Guides
Step-by-step guides for private finance, anonymous communications, and surveillance-resistant infrastructure.
- 01Creating a Burner IdentityHow to use forwarding aliases and proxy cards to create a compartmentalized digital identity.~3 min read
- 02Safe SwappingHow to acquire and swap cryptocurrency without creating an exchange account or exposing your identity.~3 min read
- 03Hardening TelegramTelegram is not a secure messenger by default. Here is how to lock down your account and hide your identity.~3 min read
- 04The No-KYC Stack: Domain → VPS → PaymentsFull infrastructure guide: anonymous domain, offshore VPS, XMR payments, Tor, and privacy DNS — end to end.~12 min read
- 05Anonymous VPN Setup: Mullvad GuideSet up Mullvad VPN with no account, paid with XMR or cash. Multi-hop, DNS leak testing, kill switch config.~6 min read
- 06Wasabi CoinJoin Is Dead: What Happened and Where to Go NowzkSNACKs shut down Wasabi Wallet’s CoinJoin coordinator in June 2024. What broke, what guides became obsolete, and which Bitcoin privacy tools still matter in 2026.~6 min read
- 07Anonymous VPS Hosting: No-KYC Server Setup GuideHow to rent a VPS without your name, using Monero or cash. 1984 Hosting, FlokiNET, Njalla, and IncogNET compared with full setup walkthrough.~9 min read
- 08Age Verification and Privacy: What They Collect and How to Fight BackUK, Australia, and EU age verification mandates force facial scans and ID uploads. What these systems actually collect, and how VPNs, Tor, and GrapheneOS protect you.~6 min read
- 09Bitcoin CoinJoin Guide: Wasabi Wallet Step-by-Step 2026Break the Bitcoin transaction graph using Wasabi Wallet CoinJoin. Step-by-step setup, coordinator selection, and coin control.~8 min read
- 10Private DNS Setup Guide: Stop Your ISP Logging Your VisitsHow to configure encrypted DNS (DoH, DoT) on Android, iOS, Windows, macOS, and your router. Mullvad DNS, Quad9, and NextDNS compared.~7 min read
- 11Deploying a Privacy App Privately: Next.js on a No-KYC VPSHow to deploy a Next.js application on a no-KYC VPS with zero identity exposure. FlokiNET, 1984 Hosting, Njalla compared.~9 min read
- 12Tails OS for Financial Privacy: Crypto and OPSEC GuideHow to use Tails OS — the amnesic live operating system — for no-KYC crypto transactions, Feather Wallet via Tor, and zero forensic trace.~9 min read
- 13Tor .onion + ENS + IPFS: Censorship-Resistant Website HostingDeploy a three-layer censorship-resistant website: Tor hidden service, ENS domain, and IPFS static hosting. Step-by-step guide.~10 min read
- 14Trusts & Foundations: Cook Islands, Panama, Nevada GuideOffshore trusts and foundations for asset protection. Cook Islands, Panama, and Nevada structures compared with privacy tradeoffs.~10 min read
- 15Zcash Full Privacy Setup: Shielded Transactions GuideHow to use Zcash with full shielded privacy. Zashi wallet setup, auto-shielding, unified addresses, and spending shielded ZEC.~8 min read
- 16Setting Up a Ghost PhoneHow to flash a hardened operating system and pair it with a no-KYC eSIM for a fully private phone.~8 min read
- 17PGP Basics: Encrypt Messages Without a Central ServerHow to generate PGP keys, encrypt and sign messages, and verify identities without trusting a central server.~6 min read
- 18How to Set Up Feather Wallet for Maximum Monero PrivacyStep-by-step setup of Feather Wallet with Tor, coin control, and subaddresses for maximum Monero transaction privacy.~9 min read
- 19How to Run AI Privately: Local LLMs and Anonymous InferenceRun AI models locally with Ollama, llama.cpp, and LM Studio. No cloud, no logging, no data collection. Complete privacy guide.~7 min read
- 20Ethereum Privacy with Railgun: Complete GuideHow to use Ethereum and ERC-20 tokens privately with Railgun — zero-knowledge shielded balances, private transfers, and DeFi without a surveillance trail.~12 min read
- 21Hardware Wallet Security: OSS vs Closed-Source, Ledger, and AlternativesWhy Ledger is compromised, open-source alternatives (Coldcard, Trezor, Passport, Jade), multisig setups, and when paper or steel is better.~10 min read
- 22How to Scrub Your Personal Information from the InternetStep-by-step guide to removing your name, address, phone number, and photos from data brokers, people-search sites, Google, social media, and public records.~15 min read
- 23Lightning Network Privacy: What It Hides and How to Harden ItLightning Network uses onion routing but leaks more than most users realise. Channel funding privacy, Tor-only nodes, BOLT12, and when to use Monero instead.~10 min read
- 24The No-KYC Phone Stack 2026: GrapheneOS + Phreeli + SimpleXAnonymous phone stack 2026: GrapheneOS on Pixel, Phreeli or Silent.Link for carrier, SimpleX or Session for messaging, Cake Wallet for crypto.~15 min read
- 25Pakistan's Rupee Is Collapsing. How Crypto Is Used to Survive.PKR lost 40%+ in a year. Pakistan is a top crypto adoption country out of necessity. Hawala, remittances, FIA crackdowns, and tools that work.~15 min read