

I use the free tier of a non-M/G email provider, and keep my use of email to a minimum. I would happily pay for it in cash but I haven’t found that provider yet, and Stripe hates prepaid cards. A lot of discretionary shopping is done in cash
Credentials are local and employ entries from a custom dictionary I made with vocab that combines multiple languages with randomized and inconsistently applied letter substitutions, to which a random string is added (it’s probably no more secure than a random string alone but I enjoyed getting some sed XP, sue me)
Certain browsing habits and needs have their own browser profile. I used to attempt user agent obfuscation but further reading suggests spoof attempts are trivial to detect by even crude scripts
The one layer that never gets enough study is hardware and software compartmentalization. The demand for sync everywhere always is itself a threat vector
Media consumption is LAN only sourced from p2p networks 🏴
I’ve been doing what’s in the guide for several years but its good to see a well structured and well presented resource like this anyway.
Theyve convinced normie that his valuable resources are valueless, and absent a better role model that won’t change (he’s not the type who thinks from first principles)