root@vsec:~#
cat ./README.md
V-Sec: The Master Guide
Welcome to V-Sec. This framework is designed to protect digital creators, VTubers, and streamers from the realities of the modern internet. Your anonymity is your armor, but the internet is intrinsically designed to link, correlate, and expose data.
Maintaining boundaries between your online persona and your real-life identity is not about paranoia; it is about Operational Security (OpSec). This guide operates on the principle of Defense in Depth—if one layer of security fails (like accidentally leaking an email address on stream), the next layer (an encrypted alias) prevents a complete breach.
HOW TO USE THIS SYSTEM:
-
1.
BASIC_OPSEC/
The absolute fundamentals. Even if you aren't tech-savvy, you must implement these habits. It covers isolating your browser fingerprints, locking down your physical mail, safely handling sponsorships/money, and stream hygiene.
-
2.
TECH_NETWORK/
For advanced users seeking enterprise-grade resilience. We abandon consumer routers here to build self-hosted hardware firewalls (OPNSense), isolate traffic with VLANs, and establish Site-to-Site VPN tunnels to scrub DDoS attacks.
-
3.
THREAT_INTEL/
Know your enemy. This section breaks down the exact methodologies, OSINT tools, and AI algorithms that malicious actors use to dox creators, allowing you to counter them proactively.
-
4.
LEGAL_DEFENSE/
When digital defense fails, you must respond physically. Learn how to weaponize privacy laws (GDPR/CCPA) against data brokers and how to properly interface with local law enforcement to prevent swatting.
0. The Threat Landscape
Standard cybersecurity focuses on protecting credit cards and passwords. Creator security is entirely different—it is about protecting a persona from psychological warfare and physical stalking.
-
The Asymmetric Threat: You are defending against highly motivated individuals with infinite free time. They are not looking to steal your bank account; they are looking to solve a puzzle. The reward is destroying the illusion of your boundary.
Scenario: A malicious actor creates an automated script to cross-reference the exact time your stream goes live with the activity status of thousands of public Discord accounts. If your personal IRL Discord account consistently goes "Do Not Disturb" at the exact second the Creator goes live over a period of 30 days, they have found your real identity through metadata correlation alone.
-
Facial Recognition (IRL Creators): If you show your face on stream, your threat model is vastly different from VTubers. Your face is a biological fingerprint that cannot be changed or hidden.
Scenario: You use a facecam while streaming. An attacker takes a screenshot of your stream and uploads it to PimEyes or Clearview AI. The AI reverse-searches your face against billions of images on the internet, discovering a 10-year-old Facebook album uploaded by your aunt that contains your full name, hometown, and high school graduation details.
-
Perfect Compartmentalization: The golden rule of V-Sec is complete, physical and digital separation. The data associated with the "Real You" must never exist on the same hardware, browser, or account as the "Creator You".
Scenario: A creator uses the same Windows login for college work and streaming. During a stream, a Windows background notification pops up saying: "OneDrive Sync Failed: C:\Users\JaneSmith\University\...". The real name is broadcasted to 5,000 viewers instantly.
1. Email & Communications Isolation
Your personal email is tied to data breaches, your phone number, and your real name. It must never touch your Creator accounts.
-
Encrypted Providers: Create a fresh, dedicated email using a privacy-respecting provider like ProtonMail or Tuta. Do NOT use Gmail for your root recovery accounts.
Scenario: You use your personal Gmail to register for a game you stream. That game suffers a data breach. Attackers plug your leaked Gmail into a password recovery tool, see the masked recovery phone number (ending in -45), cross-reference it with a leak from a local pizza chain you ordered from IRL, and instantly uncover your home address.
-
Email Aliasing: Never give out your root email. Use services like SimpleLogin or Addy.io to generate unique, burnable email addresses for every service (e.g.,
twitter_vsec@alias.com). If an alias is spammed or breached, you simply turn it off.
Scenario: You put a business email in your Twitter bio. A malicious actor signs that email up for thousands of newsletters, causing a Denial of Service attack on your inbox. If you used an alias, you simply click "Deactivate" in SimpleLogin, and the spam instantly stops without affecting your main accounts.
