Crypto-OpSec-SelfGuard-RoadMap

Security hub

A resource collection and discussion forum for DeFi, blockchain, and crypto security researches and data terminals.

Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.

GitHub

1k stars
48 watching
141 forks
last commit: 4 months ago
awesome-listblockchaincryptocurrencycurated-listdefiinfosecknowledge-baseopsecsecurity

Translations:

Portuguese-Brazilian 1,476 4 months ago
French 1,476 4 months ago

OpSec SelfGuard RoadMap

AnonPlanet
My Blog on Mirror
My Blog on Medium

OpSec SelfGuard RoadMap / Why do I need OpSec?

my blog! Study
Follow AnonPlanet!
Security Tips & Devices for Digital Nomads

OpSec SelfGuard RoadMap / What do I need for a perfect OpSec?

The Only Safe Way to Store Crypto
An ultimate list of rules any on-chain survivor should follow to stay safe!
Trail of Bits Minimum Viable Plans (MVPs) for Security
On Operational Security in Web3
AnonPlanet
opsecprofessionals.org
Crypto Security Best Practices Checklist
Check out this tool!
Wholeaked Tool 1,034 almost 3 years ago
Symbiote Tool 830 12 days ago

Problem 1

Watch More
Read More on Email Encryption with Proton
Meta Secret Tool
Croc Tool 28,127 8 days ago
Richard Stallman: How I Do My Computing
Choosing a Reliable VPN Provider for Life & Work
The Only Safe Way to Store Crypto
An ultimate list of rules any on-chain survivor should follow to stay safe!
Trail of Bits Minimum Viable Plans (MVPs) for Security
Check out this awesome Privacy-focused toolkit!
Create your own vpn server
Create your own vpn server No.2
Setup OpenVPN server on Ubuntu
Watch more
Wireguard VS OpenVPN
Brave Browser Privacy Issues
How to Disappear from the Internet!
How to hide your email
Anti-detection system

Problem 2

Taming a Wildhorse CEX App
«Back office» and «front office»
Steganography tool
The State of Crypto Security
Blockchain dark forest selfguard handbook 5,454 4 months ago
Store SSH keys in the Secure Enclave! 7,234 3 months ago
Blockchain dark forest selfguard handbook 5,332 14 days ago
A tool that allows user to create time bound backups for various cryptocurrencies 9 over 1 year ago
Wi-Fi Security A-Z
Fing App
How to detect if someone is attempting to crack your wi-fi
Use a Raspberry Pi To Catch Hackers with OpenCanary
canarytokens.org
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
MacOS + IOS + Crypto + OpSec = ?
Awesome wifi security 160 over 5 years ago
bbox.rocks
IT security lecture 372 over 1 year ago
Unredacter Tool 7,792 8 months ago
forensicdots.de
meta-secret App
Portable-secret App
This article tells that when using BitWarden one have to audit server side cryptography primitives by himself and monitor for changes!
Secant
Awesome csirt 466 about 2 months ago
teachingprivacy.org
securityinabox.org
SecureYourselfNow
ssd.eff.org
Wasted
bbox.rocks
Read More
NIST 800-63b Password Guidelines and Best Practices
OpSec tips
How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
Web3 Cybersecurity Academy
Enhancing user asset security
Rare Web2 phreaker style attacks: Note

Problem 3

OpSec Going Smart
OpSec Going Smarter
OpSec Going Smarter: Secure Smartphones
Choosing a Reliable VPN Provider for Life & Work
How to use an ipad as a secure calling and messaging device
Read More
Intro to Web3 Security
Privacy and Scaling Explorations
A collection of practical security-focused guides and checklists for smart contract development 1,065 about 1 year ago

Problem 4

Tips from TrailOfBits
Read More
CryptoCustody Blog
A DIY Guide to High-Security Cryptography
Securing OT Systems: A Practical Guide
ECDSA: Handle with Care
solidity-security 126 5 months ago
A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life
Checklist for Developers for securing APIs

