A list of privacy, security, and cryptocurrency resources curated by the hackliberty.org community.
Find a file
2025-06-23 17:25:47 -04:00
assets/img update format, add assets, add donations 2023-03-04 22:10:29 +00:00
README.md update simplex link 2025-06-23 17:25:47 -04:00

Hack Liberty Resources

VERITAS - LIBERTAS - SCIENTIA


About Hack Liberty

We are a group of cypherpunks, privacy advocates, engineers, and philosophers dedicated to the pursuit of truth, liberty, and knowledge for all. We believe technology is a tool for liberation, not enslavement. We fight tyranny with encryption, decentralization, and anonymity. Join us in the fight for liberty.


Hack Liberty Services

[Terms of ServiceCode of ConductPrivacy Policy]

All our services use open source software and are open to the public. We anonymize logs and use full disk encryption to preserve user privacy when possible. Our hosting provider 1984 is located in Iceland and supports human rights and free speech.

  • Simplex [Tor] - the first messaging network operating without user identifiers of any kind - 100% private by design!
  • Forum [Tor] [Archive] - discuss and advocate for the use of encryption, privacy technologies, and decentralized systems to promote freedom and protect digital rights
  • Darknet Lantern [Tor] - decentralised peer-to-peer darknet search engine
  • 4get [Tor] - a proxy search engine that doesn't suck
  • Redlib [Tor] - a private front-end for Reddit
  • Forgejo [Tor]- a painless self-hosted Git service
  • PrivateBin [Tor]- a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode
  • OTS [Tor]- One-Time-Secret sharing platform with symmetric 256bit AES encryption in the browser
  • Farside - a smart redirecting gateway for various frontend services

Archives

An open source collection of archives suitable for offline hosting, online hosting, and git mirroring. Please download, mirror, and share to help fight against censorship and internet memory-holing.

Views and opinions expressed in these archives do not necessarily reflect those of Hack Liberty, contributors, or partners.


Donations and Transparency

Please consider donating to help us pay for servers and infrastructure. We operate 100% out of our own pocket and any donations will help pay for server costs!

Monero (XMR)
881ayjjExYVhyqQBQFxdY6aQC5J5Ys3JNfvxC1r5WNwSVK3ysD4Sn6GfUbNf1JkhMEJWj11mNvzCW9XZLpyWkjHx6EftAXU
Tor - click here to donate with cryptocurrencies other than Monero over Tor
Clearnet - click here to donate with cryptocurrencies other than Monero over Clearnet

Current number of donations received: 6


Operating Costs: $250 a month / $3100 a year


Hack Liberty Simplex Community

Anyone that agrees to our Code of Conduct is welcome to join our Simplex Hack Liberty Community Room and our Simplex server, a decentralized, metadata resistant alternative to Matrix! Incognito profiles welcome!

Simplex Servers

  • Hack Liberty SMP Server

    • smp://esPsfRFGZd2TRyKijJDorCMo3Ld-QD8Cq8ASx8qrY_Q=@simplex.hackliberty.org,gstc5w42xawazcr4txrcyhitmkhiyu2vkkwy2xhwovbhlapzrccjeyad.onion
  • Hack Liberty XFTP Server

    • xftp://DfK0yVcc9P5NgfaRR4retNWDDTKFa9g_NqF11maM87Q=@xftp.hackliberty.org,kf25i7slt6skypu47j5kzl4s4nlt3aw3baiocanygf6gprrrbft4dyqd.onion:5233

