OPSEC - HAVE A SECURE EMAIL

OPSEC - HAVE A SECURE EMAIL

INVICTUS

An agile freedom fight in the 21st century can't be done without digital communication. Thus, that communication has to be most secure. Start with this essential tool today.


The Need for Operational Security (OPSEC)

The pursuit of freedom and liberation is not in everyone's interest. In fact, the dark side forces are constantly on the hunt to attack any libertarian approach as soon as they can.

That's why freedom fighters have to secure their operations to their best. Save communication is a key factor in Operational Security (OPSEC).

An agile freedom fight in the 21st century can't be done without digital communication. Thus, that communication has to be most secure.

 

Letters from the Past

It is often said that sending an ordinary email using the internet is like sending a postcard in the old days.

It takes little effort for almost everyone "in the middle" to read that communication between the sender and the recipient. Practically the same is true when making usual phone calls.

With this said, operational freedom teams must frequently decide which security level their communication requires. Then, depending on that decision, communication tools must be chosen.

 

Secure Email

Today's highest standard of digital communication security is end-to-end encryption (E2EE), which is available for both voice and written communication.

Since it would take disproportional effort to set up customized E2EE technology, there are some professional providers that freedom fighters can use.

Learn more about E2EE

INVICTUS fully complies with Proton's idea of privacy protection. That's why we recommend Proton as your first stop in building your OPSEC strategy.

Have everyone in your team sign-up for a free Proton account and use E2EE mailing for secure information exchange, especially when writing longer texts or sending attachments.

Keep in mind that email is supposed to be used for one-on-one communication or within a small team, not for mass mailings, aka "Newsletter."

 

Don't MESS IT UP!

When setting up your E2EE email,

  • Do NOT connect your Proton account to your mobile phone number or previous address book. 
  • Do NOT choose a Proton account name that refers to your identity.BAD: john.doe1974boston@proton.me
  • GOOD: hlm9rk@proton.me 

You will be asked to provide a recovery email during the setup process with Proton. Again, use one that does not refer back to your identity.

 

Why Protonmail, for Haven's sake?

"But wait a minute. Why do you recommend Protonmail? I've heard that they very well gave user data to the govs. And rumors are that they are even run by the CIA." 

So, is Protonmail really safe?

Nobody knows but Jesus.

Look, we don't dictate to anyone to use encrypted email. We're just happy for anyone who does it at all. 

If you are mistrustful of Protonmail, simply choose another service. There are a few, and you will easily find them.

Pick the one you feel comfortable with.

We've checked and compared different services. Advantages and disadvantages were found in all of them.

In the end, it is a question of personal consideration.

We don't want a company or a server location in the EU or the US.

Every provider is always subject to the prevailing legal system, and Switzerland still scores best for us.

 

No Content Breach

Yes, we've seen articles like this. So you don't need to send it over :-)


Source

Note that the article states just what Proton said. They certainly must comply with govs when legally forced by Swiss jurisdiction. Actually, they can only hand over what they have.

That is the user name of the person in question, some IP addresses they used to log in, and the subject line of their emails since those can not be encrypted for technical reasons.

They also might be forced to hand over the entire email content of a suspect. However, since that content is high-secure protected by Proton's E2EE, it's useless.

No one is supposed to encrypt it unless they have the key, which is true only for the sender and the receiver. Even Proton claims they have no chance to decrypt any message.

Is that the truth and nothing but the truth?

Again, ask the Lord if you really want to know.

 

Your life. Your choice.

All personal freedom decisions are totally up to you.

At the end of the day, it comes down to one simple question.



If your choice is Proton, we recommend these additional security measures:

  • Do not take a user name that allows conclusions about your identity (we said it before)
  • Use a VPN service and a secure browser like TOR to conceal your IP address
  • Use concealed subject lines (Always send cooking recipes)

 

OVER TO YOU, VICTOR

  1. Set up a free E2EE email account with Proton.
  2. Discuss the need for OPSEC with your team and help them set up their E2EE email account.
  3. Do this TODAY!


Report Page