The Complete Guide to Digital Hardening
A practical, threat-model-driven guide for anyone serious about reclaiming digital sovereignty. No paranoia required — just methodical risk reduction.
Step 1: Threat Modeling — The Foundation
Before downloading any tool, define your threat model. This is the most important step and the one most people skip. Without one, you either do too little (false security) or too much (unsustainable friction that gets abandoned).
The EFF's Surveillance Self-Defense guide recommends answering five questions:
- What do I want to protect? Financial data, browsing history, physical location, communications, source identity.
- Who am I protecting it from? Advertisers, data brokers, hackers, ex-partners, employers, law enforcement, state intelligence.
- How likely is a threat? A journalist protecting a source faces fundamentally different risks than someone avoiding ad targeting.
- How severe are the consequences of failure? Embarrassing ads vs. job loss vs. imprisonment vs. physical danger.
- How much friction am I willing to accept? Perfect privacy is incompatible with maximum convenience.
Practical Threat Model Tiers
- Tier 1 — Everyday user: Avoid ads and data broker profiles. Tools: Firefox + uBlock Origin, NextDNS, password manager, Signal.
- Tier 2 — Privacy-conscious: Prevent behavioral profiling and cross-site identity linkage. Add: Firefox Multi-Account Containers, email aliasing (SimpleLogin), no Google/Meta accounts.
- Tier 3 — High-risk: Journalist, activist, lawyer, abuse survivor. Add: Tor Browser for sensitive research, Tails OS, Signal disappearing messages, burner devices, compartmentalized identities.
- Tier 4 — State-level threat: Dissidents, intelligence sources. Requires face-to-face professional OpSec training — no online guide is sufficient for this tier.
Step 2: Securing Communications
Messaging
- Signal: Gold standard for personal messaging. Open-source, E2EE by default, sealed sender feature. Requires a phone number — a real-world identity anchor. Enable disappearing messages for sensitive topics.
- Session: Signal-derived but requires no phone number. Uses a decentralized onion routing network for message delivery. Less battle-tested than Signal.
- Briar: P2P mesh networking — works over Bluetooth and Wi-Fi without internet. Designed for activists in connectivity-restricted environments.
- Matrix/Element: Federated, self-hostable. Good for teams wanting full data sovereignty. E2EE available but not default on all clients.
- ProtonMail (Switzerland) / Tutanota (Germany): Zero-knowledge E2EE between users of the same provider. Both open-source, privacy-friendly jurisdictions.
- Email aliasing: Use SimpleLogin or AnonAddy to generate unique aliases per service. When a breach occurs, disable that alias — not your real address.
- PGP: Works cross-provider but is notoriously difficult to use correctly. Metadata (sender, recipient, timestamps) is never protected by PGP.
Step 3: Browser Hardening & Compartmentalization
Recommended browser setup by use case
- Daily browsing: Firefox with uBlock Origin (hard mode), Firefox Multi-Account Containers,
privacy.resistFingerprinting = truein about:config. Blocks 95%+ of third-party trackers. - Financial & sensitive accounts: A completely separate Firefox profile — never mixed with general browsing. Consider Brave as an alternative with strong defaults.
- Sensitive research: Tor Browser — never resize the window, never log into any account, never enable JavaScript unless essential. Each session is isolated and fingerprint-normalized.
- Never use: Chrome (extensive Google telemetry), Edge (Microsoft telemetry), any browser with built-in "free VPN" (usually data harvesting).
Critical Firefox settings
- uBlock Origin in medium/hard mode: Blocks third-party scripts globally. Most effective single anti-tracking intervention available.
- privacy.resistFingerprinting: Normalizes canvas, WebGL, fonts, screen resolution — drastically reduces fingerprint uniqueness.
- Firefox Multi-Account Containers: Isolates cookies by context (Personal, Work, Shopping) — prevents cross-site identity correlation.
- network.http.sendRefererHeader = 0: Stops your browser from telling sites where you came from.
Step 4: Operating System Security
Windows 11 telemetry transmits hardware IDs, installed software lists, search queries, and usage patterns to Microsoft — even on "Basic" setting. macOS is marginally better but still phones home. For serious privacy, move to Linux.
