Guides · runbooks · checklists

Guides for privacy, defense & forensics

Practical notes you can apply: phone hardening, comms patterns, incident response, and forensic methodology. No “magic anonymity”. No operational evasion. Clean, defensive, useful.

Scope: defensive Style: checklists + why Focus: calm + realistic
find
All
Mobile
Comms
Forensics
Web
Ops
Mobile

GrapheneOS hardening baseline

Profiles, app minimization, permission discipline, and a calm baseline that raises exploit cost.

Difficulty: starter Profiles Permissions
Mobile

High-risk phone checklist

Patch strategy, safer workflows, and what to do when you suspect targeting.

Difficulty: intermediate Zero-click Hygiene
Mobile

Backups you control

A simple encrypted backup plan with restore tests and minimum third-party exposure.

Difficulty: starter 3-2-1 Restore
Comms

Secure comms: what E2E does and does not protect

Clear mental model: encryption is strong, but endpoints and metadata still matter.

Difficulty: starter E2E Endpoints
Comms

On-prem messaging: keys, logs, governance

How to own your comms stack without turning it into a liability or a shadow archive.

Difficulty: advanced Keys Policy
Forensics

Forensic imaging 101: chain of custody

Write blockers, hashing, notes, clean copies, and a defensible workflow.

Difficulty: starter Hashes Method
Forensics

SSD reality: TRIM, carving, and what’s recoverable

Why undelete differs on SSDs and what early imaging can still save.

Difficulty: intermediate TRIM Limits
Web

Web hardening baseline: cookies + CSP + headers

Practical baseline that reduces common web risks and lowers exploitability.

Difficulty: intermediate CSP Headers
Ops

Incident response: containment-first playbook

Contain, preserve, eradicate, recover, learn. A calm workflow teams can follow.

Difficulty: starter Containment Evidence

Notes: These guides focus on defensive security and forensic methodology. Anti-forensics, evidence destruction, and operational evasion are intentionally out of scope.