assets/img | ||
README.md |
Hack Liberty Resources
VERITAS - LIBERTAS - SCIENTIA
About Hack Liberty
We are a group of cypherpunks, privacy advocates, engineers, and philosophers dedicated to the pursuit of truth, liberty, and knowledge for all. We believe technology is a tool for liberation, not enslavement. We fight tyranny with encryption, decentralization, and anonymity. Join us in the fight for liberty.
Hack Liberty Services
All our services use open source software and are open to the public. We anonymize logs and use full disk encryption to preserve user privacy when possible. Our hosting provider 1984 is located in Iceland and supports human rights and free speech.
- Simplex [Tor] - the first messaging network operating without user identifiers of any kind - 100% private by design!
- Forum [Tor] [Archive] - discuss and advocate for the use of encryption, privacy technologies, and decentralized systems to promote freedom and protect digital rights
- Darknet Lantern [Tor] - decentralised peer-to-peer darknet search engine
- 4get [Tor] - a proxy search engine that doesn't suck
- Redlib [Tor] - a private front-end for Reddit
- Forgejo [Tor]- a painless self-hosted Git service
- PrivateBin [Tor]- a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode
- OTS [Tor]- One-Time-Secret sharing platform with symmetric 256bit AES encryption in the browser
- Farside - a smart redirecting gateway for various frontend services
Archives
An open source collection of archives suitable for offline hosting, online hosting, and git mirroring. Please download, mirror, and share to help fight against censorship and internet memory-holing.
Views and opinions expressed in these archives do not necessarily reflect those of Hack Liberty, contributors, or partners.
- r/Conspiracy Archive [Tor] - 34,579 posts and 276,632 comments from August 15, 2008 through October 15, 2018
- r/Pizzagate Archive [Tor] - 2,294 posts and 37,870 comments from November 7 to November 22, 2016
- v/Conspiracy Archive [Tor] - 42,505 posts and 159,856 comments from November 11, 2016 through December 25, 2020
- v/Pizzagate Archive [Tor] - 40,446 posts and 685,330 comments from November 11, 2016 through December 25, 2020
Donations and Transparency
Please consider donating to help us pay for servers and infrastructure. We operate 100% out of our own pocket and any donations will help pay for server costs!
![]() |
---|
Monero (XMR) |
881ayjjExYVhyqQBQFxdY6aQC5J5Ys3JNfvxC1r5WNwSVK3ysD4Sn6GfUbNf1JkhMEJWj11mNvzCW9XZLpyWkjHx6EftAXU |
Tor - click here to donate with cryptocurrencies other than Monero over Tor |
Clearnet - click here to donate with cryptocurrencies other than Monero over Clearnet |
Current number of donations received: 6
Operating Costs: $250 a month / $3100 a year
Hack Liberty Simplex Community
Anyone that agrees to our Code of Conduct is welcome to join our Simplex Hack Liberty Community Room and our Simplex server, a decentralized, metadata resistant alternative to Matrix! Incognito profiles welcome!
Simplex Servers
-
Hack Liberty SMP Server
smp://esPsfRFGZd2TRyKijJDorCMo3Ld-QD8Cq8ASx8qrY_Q=@simplex.hackliberty.org,gstc5w42xawazcr4txrcyhitmkhiyu2vkkwy2xhwovbhlapzrccjeyad.onion
-
Hack Liberty XFTP Server
xftp://DfK0yVcc9P5NgfaRR4retNWDDTKFa9g_NqF11maM87Q=@xftp.hackliberty.org,kf25i7slt6skypu47j5kzl4s4nlt3aw3baiocanygf6gprrrbft4dyqd.onion:5233
Simplex Rooms
- Hack Liberty Community Room
- Anonymity, Privacy, Security
- Esoterica
Privacy and Security
Sites and Articles
- Anonymous Planet - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
- Privacy Guides [Tor] - a non-profit, socially motivated website that provides information for protecting your data security and privacy
- Extreme Privacy 5th Edition - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view
- Nihilism OPSEC Blog [Tor] - ultimately, this blog aims to showcase that technology, when used correctly, can allow one to transcend any limitation. be it to transcend surveillance, centralisation, deanonymization, lack of security. any ability that we have as humans, such as privacy, decentralisation, anonymity, security, plausible deniability can be protected and enhanced by using the correct technology.
- Dig Deeper [Tor] - a diverse range of articles focused on software privacy, technology critiques, societal issues, video game recommendations, and reviews, emphasizing the importance of digital security, ethical software choices, and critical perspectives on contemporary societal challenges
- Shadow Wiki [Tor] - a resource dedicated to exploring topics related to nanonymity, privacy, security, and anonymity, while also delving into hardware, software, politics, religion, and obscure or esoteric knowledge, with a focus on sustainability and quality in production
- Spyware Watchdog [Tor] - this website classifies spyware programs, so that users can be more aware of what they install
- Anonymous Land - a community dedicated to providing anonymity enhancing guides and services
- No Trace Project [Tor] - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
- Anarsec: Tech Guides for Anarchists [Tor] - tech and opsec guides for anarchists
- OfficerCIA - various tools and articles for OpSec, written with a preference for practical usability
- PrivSec - articles written with a practical approach to privacy and security
- Defending against Stylometric attacks [Tor] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. it’s one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
- Prism Break - opt out of global data surveillance programs like prism, xkeyscore and tempora.