- Ubuntu / Fedora: Mainstream entry point. Far less telemetry than Windows, good hardware support. Not hardened by default but vastly better.
- Tails OS: Boots from USB, routes all traffic through Tor, leaves no trace on host hardware. Amnesic by design. Ideal for sensitive tasks on untrusted hardware.
- Qubes OS: Compartmentalization through hardware virtualization — each app runs in an isolated VM ("qube"). A browser exploit in the untrusted qube cannot reach your personal qube.
- Whonix: Two-VM setup — Gateway (Tor) and Workstation. All workstation traffic is forced through Tor at the OS level. Can run inside Qubes for combined protection.
Step 5: Network Layer — VPNs, Tor, and DNS
VPNs: What they actually do
A VPN encrypts traffic between your device and the VPN server, hiding it from your ISP. It does not make you anonymous — the VPN provider sees everything your ISP previously saw. Trust shifts; surveillance doesn't end. Never use free VPNs — their business model is selling your data. Choose a provider with an independently audited no-logs policy (Mullvad, ProtonVPN).
Tor: Actual anonymity network
- Routes traffic through three volunteer relays — entry guard, middle relay, exit relay. No single node sees both your IP and your destination.
- Weaknesses: Exit node sees cleartext HTTP (always use HTTPS). Slow for high-bandwidth tasks. Not suitable for torrenting or large downloads.
- Use the Tor Browser — do not configure Tor manually unless you know exactly what you're doing.
DNS privacy
Your DNS resolver sees every domain you query — even over HTTPS. Your ISP logs these. Switch to DNS-over-HTTPS (Quad9: 9.9.9.9, NextDNS) or run your own recursive resolver (Unbound + DNS-over-TLS).
Step 6: Financial Privacy
Traditional banking is one of the most comprehensive civilian surveillance systems in existence. Banks report transactions to regulators, share data with credit bureaus, and are required to file Suspicious Activity Reports (SARs) for patterns their AI flags — without notifying you.
- KYC (Know Your Customer): Exchanges and banks collect government ID, facial biometrics, and address proof. This data is stored indefinitely and is frequently breached.
- Transaction monitoring: AI systems flag unusual patterns — large cash withdrawals, international transfers, round-number transactions. You may not know you're flagged until a payment is blocked.
- Privacy alternatives: Prepaid cards (no name linkage for low-value purchases), cash for local transactions, Monero (privacy-by-default cryptocurrency with ring signatures and stealth addresses).
For hype-free education on financial privacy, risk management, and privacy-respecting investment approaches, Anon Invest provides neutral, well-researched analysis without behavioral tracking.
Step 7: Identity Hygiene
- Email aliases: Use a unique alias per service. SimpleLogin (open-source, self-hostable), AnonAddy, or Firefox Relay. When breached: disable that alias, not your real address.
- Unique usernames: Never reuse a username across platforms — it's the primary vector for cross-platform identity correlation.
- Phone numbers: Your phone number links your bank, government ID, social accounts, and physical location. For services requiring a number, use VoIP (JMP.chat, MySudo).
- Password manager: KeePassXC (local, no cloud sync) or Bitwarden (open-source, self-hostable). Generate cryptographically random, unique passwords for every account.
- Data broker opt-outs: Manually opt out of Spokeo, WhitePages, BeenVerified, Intelius. Requires annual renewal — data re-populates from public records.
Step 8: Physical Security & Operational Security
- Full-disk encryption: Enable on all devices — VeraCrypt (Windows/cross-platform), LUKS (Linux), FileVault (macOS). Protects data if your device is seized or stolen.
- Webcam covers: Low-cost protection against remote access trojans using your camera covertly.
- Secure deletion: Deleting a file marks the space as available — it doesn't erase it. Use BleachBit,
shred, or full-disk encryption (which renders recovered fragments unreadable). - OpSec mindset: Don't share your security setup publicly. Don't discuss sensitive plans on unsecured channels. Never link an anonymous persona to your real identity — even once.
- Screen privacy filters: Prevent shoulder-surfing in public spaces. Essential for journalists, lawyers, and business travelers.