Problem 5

List of Hardware Wallet Hacks
Another List
walletcompare.xyz/
walletscrutiny.com
Security Tips & Devices for Digital Nomads
The Only Safe Way to Store Crypto
An ultimate list of rules any on-chain survivor should follow to stay safe!
Read More
Read More
ShiftCrypto
Rogue Key Attack in BLS Signature and Harmony Security
Opinion on Trezor
airgapcomputer.com
Coldcardwallet
Cypherockwallet
Sparrowwallet.com
BitBox
Bitlox
Alphawallet
Airgap_it
rainbow.me
Frame.sh
Walletscrutiny.com
Grid-lattice1
Atomicwallet.io
Alternatives to Metamask
myetherwallet.com
Forked MetaMask
Multichain crypto wallet

Problem 6

Audio Steganography : The art of hiding secrets
Audio Steganography Technique for Communication Security
Learn OpSec basics in 15 mins
OpSec Going Smart
OpSec Going Smarter
Portable Secret Check out: &
Read More
How to Store Seed Phrase Backups
Awesome Security Hardening Guides 5,502 about 2 months ago
Authenticator app for storing your 2FA secrets 16,119 4 days ago
iOS Forensics References 204 12 months ago
Android Forensics References 287 over 1 year ago

Problem 7

Digital Communications Protocols
OTR versus OMEMO
ChatSecure
Encrypted Instant Messaging on Mac OS X with Adium and Off The Record
axolotl, OMEMO vs OpenPGP
The most significant milestones in the development of communications
Telegram & Discord Security Best Practices
Jolly Roger’s Security Thread for Beginners
A curated list of privacy & security-focused software and services 6,953 1 day ago
Complete Expert Opsec Setup
Pidgin
The Hitchhiker’s Guide to Online Anonymity
element.io - Matrix client
jitsi.org - for video calls
Open source virtual / remote desktop infrastructure for everyone!
The Invisible Internet Project
Get Bridges for Tor
YouTubeDrive 1,912 over 6 years ago &
youbit 673 about 2 years ago
aperisolve.com
An ultimate list of rules any on-chain survivor should follow to stay safe!
openvpn-install 19,245 2 months ago
Juice jacking: Why you should avoid public phone charging stations
Throwingstar...
How I turned a mini-PC into an Ethereum node to run at home
Spin up your own Ethereum node
Check out this resource!
Improve Fast Reaction: Techniques to Enhance Your Reflexes
Guide to securing and improving privacy on macOS 21,308 18 days ago
Set of utilities to manage BIP44-compatible Ethereum HD wallet
The Last Laptop You'll Ever Need For Crypto
Nano-Painting: Encryption With Colours
Hacking a Windows Machine by Hiding a RAT Inside an Image
The Importance of Self-Custody Password Managers: A Deep Dive
Read this article!
MacOS Secure Profiles 8 about 1 year ago
MacOS Security 1,792 8 days ago
Free, open-source tools to protect your Mac
Mac Monitor 941 5 months ago
Security checklist app for your Mac
Manual QubesOS;
Manual TailsOS;
Manual WhonixOS;
Forum GrapheneOS;
Manual LineageOS;
Manual DivestOS;
Read
Comparing VeraCrypt and TrueCrypt with an unexpected result
Awesome Security Hardening Guides 5,502 about 2 months ago
Endian
sandboxie-plus.com
Digital Communications Protocols
spideroak.com
rsync.net
nextdns.io
app.any.run
Malware - File Analysis
Island
Vanilla OS
safing.io
shadowsocks
mac.getutm.app
souin 715 6 days ago
geti2p.net
anon-service 14 4 months ago
privacy.sexy
Learn Cryptography!
Catch the Man-in-the-Middle
CamWings
ScreenWings
rethink-app 3,005 6 days ago
kleopatra
DPI tunnel
Teletun 331 almost 5 years ago
GoodbyeDPI 25,511 16 days ago
algoVPN 28,977 3 months ago
usbraptor
Network Bandwidth Analyzer - Bandwidth Monitor
Network and IT infrastructure monitoring for small & medium environments
Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game
Dangerous RCE Vulnerability in GTA Online Fixed
What We Know About the Vulnerabilities Keeping ‘Dark Souls’ Offline
Details about the ‘Dark Souls’ hacking exploit have been published
SiM Swap Attacks Rising in Web3
Steganography and You: When What You See Isn’t All You Get
Discord Security 42 about 1 year ago
Stop Auto-Download on Telegram: Working Methods for Desktop, iPhone, Android!
Death Note Anonymity
Instant Workstation: Virtual Machines

