May 12, 2023, 1:39 p.m. | /u/SaveFroman

Privacy & Freedom in the Information Age www.reddit.com

For someone with a pretty regular threat model (avoiding mass surveillance, generally just being private), decent terminal ability / understanding of the Linux operating system, and already good knowledge of best practices (not plugging in random USB's, generally avoiding third party repos, constantly updating, strong passwords, etc).
Are there any guides that offer some sort of benefit for this specific situation?

best practice best practices fedora guides hardening knowledge linux mass surveillance operating system party practice practices privacy private random repos surveillance system terminal third threat threat model understanding usb

Senior Security Engineer - Detection and Response

@ Fastly, Inc. | US (Remote)

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Defensive Cyber Operations Engineer-Mid

@ ISYS Technologies | Aurora, CO, United States

Manager, Information Security GRC

@ OneTrust | Atlanta, Georgia

Senior Information Security Analyst | IAM

@ EBANX | Curitiba or São Paulo

Senior Information Security Engineer, Cloud Vulnerability Research

@ Google | New York City, USA; New York, USA