Articles

The Mobile Podcast Setup That Actually Works

The Mobile Podcast Setup That Actually Works

Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.

Build for the Mole

Build for the Mole

Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

The Praxeology of Privacy ~ Chapter 19: Operational Security

The Praxeology of Privacy ~ Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.

Know Your Enemy, Name Your Defenses

Know Your Enemy, Name Your Defenses

Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.

Your Phone Is Not Your Property (Until You Install GrapheneOS)

Your Phone Is Not Your Property (Until You Install GrapheneOS)

Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.

The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch

The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch

Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.

The Cypher Wars: Choose Your Weapon Wisely

The Cypher Wars: Choose Your Weapon Wisely

Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.

The Art of Waiting: Random Delays for Private Payments

The Art of Waiting: Random Delays for Private Payments

Two scripts that randomize timing between Wasabi coinjoin rounds, making your payment patterns indistinguishable from organic human behavior.

Vanishing Secrets: Auto-Wipe Your Clipboard on Qubes OS

Vanishing Secrets: Auto-Wipe Your Clipboard on Qubes OS

One command in your Qubes template installs `xsel` and creates an autostart service that wipes your clipboard 30 seconds after you copy anything. Works on Debian, Fedora, and Whonix minimal templates.

Disappear Into the Crowd: Wasabi's Hidden Payment Superpower

Disappear Into the Crowd: Wasabi's Hidden Payment Superpower

Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.