The Privacy Stack

Battle-tested tools and configurations to reclaim your digital sovereignty.

“Privacy is not about having something to hide, it’s about having something to protect.” — the mindset behind this guide
🌐 Browsing & VPN

Mullvad Browser

Anti-Fingerprint

Developed with the Tor Project to combat browser fingerprinting without the speed cost of the Tor network.

Mullvad VPN

No-Logs

Open-source VPN with a strict no-logs policy. A solid baseline to reduce ISP-level tracking.

💬 Communication (Signal vs. Noise)

Signal

Gold Standard

The default recommendation for secure, end-to-end encrypted messaging. Great usability, strong security model.

Session

No Phone #

A hidden gem for anonymity: runs on the Oxen network and does not require a phone number.

SimpleX Chat

Hardcore

For users who want maximum metadata resistance: no user IDs. You can be reachable without being “discoverable.”

🔑 Identity & Storage

KeePassXC

Local Vault

Full control over your passwords. Your database stays on your hardware, never touching a cloud server.

SimpleLogin

Alias Engine

Create unique email aliases for every service to prevent cross-site tracking and spam leaks.

📧 Email Masking (The Power of Aliases)

Never give your real email

Anti-Breach

Your “main” inbox (for example Proton Mail) should be a vault: private, stable, and rarely shared. For everything else, use aliases (SimpleLogin).

Tuto: how aliases protect you
  1. Create one alias per site (ex: discord-9f3@yourdomain).
  2. Use that alias only for that one service.
  3. If the service is hacked or sells your address, disable/delete that alias.
  4. Your real inbox stays safe; the spam stops instantly.
Rule: one service = one alias. This prevents cross-site tracking and makes breaches painless.
🧪 Proton Ecosystem (Private by Design)

Proton Mail

Encrypted Inbox

Use Proton Mail as your “vault inbox”: stable identity, less shared, and a strong baseline against provider-level scanning. Combine it with aliases (SimpleLogin) to keep your real address out of breaches.

Proton VPN

Network Privacy

VPNs reduce ISP-level visibility and help against local network snooping. Use it as a privacy baseline — but remember: a VPN is not the same as anonymity (for that: Tor).

SimpleLogin

Alias Firewall

One alias per service. If a service lekt of verkoopt: alias uit = probleem klaar. Dit is één van de hoogste “ROI” privacy-moves die je kunt doen.

Proton Pass

Password Manager

Use a password manager to enforce unique, long passwords everywhere. Combine with aliases: unique email + unique password = breach damage becomes minimal.

Proton Authenticator (2FA)

Account Shield

Turn on 2FA for your email and critical accounts. Prefer authenticator-app codes over SMS where possible. Store backup codes offline.

Proton Drive

Cloud Storage

For cloud files: keep sensitive documents in a privacy-focused storage stack. If something is “too sensitive to lose”, keep an offline encrypted backup too.

Proton Scribe (AI)

Privacy-Aware Writing

If you use AI writing assistance: prefer options that are designed to reduce data exposure. Rule: never paste secrets (passwords, recovery codes, IDs, private keys) into any AI tool.

Quick setup: Proton stack in 10 minutes
  1. Create a Proton Mail account and enable 2FA.
  2. Install Proton Pass and migrate your most-used accounts first.
  3. Turn on aliases in SimpleLogin: one alias per service.
  4. Enable Proton VPN on public Wi‑Fi (cafés, school, travel).
  5. Store important docs in Proton Drive + keep an offline encrypted backup.
Mindset: make the “private default” easy, so you actually keep doing it.
🧅 Tor & Anonymity (When VPN isn’t enough)

Tor: what it is (and what it isn’t)

Anonymity Layer

A VPN helps with privacy (hiding traffic from your ISP), but Tor is built for anonymity (hiding who you are / where you are). Tor routes your traffic through multiple relays so the destination doesn’t see your real IP.

When should you use Tor?
  • When you need to hide your IP/location from the site you visit.
  • When you’re researching sensitive topics.
  • When you want strong anti-tracking + anti-fingerprinting defaults.
Reality check: Tor is slower by design. That’s the trade-off for anonymity.
Tor safety rules (do this to avoid self-doxxing)
  • Don’t log into your real accounts (Google, personal email) in Tor.
  • Don’t install extra extensions (fingerprinting risk).
  • Don’t open downloaded documents while online (they can leak network info).
  • Keep Tor Browser updated.
Rule: anonymity breaks when you bring your real identity into the Tor session.

Tor Browser

Default Hardening

The easiest and safest way to use Tor. It ships with strong anti-fingerprinting defaults and privacy-oriented settings.

💸 Financial Privacy

Monero (XMR)

Private by Default

Monero is the only mainstream coin that is invisible by default: sender, receiver, and amount are not publicly traceable like transparent chains.

Cake Wallet

Mobile Go-To

Recommended “go-to” wallet on mobile for Monero. Simple UI, solid privacy focus, and widely used in the community.

Bitcoin Donations: Silent Payments

Modern Donations

If you accept Bitcoin donations, look into Silent Payments: a modern approach to receiving donations with improved privacy and less address reuse.

Practical tip: avoid posting static BTC addresses publicly. Donation patterns create metadata trails.
🧱 OS & Hardware (The Foundation)

GrapheneOS

Lock Down Your Phone

For people who really want to harden their phone security and privacy (best fit on supported Pixel devices).

Linux (Fedora / Tails)

Escape Telemetry

For desktop users who want to get away from Windows telemetry. Fedora is a great daily driver; Tails is for high-anonymity sessions.

If you’re on Windows (Acer Nitro etc.)

Know the Limit

Privacy on Windows has hard limits due to built-in telemetry. For switching users, Linux Mint or Pop!_OS are friendly on-ramp distros.

🧼 Metadata (Don’t Leak Your GPS)

ExifCleaner

Remove EXIF

Photos you share (even on Discord) often include EXIF metadata like GPS location, device model, and timestamps. Strip metadata before sharing screenshots/photos.

🛡️ Interactive Hardening Guides

Quick Tips (click to expand)

10-Min Hardening
Browser: enable stronger tracking protection
Turn on Strict tracking protection (Firefox-based browsers) and disable unnecessary extensions.
Rule: fewer extensions = less fingerprint surface.
Search: replace Google
Switch to DuckDuckGo or (even better) SearXNG for metasearch without the same tracking incentives.
DNS: stop using your ISP DNS
Use privacy-respecting resolvers like Quad9 or NextDNS instead of your provider DNS.
Why: DNS is metadata. It reveals which domains you try to reach.
🔬 Behavioral Lab

Phantom Trace Simulation

Educational

Experience how trackers see you. This interactive lab demonstrates kinetic mouse tracking, keystroke monitoring, and behavioral profiling in real-time.

Enter the Lab

Reclaim your Score (Satoshi Status)

Make privacy measurable: run your audit, change one thing, run it again.

  1. Step 1: Perform the audit on the Webcheck.
  2. Step 2: Implement one tool from this guide (VPN, browser hardening, aliases, etc.).
  3. Step 3: Perform the audit again and watch your score rise.

Ready to test your security?

Use the Eltrix Webcheck to see if your current VPN and browser settings are leaking information.

Launch Webcheck