As part of this series on OPSEC for researchers, I want to start by highlighting what are some of the workstation options that are available to researchers by using myself as an example. Over the years I have chosen to do two things 1) use a dedicated research laptop, desktop, or mobile device void of any personal information or 2) use a virtual machine (VM). There are other options such as the use of a virtual desktops ( remote desktops services or desktop-as-a-service) but I have not used these personally. The device (physical or virtual) that you choose to do your research on plays an important role in your operational security practices. There is no way to be 100% secure online, rather is about minimizing your vulnerabilities to a few potential points of failure, while you are doing your research. Though today I will be focusing on “tools”, OPSEC is a method and a
OPSEC 101: What Does My Setup Look Like
OPSEC 101: What Does My Setup Look Like
OPSEC 101: What Does My Setup Look Like
As part of this series on OPSEC for researchers, I want to start by highlighting what are some of the workstation options that are available to researchers by using myself as an example. Over the years I have chosen to do two things 1) use a dedicated research laptop, desktop, or mobile device void of any personal information or 2) use a virtual machine (VM). There are other options such as the use of a virtual desktops ( remote desktops services or desktop-as-a-service) but I have not used these personally. The device (physical or virtual) that you choose to do your research on plays an important role in your operational security practices. There is no way to be 100% secure online, rather is about minimizing your vulnerabilities to a few potential points of failure, while you are doing your research. Though today I will be focusing on “tools”, OPSEC is a method and a