- The New Oil [Tor] - the beginner’s guide to data privacy & cybersecurity
- Techlore - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
- Into the Crypt [Tor] - the art of anti-forensics
- Advanced Privacy and Anonymity Using VMs, VPN’s, Tor - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
- How to create anonymous Telegram and Signal accounts without a phone - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
- EFF Surveillance Self-Defense - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
Android
- A brief and informal analysis of F-Droid security - a write-up emphasizing major security issues with F-Droid
- Android Tips - list of tips for buying and using Android phones
- Android - common ways in which people worsen the security model of android
Secure Messengers
- The Guide to Peer-to-Peer, Encryption, and Tor: New Communication Infrastructure for Anarchists - an exhaustive anarchist overview and guide to various apps and tech that utilize peer-to-peer and encryption
- Secure Communications Comparison - communicating securely over the internet is a must. this article compares available and actively-developed projects that are used for secure communications
- Signal Privacy Concerns (2019) - arguments against the popular secure messenger signal
- A security analysis comparison between Signal, WhatsApp and Telegram [PDF] - a security analysis comparison between the three popular instant messaging apps. The analysis will focus on the encryption protocols used by each app and the security features they offer
- Wire (and Signal) use privacy-hostile Amazon AWS - wire (and signal) are centralized on amazon's aws... there are substantial privacy and ethical issues with this
- XMPP: An Under-appreciated Attack Surface - a demonstration for why XMPP is of interest to penetration testers, security researchers, and defenders
- Wiretapping the largest Russian XMPP server - xmpp (jabber) instant messaging protocol encrypted tls connection wiretapping (man-in-the-middle attack) of jabber[.]ru (aka xmpp[.]ru) service’s servers on hetzner and linode hosting providers in germany
- XMPP: Admin-in-the-middle - in our opinion, you can’t refer to xmpp-based messaging as “privacy-friendly” as long as you don’t control all xmpp servers. an xmpp administrator (or any other server-side party) can inject arbitrary messages, modify address books, and log passwords in cleartext
- What a malicious Matrix homeserver admin can do - potential passive and active attacks from malicious homeserver admins
- Matrix? No, thanks. - matrix keeps growing. even the french government decided to use it. however, many free software activists refuse to use it
- Session's Lack of Perfect Forward Security - "we don't have any current plans to reintroduce pfs"
- Matrix Metadata Leakage - exactly what metadata Matrix leaks and why
- Matrix linked Amdocs found tapping South African cell phones - south african agents wrote in a 2009 document that they suspected that israel’s secret service, mossad, was using israeli software giant amdocs to eavesdrop on mobile phone conversations and gather data
- Why Not Matrix? - 22 reasons why not to use matrix
Desktop
- Desktop Linux Hardening - a guide that intermediate to advanced Linux users can reasonably follow to set up and maintain hardened security configurations
- Linux - an article debunking common misunderstandings on desktop Linux's security model.
- Linux Hardening Guide - how to harden Linux as much as possible for security and privacy
- Choosing Your Desktop Linux Distribution - privacy and security considerations when choosing a Linux distribution
- security-misc - configurations to enhance Linux security
- The Linux Security Circus: On GUI isolation - article detailing the lack of GUI-level isolation in Linux, and how it nullifies all Linux desktop security
- Re: X11 -> Root? (Qubes square rooted) - criticisms of the Qubes security model
Tor and VPNs
- VPN - a Very Precarious Narrative - criticisms for VPN use
- Commercial VPN Use Cases - realistics use cases for VPNs
- Don’t use VPN services - a case for ditching VPN use
- You want Tor Browser … not a VPN - use case comparisons betwen Tor and VPN use
- IPVanish “No-Logging” VPN Led Homeland Security to Comcast User - an article detailing the time IPVanish doxed a customer to Homeland Security
- Is Tor Trustworthy and Safe? - an article detailing considerations and cons when using Tor
General
- Security and Privacy Advice - security and privacy advice for desktop, mobile, browser, messengers, email, passwords, 2FA, and social media.