-
Burner Phone Numbers: SMS 2FA is fundamentally broken and vulnerable to SIM swapping. If a service forces you to provide a phone number, use a VoIP number like MySudo, Google Voice (on a burner account), or buy a cheap prepaid SIM card like Mint Mobile paid for in cash.
Scenario: An attacker pays an underground service $50 to bribe a corrupt telecom employee to transfer your real phone number to the attacker's SIM card. The attacker then hits "Forgot Password" on your Twitter, receives the SMS 2FA code, and steals your account permanently.
2. Browser & Web Navigation
Browsers track hardware IDs, canvas fingerprints, and cookies. If you check your personal banking and Creator Twitter in the same browser, ad networks will link the two identities.
-
Browser Separation: Use entirely different browsers. Personal life on Chrome/Edge, Creator life on a hardened browser like Brave, Mullvad Browser, or LibreWolf.
Scenario: You accidentally click a link a viewer sends in chat while on your personal Chrome profile. A hidden script doesn't just log your IP, but it logs your hardware canvas fingerprint and existing session cookies. An ad network correlates your Twitch session with your personal Amazon shopping cart session, bridging the gap between your identities.
-
Multi-Account Containers: If using Firefox, install the Multi-Account Containers extension. Keep your YouTube, Twitter, and Email strictly separated into isolated color-coded tabs so cookies cannot cross-pollinate.
Scenario: You log into your Twitter. Without containers, Twitter's background trackers follow you as you open a new tab and log into your personal university portal, linking the metadata of both accounts on their backend servers.
-
Essential Extensions: Install uBlock Origin (blocks tracking scripts and malicious IP grabbers) and CanvasBlocker (fakes your hardware fingerprint).
Scenario: A malicious actor buys a seemingly innocent ad slot on a forum you visit. The ad contains a zero-pixel image that executes a script to map your local network. uBlock Origin terminates the script before the ad even renders on your screen.
-
Search Engines: Stop using Google for Stream-related searches. Use DuckDuckGo or Brave Search to prevent search history correlation.
Scenario: You Google a very specific, local medical clinic, and then later Google "How to set up OBS studio". Google's profile algorithm combines these interests. Later, a targeted YouTube ad pops up on your stream showing the local clinic, revealing your city to your viewers.
3. Account & Credential Management
Your passwords and auth tokens are the final line of defense against account takeovers.
-
Password Managers: NEVER use the password manager built into your browser. Use a dedicated, zero-knowledge manager like Bitwarden, 1Password, or KeePassXC.
Scenario: You reuse your personal Spotify password for your Twitter account. Spotify suffers a data breach. Attackers employ "credential stuffing bots" that automatically test leaked passwords against thousands of sites. Your Twitter is instantly hijacked.
-
Hardware Security Keys: The ultimate defense against phishing. Buy two YubiKeys (one primary, one backup stored in a safe). Register them to your Google, Twitter, and Password Manager.
Scenario: You receive a highly convincing email pretending to be a Twitch sponsorship. You click the link, enter your password, and type in your 6-digit authenticator code. The attacker's bot instantly forwards those to the real Twitch, bypassing your 2FA. A YubiKey stops this completely because the physical key cryptographically verifies the actual domain URL, rejecting the fake site automatically.
-
Authenticator Apps (TOTP): For sites that don't support YubiKeys, use an offline authenticator app like Aegis (Android) or Ente Auth (Cross-platform).
Scenario: You use Authy for 2FA. Authy's cloud infrastructure is breached by hackers, exposing millions of 2FA seeds. Attackers clone your tokens and gain access to your accounts. Offline managers like Aegis ensure the private keys never leave your physical device.
4. Stream Environment & Content Hygiene
A momentary slip-up on stream can reveal your IP, real name, or location.
-
Dedicated Windows User: Create a separate Windows User Account strictly for streaming. Do not log into your personal Microsoft account.
Scenario: While streaming, your mother sends you an iMessage or WhatsApp text saying, "Hi honey, I left the lasagna in the fridge. Love, Mom." A desktop notification pops up over your game, revealing your real first name to thousands of people.
-
OBS Window Capture ONLY: Never use "Display Capture." Always capture specific application windows.
