Privacy PacksHigh-Risk Professional
Privacy Pack

Maximum Security Suite

Advanced protection for journalists, activists, and professionals handling sensitive information.

High-risk professionals, journalists, activists, researchers
Advanced

Mullvad VPN

VPN

Maximum privacy VPN with anonymous account creation

HighAdvanced
Setup Time: 1-2 hours

Mullvad VPN Setup Guide

VPN · Advanced setup · 1-2 hours

Guide Available
Why Recommended

No personal information required, accepts cash payments, independently audited, no logs

Guidance for High-Risk Professional

Mullvad is essential for high-risk work. Pay with cash mailed anonymously or cryptocurrency. Your account number is your only identifier - memorize it and store it securely offline. Use multihop connections for sensitive work (routes through 2 VPN servers). Never use the same server for different projects. In hostile environments, use bridge mode to hide VPN usage from ISP. Always enable kill switch to prevent accidental data leaks.

Configuration tips

  • Enable "Always-on VPN" and "Kill Switch" - never allow unprotected connections
  • Use multihop (double VPN) for maximum security: Settings > Advanced > Multihop
  • Configure WireGuard with custom port for better censorship resistance
  • Use bridge mode in restrictive countries to hide VPN usage
  • Rotate servers regularly - don't use the same server for extended periods
  • Combine with Tor Browser for maximum anonymity when needed

Step-by-step setup

  1. 1Purchase Mullvad account anonymously (cash or cryptocurrency)
  2. 2Install Mullvad on all devices
  3. 3Enable kill switch to prevent data leaks
  4. 4Configure multi-hop connections for extra security
  5. 5Use bridge mode in restrictive networks
  6. 6Regularly rotate VPN servers
  7. 7Combine with Tor for maximum anonymity when needed
Common Issues & Solutions
  • Multihop very slow: This is normal - you're routing through 2 servers. Use only for sensitive work
  • VPN detected/blocked: Use bridge mode or try different protocols (WireGuard vs OpenVPN)
  • Kill switch blocking all internet: This is intentional - reconnect to VPN to restore access
  • Can't receive cash payment confirmation: Check Mullvad website with your account number after 2 weeks

Signal with Security Hardening

Messaging

Military-grade encrypted messaging with advanced security features

HighAdvanced
Setup Time: 45-60 minutes

Signal with Security Hardening Setup Guide

Messaging · Advanced setup · 45-60 minutes

Guide Available
Why Recommended

Open source, end-to-end encrypted, disappearing messages, sealed sender, no metadata collection

Guidance for High-Risk Professional

Signal is your primary secure communication tool. Use a dedicated device if possible. ALWAYS verify safety numbers with contacts - this prevents man-in-the-middle attacks. Enable disappearing messages with short timers (1 hour or less) for all conversations. Use sealed sender to hide metadata. Never screenshot sensitive messages. Consider using separate Signal accounts (different phone numbers) for different contexts. In extreme cases, use Signal through Tor for IP protection.

Configuration tips

  • Enable Registration Lock with strong PIN (Settings > Account > Registration Lock)
  • Verify safety numbers with ALL contacts before sensitive conversations
  • Enable disappearing messages by default: Settings > Privacy > Disappearing Messages (1 hour or less)
  • Disable message previews: Settings > Notifications > Show > Name only
  • Enable "Screen Security" to prevent screenshots
  • Use "Sealed Sender" to hide metadata (hides sender from Signal servers)
  • Enable "Relay Calls" to hide IP address during calls

Step-by-step setup

  1. 1Install Signal on dedicated secure device
  2. 2Enable registration lock with strong PIN
  3. 3Verify safety numbers with all contacts
  4. 4Enable disappearing messages by default (short duration)
  5. 5Disable message previews and notifications content
  6. 6Use sealed sender for metadata protection
  7. 7Enable screen security to prevent screenshots
  8. 8Set up separate Signal accounts for different contexts
Common Issues & Solutions
  • Safety number changed: Contact's device changed or app reinstalled - verify new number before continuing
  • Messages disappearing too quickly: Adjust timer to longer duration or disable for specific conversations
  • Can't verify safety number: Must be done in person or via trusted secondary channel (not Signal itself)
  • Sealed sender not working: Ensure both parties have it enabled and are using latest Signal version

Tresorit or Sync.com

Cloud Storage

Zero-knowledge encrypted cloud storage

HighAdvanced
Setup Time: 1-2 hours

Tresorit or Sync.com Setup Guide

Cloud Storage · Advanced setup · 1-2 hours

Guide Available
Why Recommended

End-to-end encryption, zero-knowledge architecture, secure file sharing

Guidance for High-Risk Professional

Tresorit and Sync.com both offer zero-knowledge encryption - even they can't access your files. For maximum security, encrypt critical files with VeraCrypt before uploading (double encryption). Use separate accounts for different projects to compartmentalize data. When sharing files, use encrypted links with strong passwords sent via separate channel (Signal). Set short expiration times. Never store encryption keys or passwords in the cloud. Maintain offline encrypted backups of critical files on external drive stored securely.

