Every person has a threat model. Whether you're protecting passwords from data breaches or your identity from state-level adversaries — there's a security stack for you.
Security is not one-size-fits-all. A threat model is a structured way of thinking about who might want your data, what they can do with it, and how capable they are of getting it.
A journalist in an authoritarian country faces radically different threats than someone trying to avoid ad-tracking. The tools and effort should match the risk — over-engineering creates friction that leads to abandonment; under-engineering leaves you exposed.
This guide presents five stacks, each building on the last. Start where you are. Move up when your threat model demands it.
Companies that harvest, aggregate, and sell your personal information from public records, apps, and tracking pixels.
Opportunistic attackers using social engineering, fake emails, and malicious links to steal credentials or money.
When services you use are compromised and your credentials or personal data are leaked onto the dark web.
Your internet service provider can log every site you visit. Public Wi-Fi exposes traffic to anyone on the network.
Law enforcement, intelligence agencies, or foreign governments who can compel platforms to hand over your data.
Sophisticated adversaries — corporate spies, stalkers, nation-state actors — who focus resources specifically on you.
Click any level to expand the full stack. Each level includes all protections from the levels below it.
| Protection | L1 Baseline | L2 VPN | L3 Encrypted | L4 Anonymous | L5 Journalist |
|---|---|---|---|---|---|
| Strong unique passwords | ✓ | ✓ | ✓ | ✓ | ✓ |
| 2-Factor Authentication | ✓ | ✓ | ✓ | ✓ | ✓ |
| Ad & tracker blocking | ✓ | ✓ | ✓ | ✓ | ✓ |
| ISP traffic hidden | ✗ | ✓ | ✓ | ✓ | ✓ |
| IP address hidden | ✗ | ~ | ~ | ✓ | ✓ |
| End-to-end encrypted messaging | ✗ | ✗ | ✓ | ✓ | ✓ |
| Encrypted storage at rest | ✗ | ✗ | ✓ | ✓ | ✓ |
| Metadata-free file transfers | ✗ | ✗ | ✗ | ✓ | ✓ |
| Unlinkable identity | ✗ | ✗ | ✗ | ✓ | ✓ |
| Air-gapped offline machine | ✗ | ✗ | ✗ | ✗ | ✓ |
| Amnesic OS (no trace) | ✗ | ✗ | ✗ | ✓ | ✓ |
| Protection from physical seizure | ✗ | ✗ | ~ | ~ | ✓ |
✓ Full protection · ~ Partial protection · ✗ Not covered
Tick items off as you complete them. These are ordered by impact-to-effort ratio.