Problem 8

DefaultCreds CheatSheet 5,699 2 months ago
Physical crypto attacks 577 10 days ago
About If you want know, who use your computer when you are not nearby - PC Mouse Tracker 48 about 3 years ago
Read More
Torn
Anon Swaps
sideshift.ai
agoradesk.com
Aztecnetwork
Aztec-2 Dune Privacy Dashboard
RailGun
Monero

Problem 9

Physical Security: Escapology
Threat modeling for smart contracts step-by-step guide
How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
Read More
Read More
Drive NFC Hack
Web3.0 API Security for TestNet and MainNet Environment for Authorization Attack Prevention Implementation Using Python
Ethereum nodes security
How To Secure Your Crypto Wallet On A Virtual Machine And Stop Front-Running
The Evolving Landscape of Privacy in Web3

Problem 10

Wi-Fi Security when holding Crypto assets!
Read More
Read More
SS7 Attacks
More SS7 Attacks
How to detect IMSI catchers
Check out
Wardriving 155 over 1 year ago
CreepDetector 198 over 3 years ago
AntiCensorship Messaging
Discord e2e encryption 87 over 5 years ago

Problem 11

On Operational Security in Web3
Network Security Myths Busted
5 Ways to Find Hidden Cameras Using Your Mobile Phone
9 Places Where Secret Cameras Are Most Likely to Be Hidden
Discussion about how to find hidden cameras.
Perform a Self-doxxing!
Watch More
Awesome InfoSec 5,207 9 months ago
Dear Security, be a part of the solution
Staying Safe in Web3: OTC Scams
HoneyPots against Hackers
Randomness Concept
CIA Triad
Detect Personal Information Leakage With OSINT Attack Surface Management
Leveraging Open-Source Intelligence (OSINT) for Enhancing Efficiency in Business Administration: A Comprehensive Examination

Problem 12

The Wiretap: How The FBI Digs Up Deleted WhatsApp Messages
anonymousplanet.org
Android keyboard for secure E2EE communication through the signal protocol in any messenger 668 7 months ago
Steganography
this tool 1,034 almost 3 years ago Check out !
Check out this awesome Privacy-focused toolkit!
Watch More
stylesuxx.github.io
stegonline.georgeom.net

Problem 13

Read More
AnonPlanet
censorship.no
detect.expert
WhatBreach 1,179 about 1 month ago
Building a Transaction By Hand
Generating a Seed Phrase using a Calculator
Instruments on the radio waves🛠
No Internet, No Problem: How to Send Bitcoin by Amateur Radio
The Cypherpunks Tapping Bitcoin via Ham Radio
The Only Safe Way to Store Crypto: Ultimate OpSec
Better privacy without special software

Problem 14

Can forensic science still recover data from a hard drive after a seven-pass wipe?
Gentoo
TailsOS
Awesome Memory Forensics 347 about 1 year ago
WhonixOS
ParrotOS
LUKS! You may also try using
File carving
Read More
Choose Veracrypt (better) or FileVault!
Citation from this resource:

Problem 15

Read More
Tips from TrailOfBits
CryptoCustody Blog
6 Reasons to Avoid Cloud Services and Keep Your Feet on the Ground
How Crypto Stealth Addresses Keep Your Transactions Private
How to Hide Your MAC Address and Why You Should
5 Ways to Hide Apps on Your iPhone

Problem 16

Create a ‘Panic’ Alarm With Aqara Hub & Siri Shortcuts
How to use the 'In Case of Emergency' iPhone shortcut to get quick help from rescue services or a contact
Automated Panic Button: Details in Comments
Event Triggers - Siri
Using Siri Shortcuts as a Panic Button on Apple Watch - Discussion
Panic Button App example
Read More
Ultimate Guide to Safely Self Custody your Crypto
Setting up a VM for crypto operations