Configuration tips

  • Use anonymous email (ProtonMail) for account creation
  • Enable 2FA with authenticator app (Aegis or andOTP on mobile)
  • For ultra-sensitive files: encrypt with VeraCrypt BEFORE uploading to Tresorit
  • Use encrypted links with strong passwords and short expiration (24-48 hours)
  • Never share master password - use encrypted links for sharing
  • Maintain offline encrypted backups on external drive

Step-by-step setup

  1. 1Create account with anonymous email
  2. 2Enable two-factor authentication
  3. 3Install desktop and mobile apps
  4. 4Encrypt sensitive files before upload (additional layer)
  5. 5Use secure sharing links with passwords and expiration
  6. 6Never store encryption keys in the cloud
  7. 7Maintain offline encrypted backups of critical files
Common Issues & Solutions
  • Very slow upload: Zero-knowledge encryption happens on your device - be patient with large files
  • Recipient can't open encrypted link: Ensure password sent via separate secure channel
  • Forgot master password: No recovery possible with zero-knowledge encryption - emphasize importance
  • High cost: Tresorit is expensive but necessary for high-risk work - budget accordingly

ProtonMail with PGP

Email

Encrypted email with additional PGP encryption layer

HighAdvanced
Setup Time: 2-3 hours

ProtonMail with PGP Setup Guide

Email · Advanced setup · 2-3 hours

Guide Available
Why Recommended

End-to-end encryption, Swiss privacy laws, Tor access, no IP logging

Guidance for High-Risk Professional

ProtonMail is Swiss-based with strong privacy laws. Create account via Tor for anonymity. Use hardware key 2FA (YubiKey). For non-ProtonMail contacts, use PGP encryption - generate key pair and publish public key. Verify all contacts' keys via trusted channel. Use email aliases to compartmentalize different work. Access via Tor .onion address when needed. Never access from compromised networks without VPN. ProtonMail encrypts subject lines only between Proton users - use generic subjects with external contacts.

Configuration tips

  • Create account via Tor Browser for maximum anonymity
  • Enable 2FA with hardware key (YubiKey) - most secure option
  • Generate PGP key pair: Settings > Encryption & Keys > Export Public Key
  • Publish PGP public key on keyserver for external contacts to find
  • Enable address verification to prevent phishing
  • Use email aliases for different contexts (journalism@, activism@)
  • Access via Tor .onion address when maximum anonymity needed

Step-by-step setup

  1. 1Create ProtonMail account via Tor
  2. 2Enable two-factor authentication with hardware key
  3. 3Generate and publish PGP key for external communications
  4. 4Configure email client with PGP for non-Proton contacts
  5. 5Use ProtonMail Bridge for desktop email clients
  6. 6Enable address verification for all contacts
  7. 7Set up email aliases for different contexts
  8. 8Never access via compromised networks without VPN
Common Issues & Solutions
  • PGP setup complex: Use ProtonMail's built-in encryption for Proton-to-Proton, PGP only for external contacts
  • Recipient can't read PGP email: They need PGP-compatible email client - use ProtonMail password-protected message instead
  • Tor access very slow: This is normal - patience required for maximum anonymity
  • Hardware key not working: Ensure YubiKey is properly inserted and browser supports WebAuthn

Tor Browser

Browser

Anonymous browsing through the Tor network

HighAdvanced
Setup Time: 30-45 minutes

Tor Browser Setup Guide

Browser · Advanced setup · 30-45 minutes

Guide Available
Why Recommended

Maximum anonymity, circumvents censorship, no tracking possible

Guidance for High-Risk Professional

Tor Browser is essential for anonymous research and accessing censored information. NEVER login to personal accounts via Tor - this defeats anonymity. Use only for anonymous browsing and accessing .onion sites. Don't maximize window (fingerprinting). Set security to "Safest" level (disables JavaScript) for sensitive work. Use bridges in hostile environments to hide Tor usage from ISP. Combine with VPN for extra protection (VPN -> Tor). Create new identity frequently. Never download files via Tor unless absolutely necessary.

