Decentralized P2P exchange using Monero (XMR) as settlement currency. Tor-only, non-custodial, security deposit model. by design.
Find tools that don't know who you are.
Verified services for private finance, encrypted communications, and surveillance-resistant infrastructure.
150 verified services across 14 categories.
Anonymous VPN — account number only, no email, accepts cash/XMR/BTC. No logs policy, independently audited. Open source.
Privacy-focused swap rate aggregator. Compares rates across no-KYC exchanges. XMR specialist. Tor-accessible.
Hardened Android OS for Google Pixel devices. Maximum privacy and security — no Google account required, sandboxed apps, verified boot. Free, open source.
A free, open-source Monero wallet for desktop. Connects via Tor by default, heavily optimized for privacy and power users.
Anonymous eSIM with data and US phone number. , no email, no sign-up. Pay with XMR or BTC/Lightning. Works in 160+ countries.
- 01Hong Kong Can Jail You for Refusing to Unlock a DeviceHong Kong now criminalises refusal to provide device passwords in national security cases. What the new rules say, where the claimed safeguards stop, and how travelers should change their device OPSEC.~12 min read
- 02Google Promised Notice Before Handing Over Your Data. ICE Cases Show the Promise Can Fail.EFF says Google turned over subscriber data to ICE and only notified the user afterward, despite a public promise of advance notice. What simultaneous notice means and how to cut your exposure.~10 min read
- 03License Plate Readers Were Sold for Serious Crime. Now They Can Write Traffic Cases.A Georgia citation built on a Flock camera capture shows how license plate readers move from serious-crime investigations into routine traffic enforcement. What that shift means for privacy, sharing, and travel history.~10 min read
- 04Using a VPN Could Change How Section 702 Treats YouLawmakers warned that commercial VPN use may cause Americans to be treated as foreign or location-unknown under Section 702 rules. What the Wyden letter says, what remains unclear, and where VPN protection still helps.~9 min read
- 05Section 702 "Reform" Still Lets the FBI Search for Journalists and Politicians Without a WarrantRon Wyden says the FBI still handles the most sensitive Section 702 searches with internal approval, not a warrant. The current law sunsets on April 20, 2026, and the core backdoor-search issue is still intact.~8 min read
- 06The White House App Is a Surveillance Liability Disguised as a News FeedThe official White House app ships 10 OneSignal frameworks, loads JavaScript from a Russian-origin company, contains a remotely activatable GPS pipeline, and files a provably false privacy manifest. Two independent decompilations confirmed it.~8 min read
- 07EU Parliament Kills CSAM Scanning ExtensionThe European Parliament voted 311 against extending the temporary regulation that let tech companies scan private messages for CSAM. The law lapsed April 4. What happened, what it means for encrypted messaging, and what comes next.~8 min read
- 08Your Operating System Wants Your IDCalifornia forces operating systems to collect your age at setup and share it with every app. The UK and Australia are doing the same. How OS-level age verification builds permanent identity infrastructure.~8 min read
Frequently Asked Questions
What is a no-KYC crypto service?
A no-KYC crypto service lets you exchange, spend, or hold cryptocurrency without submitting identity documents. Examples include non-custodial swaps (SideShift, Trocador), P2P exchanges (Haveno), and VPNs that accept Monero. Most have transaction limits to stay outside regulated thresholds.
Is it legal to use no-KYC crypto services?
In most countries, yes. KYC laws apply to regulated businesses, not to individuals transacting peer-to-peer. Tax reporting requirements on gains still apply regardless of how you acquired crypto.
What is Monero and why does it matter for privacy?
Monero (XMR) is a cryptocurrency with mandatory privacy built into every transaction. Unlike Bitcoin, Monero hides sender, recipient, and amount by default using ring signatures, stealth addresses, and RingCT.