Scenario: You are playing a horror game on "Display Capture" and the game crashes to the desktop. Your desktop background is a photo of you and your significant other, and your tax return PDF is sitting on the desktop. The entire stream sees it. Window Capture ensures they only see a black screen upon crash.
-
IRL Cameras & Reflections (FleshTubers): If you use a facecam, be hyper-aware of your background. Dedicated attackers can geolocate your exact street using "Geoguessr" tactics based on the style of street signs, license plates, or tree lines visible out your window. Keep blinds closed. Additionally, beware of reflections in your glasses, glossy monitors, or even spoons. Modern HD webcams capture enough detail for attackers to read mail reflected in your eyes.
-
VTube Studio & Avatar Software Leaks: Most VTubers use VTube Studio or VSeeFace. When interacting with these programs (loading models, adding props), they often open the Windows File Explorer. Always use Spout2 capture or strictly configure OBS to hide the VTS UI. Never load new assets live.
Scenario: You click "Load Custom Item" in VTube Studio mid-stream. A Windows File Explorer window pops up. The file path at the top reads C:\Users\FirstnameLastname\Downloads\VTuberAssets\. You have just broadcasted your legal name to your entire audience.
-
Scrubbing Metadata (EXIF): Every picture taken with a smartphone contains hidden GPS coordinates. Before posting "handcams" or pet photos, run them through tools like ExifTool or mobile apps like ImagePipe to strip the metadata.
Scenario: You take a cute photo of your cat to post on your Twitter account to celebrate 10k followers. You forget to scrub the EXIF data. The raw image file contains the exact longitude and latitude of your bedroom where the photo was taken, leading stalkers directly to your front door.
5. Financial Anonymity & Real World
Handling money is the fastest way to leak your real name.
-
The PayPal Trap (CRITICAL): Standard PayPal accounts reveal your legal name. Upgrading to a PayPal Business Account allows you to use a DBA, but is still risky without an LLC.
Scenario: You commission an artist and pay them via a personal PayPal account. PayPal displays "Payment received from Jane Doe". The artist now has your legal name. If they get hacked, or turn out to be malicious, your identity is exposed.
-
Virtual Credit Cards: Never use your real debit card to pay for assets. Use Privacy.com (US) or Revolut (EU) to generate burner cards with fake billing names.
Scenario: You buy a cheap asset from a shady third-party marketplace using your real credit card. The site's database is compromised. Not only are your card details stolen, but your billing name and home address are dumped on a public hacker forum.
-
Crypto & Monero: For extreme anonymity in commissions, cryptocurrency can be used. If privacy is paramount, utilize Monero (XMR), which obscures wallet addresses and transaction amounts.
Scenario: You pay an editor in Bitcoin. Because Bitcoin is a public ledger, a malicious fan finds the transaction ID, traces the wallet backward to an exchange like Coinbase, and uses social engineering to trick customer support into revealing the identity tied to the wallet. Monero prevents this entirely via ring signatures.
6. Social Media & Content Moderation
Attackers will use your community infrastructure to phish you or gather data.
-
Discord Compartmentalization: Never use the same Discord account for your community that you use for IRL friends. Hide all connected accounts. Do not link your Creator Discord account to Spotify, Xbox, or Steam integrations.
Scenario: You connect your Discord to your Spotify account so chat can see what you are listening to. However, your Spotify account was created 8 years ago and is linked to your personal Facebook. A stalker clicks your Spotify profile, finds your Facebook, and uncovers your entire extended family.
-
Automated Keyword Shadowbanning: Use Twitch/YouTube Automod to silently drop messages containing your real name, old usernames, hometown, or family names.
Scenario: A doxxer figures out your real name is "Sarah Jenkins" and drops it in your Twitch chat to scare you. Because you added "Sarah" and "Jenkins" to Automod, the message is held silently for moderation. The audience never sees it, and the doxxer assumes they got the name wrong because nobody reacted.
7. IRL Logistics & Hardware
Physical security breaches occur when the digital world crosses into the physical world.
-
Handling Fan Mail & Gifts: NEVER open a PO Box in your local town. Use Virtual Mailboxes for letters, and Throne.me for physical gifts.