Simplex Rooms


Privacy and Security

Sites and Articles

  • Anonymous Planet - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
  • Privacy Guides [Tor] - a non-profit, socially motivated website that provides information for protecting your data security and privacy
  • Extreme Privacy 5th Edition - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view
  • Nihilism OPSEC Blog [Tor] - ultimately, this blog aims to showcase that technology, when used correctly, can allow one to transcend any limitation. be it to transcend surveillance, centralisation, deanonymization, lack of security. any ability that we have as humans, such as privacy, decentralisation, anonymity, security, plausible deniability can be protected and enhanced by using the correct technology.
  • Dig Deeper [Tor] - a diverse range of articles focused on software privacy, technology critiques, societal issues, video game recommendations, and reviews, emphasizing the importance of digital security, ethical software choices, and critical perspectives on contemporary societal challenges
  • Shadow Wiki [Tor] - a resource dedicated to exploring topics related to nanonymity, privacy, security, and anonymity, while also delving into hardware, software, politics, religion, and obscure or esoteric knowledge, with a focus on sustainability and quality in production
  • Spyware Watchdog [Tor] - this website classifies spyware programs, so that users can be more aware of what they install
  • Anonymous Land - a community dedicated to providing anonymity enhancing guides and services
  • No Trace Project [Tor] - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
  • Anarsec: Tech Guides for Anarchists [Tor] - tech and opsec guides for anarchists
  • OfficerCIA - various tools and articles for OpSec, written with a preference for practical usability
  • PrivSec - articles written with a practical approach to privacy and security
  • Defending against Stylometric attacks [Tor] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. its one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
  • Prism Break - opt out of global data surveillance programs like prism, xkeyscore and tempora.
  • The New Oil [Tor] - the beginners guide to data privacy & cybersecurity
  • Techlore - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
  • Into the Crypt [Tor] - the art of anti-forensics
  • Advanced Privacy and Anonymity Using VMs, VPNs, Tor - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
  • How to create anonymous Telegram and Signal accounts without a phone - a guide for using Whonix & Anbox to create anonymous mobile accounts without a phone
  • EFF Surveillance Self-Defense - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states

Android

Secure Messengers

Desktop

Tor and VPNs

General

Fingerprinting Articles


Fingerprinting Tests

  • TorZillaPrint - comprehensive, all-in-one, fingerprinting test suite
  • No-JS fingerprinting - demonstration of how fingerprinting can occur even in the absence of JavaScript
  • CSS Fingerprint - exploiting CSS to collect various characteristics about the visitor
  • CreepJS - creepy device and browser fingerprinting
  • Kloak - Kloak is a Keystroke Anonymization Tool
  • AudioContext Fingerprint - tests browser-fingerprinting using the AudioContext and Canvas API
  • Available Fonts - gets available fonts on browser without flash
  • Browser Fingerprinting - analysis of Bot Protection systems with available countermeasures
  • BrowserLeaks - a gallery of web technologies security testing tools
  • Canvas Test - checks if the addon CanvasBlocker can be detected by websites
  • CSS Exfil Vulnerability Tester - test to see if your browser is vulnerable to Cascading Style Sheets (CSS) data leakage
  • Device Info - a web browser security testing, privacy testing, and troubleshooting tool
  • DNS Cookie Demonstration - uses DNS caches as a side-channel to identify related network flows
  • EFF: Cover Your Tracks - understand how easy it is to identify and track your browser based on how it appears to websites
  • Epic Tracker - fingerprinting demo with some automated lookups using modern Javascript APIs
  • Extension Fingerprints - detecting Chrome extensions by fetching web accessible resources
  • Firefox Addon Detector - tracking 400+ firefox addons through chrome:// URI trickery!
  • Iphey - Browser Fingerprinter
  • Mouse Wheel Tracking Test - fingerprint based on tracking your mouse's wheel
  • Nothing Private - proof of concept to show any website can identify and track you
  • PicassAuth - canvas fingerprinting
  • Pixelscan - basically a bot check
  • Privacy Check - this website aims to focus on each fingerprinting technique in detail
  • scheme flooding - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
  • SuperCookie - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
  • Webgl Fingerprinting - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
  • Zardaxt.py - TCP/IP fingerprinting for VPN and Proxy Detection

Surveillance Technology

  • Ears and Eyes - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
  • Bugged Planet - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
  • Harris: Wide Area Airborne Motion Imagery - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
  • CRI LodeStar Wide Area Motion Imagery (WAMI) - a demonstration of cri lodestar wide area motion imagery (wami) system
  • Harris: Locate GPS Jamming - harris signal sentry 1000 is a gps interference detection and geolocation solution. it provides a web-based visualization tool to support timely and effective actionable intelligence.
  • Harris: Material Identification - harris material identification technology enables remote sensing systems to detect, identify and geolocate the presence of solid materials and gasses on earth and in the atmosphere
  • Elbit Systems / SPECTRO XR - spectro xr integrates a wide range of digital imaging, high-definition optical sensors and advanced lasers, providing simultaneous multi-spectral observation capabilities and enabling ultra-long-range detection.
  • Police thermal imaging finds cannabis factory - It was a case of being caught red handed when the West Midlands Police helicopter found this cannabis factory using its thermal imaging camera
  • The Stingray: How Law Enforcement Can Track Your Every Move - a "cell site simulator" initially developed for military use, Stingrays have made their way into local police and sheriff's departments around the country
  • How Police Cameras Recognize and Track You - wired spoke with several experts about the explosion of surveillance technology, how police use it, and what the dangers might be. as tech advances, street cameras can now employ facial recognition and even connect to the internet. what does this mean for the future of privacy?
  • How Chinas Surveillance Is Growing More Invasive - analysis of over 100,000 government bidding documents found that Chinas ambition to collect digital and biological data from its citizens is more expansive and invasive than previously known
  • Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees - babel x may provide to analysts a targets name, date of birth, address, usernames, email address, phone number, social media content, images, IP address, Social Security number, drivers license number, employment history, and location data based on geolocation tags and also cell phone gps tracking

