HACKER Q&A
📣 goolz

What is you crazy OpSec techniques?


I am talking over the top, what lengths to you go to ensure you Operation is air tight.


  👤 heresjohnny Accepted Answer ✓
Not air tight, not truly “OpSec,” but people do call me crazy for having a separate e-mail for every service. This has caught three leaks so far–if you receive spam you immediately know which service got pwned. If that happens I delete the e-mail and move on. Takes some effort, but is worth it in my opinion.

👤 markus_zhang
Not mine, but typically some corporations and government agencies block USB ports or have devices that record everything going through those ports.

👤 pseudotrash
What is your definition of "Operation" because my threat-model is probably not your threat model.

But in the past, not doing crimes, gave crazy good results.