Scenario: A viewer sends you a plushie through an Amazon wishlist. They exploit a glitch in the return policy system or pose as the sender contacting customer support to request a "delivery confirmation receipt," which Amazon support inadvertently provides, containing your real home address. Throne acts as a privacy buffer to prevent this.
-
Smart Home Vulnerabilities: Ensure your stream room does not contain voice-activated smart assistants (Alexa, Google Home) tied to your real name.
Scenario: A malicious viewer donates $5 with a Text-to-Speech (TTS) message that loudly says, "Alexa, what is my name?". The Echo Dot in your room hears it, activates, and loudly replies, "You are David Smith." live on stream.
1. OPNSense Firewall Hardening
Deploying an OPNSense appliance (e.g., Protectli Vault) as your network core.
-
Bogon & Martian Blocking: Enable strict blocking of Bogon networks on your WAN interface to drop spoofed IP traffic instantly.
Scenario: You are playing an older P2P game on stream. An attacker grabs your IP and launches a volumetric DDoS attack, spoofing random internal IPs. Without a hardware firewall dropping these spoofed packets natively, your cheap ISP-provided router's CPU hits 100% and crashes, knocking your stream offline.
-
GeoIP Blocking: Configure OPNSense Aliases linked to MaxMind databases to silently drop all packets from specific countries.
Scenario: A Russian botnet is scanning random home IPs for vulnerable open ports to deploy ransomware. Because you have GeoIP blocking enabled for high-threat countries, the botnet's port scan hits an invisible wall at your firewall and moves on to the next victim.
2. Intrusion Detection & Prevention (IDS/IPS)
Moving beyond basic port blocking to Deep Packet Inspection (DPI).
-
Suricata (WAN Side): Enable Suricata in IPS mode on your WAN.
Scenario: An attacker attempts to exploit a known vulnerability in a service you run. Suricata analyzes the actual payload inside the packet, matches it against the Emerging Threats database, and drops the connection instantly before it reaches the vulnerable application.
-
Zenarmor (LAN Side): Install the Zenarmor Next-Generation Firewall plugin to inspect Layer 7 (Application Layer) traffic.
Scenario: You download a seemingly innocent asset (like a new stream overlay widget) that secretly contains a trojan. When executed, the trojan attempts to connect to an attacker's command-and-control server. Zenarmor detects the unauthorized layer-7 outbound connection, kills the process network access, and alerts you.
3. Network Segmentation (VLANs)
The "4-Zone Rule." If an attacker breaches a smart lightbulb, they shouldn't be able to reach your streaming PC.
-
VLAN Segmentation Logic: Isolate Stream Rig, Personal Devices, and IoT into separate virtual networks.
Scenario: Your roommate downloads a sketchy file, or a hacker finds an exploit in your cheap smart fridge. Because they share the same "flat" network as your streaming PC, the attacker pivots from the fridge directly into your unprotected Windows file shares. VLANs isolate the fridge so it physically cannot route traffic to your streaming rig.
4. VPN Tunnels & DDoS Mitigation
Standard VPNs introduce too much lag for competitive gaming and can be bypassed. We build our own.
-
Site-to-Site WireGuard: Rent a cheap VPS from OVH or Linode and configure OPNSense to create a persistent WireGuard tunnel. Route only high-risk game traffic through it.
Scenario: You stream a highly competitive game where IP pulling is common. You route your game traffic through the WireGuard tunnel to an OVH VPS. When an angry opponent boots your IP, they are actually attacking the OVH data center, which scrubs the 500Gbps attack effortlessly while your home network remains totally unaffected.
5. DNS Sinkholing & Encryption
Preventing accidental leaks via chat links or background telemetry.
-
Network-Level Ad Blocking: Route all DNS requests through AdGuard Home or Pi-Hole. Use aggressive blocklists.
Scenario: A viewer links an image in your Discord that is actually a disguised IP logger hosted on a known tracking domain. Because your entire network's DNS requests are filtered through Pi-Hole with an aggressive blocklist, the DNS request to the logger fails to resolve, protecting your IP without you doing a thing.
6. Self-OSINT & Threat Modeling
To defend yourself, you must think like an attacker. Regularly try to dox yourself.
