2026-02-18
Disclaimer
This is an obvious point to me (lots of evidence I can't sit and explain right now), but some people I meet and some opsec guides I see still don't seem to take it seriously.
Decide if you're someone who will have good opsec or no opsec, and actually stick to that. Good opsec is actually very tight and moderately simple. The people who are worst off are the people who half-ass opsec. They take on all the cognitive load of maintaining good opsec, and not get much of the benefit.
Example of someone making this mistake - using a VPN 95% of the time but not using it the remaining 5% of the time. This is actually worse than just not using a VPN, because you additionally took on a bunch of cognitive load that made you less productive.
This also ties into a general point I have around highly transparent and highly secret actors being the most effective actors in general, in today's internet-driven society.
Enter email or phone number to subscribe. You will receive atmost one update per month
Enter comment