DHitMA: High-Level Outline of DHitMA
Stay
anonymous
. Delete old accounts, do not use social media and use a
VPN
or
Tor
.
Use end-to-end encryption for all forms of communication: both
messaging apps
and
emails
.
Harden your
Internet browser
and increase your operational security when
browsing the Internet
.
Get off of Windows and Mac. Use Linux as your main
operating system
. Use
VMs
as needed.
Generate, store and use
strong passwords
.
Store all compromising applications on your operating system drive, and
encrypt it with VeraCrypt
; or more preferably, encrypt every drive entirely.
Think about and plan your
data organization scheme
.
Set up your
starting hardware
and look into using
better hardware
.
Make off-site
backups
of your hoard.
Look at
libraries
of data, and save things.
Look at
curated
bodies of data, and save things.
Upload data to others, either
publicly
or
privately
.
Spread the word of DHitMA!
https://dhitma.neocities.org