Cypherpunk Resources

Free Your Mind

  • The End of All Evil - Jeremy Locke [Tor] - how to dismantle false beliefs in authority as a means to achieve true freedom and prosperity
  • Crypto Agorism: Free Markets for a Free World [Tor] - how cryptocurrencies are a tool to achieve economic freedom by bypassing traditional financial and state controlled systems
  • Videos to Free Your Mind [Tor] - a selection of thought-provoking videos that delve into themes of anarchy, conspiracy, and the occult, aiming to challenge conventional beliefs and inspire viewers to question mainstream narratives while exploring alternative perspectives on society and knowledge
  • Infographics to Free Your Mind [Tor] - infographics that cover freedom and liberty, cypherpunk ideals of digital privacy, anarchy, natural law, mind control, occultism, and the influence of secret societies like the Illuminati and conspiracy theories
  • Memes to Free Your Mind [Tor] - explore themes of freedom and liberty, highlighting autonomy and self-determination, while also addressing cypherpunk ideals of digital privacy and encryption; they touch on anarchy, natural law, mind control, and occultism, and examine the role of memes in shaping public perception and alternative narratives
  • Quotes to Free Your Mind [Tor] - quotes from great thinkers that seek truth and challenge authority
  • Second Realm: Book on Strategy [Tor] - a book on how to establish second realms or autonomous zones
  • The Aristocracy of Action [Tor] - what it will take to build a cypherpunk breakaway society
  • Why cryptoanarchy is not a revolutionary movement [Tor] - an interview describing how cryptoanarchy is about building parallel systems on top of existing power structures
  • Aquinas On Liberty [Tor] - asserts that misunderstanding true liberty, based on reason and morality, has weakened society, necessitating a unified understanding to resist oppressive forces.

Cypherpunk Toolkits

  • the autistic cypherpunk toolkit [Tor] - notes and resources on cryptography, cryptocurrencies, and cypherpunk living for the autistic cypherpunk anons out there
  • the contrarian cypherpunk toolkit [Tor] - notes and resources on how to rebuild our outdated systems (e.g., anarchy, state, utopia, technoliber*, plurality, daos, tokenomics, furtarchy)
  • decentralized cryptography toolkit [Tor] - notes and resources on applied cryptography for decentralized protocols, both for privacy and optimization (e.g., zk, tees, fhe, mpc, provers)
  • decentralized protocols toolkit [Tor] - notes and resources on protocols (e.g., consensus, mechanism design, incentives, game theory, da)
  • mev toolkit [Tor] - notes and resources on blockchain's maximal extractable value: on the hope of non-predatory free markets in the metaweb
  • blockchain data engineering toolkit [Tor] - cypherpunk blockchain infrastructure projects and resources (e.g., ethereum event scanner, on chain analysis, data pipelines, etc.)
  • blockchains security toolkit [Tor] - notes and resources on decentralized protocols (e.g. oracles, bridges, honeypots, cryptography, decompilers, static analysis, bug bounties)
  • backend and orchestration toolkit [Tor] - code and notes on cloud microservices, orchestration (e.g., cloud, terraform, kubernetes, docker, data engineering)
  • quantum computing toolkit [Tor] - notes and resources on quantum computing (e.g., quantum information, post-quantum cryptography, implications on post-quantum and blockchains)
  • sec-pentesting toolkit [Tor] - a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
  • shell-whiz-toolkit [Tor] - bt3gl's personal resources and scripts over the years (e.g., dotfiles, shell, zsh, git, tmux, vim, vpn, chef, scripts, configs, rooting devices)

