Battle-tested tools and configurations to reclaim your digital sovereignty.
“Privacy is not about having something to hide, it’s about having something to protect.” — the mindset behind this guide
Mullvad Browser
Anti-FingerprintDeveloped with the Tor Project to combat browser fingerprinting without the speed cost of the Tor network.
Mullvad VPN
No-LogsOpen-source VPN with a strict no-logs policy. A solid baseline to reduce ISP-level tracking.
Signal
Gold StandardThe default recommendation for secure, end-to-end encrypted messaging. Great usability, strong security model.
Session
No Phone #A hidden gem for anonymity: runs on the Oxen network and does not require a phone number.
SimpleX Chat
HardcoreFor users who want maximum metadata resistance: no user IDs. You can be reachable without being “discoverable.”
KeePassXC
Local VaultFull control over your passwords. Your database stays on your hardware, never touching a cloud server.
SimpleLogin
Alias EngineCreate unique email aliases for every service to prevent cross-site tracking and spam leaks.
Never give your real email
Anti-BreachYour “main” inbox (for example Proton Mail) should be a vault: private, stable, and rarely shared. For everything else, use aliases (SimpleLogin).
discord-9f3@yourdomain).Proton Mail
Encrypted InboxUse Proton Mail as your “vault inbox”: stable identity, less shared, and a strong baseline against provider-level scanning. Combine it with aliases (SimpleLogin) to keep your real address out of breaches.
Proton VPN
Network PrivacyVPNs reduce ISP-level visibility and help against local network snooping. Use it as a privacy baseline — but remember: a VPN is not the same as anonymity (for that: Tor).
SimpleLogin
Alias FirewallOne alias per service. If a service lekt of verkoopt: alias uit = probleem klaar. Dit is één van de hoogste “ROI” privacy-moves die je kunt doen.
Proton Pass
Password ManagerUse a password manager to enforce unique, long passwords everywhere. Combine with aliases: unique email + unique password = breach damage becomes minimal.
Proton Authenticator (2FA)
Account ShieldTurn on 2FA for your email and critical accounts. Prefer authenticator-app codes over SMS where possible. Store backup codes offline.
Proton Drive
Cloud StorageFor cloud files: keep sensitive documents in a privacy-focused storage stack. If something is “too sensitive to lose”, keep an offline encrypted backup too.
Proton Scribe (AI)
Privacy-Aware WritingIf you use AI writing assistance: prefer options that are designed to reduce data exposure. Rule: never paste secrets (passwords, recovery codes, IDs, private keys) into any AI tool.
Tor: what it is (and what it isn’t)
Anonymity LayerA VPN helps with privacy (hiding traffic from your ISP), but Tor is built for anonymity (hiding who you are / where you are). Tor routes your traffic through multiple relays so the destination doesn’t see your real IP.
Monero (XMR)
Private by DefaultMonero is the only mainstream coin that is invisible by default: sender, receiver, and amount are not publicly traceable like transparent chains.
Cake Wallet
Mobile Go-ToRecommended “go-to” wallet on mobile for Monero. Simple UI, solid privacy focus, and widely used in the community.
Bitcoin Donations: Silent Payments
Modern DonationsIf you accept Bitcoin donations, look into Silent Payments: a modern approach to receiving donations with improved privacy and less address reuse.
GrapheneOS
Lock Down Your PhoneFor people who really want to harden their phone security and privacy (best fit on supported Pixel devices).
Linux (Fedora / Tails)
Escape TelemetryFor desktop users who want to get away from Windows telemetry. Fedora is a great daily driver; Tails is for high-anonymity sessions.
If you’re on Windows (Acer Nitro etc.)
Know the LimitPrivacy on Windows has hard limits due to built-in telemetry. For switching users, Linux Mint or Pop!_OS are friendly on-ramp distros.
ExifCleaner
Remove EXIFPhotos you share (even on Discord) often include EXIF metadata like GPS location, device model, and timestamps. Strip metadata before sharing screenshots/photos.
Quick Tips (click to expand)
10-Min HardeningPhantom Trace Simulation
EducationalExperience how trackers see you. This interactive lab demonstrates kinetic mouse tracking, keystroke monitoring, and behavioral profiling in real-time.
Enter the LabMake privacy measurable: run your audit, change one thing, run it again.
Use the Eltrix Webcheck to see if your current VPN and browser settings are leaking information.
Launch Webcheck