- Despite DoH and ESNI, with OCSP, web activity is insecure and not private - how OCSP responses are a privacy nightmare
- Badness Enumeration - why badness enumeration as a concept is flawed and some examples of its failings in practice
- The Six Dumbest Ideas in Computer Security - default permit, badness enumeration, penetrate and patch, hacking is cool, educating users, action is better than inaction
- Threat Modeling - the first task a person should do when taking steps to protect their privacy and security
- The right thing for the wrong reasons: FLOSS doesn’t imply security [Tor] - source unavailability doesn’t imply insecurity, and source availability doesn’t imply security
- FLOSS Security - while source code is critical for user autonomy, it isn’t required to evaluate software security or understand run-time behavior
- Two types of privacy [Tor] - two main approaches to privacy: “tracking reduction” and “tracking evasion”
- Recovering redacted information from pixelated videos - image/video blurring methods and their weaknesses
- Let’s Enhance! How we found @rogerkver’s $1,000 wallet obfuscated private key - by overcoming blurring techniques
- Email (In)security - email is an inherently insecure protocol, conceived at a time when security was an afterthought
Fingerprinting Articles
- NetworkManager Minor Hardening - MAC address randomization, removing static hostname to prevent hostname broadcast, and disabling sending hostname to DHCP server
- How CSS Alone Can Help Track You - how CSS can fingerprint with javascript disabled
- Browser Tracking - misguided ways in which people attempt to improve their privacy when browsing the web
- Don’t update NTP – stop using it - arguements for why NTP has to die
Fingerprinting Tests
- TorZillaPrint - comprehensive, all-in-one, fingerprinting test suite
- No-JS fingerprinting - demonstration of how fingerprinting can occur even in the absence of JavaScript
- CSS Fingerprint - exploiting CSS to collect various characteristics about the visitor
- CreepJS - creepy device and browser fingerprinting
- Kloak - Kloak is a Keystroke Anonymization Tool
- AudioContext Fingerprint - tests browser-fingerprinting using the AudioContext and Canvas API
- Available Fonts - gets available fonts on browser without flash
- Browser Fingerprinting - analysis of Bot Protection systems with available countermeasures
- BrowserLeaks - a gallery of web technologies security testing tools
- Canvas Test - checks if the addon CanvasBlocker can be detected by websites
- CSS Exfil Vulnerability Tester - test to see if your browser is vulnerable to Cascading Style Sheets (CSS) data leakage
- Device Info - a web browser security testing, privacy testing, and troubleshooting tool
- DNS Cookie Demonstration - uses DNS caches as a side-channel to identify related network flows
- EFF: Cover Your Tracks - understand how easy it is to identify and track your browser based on how it appears to websites
- Epic Tracker - fingerprinting demo with some automated lookups using modern Javascript APIs
- Extension Fingerprints - detecting Chrome extensions by fetching web accessible resources
- Firefox Addon Detector - tracking 400+ firefox addons through chrome:// URI trickery!
- Iphey - Browser Fingerprinter
- Mouse Wheel Tracking Test - fingerprint based on tracking your mouse's wheel
- Nothing Private - proof of concept to show any website can identify and track you
- PicassAuth - canvas fingerprinting
- Pixelscan - basically a bot check
- Privacy Check - this website aims to focus on each fingerprinting technique in detail
- scheme flooding - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
- SuperCookie - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
- Webgl Fingerprinting - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
- Zardaxt.py - TCP/IP fingerprinting for VPN and Proxy Detection
Surveillance Technology
- Ears and Eyes - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
- Bugged Planet - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
- Harris: Wide Area Airborne Motion Imagery - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
- CRI LodeStar Wide Area Motion Imagery (WAMI) - a demonstration of cri lodestar wide area motion imagery (wami) system
- Harris: Locate GPS Jamming - harris signal sentry 1000 is a gps interference detection and geolocation solution. it provides a web-based visualization tool to support timely and effective actionable intelligence.
- Harris: Material Identification - harris material identification technology enables remote sensing systems to detect, identify and geolocate the presence of solid materials and gasses – on earth and in the atmosphere
- Elbit Systems / SPECTRO XR - spectro xr integrates a wide range of digital imaging, high-definition optical sensors and advanced lasers, providing simultaneous multi-spectral observation capabilities and enabling ultra-long-range detection.
- Police thermal imaging finds cannabis factory - It was a case of being caught red handed when the West Midlands Police helicopter found this cannabis factory using its thermal imaging camera
- The Stingray: How Law Enforcement Can Track Your Every Move - a "cell site simulator" initially developed for military use, Stingrays have made their way into local police and sheriff's departments around the country
- How Police Cameras Recognize and Track You - wired spoke with several experts about the explosion of surveillance technology, how police use it, and what the dangers might be. as tech advances, street cameras can now employ facial recognition and even connect to the internet. what does this mean for the future of privacy?
