You cannot be governed. You just didn't realize it yet.
Yes, you can become ungovernable if you have proper Operational Security. Everyone can have it. The Opsec Bible is here to show you why and how you can achieve Operational Security from A to Z. From Privacy, to Anonymity, to Deniability, on both the Clientside, and the Serverside.
Statism is no longer an option. We are here to show you the Agorist way.

SHOWCASED TUTORIAL: Learn how to audit your own setup, to determine your Operational Security (OPSEC) Level, and find out what is the most appropriate internet use for it.
BREAKING NEWS: Welcome to The Opsec Bible v2.0! We are now running mkdocs-material and all of our blogposts have been converted to Markdown to make it simplify the contribution process in the long run.
With this new mkdocs blog version, we have completely changed how you can find blogposts that are relevant to your own situation. Thanks to the Mkdocs search plugin, you can now search for specific terms (ex:Tor, Monero, Anonymity, Deniability) in the search bar at the top to find the blogposts that are relevant to what you wish to know. Don't hesitate to combine search terms together to try and find what you need.
What is the goal of The Opsec Bible ?
In short, we're here to tell you why and how you can become ungovernable.
- Priority number 1: Solving the lack of education (no FUD, nor minimization fallacies)
- Priority number 2: Opsec advice applicable to 90% of the people out there, to defeat 99% of the risks
- Priority number 3: Simplifying the Opsec advice as much as possible to make it as easy to achieve as possible.
(Check out this blogpost for more details on our mission)
Our latest contributed tutorials (π‘ RSS)
- 2025-11-17: Dead man's switch with the SimpleX Alerter
- 2025-11-14: E2EE Doesn't provide privacy if the software is closed-source
- 2025-10-19: OPSEC is real-life chess
- 2025-10-19: The Adversary also benefits from Anonymity
- 2025-10-18: Prevent scams using Multisig 2of3 Monero wallets
- 2025-10-16: Routing the network through Cloak using OpenWRT router
- 2025-10-13: The dangers of ordering drugs online
- 2025-10-05: LAPSUS$ OPSEC Mistakes
- 2025-09-28: SimpleX Deniable Chats
- 2025-09-27: Roadmap Progress (as of Q3 2025)
- 2025-09-14: Sensitive Remote Servers Organization
- 2025-09-14: How to safely use the Sensitive VM
- 2025-09-08: Redditβs Decline for Real Privacy Discussions
- 2025-09-07: Setting up Invidious to watch YouTube privately
- 2025-08-31: Man arrested for donating to a terrorist organization
- 2025-08-29: Backup data remotely without revealing contents to the VPS provider - BorgBackup
- 2025-08-29: Canadian truckers protesters' bank accounts frozen
- 2025-08-27: Privacy Laxism is real and it's part of the problem
- 2025-08-27: The Downfall of Pompompurin
- 2025-08-27: Corporate censorship: Steam forced to delist games
- 2025-08-26: Setting up SafeTwitch to watch Twitch privately
- 2025-08-25: Being lured into meeting someone IRL
- 2025-08-25: Internet Usage Segmentation Setup [GrapheneOS addition]
- 2025-08-23: What if a FOSS Project Turns Malicious? (Building SimpleX from Source)
- 2025-08-22: How to Get an Email Account Anonymously [update replacing protonmail]
- 2025-08-22: Git LFS over Tor - Proof of Concept
- 2025-08-20: Docker Intro: Installation, Setup and Basic Operations
- 2025-08-17: The Nowhere Community and our Services
- 2025-08-16: 10 things you must do if you are pro-freedom
- 2025-08-16: How the states manage to pass abusive laws
- 2025-08-14: Disguising Tor traffic with Cloak
- 2025-08-13: How to mine Monero easily using Gupax
- 2025-08-12: Where are VPNs, Tor, Monero and SimpleX Legal ?
- 2025-08-12: The Downfall of IntelBroker
- 2025-08-11: How to have privacy on your Router (OpenWrt)
- 2025-08-10: Black Hat Hacking Sensitive VMs Tutorial
- 2025-08-10: How to redirect your clearnet audience to the Darknet
- 2025-08-09: Password Management 101: How to use Keepass [old tutorial update]
- 2025-08-08: Setting up Redlib to browse Reddit privately
- 2025-08-04: The Downfall of AlphaBay
- 2025-08-04: Being forced into becoming an Informant
- 2025-08-03: The Private and Anonymous Email Problem
- 2025-08-02: Being lured into telegram for sensitive use
- 2025-07-31: Solitary Confinement
- 2025-07-30: Restricting Onion Service Access with Client Authorization
- 2025-07-28: Making Your Home Server Reachable via a Hidden Service (SSH + Cockpit + VNC via Tor)
- 2025-07-27: Being forced into violence by gangs
- 2025-07-25: How to transfer Activities across Identities
- 2025-07-25: Never tell your bank that you bought crypto
- 2025-07-22: Deniably renting servers from the Sensitive use VM
- 2025-07-21: What is my Attack Surface ?
