What Layer Are You At? #
Find your current privacy level across the 7 Layersβthen get a personalized action plan.
Privacy isn’t all-or-nothing. You’re somewhere on the spectrum across multiple layers. This assessment helps you:
- Identify where you are now (honestly)
- Understand what each layer means
- Prioritize which layer to improve first
No judgment. Everyone starts somewhere.
π THE 7 LAYERS (Quick Reference) #
Layer 0: Hardware (devices, chips, firmware)
Layer 1: Operating Systems (Windows, Mac, Linux, mobile OS)
Layer 2: Software & Applications (browsers, apps, tools)
Layer 3: Internet & Network (VPN, DNS, Tor, mesh)
Layer 4: Communications (email, messaging, voice/video)
Layer 5: Identity & Authentication (passwords, 2FA, biometrics)
Layer 6: Data Storage & Sovereignty (cloud, encryption, backups)
Layer 7: Social & Behavioral (OpSec, awareness, community)
π SELF-ASSESSMENT (Rate Yourself 1-10 Per Layer) #
LAYER 0: Hardware #
Rate yourself:
- β 1-3: Using mainstream devices (Intel ME/AMD PSP, stock phones), no awareness of hardware risks
- β οΈ 4-6: Aware of hardware backdoors, considering privacy-focused devices
- β 7-9: Using privacy-respecting hardware (System76, Purism, Pixel w/ GrapheneOS)
- π 10: Libreboot ThinkPad or RISC-V devices, hardware kill switches
Where are you? [1-10]: _
If 1-5: Focus on higher layers first (hardware is hardest to change)
If 6-8: Good foundation, maintain awareness
If 9-10: You’re advanced, help others
Deep Dive: Layer 0 (Framework KB, Doc 2.2.1)
LAYER 1: Operating Systems #
Rate yourself:
- β 1-3: Windows 10/11 or stock Android/iOS (default settings, heavy telemetry)
- β οΈ 4-6: Using macOS or hardened Windows/iOS (some privacy settings enabled)
- β 7-9: Linux (Ubuntu, Fedora, Mint) or GrapheneOS/CalyxOS
- π 10: Qubes OS, Tails, or Arch Linux (full control, no proprietary blobs)
Where are you? [1-10]: _
Action plan:
- If 1-3: START HERE (biggest impact) β Linux Guide (2.3.3) or Harden Windows (3.2.3)
- If 4-6: Consider dual-boot Linux β Guide (2.3.9)
- If 7+: Maintain, help others switch
LAYER 2: Software & Applications #
Rate yourself:
- β 1-3: Mostly proprietary (Microsoft Office, Adobe, Chrome, mainstream apps)
- β οΈ 4-6: Mix of open-source and proprietary (Firefox + some FOSS apps)
- β 7-9: Primarily open-source (LibreOffice, GIMP, F-Droid apps)
- π 10: 100% FOSS, audit software before use, contribute to projects
Where are you? [1-10]: _
Action plan:
- If 1-3: Swap 1 app/week β App Swaplist (1.2.4)
- If 4-6: De-Adobe, De-Microsoft β Guides (2.4.4, 2.4.5)
- If 7+: Teach others, audit software
LAYER 3: Internet & Network #
Rate yourself:
- β 1-3: No VPN, ISP DNS, no awareness of network privacy
- β οΈ 4-6: Using free/questionable VPN or only on public WiFi
- β 7-9: Privacy VPN (Mullvad, ProtonVPN, IVPN) + encrypted DNS (Quad9, NextDNS)
- π 10: Self-hosted VPN, Tor for sensitive tasks, mesh networking (Meshtastic)
Where are you? [1-10]: _
Action plan:
- If 1-3: Get VPN NOW β VPN Guide (2.5.2)
- If 4-6: Switch to privacy VPN β Mullvad Setup (3.6.2)
- If 7-9: Add encrypted DNS β Guide (2.5.7)
- If 10: Teach others, contribute to mesh networks
LAYER 4: Communications #
Rate yourself:
- β 1-3: Gmail, WhatsApp, SMS, Zoom (unencrypted or metadata-rich)
- β οΈ 4-6: ProtonMail + Signal (but still use some mainstream)
- β 7-9: ProtonMail, Signal, Element/Matrix (E2E encrypted everything)
- π 10: Self-hosted email, SimpleX Chat, PGP-encrypted comms, no metadata
Where are you? [1-10]: _
Action plan:
- If 1-3: Switch to ProtonMail + Signal β Guides (3.4.2, 3.5.2)
- If 4-6: Migrate fully to encrypted tools β 30-Day Challenge (1.2.3)
- If 7-9: Explore SimpleX, self-host β Guides (3.5.3, 2.6.4)
- If 10: Teach OpSec to activists
LAYER 5: Identity & Authentication #
Rate yourself:
- β 1-3: Reused passwords, no 2FA, browser-saved passwords
