Privacy, Anonymity & OPSEC Index Purpose This index is the root entry point for the Privacy, Anonymity & OPSEC branch of the cybersecurity vault. Use it to understand how privacy tools actually change a threat model: - what they hide - what they expose - who they shift trust toward - what metadata remains - where operational mistakes defeat the tool The branch avoids cryptocurrency and darknet-market framing. Its focus is privacy engineering, anonymity limits, VPN threat models, Tor, metadata leakage, encrypted communication, compartmentalized systems, secure deletion, and common deanonymization failures. Use Reference Registry - Privacy, Anonymity & OPSEC as the source of truth for references in this branch. Return to Cybersecurity Index for root navigation across branches. Before this branch: - Foundations (Phase 0). Always-on: this branch is a parallel personal discipline, not a phase. Read alongside everything else. Branch mental model Privacy tools do not create anonymity by default. They change visibility, trust, metadata exposure, and failure modes. The recurring question is not "is this tool private?" It is: Against which observer, for which activity, with which identity signals still present? Recommended learning order Core vocabulary and leakage privacy-vs-anonymity-vs-confidentiality metadata-and-identity-leakage vpn-threat-models VPNs and routing trust vpn-protocols vpn-logging-and-trust vpn-leakage-risks vpn-dns-and-ipv6-leaks vpn-kill-switches vpn-fingerprinting-limitations vpn-vs-tor Tor, composition, and file OPSEC tor-and-onion-services tor-browser-security-settings tor-bridges-and-pluggable-transports vpn-with-tor corporate-vpns-vs-consumer-vpns file-metadata-removal Anonymity environments and sharing tails-operational-model qubes-compartmentalization whonix-gateway secure-file-sharing anonymity-threat-models deanonymization-failures Messaging and email privacy private-email-threat-models temporary-email-risks xmpp-and-private-messaging end-to-end-encryption pgp-encryption-and-signatures Storage and deletion secure-deletion-and-storage-wiping OPSEC and correlation opsec-failure-chains browser-fingerprinting account-correlation traffic-correlation Current mature starter notes Core model privacy-vs-anonymity-vs-confidentiality metadata-and-identity-leakage VPN model vpn-threat-models vpn-protocols vpn-logging-and-trust vpn-leakage-risks vpn-dns-and-ipv6-leaks vpn-kill-switches vpn-fingerprinting-limitations vpn-vs-tor vpn-with-tor corporate-vpns-vs-consumer-vpns Tor, environment, and file OPSEC tor-and-onion-services tor-browser-security-settings tor-bridges-and-pluggable-transports tails-operational-model qubes-compartmentalization whonix-gateway file-metadata-removal secure-file-sharing anonymity-threat-models deanonymization-failures Messaging and email privacy private-email-threat-models temporary-email-risks xmpp-and-private-messaging end-to-end-encryption pgp-encryption-and-signatures Storage and deletion secure-deletion-and-storage-wiping OPSEC and correlation opsec-failure-chains browser-fingerprinting account-correlation traffic-correlation Cross-links to other branches Networking DNS Resolution DNS Security TLS / HTTPS Cookies and Sessions HTTP Headers Web and API security Session Management Content Security Policy OAuth Security Token Lifecycle OSINT OSINT Social Media OSINT Image and Location OSINT Email and Phone OSINT Cloud and DevSecOps Cloud Logging and Detection Secrets Management Secure by Design Practical lab queue Future private lab candidate: privacy and OPSEC lab. Possible exercises: - compare visible IP address before and after a VPN - test DNS leak paths - test IPv6 leak paths - inspect browser fingerprint surfaces - inspect file metadata before sharing - remove image metadata and verify removal - compare VPN vs Tor routing visibility - simulate VPN disconnect behavior with a kill switch - document an OPSEC failure chain from harmless-looking clues Branch maintenance notes Keep the branch defensive, educational, and threat-model oriented. Avoid cryptocurrency, marketplace, and evasion-for-crime framing. Treat anonymity as an adversary-specific property, not a product label. Keep VPN notes precise: VPNs shift network-path trust; they do not erase identity. Keep Tor notes careful: Tor changes the observer model but still requires disciplined browser and account behavior. Keep OPSEC notes practical: identities leak through accounts, behavior, files, time, language, device state, and social context. Note-local suggested future links remain useful for adjacent subtopics, but the branch-level backlog for this pass is closed. References Foundational: EFF Surveillance Self-Defense - https://ssd.eff.org/ Foundational: NIST Privacy Framework - https://www.nist.gov/privacy-framework Foundational: OWASP User Privacy Protection Cheat Sheet - https://cheatsheetseries.owasp.org/cheatsheets/User_Privacy_Protection_Cheat_Sheet.html Official Tool Docs: Tor Browser User Manual - https://tb-manual.torproject.org/