Accepting Privacy-Centric Donations - Monero & Zcash practical guide

If you want to accept support without turning your donors into an open ledger of leads for curious investigators, congratulations, you also want to do bookkeeping, UX, and threat modeling. The simplest path is usually the best: pick a privacy coin, pick a wallet strategy, and publish a donation flow that minimizes metadata surface area.

Read More

VPNs Aren't Dead - A Smarter Survival Guide

Misguided and tyrannical beaureaucrats are trying to make you prove who you are just to look at ordinary things online. Your knee-jerk reaction might be “use a VPN”. That’s not wrong, it’s just naive. VPNs can still work, but only if you understand which ones, why, and how to use them without handing your privacy to some free service or sacrificing your operational security.

Read More

Your Browser Is Snitching on You - Fingerprint Resistance 101

Your browser is loud. It broadcasts a parade of tiny facts: OS, fonts, extensions, screen size, audio stack, micro-timings that together, form a fingerprint. Even if you hide your IP behind a VPN or Tor, that fingerprint will happily point at you. If the state (or a gatekeeper of some other kind) wants to know who’s looking, they don’t need your passport; they just need to check whether your browser looks like the other ones.

Read More

OPSEC for the Ordinary Rebel

You don’t need to be a spook to protect yourself. You need a simple habit loop: 1. Model the threat, 2. Compartmentalize, 3. Use the right tools for the task, 4. Reduce metadata, and 5. Practice leave-no-trace routines. Do those five things consistently and you’ll multiply the work required to deanonymize you by orders of magnitude.

Read More

Own the Library - Mirrors, IPFS, ZIMs & Offline Copies

If the state is building fences, your job is to build replication. Mirrors, archives, and peer-to-peer distribution aren’t romantic technobabble, they’re survival. The fewer single points of control for content, the harder it is for a regulator (or a contractor with a checklist) to tell you you can’t read that.

Read More

Beyond VPNs - Tor, Bridges, and Trickier Escape Routes

When the VPN ladder gets sawed in half, you need tunnels and a map for choosing the tunnel that won’t collapse under you. This post explains the practical alternatives to VPNs, what they actually buy you, and the realistic tradeoffs for people who need to keep reading, learning, and meeting online without handing their identity to some bureaucratic gatekeeper.

Read More

When you're worried about your post history

We’ve all left trails online. Tweets (or, posts now), forum posts, throwaway comments, blurry photos… The internet is a scrapbook we never agreed to curate. With governments pushing digital IDs and tightening surveillance, the rist isn’t just that your old content exists. It’s that it can be weaponized against you.

Read More

Pseudonymity Starter Kit - what to buy, how to configure it, and how to use it safely

You want to exist online under a name that doesn’t map to your passport, employer, or landlord. Good. That’s doable, but it’s not a product you can buy and forget. It’s a posture you assemble: identities, network hygiene, hardened accounts, and payment rails, combined and maintained. Below are the concrete tools I recommend, why they matter, and the exact toggles and habits I’d use to get them from zero to a functioning pseudonymous persona.

Read More

So you woke up in an authoritarian privacy nightmare. Now what?

You wake up and the world has changed overnight. Digital ID requried for work. A “safety” app on everyone’s phone. Payment rails that tag transactions to a score. Sites your friends still visit are suddenly censored. The state asks for “proof” to access services. Everyone normalizes it.

Read More

A Short Guide to Digital Prep

If you live in the UK or Australia, you’re watching the internet go through a slow, bureaucratic lockdown. Age verification for websites like Wikipedia. Music and map apps demanding ID. Search enginges facing content controls. VPNs being eyed for regulation.

Read More

What If They Wanted *You*?

You probably already know the basics of digital privacy: use a password manager, enable 2FA, don’t click weird links. It’s good advice for the average person. But what if you’re not average?

Read More

Lucía - Run an online business when the national government doesn't want you to

There are countries where currency is a tool, and there are countries where currency is a trap. Lucía lives in one of the latter. A student in Buenos Aires, Lucía used to think she was just anxious. That her obsession with inflation rates and central bank policy was a niche academic kink. But when her rent doubled in six months and her bank limited how much USD she could withdraw, she realized something. This wasn’t anxiety. It was foresight.

Read More

Anonymous Internet Access 101

This guide is written for people who don’t have a strong technical background, and may live in places where the internet is more locked down than a vault. Carefully following these instructions should have even the least technical people up and running with anonymous access to the open internet with the most convenience possible.

Read More