Anonymity and Privacy Preservation
Advanced Anonymity Networks: Tor, I2P, and Censorship Circumvention
A comprehensive guide to using advanced anonymity networks like Tor and I2P to bypass censorship and surveillance in Iran, including configuration of bridges and specialized operating systems.
Anti-Doxing and Social Footprint Reduction
A comprehensive guide to reducing your digital footprint and protecting against doxing attacks, specifically tailored for the Iranian threat landscape.
Digital Identity Management and Pseudonymity
A comprehensive guide to creating, maintaining, and protecting separate digital identities to mitigate surveillance risks in Iran.
Financial Privacy and Anonymous Transactions
A comprehensive guide to maintaining financial privacy in Iran, covering the risks of transparent blockchains, the use of Monero for anonymity, and methods to bypass sanctions and local surveillance safely.
Hardware Isolation and Secondary Devices
A comprehensive guide to using hardware isolation and secondary devices to protect sensitive data. Covers strategies for secondary phones in the Iranian context, air-gapped systems, and secure operating systems like Tails and Qubes.
Metadata Management and File Sanitization
A comprehensive guide to removing invisible data (metadata) from files, safely redacting visual information, and sanitizing documents to neutralize tracking and malware.
Network Traffic Privacy and VPNs
A comprehensive guide to protecting network traffic against surveillance and censorship in Iran. Covers the selection of secure VPNs, self-hosted circumvention tools (Outline, Amnezia), and the use of the Tor network with bridges.
Secure Browsing and Fingerprinting Protection
A comprehensive guide to minimizing your digital footprint, preventing browser fingerprinting, and configuring web browsers for maximum security within the Iranian internet landscape.