-
Sherlock & OSINT Framework: Run the Python tool Sherlock against your usernames.
Scenario: You used your Creator name to register a Neopets account 10 years ago. Sherlock finds it. You realize that Neopets account has your real birthday and location listed publicly, allowing you to delete it before an attacker finds it.
-
Breach Databases (Credential Stuffing): Attackers don't need to hack you directly if a website you used 8 years ago gets hacked. Search your old aliases on HaveIBeenPwned or DeHashed.
Scenario: You registered a Tumblr account in 2012 with the same username as your current Twitch channel. In 2013, Tumblr was breached. An attacker buys the breached database, searches your username, finds the plain-text password you used, and tries it on your current email.
-
The Family Weakness: Attackers know your OpSec is strong, so they target your family instead. Ensure your parents and siblings have private social media.
Scenario: Your OpSec is flawless. However, an attacker finds your mother's public Facebook page. She proudly posted a photo of you, tagged your real name, and captioned it: "So proud of my child graduating from [Specific University] in [Specific City]." You are now completely exposed through someone else's metadata.
-
Data Broker Takedowns: Use services like DeleteMe, Incogni, or Kanary to aggressively issue legal takedown requests.
Scenario: You bought a house or registered to vote. LexisNexis scraped the county property records and sold it to Whitepages. A stalker who found your real name now just has to Google it to find your home address. Automated data broker removal forces these companies to scrub your records constantly.
1. The Attacker's Toolkit (OSINT)
To defend yourself, you must know what tools malicious actors (who refer to themselves as "researchers") use to track you.
-
Advanced Reverse Image Search: Attackers use Yandex and specialized anime/art searchers like SauceNAO, IQDB, and Trace.moe.
Scenario: You post a photo of a coffee cup on your personal private Instagram, and later post a very similar photo of your desk setup on your public Twitter. An attacker uses Yandex's terrifyingly good AI image matching to connect the wood grain pattern of your desk and the specific coffee cup, linking your two accounts.
-
Image Upscaling: Attackers run blurry leaked thumbnails through AI upscalers like Waifu2x to enhance the image enough for facial recognition to trigger.
Scenario: You catch a 1-second reflection of your face in a spoon on stream. The resolution is too low for human eyes to make out features. An attacker runs the frame through Waifu2x, restores the facial geometry, and plugs it into facial recognition software to find your real Facebook page.
-
Username Enumeration: Attackers use tools like WhatsMyName.app to instantly scan hundreds of websites to find linked personal accounts.
Scenario: You used a unique handle for your online account. WhatsMyName discovers that the exact same handle was used on a niche knitting forum in 2012, where you introduced yourself with your real first and last name.
-
Rapid Archiving: Attackers use HTTrack to scrape and archive your entire profile locally before you can hit delete.
Scenario: You accidentally tweet a photo showing a piece of mail. You realize your mistake and delete the tweet 30 seconds later. However, an attacker has a script running that instantly downloaded the image the millisecond it went live. The data is compromised permanently.
2. AI & LLM Threat Vectors
The rapid advancement of Artificial Intelligence has handed enterprise-level data aggregation and deepfake tools directly to hobbyist stalkers.
-
Voice Cloning & Social Engineering: Attackers no longer need to sound like you. They only need a few seconds of clean stream audio to train an AI model (like ElevenLabs).
Scenario: An attacker feeds 10 seconds of your VOD into a voice cloner. They use VoIP to spoof your mother's phone number, call your elderly grandparents, and play an AI-generated message in your exact voice claiming you are in jail and need them to wire money, or provide your social security number to "the authorities".
-
LLM Data Scraping (The "Lore" Problem): Large Language Models (like ChatGPT or Perplexity) aggressively scrape forums, wikis, and 4chan. They memorize deleted information and can bridge connections between your aliases if prompted correctly.
Scenario: 5 years ago, a troll posted your real name on KiwiFarms. The thread was eventually deleted. Today, a user asks an AI: "What are the previous identities or controversies associated with [Your VTuber Name]?" The AI accesses its historical training data and outputs your real name, bypassing the fact that the original post was deleted.
-
Generative AI Un-cropping & De-blurring: Attackers use tools like Photoshop's Generative Fill or Waifu2x to restore destroyed data.