Configuration tips

  • Download ONLY from official torproject.org website
  • Verify GPG signature of download to ensure authenticity
  • NEVER maximize browser window - keeps fingerprint consistent
  • Set security level to "Safest" for maximum protection (disables JavaScript)
  • Use .onion sites when available - they're only accessible via Tor
  • Use bridges in restrictive countries: Settings > Tor > Use a Bridge
  • Create new identity frequently: Click onion icon > New Identity

Step-by-step setup

  1. 1Download Tor Browser from official source
  2. 2Verify download signature
  3. 3Use Tor Browser for all sensitive research
  4. 4Never maximize window (fingerprinting protection)
  5. 5Disable JavaScript for maximum security (when possible)
  6. 6Use .onion sites when available
  7. 7Never login to personal accounts via Tor
  8. 8Use bridges in restrictive countries
Common Issues & Solutions
  • Very slow browsing: Normal - traffic routes through 3 servers worldwide. Patience required.
  • Many websites broken: Set security level to "Standard" or "Safer" instead of "Safest"
  • CAPTCHAs everywhere: Tor exit nodes often flagged as suspicious - solve CAPTCHAs or use different exit node
  • Tor blocked in my country: Use bridges to circumvent blocking - get bridge addresses from torproject.org

Bitwarden with Hardware Key

Password Manager

Password manager with hardware security key protection

HighAdvanced
Setup Time: 1-2 hours

Bitwarden with Hardware Key Setup Guide

Password Manager · Advanced setup · 1-2 hours

Guide Available
Why Recommended

Open source, end-to-end encrypted, supports hardware keys for 2FA

Guidance for High-Risk Professional

Bitwarden with hardware key 2FA is essential. Use anonymous email for account. Purchase YubiKey ($45) - physical key required for access. Generate 25+ character passwords for all accounts. Store master password offline in secure location - if you lose it, no recovery possible. Export encrypted backups regularly. Consider using separate Bitwarden accounts for different contexts (personal, work, activism). For maximum control, self-host Bitwarden on your own server. Never use SMS 2FA - hardware key only.

Configuration tips

  • Use anonymous email (ProtonMail) for Bitwarden account
  • Purchase YubiKey 5 NFC ($45) - works with computers and phones
  • Enable hardware key as primary 2FA: Settings > Two-step Login > Security Key
  • Generate 25+ character passwords for critical accounts
  • Store master password offline in secure location (safe, safety deposit box)
  • Export encrypted backup monthly and store offline
  • Consider self-hosting Bitwarden for maximum control

Step-by-step setup

  1. 1Create Bitwarden account with anonymous email
  2. 2Purchase YubiKey or similar hardware security key
  3. 3Enable hardware key as primary 2FA method
  4. 4Generate strong unique passwords for all accounts
  5. 5Store master password offline in secure location
  6. 6Enable emergency access for trusted contact
  7. 7Export encrypted backup regularly
  8. 8Use separate password manager for different contexts
Common Issues & Solutions
  • Lost hardware key: This is why you set up emergency access - trusted contact can grant access after waiting period
  • Forgot master password: No recovery possible - emphasize importance of storing securely offline
  • Hardware key not recognized: Ensure browser supports WebAuthn and key is properly inserted
  • Self-hosting complex: Use official Bitwarden cloud unless you have technical expertise

Tails OS (for highest risk)

Operating System

Amnesic live operating system for maximum security

MediumAdvanced
Setup Time: 2-3 hours

Tails OS (for highest risk) Setup Guide

Operating System · Advanced setup · 2-3 hours

Guide Available
Why Recommended

Leaves no trace, routes all traffic through Tor, includes security tools

Guidance for High-Risk Professional

Tails OS is for highest-risk situations. Boot from USB for sensitive work - leaves no trace on computer. All traffic routes through Tor automatically. Use for: sensitive communications, handling leaked documents, accessing censored information, protecting sources. Configure persistent storage for PGP keys and essential files. Never connect to personal accounts from Tails. Maintain separate Tails USBs for different projects. When done, remove USB and restart - computer returns to normal with no trace of your work. Tails is used by journalists worldwide for source protection.

Configuration tips

  • Download Tails from official tails.net website
  • Verify download signature - critical for security
  • Use Etcher or Rufus to create bootable USB (8GB minimum)
  • Configure persistent storage for PGP keys and important files
  • All internet traffic automatically routes through Tor
  • Tails includes: Tor Browser, encrypted email, secure file deletion
  • Computer returns to normal when you remove USB and restart

Step-by-step setup

  1. 1Download Tails OS and verify signature
  2. 2Create bootable USB drive
  3. 3Boot from Tails for sensitive work
  4. 4Configure persistent storage for essential files
  5. 5Use Tails for all high-risk communications
  6. 6Never connect to personal accounts from Tails
  7. 7Maintain separate Tails USB for different contexts
Common Issues & Solutions
  • Computer won't boot from USB: Change boot order in BIOS/UEFI settings
  • Persistent storage not working: Must be configured on first boot - follow Tails setup wizard
  • Very slow performance: Tails runs from USB and routes through Tor - slower than normal OS
  • WiFi not working: Some WiFi adapters not supported - use ethernet or different adapter

Need help implementing this pack?

Check out our Data Escape Guide for detailed tutorials and step-by-step walkthroughs.