This is my opionated tech stack or cyber arsenal which can be leveraged by the average person or the seasoned cyber practitioner. Once there is a contribution workflow, then I will open this up for contributions.
Identity & Credential ManagementMulti-Factor/Two-Factor AuthenticationPassword ManagersEmail Aliasing & Temp EmailsPersonal Incident ResponsePersonal Threat IntelligencePersuasive Technology Defense & Humane TechnologyAccount SegmentationPersonal Data PrivacyKnowledge ManagementTypes of KMSs (Knowledge Management Systems)Knowledge Graph SystemsResearch & Problem Domain TraversalPersonal BackupsUpdates & Periodic ResetsPeriodic Hard ResetsResetting Windows ComputersOSINTSurveillance Self Defense
Identity & Credential Management
Multi-Factor/Two-Factor Authentication
Password Managers
Email Aliasing & Temp Emails
Personal Incident Response
Personal Threat Intelligence
Persuasive Technology Defense & Humane Technology
Account Segmentation
Personal Data Privacy
Knowledge Management
Types of KMSs (Knowledge Management Systems)
Knowledge Graph Systems
Research & Problem Domain Traversal
Personal Backups
Updates & Periodic Resets
Periodic Hard Resets
Resetting Windows Computers
Recovery options in Windows
Important: If you've encrypted your device, you'll need your BitLocker key to reset your PC. If you don't know your BitLocker key, see Find my BitLocker recovery key. During the resetting process, it is possible that your screen may go black for a long period of time (occasionally upwards of 15 minutes) and that your device may attempt to restart itself during this period.
https://support.microsoft.com/en-us/windows/recovery-options-in-windows-31ce2444-7de3-818c-d626-e3b5a3024da5
![Recovery options in Windows](https://support.content.office.net/en-us/media/803b8f8f-52b7-4a76-a9cd-9429df3d2034.png)