- β οΈ 4-6: Password manager (Bitwarden), SMS 2FA on some accounts
- β 7-9: Unique passwords everywhere, authenticator app 2FA (Aegis/2FAS)
- π 10: Hardware keys (YubiKey), anonymous accounts, segmented identities
Where are you? [1-10]: _
Action plan:
- If 1-3: Install Bitwarden TODAY β Guide (3.7.2)
- If 4-6: Enable 2FA everywhere β Guide (2.7.3)
- If 7-9: Get hardware key β Guide (2.7.4)
- If 10: Teach threat modeling
LAYER 6: Data Storage & Sovereignty #
Rate yourself:
- β 1-3: Google Drive, Dropbox, iCloud (unencrypted cloud)
- β οΈ 4-6: Encrypted cloud (ProtonDrive, Tresorit) or local backups
- β 7-9: Self-hosted Nextcloud or Syncthing (P2P)
- π 10: Encrypted self-hosted + 3-2-1 backup rule, airgapped backups
Where are you? [1-10]: _
Action plan:
- If 1-3: Switch to ProtonDrive or encrypt with Cryptomator β Guides (3.8.2, 3.8.4)
- If 4-6: Set up backups (3-2-1 rule) β Guide (2.8.4)
- If 7-9: Self-host Nextcloud β Guide (2.8.5)
- If 10: Help others self-host
LAYER 7: Social & Behavioral #
Rate yourself:
- β 1-3: No OpSec awareness, fall for phishing, share too much online
- β οΈ 4-6: Aware of threats, some good habits (lock screen, skeptical of links)
- β 7-9: Strong OpSec (compartmentalization, threat modeling, physical security)
- π 10: Activist-level OpSec (assume surveillance, dead drops, community security)
Where are you? [1-10]: _
Action plan:
- If 1-3: Learn threat modeling β Guide (2.9.2)
- If 4-6: Build OpSec habits β Guide (2.9.5)
- If 7-9: Join local privacy node β Find Node (5.2.2)
- If 10: Lead workshops, teach others
π YOUR TOTAL PRIVACY SCORE #
Add up your scores: [Layer 0] + [Layer 1] + β¦ + [Layer 7] = _ / 70
Convert to percentage: (Your score / 70) Γ 100 = _ %
π― WHAT YOUR SCORE MEANS #
0-20% (Beginner – High Risk) #
You’re vulnerable. Most people start here. Focus on Layer 1, 4, 5 immediately.
Priority Actions:
- Install password manager (Layer 5)
- Switch to privacy browser (Layer 2)
- Enable 2FA (Layer 5)
- Install Signal (Layer 4)
- Get VPN (Layer 3)
Timeline: 1 week to get to 40%
Start here: Your First 5 Privacy Wins (1.2.1)
21-40% (Basic Privacy – Medium Risk) #
You’ve started. Some good habits, but gaps remain.
Priority Actions:
- Migrate to ProtonMail (Layer 4)
- Set up VPN (Layer 3)
- Dual-boot Linux (Layer 1)
- Encrypted backups (Layer 6)
Timeline: 30 days to get to 60%
Continue: 30-Day Privacy Challenge (1.2.3)
41-60% (Intermediate Privacy – Moderate Protection) #
You’re ahead of 90% of people. Time to go deeper.
Priority Actions:
- Full Linux switch (Layer 1)
- Self-hosting basics (Layer 6)
- Advanced OpSec (Layer 7)
- Join local privacy node (Layer 7)
Timeline: 3-6 months to get to 80%
Next: Intermediate Roadmap (1.3.2)
61-80% (Advanced Privacy – Strong Protection) #
You’re in the top 5%. Focus on operational security and community.
Priority Actions:
- Self-host critical services (email, cloud)
- Hardware upgrades (privacy-focused devices)
- Teach others (workshops, local nodes)
- Mesh networking (Layer 3 advanced)
Timeline: 6-12 months to get to 90%+
Explore: Advanced Guides (KB4)
81-100% (Expert Privacy – Maximum Protection) #
You’re at activist/journalist level. Your role: Teach and lead.
Priority Actions:
- Contribute to FOSS projects
- Start/lead local privacy node
- Mentor beginners
- Share case studies (what works, what doesn’t)
Your mission: Multiply impact by helping 10 others reach 60%
Join: Node Leader Community (5.2.5)
π€οΈ CHOOSE YOUR NEXT STEP #
Based on your score, pick ONE path:
Score 0-40: β Beginner’s Roadmap (1.3.2)
Score 41-60: β Intermediate Path (1.3.3)
Score 61-80: β Advanced User Fast-Track (1.3.4)
Score 81-100: β Become a Leader (5.2.3)
Retake this assessment every 30 days to track progress.
Download Self-Assessment Worksheet (PDF):
[DOWNLOAD: Layer-by-Layer Tracker]