Topic index
Online Privacy & Anonymity
PGP, secure messaging, anonymous email, and metadata hygiene — encryption and anonymity for realistic threat models.
6 articles
Recommended entry
PGP Encryption Guide: How to Use GPG Step by Step
Learn how PGP encryption works, install GPG, generate keys, and encrypt messages. Covers OpenPGP RFC 4880, Ed25519, and common PGP mistakes.
More on privacy
Signal vs Session: Which Messenger Fits Your Threat Model
Signal vs Session compared honestly: phone number vs Session ID, centralized vs onion-routed servers, and which threat models each one actually fits.
6 min read
Metadata Removal Tools: Strip What You Can't See
Learn which metadata removal tools actually work for photos, PDFs, and documents. mat2, ExifTool, and OS-level tools — plus what metadata can expose about you.
8 min read
Secure Messaging Apps: Signal, Session, SimpleX Compared
Compare secure messaging apps by protocol, metadata exposure, and threat model fit. Signal, Session, SimpleX, Briar, Element, and Wire — honest assessment.
9 min read
Anonymous Email Providers: Proton, Tutanota & More
Compare anonymous email providers in 2026: Proton Mail, Tutanota, OnionMail, SimpleLogin, and Cock.li — jurisdiction, encryption, and PGP support.
8 min read
End-to-End Encryption Explained: What It Actually Does
End-to-end encryption explained clearly: what the 'ends' are, why server-side encryption isn't the same, and what E2EE can't protect you from.
7 min read