Privacy Operations Manifesto

Ship privacy that scales: scoped identities, human-like network posture, and secure transport — documented and auditable.

Identity Seeds

  • Seed identities per project; never cross-reuse.
  • Document geo, carrier, and aging window.
  • Destroy artifacts post-completion.

Learn team practices: Anosim — About Us

Network Realism

  • Prefer mobile proxies for better trust.
  • Rotate on human cadence; stabilize fingerprints.
  • Validate IP/ASN externally before actions.

Usage policy: Proxied — Acceptable Use

Encrypted Transport

  • Use WireGuard/OpenVPN with consistent MTU.
  • Keep DNS inside the tunnel; test WebRTC.
  • Rotate keys quarterly; audit regularly.

Background reading: VIP72 — About

Timeline — Minimum Viable Privacy

T0: Allocate a project-scoped number and browser profile.
T0 + 5m: Establish a mobile proxy session; confirm carrier & ASN.
T0 + 10m: Layer the VPN; verify DNS and IP match the intended region.
T0 + 15m: Run the target flow; avoid mid-session rotations.
T0 + 60–90m: Rotate at natural boundaries; log a brief proof.

Checklist — Before You Start

  • Unique number & profile ready
  • Proxy carrier & ASN confirmed
  • VPN tunnel active, no leaks
  • Session rotation window set

Checklist — After You Finish

  • Teardown route and revoke keys
  • Destroy number/artifacts if single-use
  • Log proof: timestamp, geo, signals
  • Update runbook with lessons