- How China’s Surveillance Is Growing More Invasive - analysis of over 100,000 government bidding documents found that China’s ambition to collect digital and biological data from its citizens is more expansive and invasive than previously known
- Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees - babel x may provide to analysts a target’s name, date of birth, address, usernames, email address, phone number, social media content, images, IP address, Social Security number, driver’s license number, employment history, and location data based on geolocation tags and also cell phone gps tracking
Cypherpunk Resources
Free Your Mind
- The End of All Evil - Jeremy Locke [Tor] - how to dismantle false beliefs in authority as a means to achieve true freedom and prosperity
- Crypto Agorism: Free Markets for a Free World [Tor] - how cryptocurrencies are a tool to achieve economic freedom by bypassing traditional financial and state controlled systems
- Videos to Free Your Mind [Tor] - a selection of thought-provoking videos that delve into themes of anarchy, conspiracy, and the occult, aiming to challenge conventional beliefs and inspire viewers to question mainstream narratives while exploring alternative perspectives on society and knowledge
- Infographics to Free Your Mind [Tor] - infographics that cover freedom and liberty, cypherpunk ideals of digital privacy, anarchy, natural law, mind control, occultism, and the influence of secret societies like the Illuminati and conspiracy theories
- Memes to Free Your Mind [Tor] - explore themes of freedom and liberty, highlighting autonomy and self-determination, while also addressing cypherpunk ideals of digital privacy and encryption; they touch on anarchy, natural law, mind control, and occultism, and examine the role of memes in shaping public perception and alternative narratives
- Quotes to Free Your Mind [Tor] - quotes from great thinkers that seek truth and challenge authority
- Second Realm: Book on Strategy [Tor] - a book on how to establish second realms or autonomous zones
- The Aristocracy of Action [Tor] - what it will take to build a cypherpunk breakaway society
- Why cryptoanarchy is not a revolutionary movement [Tor] - an interview describing how cryptoanarchy is about building parallel systems on top of existing power structures
- Aquinas On Liberty [Tor] - asserts that misunderstanding true liberty, based on reason and morality, has weakened society, necessitating a unified understanding to resist oppressive forces.
Cypherpunk Toolkits
- the autistic cypherpunk toolkit [Tor] - notes and resources on cryptography, cryptocurrencies, and cypherpunk living for the autistic cypherpunk anons out there
- the contrarian cypherpunk toolkit [Tor] - notes and resources on how to rebuild our outdated systems (e.g., anarchy, state, utopia, technoliber*, plurality, daos, tokenomics, furtarchy)
- decentralized cryptography toolkit [Tor] - notes and resources on applied cryptography for decentralized protocols, both for privacy and optimization (e.g., zk, tees, fhe, mpc, provers)
- decentralized protocols toolkit [Tor] - notes and resources on protocols (e.g., consensus, mechanism design, incentives, game theory, da)
- mev toolkit [Tor] - notes and resources on blockchain's maximal extractable value: on the hope of non-predatory free markets in the metaweb
- blockchain data engineering toolkit [Tor] - cypherpunk blockchain infrastructure projects and resources (e.g., ethereum event scanner, on chain analysis, data pipelines, etc.)
- blockchains security toolkit [Tor] - notes and resources on decentralized protocols (e.g. oracles, bridges, honeypots, cryptography, decompilers, static analysis, bug bounties)
- backend and orchestration toolkit [Tor] - code and notes on cloud microservices, orchestration (e.g., cloud, terraform, kubernetes, docker, data engineering)
- quantum computing toolkit [Tor] - notes and resources on quantum computing (e.g., quantum information, post-quantum cryptography, implications on post-quantum and blockchains)
- sec-pentesting toolkit [Tor] - a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
- shell-whiz-toolkit [Tor] - bt3gl's personal resources and scripts over the years (e.g., dotfiles, shell, zsh, git, tmux, vim, vpn, chef, scripts, configs, rooting devices)
Crypto Agorism
- Agorist Class Theory - a left libertarian approach to class conflict analysis
- Agorist Journal - axxi amplifies dissonance and brings voices together from across the political spectrum. it is also a call for unity. axxi resurrects the unifying vision of an agorist alliance beyond the surveillance state
- An Agorist Primer - a comprehensive guidebook that explores the principles and practical aspects of agorism, a strategy for achieving a stateless society through peaceful market activities
- An Argument Against KYC Bitcoin - presents a compelling case against the use of Know Your Customer (KYC) requirements in the Bitcoin ecosystem, discussing how it creates honeypots of user information and gives rise to a permissioned social system
- Building a circular economy with Monero - the future belongs to digital marketplaces that run on private digital cash. Anarkio explains why he built Bitejo and why he is into Monero
- How Monero Uniquely Enables Circular Economies- explores how Monero, a privacy-focused cryptocurrency, has distinct characteristics that make it particularly well-suited for enabling circular economies
- It’s Time To Join The Bitcoin Circular Economy - free men don’t ask permission to transact with each other and don’t rely on the legacy third-party financial institutions that operate in tandem with State authorities
- KYC-free Bitcoin Circular Economies - KYC-free bitcoin circular economies are perhaps the most pure free markets in the world, enabled by the first truly free sound money
- New Libertarian Manifesto - a concise and influential guide outlining the principles of agorism, a libertarian philosophy advocating for the practice of counter-economics
- The Last, Whole Introduction to Agorism - Agorism, unfortunately, needs an introduction...