Scenario: You post a photo of a new keyboard on your desk, but blur out the reflection in the monitor. An attacker uses AI de-blurring algorithms to restructure the pixels, successfully reading the reflection of a shipping label sitting behind your keyboard.
-
Automated Spear Phishing: Attackers use LLMs to write hyper-specific, flawlessly localized phishing emails based on your stream transcripts.
Scenario: An attacker feeds an AI a transcript of your latest stream where you mentioned struggling with your taxes. The AI generates a highly realistic, legally intimidating email claiming to be from the IRS or an accountant, tricking you into clicking a malicious link that you otherwise would have ignored.
3. Stream Reconnaissance Tactics
Attackers listen to streams differently than fans. They take meticulous notes to piece together a psychological and geographical profile.
-
Data Points of Interest: Attackers specifically listen for: Pet names, offline occupations, funerals/deaths, local news stories, and specific conventions you attended IRL. They log this data using apps like Simplenote.
Scenario: During your debut stream, you casually mention that your high school's mascot was a very specific, rare animal, and that a massive thunderstorm just rolled in. An attacker uses WolframAlpha to cross-reference historical weather data from that exact time with a list of US high school mascots, instantly pinpointing your childhood town.
-
Defeating the "Fudge": Many creators "fudge" or alter stories to protect themselves. Attackers write down your story, wait months, and see if you retell it. If the details change, they know you are hiding a vulnerability.
Scenario: You claim you live in New York, but later complain about a 100-degree heatwave in November. Attackers flag the discrepancy, realize New York is a cover story, and begin analyzing your sleep schedule to calculate your true timezone (likely Australia or South America).
-
Visual Profiling: Attackers use rapid screenshot tools like Flameshot to capture and crop any momentary visual leaks.
Scenario: You accidentally Alt-Tab out of your game for a fraction of a second. The stream software captures a blur of your desktop. A watcher using Flameshot captures that exact frame, zooms in on the bottom right corner, and reads the local weather widget on your Windows taskbar.
1. GDPR Weaponization & Privacy Law
Data privacy laws are your most powerful legal tools to force data brokers, scrapers, and malicious archive sites to delete your information.
-
The EU GDPR: If you are an EU citizen, or if the platform storing your data operates in the EU, you are protected by the GDPR.
Scenario: A malicious drama wiki hosts a page detailing your real name and old high school photos. Since their server is hosted by a company in Germany, you send the host a formal GDPR Article 17 Right to Erasure request. Facing the threat of a €20 million fine from EU regulators, the host deletes the page immediately.
-
Enforcing Removals: Do not just ask nicely. Use templates from services like YourDigitalRights.org to send legally binding, intimidating deletion notices.
Scenario: A US-based data broker refuses to remove your address, claiming public record exemption. You send a legally formatted CCPA/CPRA deletion demand on formal letterhead. The broker's automated legal compliance system flags the risk of a lawsuit and automatically purges your record.
2. DMCA, Police & Legal Counsel
When OSINT and network security fail, you must transition to physical and legal defense mechanisms.
-
The DMCA Dox Vector: Filing a DMCA takedown against stolen art or a doxxing site is dangerous. Standard DMCA forms require your legal name and address, which are published on the Lumen Database.
Scenario: An art thief steals your VTuber model. You use a generic online form to submit a DMCA takedown to Twitter. Twitter complies, but legally forwards your full name, home address, and phone number (which you provided in the DMCA form) directly to the art thief, completely doxxing yourself to a malicious actor.
-
Anti-Swatting Protocol: Proactively contact your local police precinct's non-emergency line to place an "Anti-Swatting Flag" on your address.
Scenario: An attacker figures out your address and calls your local police department, claiming there is a hostage situation at your house. Because you previously set up an anti-swatting flag, the 911 dispatcher sees the warning note, calls your personal cell phone to verify your safety, and sends a single cruiser to check rather than a heavily armed SWAT team breaking down your door.
SYSTEM WARNING // DISCLAIMER:
Security is an ongoing process, not a final destination. Review your hardware, update your stuff, stay vigilant. No single tool or guide guarantees absolute anonymity. Stay safe.