EN | DE
Last updated: 2026-03-22 · 8 sections · ~25 min read

The Complete Guide to Digital Hardening

A practical, threat-model-driven guide for anyone serious about reclaiming digital sovereignty. No paranoia required — just methodical risk reduction.

Step 1: Threat Modeling — The Foundation

Before downloading any tool, define your threat model. This is the most important step and the one most people skip. Without one, you either do too little (false security) or too much (unsustainable friction that gets abandoned).

The EFF's Surveillance Self-Defense guide recommends answering five questions:

Practical Threat Model Tiers

  • Tier 1 — Everyday user: Avoid ads and data broker profiles. Tools: Firefox + uBlock Origin, NextDNS, password manager, Signal.
  • Tier 2 — Privacy-conscious: Prevent behavioral profiling and cross-site identity linkage. Add: Firefox Multi-Account Containers, email aliasing (SimpleLogin), no Google/Meta accounts.
  • Tier 3 — High-risk: Journalist, activist, lawyer, abuse survivor. Add: Tor Browser for sensitive research, Tails OS, Signal disappearing messages, burner devices, compartmentalized identities.
  • Tier 4 — State-level threat: Dissidents, intelligence sources. Requires face-to-face professional OpSec training — no online guide is sufficient for this tier.

Step 2: Securing Communications

Messaging

Email

Step 3: Browser Hardening & Compartmentalization

Recommended browser setup by use case

  • Daily browsing: Firefox with uBlock Origin (hard mode), Firefox Multi-Account Containers, privacy.resistFingerprinting = true in about:config. Blocks 95%+ of third-party trackers.
  • Financial & sensitive accounts: A completely separate Firefox profile — never mixed with general browsing. Consider Brave as an alternative with strong defaults.
  • Sensitive research: Tor Browser — never resize the window, never log into any account, never enable JavaScript unless essential. Each session is isolated and fingerprint-normalized.
  • Never use: Chrome (extensive Google telemetry), Edge (Microsoft telemetry), any browser with built-in "free VPN" (usually data harvesting).

Critical Firefox settings

Step 4: Operating System Security

Windows 11 telemetry transmits hardware IDs, installed software lists, search queries, and usage patterns to Microsoft — even on "Basic" setting. macOS is marginally better but still phones home. For serious privacy, move to Linux.

Step 5: Network Layer — VPNs, Tor, and DNS

VPNs: What they actually do

A VPN encrypts traffic between your device and the VPN server, hiding it from your ISP. It does not make you anonymous — the VPN provider sees everything your ISP previously saw. Trust shifts; surveillance doesn't end. Never use free VPNs — their business model is selling your data. Choose a provider with an independently audited no-logs policy (Mullvad, ProtonVPN).

Tor: Actual anonymity network

DNS privacy

Your DNS resolver sees every domain you query — even over HTTPS. Your ISP logs these. Switch to DNS-over-HTTPS (Quad9: 9.9.9.9, NextDNS) or run your own recursive resolver (Unbound + DNS-over-TLS).

Step 6: Financial Privacy

Traditional banking is one of the most comprehensive civilian surveillance systems in existence. Banks report transactions to regulators, share data with credit bureaus, and are required to file Suspicious Activity Reports (SARs) for patterns their AI flags — without notifying you.

For hype-free education on financial privacy, risk management, and privacy-respecting investment approaches, Anon Invest provides neutral, well-researched analysis without behavioral tracking.

Step 7: Identity Hygiene

Step 8: Physical Security & Operational Security