Crypto Anarchy
- Fifty things to do NOW - the following is a highly valuable list of 50 things to do NOW, taken from the terrific crypto-agorist website, Anarplex. Find out what YOU can do RIGHT NOW to help build the Second Realm/counter-economy/vonu minicultures
- How to buy, earn and spend KYC-free Bitcoin and Monero (without ID or a bank account) - discover methods for purchasing, acquiring, and using Bitcoin and Monero without the need for KYC (Know Your Customer) verification
- How to survive outside of the state with Crypto Agorism - fair and free markets for food, jobs, housing, healthcare, mail, sim cards & more – no government ID or state permit required
- KYC Will Not Protect Us, Bitcoin And Encryption Will - as regulators attempt to institute KYC and AML rules at the peril of our personal data, Bitcoin and encryption offer salvation.
- Roadblocks to obtaining government-issued ID - state's ID monopoly and KYC regulations stop millions from accessing necessities like finances, jobs, healthcare, and more. No alternative methods or appeal processes exist if the state refuses to issue an ID. This exclusionary system prevents individuals, regardless of skills or efforts, from entering and regularizing their situation as adults
- Second Realm Ideas [Tor] - a collection of Second Realm ideas (KYC-free agorist services)
- The dangers of “decentralized” ID systems - many of these protocols rely on government ID as a base layer (as proof of name, age or address, referred to as “Verifiable credentials”). In this system, users are required to upload a video with their passport or national ID card. After this, their name, age or address is marked as verified. This reliance on government IDs means that DIDs cannot protect users against state surveillance
- The rarely discussed dangers of KYC and what you can do about it [Tor] - many people don't talk about it but unfortunately it's everywhere. Without KYC documents, opportunities to freely participate in the economy and even survive are limited. KYC is required for jobs, housing, healthcare and more. In addition, many people can't complete KYC, as they don't have any government-issued IDs and therefore must rely on the gray market to have access to necessities such as finding work, apartments and medicine. This text clarifies the rarely discussed reasons why KYC is harmful and what can be done about it.
- The Vision of Cryptoanarchy - talk given at "the web of phronesis" in 2020, a conference by the institute of network society, china academy of art.
- True Names Not Required: On Identity and Pseudonymity in Cyberspace - the cypherpunks recognized that a free society can not function if identity is rigid and known to all. A free society requires the option to selectively reveal yourself to the world, or not reveal yourself at all
- Why the state’s monopoly on identity is more dangerous than Google, Facebook and Microsoft [Tor] - while the tracking by Google, Facebook and Microsoft is definitely disturbing and can even put people in danger, the state’s data economy is even worse. Many people don’t talk about this, even though it affects millions of people’s daily lives
- The Slavery Contract [Tor] - argues that modern governments impose a system of laws that obligate citizens to comply with various regulations, effectively creating a master-servant dynamic where individuals have little say in the terms of their governance
- The Occult Arena of Law [Tor] - It is said that all the world’s a stage and us men and women merely players. In the world of law and legalism that old saying is paramount. But to what extent does the public realize its interaction with the modern legal systems of today is merely an elaborate performance, rigged to subjugate you through mystical utterances and titles?
Manifestos
- The GNU Manifesto (1985) [Tor] - document written by Richard Stallman, outlining the goals and principles of the GNU Project, which aimed to develop a free and open-source operating system
- The Hacker's Manifesto (1986) [Tor] - a declaration expressing the hacker culture's belief in the freedom of information and opposition to restrictions on computer use
- The Crypto Anarchist Manifesto (1988) [Tor] - advocates for the widespread use of cryptography and anonymous digital currency to uphold privacy and undermine government control
- A Cypherpunks Manifesto (1993) [Tor] - emphasizes the importance of cryptography as a tool for political and social change, promoting privacy, anonymity, and individual freedom
- Crypto Anarchy and Virtual Communities (1994) [Tor] - explores the concept of crypto anarchy where technology facilitates individuals to operate beyond traditional societal boundaries using encryption and virtual communities
- The Cyphernomicon (1994) [Tor] - a guidebook outlining the principles of cypherpunks, focusing on the role of cryptography in protecting privacy and empowering individuals against surveillance
- A Declaration of the Independence of Cyberspace (1996) [Tor] - asserts the autonomy of the online world from governments and urges policymakers to stay out of cyberspace regulation
- A Cyberpunk Manifesto (1997) [Tor] - articulates the ethos of the cyberpunk subculture, highlighting dystopian themes, the merging of humans with technology, and resistance against authority
- b-money (1998) [Tor] - proposed a digital currency system that utilized cryptographic proofs instead of centralized authorities to achieve secure and decentralized transactions
- Bit-gold (2005) [Tor] - describes a decentralized digital currency system, based on proof of work and cryptography, that influenced the development of Bitcoin
- State and Terrorist Conspiracies and Conspiracy as Governance (2006) [Tor] - sheds light on the power dynamics between conspiratorial governance and the whistleblowers
- Guerilla Open Access Manifesto (2008) [Tor] - advocates for open access to academic knowledge and criticizes the current publishing system, calling for civil disobedience to achieve a free and open flow of information
- The libbitcoin Manifesto (2013) [Tor] - outlines the principles and goals behind the libbitcoin project, emphasizing a focus on privacy, security, decentralization, and empowering individuals in their control over digital assets
- The Techno-Optimist Manifesto (2023) [Tor] - We are told that technology is on the brink of ruining everything. But we are being lied to, and the truth is so much better
Podcasts
- Agora Podcast - your home for agorism, localism, radical decentralization, and anti-authoritarian concepts
- Bit Buy Bit - a podcast for ungovernable misfits who choose Bitcoin, opensource software, privacy and freedom
- Citadel Dispatch - an interactive live show about bitcoin and freedom tech. Dispatch is audience funded without ads or paywalls. Live unedited shows with direct audience participation via youtube, twitch, and our matrix chats.
