operational-security
Practices such as using trusted devices and secure networks when changing passwords to prevent interception by adversaries.
4 chapters across 4 books
Extreme Privacy: What It Takes to Disappear (2024)Michael Bazzell
This chapter from "Extreme Privacy" focuses on the critical importance of using unique, complex, and randomly generated passwords stored in password managers to protect against account breaches. It contrasts online and offline password management options, recommending tools like Bitwarden for online use and KeePassXC for offline use, and provides detailed guidance on securely creating, storing, and backing up passwords. The author emphasizes the necessity of two-factor authentication and careful operational security practices such as avoiding password changes on compromised devices or public networks.
Count Zero (1986)William Gibson
In this chapter, Turner prepares for a high-risk extraction operation in a remote desert bunker, overseeing a team responsible for monitoring cyberspace, medical procedures, and security. The chapter details the complex technological setup, the precarious nature of their mission against the powerful Maas Biolabs, and the tense interactions with Hosaka's medical team, highlighting the intricate coordination required for the defection of a key figure named Mitchell. Turner's reflections and the vivid dream sequence reveal his personal stakes and the psychological weight of the operation.
State Tectonics (2023)Tom Doherty Associates
In this chapter, Rajiv and Maryam navigate complex interpersonal dynamics with Taskeen, an elderly tech expert whose trustworthiness is questioned despite her valuable technical insights. Meanwhile, Ken faces political tension within Free2B regarding his alignment with the group's values, and Rajiv prepares for an imminent security event while maintaining covert communications. The chapter explores themes of trust, loyalty, and the intersection of personal and organizational agendas amid a backdrop of espionage and political maneuvering.
The Lincoln Hunters (1958)Wilson Tucker
In this chapter, the protagonist Steward prepares for a time-travel mission to the era of Abraham Lincoln by studying historical summaries, idiomatic expressions, and donning period-appropriate clothing and equipment. He interacts with other Characters and technicians who brief him on the technical details of the time-travel 'shoot,' including the use of a specialized bullet-shaped time capsule and strict time tolerances to avoid paradoxes. The chapter highlights the challenges of maintaining authenticity in historical immersion and the technical and procedural constraints of time travel.