privacy

Shadow Economy - Building a fully decentralised, easy accessible app

3 minute read Modified:

Unstoppable Web 3.0 App with IPFS, OrbitDB and the tor-protocol in any browser.
The vision Imagine an application that could do it all… Something between reddit, instagram, telegram and eBay. Now imagine everyone on this platform can be anonymous - no IP log, no nothing. The application would not be served from a single server, instead it would be decentralised and accessible through a regular browser. This means, that anyone can participate and communicate / buy / sell anything they want. Because of its decentralised nature, the application could not be stopped or shut down by a government entities.

Piracy and privacy bible

1 minute read Modified:

If it rhymes, it chimes. Only an invisible pirate is a good pirate. Not really a post, just two very good resources, that i want to share.
privacytools.io is one of my favorite sites. I fo─║lowed many tips & tricks such as switching to mailbox.org as my email provider, using bitwarden as my password manager, standardnotes as my note taking tool and the like. Study it and try to realize as much as possible. After you went incognito, you can start to do some fun things without creating to much noise. Follow the awesome piracy guide to find hidden treasures.

Corebooted Thinkpad x230 with hardware mods

3 minute read Modified:

Say goodbye to your personal NSA agent and hello to a cheap and powerful laptop
The why and how Ever since the end of the bush era 2008, every Intel chip comes with an embedded subsystem called the intel management engine. Every i3, i5, i7 and i9 processor has this engine. It is a black-box and has access to every peripheral device like RAM, camera, microphone hard drive, … even when the main processor is turned off. Some say this is a backdoor for the NSA, some say this is pure paranoia.