- Cypherpunk Bitstream - A cypherpunk and cryptoanarchy focused podcast
- Monero Talk - weekly conversations with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become
- Opt Out [Tor] - a podcast that interviews individuals who are passionate about privacy, explores their reasons for valuing privacy, discusses the tools and techniques they use, and aims to inspire others to prioritize personal privacy and data control
- Truth for the Commoner - your gateway to a world of truth, knowledge, and empowerment in the digital age. We are dedicated to bringing you content that spans the realms of bitcoin, economics, privacy, freedom technology, and culture
- Vonu Podcast - the podcast making you invulnerable to the coercion of the State and the servile society
Projects & Organizations
- Annas Archive - the world’s largest open-source open-data library. mirrors sci-hub, library genesis, z-library, duxiu, and more. 51,064,327 books, 98,551,617 papers — preserved forever.
- Cryptome - cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those
- CensorBib - an archive of selected academic research papers on Internet censorship
- Electronic Frontier Foundation - the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. EFF's mission is to ensure that technology supports freedom, justice, and innovation for all people of the world.
- Paralelní Polis - paralelní polis is a one-of-a-kind nonprofit organization founded by members of a contemporary-art group ztohoven. the mission of paralelní polis is to provide the technology and education people need to participate in an independent society and protect their individual freedom. the vision of paralelní polis is a world where people have the opportunity to disengage from the state and live in a free society
- Privacy Guides - a non-profit, socially motivated website that provides information for protecting your data security and privacy
- Tor Project - fights every day for everyone to have private access to an uncensored internet, and Tor has become the world's strongest tool for privacy and freedom online
- Veilid - framework that allows anyone to build a distributed, private app. Veilid gives users the privacy to opt out of data collection and online tracking. Veilid is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon
- WikiLeaks - wikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses
Volunteer
- Write OPSEC blogposts for 10 to 50 euros (in Monero) per blogpost [Tor] - earn crypto anonymously by writing opsec articles (privacy, anonymity, deniability)
- Improve the Darknet Lantern software for 10 to 50 euros (in Monero) per feature [Tor] - looking for contributors to help improve the Darknet Lantern sofware, preferably those well versed in python and PHP programming
- Host an Anna's Archive Mirror - to increase the resiliency of Anna’s Archive, we’re looking for volunteers to run mirrors
- Seed Anna's Archive Torrents - support free access to information by sharing and maintaining torrents from Anna's Archive
- Host an IPFS Node - help to distribute and store files in a decentralized manner using the InterPlanetary File System (IPFS)
- Host a Tor Node [Tor] - contribute to online privacy and anonymity by running a node in the Tor network, allowing users to access the internet securely
- Host a full Monero Node [Tor] - help secure the Monero network and support private transactions by operating a full node for the Monero cryptocurrency
- Host a full Bitcoin Node - contribute to the security and resilience of the Bitcoin network by hosting a full node that validates and verifies transactions
- Host a Privacy Front-End Service [Tor] - host alternative open-source interfaces for popular internet platforms like YouTube and Twitter, designed to prioritize user privacy and data protection
- Host Privacy Respecting Services [Tor] - contribute to online privacy and data protection by hosting and providing services that prioritize user confidentiality and respect their privacy
- Offer Services as a Proxy Merchant [Tor] - proxy merchants offer a service where individuals without government ID can access financial services, rentals, and receive mail through a shell company or trust established by someone with valid identification, providing prepaid debit cards, a PO box for mail, and the ability to rent under the company name
- Offer P2P Crypto Trading [Tor] - enable users to trade crypto directly without intermediaries and KYC exchanges
- Start a Second Realm [Tor] - create a community-driven alternative society that emphasizes self-sufficiency, resilience, and voluntary cooperation outside of traditional structures
Cryptocurrency Resources
NoKYC Guides
- How to buy non KYC Bitcoin - how to buy non-KYC bitcoin from a Bitcoin ATM
- Fiat to Monero using Haveno DEX (Reto) [Tor] - In this tutorial we're going to cover how to do a Fiat to Monero trade from the brand new (and long awaited!) Haveno Decentralised Exchange, using the Face-to-Face (F2F) payment method. NOTE: I don't recommend face-to-face as a payment option of choice, this is just to try out how a basic trade Haveno DEX works!