- 2025-07-21: USB-triggered server shutdowns
- 2025-07-19: The Downfall of Silk Road
- 2025-07-19: Corporations are the cancer of FOSS projects
- 2025-07-18: How to prepare for the arrival of CBDCs
- 2025-07-17: Scheduled Automatic Server Randomization with Mullvad VPN CLI
- 2025-07-16: USB-triggered shutdowns
- 2025-07-15: How to route your entire network through a VPN on the router
- 2025-07-15: How your finance can be your downfall
- 2025-07-14: Opsec Mistakes - Improper Monero Usage
- 2025-07-13: Identity Segmentation Fails: Emails, Usernames, and Passwords
- 2025-07-12: The futility of talking OPSEC on Statist platforms
- 2025-07-11: Linux Basics
- 2025-07-10: Public media is funded propaganda
- 2025-07-09: Ensuring Your Privacy is Intact with OpenSnitch
- 2025-07-08: Lawfare Explained
- 2025-07-08: Why can't I trust Server-side Encryption ? [old tutorial rewrite]
- 2025-07-07: Opsec Mistakes - The Downfall of Incognito Market
- 2025-07-06: Technology either serves you, or the state
- 2025-07-06: Privacy Frontends - Avoiding Centralized Tracking
- 2025-07-03: The postal system explained
- 2025-07-02: Fallacies used to dissuade you from using Freedom technology
- 2025-07-02: Why Dread isn't always the place to go to for opsec advice
- 2025-07-02: Why are we not recommending QubesOS yet?
- 2025-07-01: Mounting a remote drive over Tor (using SFTP)
Our upcoming tutorials
To know what's in store for the future of The Opsec Bible, you can check out our Forgejo opsec project board
If there is a new tutorial that should be added in The Opsec Bible, let us know in our SimpleX Chatrooms or as a new git issue our Forgejo repository directly.
The Blog is open to contributions
If you want to earn some Monero, you can write new blogposts for us (from 0.0175 to 0.1754 XMR per tutorial, as advertised on xmrbazaar), if you're interested, check out our how to contribute guide, and make sure that you follow our quality standard.
Wall of Fame (as of May 2025)
- The Kicksecure Documentation : One of the actual backbones of OPSEC in general, making Privacy, Anonymity and even Deniability possible on the operating system level and explaining how they achieved it
- The Whonix Documentation : Another backbone of OPSEC, making Anonymity possible on the guest operating system level and explaining how they achieved it.
- The Hitchhiker's guide to Anonymity : The main inspiration for The Opsec Bible, an actual goldmine of information, even though i don't like how everything is in one page.
- Hackliberty Resources : Community centered around Anarchism, Agorism, and Cypherpunk in general.
- Dread /d/opsec : Dread being one of the largest darknet forums out there, their opsec board is a fertile ground for truth seeking
- Sam bent's youtube channel : Ex-darknet vendor, well versed in anything opsec-related, with solid background on the law in general.
- Monero Talk's youtube channel : Show focusing on growing the adoption of Monero to the masses.
- /biz/'s Monero Info Dump : Website explaining why monero is the ultimate cryptocurrency
Wall of Shame (as of June 2025)
- Dread /d/opsec : Dread being one of the largest darknet forums out there, their opsec board is also (sadly) a fertile ground for disinformation campaigns and dishonest debates, so make sure you double check and challenge everything they claim in there. Forums are anyway not ideal to actually take you from A to Z when it comes to exploring entire fields of study like operational security. EDIT: the mods stopped caring apparently.
- PrivacyGuides : Sadly a far too popular community of privacy laxists, claiming that using closed-source software is supposedly suitable for private use.
- Techlore : Another privacy laxist community claiming that privacy is possible on Windows, or MacOS.
- PrivacyTools : Yet another privacy laxism community, claiming that privacy is possible on Windows
Nihilist
Donate XMR to Nihilist:
8C1MNeB4KEHGApg6sPxFPn3NWERD3mPv7AjC8mCm1CJCXjoKnf36SYBdZ6ywCMdZRC4cxu7Uax3tufDqMXS2mLvHNCJzQZS