OPSEC Checklist
An interactive checklist to improve safer account, device, and exposure habits one step at a time.
For anyone starting from the basics. · 15-25 min
Open checklistFree Resources
Tools, guides, and templates to help you clean up the basics before you ever need private help.
Tools
The fastest way to start.
An interactive checklist to improve safer account, device, and exposure habits one step at a time.
For anyone starting from the basics. · 15-25 min
Open checklistA guided planner that turns your setup into a personalized hardening path.
For users who want practical next steps, not abstract advice. · 10-15 min
Plan your setupA calm first-pass tool for suspicious logins, phishing scares, lost access, or device problems.
For users facing something urgent or confusing. · 5-10 min
Start triageA guided self-assessment to spot account dependencies, identity overlap, and avoidable exposure.
For people who want a clearer sense of their risk. · 8-12 min
Run self-checkCheck how strong your passwords really are. Client-side only, your password never leaves your browser.
For anyone who wants to understand password security. · 2-5 min
Analyze passwordCan you spot the difference between real messages and phishing attempts? Test yourself with 10 realistic scenarios.
For everyone. Phishing is the most common attack vector. · 5-10 min
Take the quizStep-by-step hardening guides for iPhone, Android, Mac, and Windows. Track your progress per device.
For people who want to lock down their devices properly. · 15-30 min
Harden your deviceCheck if your email has appeared in known data breaches. See which breaches, what was exposed, and what to do next.
For anyone who wants to know if their data has been leaked. · 1-2 min
Check your emailTake a 2-minute assessment and get a personalized security score from 0-100 with specific recommendations.
For anyone who wants a quick security health check. · 2-3 min
Get your scoreCheck how exposed your phone number is across caller ID databases, data brokers, and social platforms. Learn how to remove yourself.
For anyone concerned about phone number privacy. · 5-10 min
Check your numberAnswer a few questions about your profile and get a personalized threat model with prioritized action steps.
For users who want to understand their specific risk profile. · 3-5 min
Generate your modelMap how your accounts are connected and see which ones are single points of failure. Visualize what happens if one is compromised.
For people who want to understand account dependencies. · 5-10 min
Map your accountsCompare SMS, authenticator apps, push notifications, and hardware keys side by side. Find the best MFA method for your needs.
For anyone setting up or upgrading two-factor authentication. · 3-5 min
Compare methodsCheck if your password has appeared in 700M+ breached passwords. Uses k-anonymity — your password never leaves your browser.
For anyone who wants to check if their passwords are compromised. · 1 min
Check passwordScan any email domain for SPF, DMARC, DKIM, and MX records. Detect spoofing vulnerabilities automatically.
For anyone who wants to verify their email domain security. · 1-2 min
Scan domainPaste headers from a suspicious email to detect spoofing, trace the sender, and verify authentication. 100% client-side.
For anyone who received a suspicious email. · 2-5 min
Analyze headersSearch a username across 30+ platforms automatically. See your digital footprint, find forgotten accounts, assess exposure.
For anyone who wants to understand their online presence. · 1-2 min
Search usernameScan any website for security headers, HTTPS, and common vulnerabilities. Get a letter grade with fix recommendations.
For anyone who wants to check if a website is secure. · 1-2 min
Scan websiteGenerate ready-to-run hardening scripts for macOS and Windows. Choose a security profile, pick your steps, download the script.
For anyone who wants to lock down their OS with real commands. · 5-10 min
Generate scriptGuides
A few guides to cover the essentials.
Privacy Basics · 8 min read
A practical starting point for people who want better online habits without turning privacy into a lifestyle project.
Read guideAccounts · 7 min read
The settings and habits that matter most if Gmail is your digital center of gravity.
Read guideRecovery & MFA · 9 min read
How to improve account recovery and MFA in a way that stays usable under stress.
Read guideTemplates
Simple assets you can reuse.
Account Inventory Template
A starter structure for mapping your important accounts, recovery options, and owners.
30-Day Remediation Plan
A lightweight template for spacing out account cleanup over a month.
Incident Response Checklist
A simple checklist to keep your first response calm and structured.
Digital Footprint Map
A basic map for seeing where your identities, handles, and accounts overlap.
Open
Open resources outside the site.
opsec-checklists
Markdown checklists and simple walkthroughs for safer online habits.
account-hardening-guides
Practical hardening guides for common account setups and recovery paths.
security-templates
Reusable templates for account inventories, remediation plans, and incident checklists.
privacy-starter-pack
A curated starter pack with beginner-friendly privacy resources and setup notes.
Get in touch