CommsBlack Mobile

CommsBlack Training

Learn how to secure your communications, protect your privacy, and operate with confidence in a digital-first world. These modules are designed for users of Shield, Shadow and Ghost communication kits.

Training Modules

Core · Shield / Shadow / Ghost

Module 01 — Foundations & GrapheneOS

Security vs privacy vs anonymity, GrapheneOS basics, and duress PIN for theft/seizure.

Core · Shield / Shadow / Ghost

Module 02 — Device Security & Kits

Standard vs Shield, Shadow and Ghost device setups and physical seizure considerations.

Core · Shield / Shadow / Ghost

Module 03 — Connection Security

VPN, Tor, anonymous SIMs, NW750 privacy router, Faraday usage and correlation attacks.

Core · Shield / Shadow / Ghost

Module 04 — Metadata Minimisation

Metadata awareness, account and session hygiene, traffic padding and data-session habits.

Core · Shield / Shadow / Ghost

Module 05 — Secure Communications (COMMSEC)

What COMMSEC is, encrypted app suite configuration and PGP-based high-assurance channels.

Applied · Shadow / Ghost

Module 06 — Secure Transactions (Crypto Privacy)

Cryptocurrency basics, privacy coins, Cake Wallet and practical payment workflows.

Applied · All kits

Module 07 — Operational Security (OPSEC)

Behavioural security, common failure points and Shield / Shadow / Ghost workflows.

Context · All kits

Module 08 — Global Digital Privacy Awareness

Global digital freedom landscape, surveillance powers and real-world case studies.

Context · Australia

Module 09 — Australia: Laws & Reality

How Australian surveillance powers work in practice and what it means for CommsBlack users.

Advanced · Shadow / Ghost

Module 10 — Compartmentalisation

Identity compartments, cross-contamination risks and mapping compartments to kits.

Advanced · All kits

Module 11 — App Selection & Risk

How apps leak data, vetting checklist, safer categories and per-kit app strategies.

Advanced · Shadow / Ghost

Module 12 — Anti-Forensics Awareness

What investigators look for, realistic anti-forensics behaviour and duress workflows.

Mapping · All kits

Module 13 — Defending by Adversary Class

Adversary types, capability mapping and choosing the right CommsBlack workflow.