What is OPSEC Mistakes?
Common operational security failures that compromise privacy or anonymity, often involving small details that link a protected identity to a real one.
Even sophisticated security can be undone by a single OPSEC mistake. Most anonymity failures come from human error, not technical failure.
Common Mistakes
- Cross-contamination: Using the same username, email, or password across anonymous and real identities
- Metadata leaks: Forgetting to strip EXIF data from photos, or using a document with embedded author info
- Timing correlation: Always posting under a pseudonym at times that match your timezone/schedule
- Writing style: Linguistic patterns can be analyzed to match anonymous and known writing (stylometry)
- Browser leaks: Using Tor but logging into a personal account
- Physical patterns: Buying crypto at the same ATM, or always using the same cafe's WiFi
Famous OPSEC Failures
- Silk Road: Ross Ulbricht posted his real email on a forum promoting Silk Road years earlier
- Hector Monsegur (Sabu): Connected to an IRC channel without Tor once
- Ross Ulbricht again: Used a public WiFi network at a cafe where he was arrested with his laptop open
Prevention
- Define your threat model before acting
- Compartmentalize identities completely
- Assume every action leaves a trace
- Regular OPSEC reviews — what have you leaked?
Related Terms
Compartmentalization
The practice of separating different activities, identities, or data into isolated compartments so that a compromise in one doesn't affect the others.
Operational Security
The practice of protecting sensitive information by thinking like an adversary to identify vulnerabilities in your own behavior and communications. OPSEC goes beyond technical tools to address human factors that could expose you.
Threat Model
A systematic analysis of what you're trying to protect, from whom, the consequences of failure, and what resources you can apply. Threat modeling helps prioritize security efforts by focusing on realistic threats rather than theoretical ones.
Have more questions?
Use our guided flow to get the right next privacy step for OPSEC Mistakes.
Open Guided Flow