- How to buy non KYC Monero using Haveno DEX (Reto) [Tor] - cash by mail on the Haveno Decentralised Exchange
- Haveno DEX dispute resolution [Tor] - how the Haveno DEX handles FIAT -> XMR trade disputes
- How to get your first Monero [Tor] - a few different strategies for obtaining your first Monero
- How to buy non KYC Monero - how to buy non-KYC bitcoin at a Bitcoin ATM and convert to Monero using Bisq
- How to buy your first non KYC bitcoin and monero - a presentation by Heady Wook
- How to buy non KYC bitcoin with a US Postal Money Order on Bisq - how to buy non-KYC bitcoin using a US Postal Money Order on Bisq
- How to use a certified mail receipt to buy non KYC Bitcoin - using a Certified Mailing Receipt when sending a money order for buying non-KYC Bitcoin on Bisq
- How to accept non-KYC bitcoin with BTCPay Jungle and Electrum - how to start receiving non-KYC bitcoin payments in exchange for online goods and services
Crypto Services Directories
- KYCNOT.ME [Tor] - directory for No-KYC exchanges and services
- Monerica [Tor] - exhaustive list of Monero and related resources
- AcceptedHere- directory for online and offline businesses accepting cryptocurrency
- CryptWerk - directory with companies, websites, shops, services that accept crypto
- Bitcoin Bookmarks-directory for premium crypto websites sorted by quality
- Lightning Network Stores - directory for stores that accept bitcoin through the lightning network
Automated Exchanges
- Trocador.app [Tor] - a privacy-focused exchange aggregator
Peer to Peer Exchanges
- Haveno Reto [Tor] - Haveno (pronounced ha‧ve‧no) is an open source platform to exchange Monero for fiat currencies like USD, EUR, and GBP or other cryptocurrencies like BTC, ETH, and BCH.
- Bisq - buy and sell bitcoin or monero for fiat using the Bisq peer-to-peer network
- Robosats [Tor]- a peer to peer exchange for converting bitcoin to national currencies via lightning hold invoices
- HodlHodl - global peer to peer bitcoin trading platform
Peer to Peer Crypto Marketplaces and Freelancing
- XMRBazaar - a monero marketplace for advertising goods and services that has a non-custodial escrow system so that both buyer and seller are sure the money is actually there
- username: beta
- password: tester
- TukanMarket - a bitcoin marketplace for advertising goods and services
- Bitcoin P2P Marketplace - a bitcoin P2P marketplace telegram channel
- Monero Market - a reddit marketplace for buying and selling items with Monero
- Microlancer - a freelancing platform designed for quick milestones and secure escrowed payments using the lightning network
Crypto VPS & Domain Services
- 1984 - high quality web hosting and VPS service provider that respects and protects the civil and political rights of customers
- Incognet [Tor] - privacy respecting web host and VPS provider
- Njalla [Tor] - anonymous domain name registrar and VPS provider
Crypto VPN Services
- Mullvad [Tor] - a Sweden-based VPN provider with a long-standing reputation for privacy and efficiency
- IVPN - a Gibraltar-registered service that has been preserving customers privacy since 2009
Crypto Credit Cards
- FCF Pay - Swap cryptocurrencies for virtual prepaid crypto debit gift cards
- Ezzocard - purchase virutal prepaid cards that work anywhere in the world
- Pay with Moon - bitcoin/lighting backed virtual credit cards
- The Bitcoin Company - buy Visa cards, gift cards, phone top-ups, and more
Crypto Gift Cards
- CardCoins - convert prepaid gift cards into digital currency at over 80,000 locations nationwide
- Cake Pay - buy gift cards and related products with virtual assets for use at millions of merchants worldwide
Crypto eSim Providers
- SilentLink [Tor] - a global mobile and phone number provider for eSIM-compatible smartphones
Crypto SMS Providers
- JMP - allows you to send and receive text messages, pictures, phone calls, and voicemails using a Jabber (XMPP) client
- TextVerified- SMS verficiation service that accepts Crypto
- SMSPVA - offers a large list of SMS verification numbers you can rent with BTC
- JuicySMS - verify online accounts with temporary real phone numbers
- SMS4Sats [Tor] - offers SMS verification numbers online
Notable Git Projects
Mirrors & Collections
- awesome-mirrors [Tor] - a curated collection of resources and awesome git repos
- awesome-piracy [Tor] - a curated list of awesome warez and piracy links
- alternative-front-ends [Tor] - alternative open source front-ends for popular internet platforms
- awesome-privacy [Tor] - a curated list of services and alternatives that respect your privacy because PRIVACY MATTERS
- farside [Tor] - A smart redirecting gateway for various frontend services
Crypto & Blockchain
- Crypto-OpSec-SelfGuard-RoadMap [Tor] - defi, blockchain and crypto-related opsec research
- tornado-cash-docs [Tor] - tornado cash is a fully decentralized non-custodial protocol allowing private crypto transactions
- tornado-core [Tor] - tornado cash. non-custodial private transactions on Ethereum
- tornado-cli [Tor] - command line interface to make transactions in Tornado Cash protocol
- tornado-relayer [Tor] - relayer for Tornado cash
- xmr-btc-swap [Tor] - bitcoin to monero cross-chain atomic swap
- xmrmemes [Tor] - Meme site for Monero. You can submit memes and get paid.