Problem 17

Read More
SIEM
DLP
IDS
How to Generate Your Own GnuPG Key
5 Reasons Installing Fewer Apps Helps You Stay Safe

Problem 18

Telegram & Discord Security Best Practices
Read More
Read More
Check out: Littlesnitch tool

Problem 19

Read More on Incident Response Plans
Read More

Problem 20

Violent Attack Vectors in Web3: A Detailed Review
Here's a List of 29 Different Types of USB Attacks
Bluetooth Attacks and Security Tips – Awareness Results in Better Protection
Bluetooth Security: 5 Ways to prevent Bluetooth attacks with Build38
This is a macOS hardening to read or set security configuration 124 7 days ago
A collection of awesome security hardening guides, tools and other resources 5,502 about 2 months ago
Guide to securing and improving privacy on macOS 21,308 18 days ago
Watch More
Read More
scan.tylabs.com
any.run
dangerzone.rocks
Malwoverview 2,967 9 days ago
urlscan.io

Problem 21

Watch More
Watch More
Read more
cameras detector at Amazon Video could be easily find. Just buy any . You should be able to detect infrared radiation coming from the objective or (and) wireless connection! Any front camera on old phone does not have infrared filter so also can be used for it!
pin-pointer Sweep with a metal detector or a
use a hardware VPN Never use a local Wi-Fi network without VPN (mullvad.net or )
How To Detect Hidden Cameras
How to find hidden cameras - 2.0
4 Ways of Detecting Hidden Cameras in Your Airbnb
Cybersecurity expert explains how to find hidden cameras in an Airbnb or hotel room
How to Find Hidden Spy Cameras in your Airbnb with Wireshark
Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room
Lumos: IoT device detection system
Researchers reveal how hotel key cards can be hacked - what you need to know
How Does a Drive-By NFC Hack Work?
Key Card Entry System Security: What is the Difference Between NFC and RFID?
Your hotel card may be copied through this item
logic bomb 38 about 9 years ago
Duress - Emergency Password
Contracts for a wallet that is recoverable via backup keys 51 over 1 year ago
Better privacy, without special software
digi cloak 62 20 days ago
hackna
html vault 150 29 days ago
Great PC for work
Another great PC for work
More Info
Trail of Bits Minimum Viable Plans (MVPs) for Security
OpSec101

Problem 22

OpSec Going Smarter: Secure Smartphones
Read More
Telegram & Discord Security Best Practices
darknetdiaries: Encrypted Phones Check out:
A nice OpSec feature
iPhones Vulnerable to Attack Even When Turned Off
Malicious profiles – one of the most serious threats to iPhones
Why Configuration Profiles Can Be As Dangerous As Malware on iPhones and iPads
Kyocera phones
iCloud Latest iPhone (watch out & ) or Android
BlackBerry Device Let's the true in this industry!
ThinkPhone
What is Island in Android?
Read more

Problem 23

walletcompare.xyz
walletscrutiny.com
TryEthernal.com
Defillama.com
Rotki
Find wallet
Read More 1,902 8 months ago
Read More
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
On Operational Security in Web3
Violent Attack Vectors in Web3: A Detailed Review
Do not confuse it with allowance approve scam!
How to protect your assets
SideShift or
How to fund an undoxxed Ethereum wallet off-chain
changenow.io
tradeogre
atomic swap 344 11 months ago ETH-XMR - this one released via a bridge!
Aztecnetwork Maybe also check out: but always keep in mind
Spook 55 over 1 year ago
RPC-proxy 23 almost 2 years ago
Zmok
Helios 1,868 20 days ago

Problem 24

The Only Safe Way to Store Crypto
Read More 9,891 14 days ago
Read More
How to protect your assets
On Operational Security in Web3

