<aside> 💡
Prerequisites: Password manager, ex Bitwarden and Multi Factor Authentication (MFA), ex ente Authenticator
Suggested reading/background: Surveillance Self-Defense scenarios, basics of creating strong passwords, Surveilance Self-Defense index
</aside>
The technology you use is only as strong as its weakest link. In every situation, that will be you, the human being. Everyone can improve their situation but making it bulletproof is extremely difficult.
The following sections are organized by commitment to anonymity from surface level to complete commitment. The emphasis of this guide is on surface level commitment.