Security, Privacy & Anonymity
- KryptEY [Tor] - Android keyboard for secure E2EE communication through the signal protocol in any messenger. Communicate securely
- blue-merle [Tor] - enhance anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
- mat2-web [Tor] - A web version of mat2
- into-the-crypt [Tor] - the art of anti-forensics
- firefox-user.js [Tor] - a comprehensive user.js template for configuration and hardening
- thunderbird-user.js - comprehensive user.js template for configuration and hardening
- shaker [Tor] - unman's collection salt stack scripts for Qubes OS
- qusal [Tor] - Salt Formulas for Qubes OS
Hardware, Firmware & Device Security
- portapack-mayhem [Tor] - custom firmware for the HackRF+PortaPack H1/H2
- tillitis-key [Tor] - board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key
Operating Systems & Platforms
- GrapheneOS - security and privacy focused mobile OS with Android app compatibility
- graphene-os-server-infrastructure [Tor] - useful to study for server hardening configs
Alternative & Decentralized Platforms
- alternative-search-engines-and-video-hosting [Tor] - alternative platforms for news and video sharing
- onionshare [Tor] - Securely and anonymously share files, host websites, and chat with friends using the Tor network
- RetroShare [Tor] - RetroShare is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.
Infrastructure, Kernel & Memory
- constellation [Tor] - constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing
- EndGame v3 [Tor] - onion service DDOS prevention front system
- hardened_malloc [Tor] - hardened memory allocator designed for modern systems
- plague-kernel [Tor] - minimal linux kernel for a reduced attack surface
Reference & Command Line Resources
- the-book-of-secret-knowledge [Tor] - a collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more
- Linux-Bash-Commands [Tor] - ultimate list of Linux bash commands, cheatsheet and resources
Networking & Distributed Systems
- farside [Tor] - A smart redirecting gateway for various frontend services
- mat2-web [Tor] - A web version of mat2
- darknet-lantern [Tor] - a minimalistic Peer to Peer Decentralised Search Engine for the Darknet
- 4get [Tor] - 4get is a proxy search engine that doesn't suck
Archives
- annas-archive [Tor] - the world’s largest open-source open-data library. mirrors sci-hub, library genesis, z-library, duxiu, and more. 51,064,327 books, 98,551,617 papers — preserved forever.
- red-arch [Tor] - The goal of this project is to provide a framework for archiving websites and social media - with a particular focus on subreddits - and creating compilations of information in ways that are very easy for non-tech-savy people to consume, copy, and distribute.
- snowdenarchive [Tor] - A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden
- 911-truth-resources [Tor] - A curated selection of 911 truth resources
Adversarial Frameworks
- advmlthreatmatrix [Tor] - Adversarial Threat Landscape for AI Systems
- DISARMframeworks [Tor] - DISARM is a framework designed for describing and understanding "disinformation" incidents
Decentralized Messaging, Communications, and Radio
- GhostNet [Tor] - a collection of communications networks set up to allow users around the world to exchange information without relying on pre-established infrastructure
- TC2-BBS-mesh [Tor] - A BBS server for Meshtastic for posting bulletins, sending mail to users, and channel directory
- TC2-APRS-BBS [Tor] - This is the TC²-BBS for APRS. The system allows for basic mail messages for specific users and bulletin boards
- Reticulum [Tor] - The cryptography-based networking stack for building unstoppable networks with LoRa, Packet Radio, WiFi and everything in between
- LXMF [Tor] - A universal, distributed and secure messaging protocol for Reticulum
- Sideband [Tor] - LXMF client for Android, Linux and macOS allowing you to communicate with people or LXMF-compatible systems over Reticulum networks using LoRa, Packet Radio, WiFi, I2P, or anything else Reticulum supports.
- NomadNet [Tor] - Off-grid, resilient mesh communication with strong encryption, forward secrecy and extreme privacy
- lxmf_messageboard [Tor] - Simple message board that can be hosted on a NomadNet node, messages can be posted by 'conversing' with a unique peer, all messages are then forwarded to the message board
- rnsh [Tor] - rnsh is a command-line utility written in Python that facilitates shell sessions over Reticulum networks and aims to provide a similar experience to SSH.