Problem 25

Physical Attacks 577 10 days ago
Physical Security Tips
3FA
Counter-OSINT Techniques 414 over 1 year ago
Read More 577 10 days ago
Read More
OpSec Going Smart
OpSec Going Smarter
OpSec Going Smarter: Secure Smartphones
Choosing a Reliable VPN Provider for Life & Work
Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
The Only Safe Way to Store Crypto
How Cross-Chain Bridges are Hacked?
What you should do if you think someone has stolen your crypto-assets
What to do when your Web3 project Discord server is hacked & how security audit may prevent it from happening
Violent Attack Vectors in Web3: A Detailed Review
What is ARP spoofing and how to protect against it?
An ultimate list of rules any on-chain survivor should follow to stay safe!
QR Code: An Underestimated Danger
The most significant milestones in the development of communications
Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
Laplace's Demon Speaks: Is there a life in blockchain?
MacOS + IOS + Crypto + OpSec = ?
How to win the war, trick the KGB and protect your crypto-assets from theft by Steganography
Master of OpSec Masters: A View Through the Prism of Time
OpSec in Crypto: Thoughts
Attacks via a Representative Sample : Myths and Reality
How can you become a one-man-army OSINT specialist?
Key principles of storing cryptocurrency securely
On Operational Security in Web3
Taming a Wildhorse CEX App
Telegram & Discord Security Best Practices
AnonPlanet
Anon Guide or via
anonymousplanet.org
My Works
How to use an ipad as a secure calling and messaging device
Stylometric fingerprinting redux
privacyguides.org
OpSec
DeepWeb OpSec
privacytools.io
Start.me RabbitHole
Trail of Bits Minimum Viable Plans (MVPs) for Security
OpSec101
Awesome Security Hardening Guides 5,502 about 2 months ago
How to protect your crypto assets
Crypto OpSec
Security best practices
MyCrypto’s Security Guide For Dummies And Smart People Too
Check out this awesome Privacy-focused toolkit!
The Ten Commandments of crypto security
Privacytests.org
Privacy.sexy Repo 4,165 11 days ago
Privacy.sexy Website
Intro to Web3 Security
Privacy and Scaling Explorations
A collection of practical security-focused guides and checklists for smart contract development 1,065 about 1 year ago
opsecprofessionals.org

Additional Resources

https://www.youtube.com/watch?v=hxHqE2W8scQy
https://www.youtube.com/watch?v=0aSQMeoz9ow
https://www.youtube.com/watch?v=pGcerfVqYyU
https://www.youtube.com/watch?v=9XaYdCdwiWU
https://www.youtube.com/watch?v=ixLuRvYlrlw
https://blog.keys.casa/7-ways-to-level-up-your-bitcoin-opsec
https://medium.com/the-business-of-crypto/fundamentals-of-opsec-in-crypto-7844ba701b1d
https://www.threatstack.com/blog/five-opsec-best-practices-to-live-by
https://digitalguardian.com/blog/what-operational-security-five-step-process-best-practices-and-more
https://www.gocivilairpatrol.com/programs/emergency-services/operations-support/operational-security-opsec
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817
https://www.cnbc.com/2017/11/02/heres-how-to-protect-your-bitcoin-and-ethereum-from-hacking.html
https://www.cnbc.com/2021/06/11/tips-to-help-keep-your-crypto-wallet-secure.html
https://www.ledger.com/academy/security/hack-wifi
https://datatracker.ietf.org/wg/opsec/documents/
https://www.lopp.net/bitcoin-information/security.html
https://www.reddit.com/r/opsec/
https://arxiv.org/abs/2106.10740
https://web.mit.edu/smadnick/www/wp/2019-05.pdf
https://airgapcomputer.com
https://joelgsamuel.medium.com/how-to-keep-your-smartphone-safe-from-spying-d7d50fbed817
https://assets.website-files.com/5ffef4c69be53b44bd10b438/6012f54022181b0d0a3a948c_CryptoCurrency%20Security%20Standards%20Checklist.pdf
https://blog.eduonix.com/cryptocurrency/cryptocurrency-security-checklist-investors-adopt/
https://github.com/jlopp/physical-bitcoin-attacks/blob/master/README.md 577 10 days ago
https://cryptosec.info/checklist/
My Blog on Mirror
My Blog on Medium