. You should not connect to a VPN after Tor unless you really know what you are doing[12].

Use end-to-end encrypted messaging applications

Use end-to-end encrypted messaging applications for all your digital communications:

Back up your digital data

Back up your digital data regularly, especially data you really don't want to lose, such as your password manager database. Encrypt your backups with Full Disk Encryption. A typical practice is to have two backups:

The advantage of the on-site backup is that it has a more recent version of your data. The advantage of the off-site backup is that it cannot be seized in the event of a house raid against your home.

Store your devices in a tamper-evident way

If an adversary physically accesses one of your digital devices, they could tamper with it, making it unsafe to use. To detect when an adversary has physically accessed a device, you can use tamper-evident preparation.

Buy your devices anonymously

Buying digital devices anonymously has two advantages:

If necessary, physically destroy your storage devices

If you want to ensure that an adversary can never access the data stored on a storage device (e.g. a laptop's hard drive, a USB stick, a SD card), the only solution is to physically destroy the storage device. This is because:

To physically destroy a storage device:

Techniques addressed by this mitigation

NameDescription
Alarm systems

When carrying out a cyber action, you can use digital evasion techniques[17] to prevent intrusion detection systems from detecting the action.

Covert surveillance devices
Video

An adversary can install covert video surveillance devices that can film a computer or phone screen, or a computer keyboard. To mitigate this, when using a computer or phone for sensitive activities, you can:

  • Keep the device facing a wall that you can thoroughly search for covert video surveillance devices (rather than facing a window or TV, for example).
  • Enter your passwords while under an opaque sheet or blanket.
Door knocks

You can follow digital best practices to make it harder for an adversary to log who you contact after they knock on your door.

Forensics
Digital

An adversary can use digital forensics to retrieve data from a computer you have used. To mitigate this, you can follow digital best practices and, in particular, use Tails[3], an “amnesic” operating system designed to leave no trace on the computer it runs on.

When investigating a cyber action, an adversary can use digital forensics to analyze the targets of the action to determine where the action came from, a process called attribution which may include determining what tools were used in the action and any other digital “signatures”. When carrying out a cyber action, you can follow digital best practices to make it harder for an adversary to achieve attribution. For example, you can:

  • Use popular rather than custom tools.
  • If you use Virtual Private Servers (VPSs), purchase them anonymously and access them through Tails[3].
Mass surveillance
Mass digital surveillance

You can follow digital best practices to make mass digital surveillance ineffective. For example, you can use Tor[5] to anonymize your Internet activity, and you can use security-oriented operating systems and applications that limit the data they store or collect about you.

Network mapping

You can follow digital best practices, and in particular use end-to-end encrypted messaging applications on encrypted devices, to obscure your social networks and make it harder for an adversary to conduct network mapping.

Service provider collaboration

You can follow digital best practices to make it harder for an adversary to use the collaboration of service providers to obtain information about you. For example, you can:

  • Use Tor[5] so that an adversary cannot obtain data about your Internet activity through the collaboration of your Internet service provider.
  • Use trusted online services[15] that will refuse to comply with an adversary's requests to access your data, or build their service to make it technically impossible to comply with such requests.
  • Use peer-to-peer applications such as Cwtch[13] and Briar[14] for communication or OnionShare[18] for file sharing to avoid having to trust a service provider.
Targeted digital surveillance
Authentication bypass

You can follow digital best practices, and in particular use security-oriented operating systems with Full Disk Encryption (FDE) and strong passwords, to make it harder for an adversary to bypass authentication on your digital devices. For example:

  • On computers, you can use the Linux FDE called LUKS, which is used by many Linux systems, such as Debian[1] and Tails[3], and which the forensics department of the German federal police was unable to decrypt after a year of effort.
  • On phones, you can use GrapheneOS, whose FDE makes it difficult for an adversary to guess the encryption password by brute force: after 140 failed attempts, each is delayed for a full day[19].
Malware

You can follow digital best practices, and in particular use security-oriented operating systems to make it harder for an adversary to install malware on your digital devices.

Network forensics

You can follow digital best practices, and in particular use Tor[5], to make it harder for an adversary to monitor and analyze your network traffic.

Physical access

You can follow digital best practices to mitigate the risk of an adversary physically accessing your digital devices. For example, if you are going to an event or demonstration and you think that you could be arrested, you should not take your phone with you.