Crypto Agorism

  • Agorist Class Theory - a left libertarian approach to class conflict analysis
  • Agorist Journal - axxi amplifies dissonance and brings voices together from across the political spectrum. it is also a call for unity. axxi resurrects the unifying vision of an agorist alliance beyond the surveillance state
  • An Agorist Primer - a comprehensive guidebook that explores the principles and practical aspects of agorism, a strategy for achieving a stateless society through peaceful market activities
  • An Argument Against KYC Bitcoin - presents a compelling case against the use of Know Your Customer (KYC) requirements in the Bitcoin ecosystem, discussing how it creates honeypots of user information and gives rise to a permissioned social system
  • Building a circular economy with Monero - the future belongs to digital marketplaces that run on private digital cash. Anarkio explains why he built Bitejo and why he is into Monero
  • How Monero Uniquely Enables Circular Economies- explores how Monero, a privacy-focused cryptocurrency, has distinct characteristics that make it particularly well-suited for enabling circular economies
  • Its Time To Join The Bitcoin Circular Economy - free men dont ask permission to transact with each other and dont rely on the legacy third-party financial institutions that operate in tandem with State authorities
  • KYC-free Bitcoin Circular Economies - KYC-free bitcoin circular economies are perhaps the most pure free markets in the world, enabled by the first truly free sound money
  • New Libertarian Manifesto - a concise and influential guide outlining the principles of agorism, a libertarian philosophy advocating for the practice of counter-economics
  • The Last, Whole Introduction to Agorism - Agorism, unfortunately, needs an introduction...

Crypto Anarchy

  • Fifty things to do NOW - the following is a highly valuable list of 50 things to do NOW, taken from the terrific crypto-agorist website, Anarplex. Find out what YOU can do RIGHT NOW to help build the Second Realm/counter-economy/vonu minicultures
  • How to buy, earn and spend KYC-free Bitcoin and Monero (without ID or a bank account) - discover methods for purchasing, acquiring, and using Bitcoin and Monero without the need for KYC (Know Your Customer) verification
  • How to survive outside of the state with Crypto Agorism - fair and free markets for food, jobs, housing, healthcare, mail, sim cards & more no government ID or state permit required
  • KYC Will Not Protect Us, Bitcoin And Encryption Will - as regulators attempt to institute KYC and AML rules at the peril of our personal data, Bitcoin and encryption offer salvation.
  • Roadblocks to obtaining government-issued ID - state's ID monopoly and KYC regulations stop millions from accessing necessities like finances, jobs, healthcare, and more. No alternative methods or appeal processes exist if the state refuses to issue an ID. This exclusionary system prevents individuals, regardless of skills or efforts, from entering and regularizing their situation as adults
  • Second Realm Ideas [Tor] - a collection of Second Realm ideas (KYC-free agorist services)
  • The dangers of “decentralized” ID systems - many of these protocols rely on government ID as a base layer (as proof of name, age or address, referred to as “Verifiable credentials”). In this system, users are required to upload a video with their passport or national ID card. After this, their name, age or address is marked as verified. This reliance on government IDs means that DIDs cannot protect users against state surveillance
  • The rarely discussed dangers of KYC and what you can do about it [Tor] - many people don't talk about it but unfortunately it's everywhere. Without KYC documents, opportunities to freely participate in the economy and even survive are limited. KYC is required for jobs, housing, healthcare and more. In addition, many people can't complete KYC, as they don't have any government-issued IDs and therefore must rely on the gray market to have access to necessities such as finding work, apartments and medicine. This text clarifies the rarely discussed reasons why KYC is harmful and what can be done about it.
  • The Vision of Cryptoanarchy - talk given at "the web of phronesis" in 2020, a conference by the institute of network society, china academy of art.
  • True Names Not Required: On Identity and Pseudonymity in Cyberspace - the cypherpunks recognized that a free society can not function if identity is rigid and known to all. A free society requires the option to selectively reveal yourself to the world, or not reveal yourself at all
  • Why the states monopoly on identity is more dangerous than Google, Facebook and Microsoft [Tor] - while the tracking by Google, Facebook and Microsoft is definitely disturbing and can even put people in danger, the states data economy is even worse. Many people dont talk about this, even though it affects millions of peoples daily lives
  • The Slavery Contract [Tor] - argues that modern governments impose a system of laws that obligate citizens to comply with various regulations, effectively creating a master-servant dynamic where individuals have little say in the terms of their governance
  • The Occult Arena of Law [Tor] - It is said that all the worlds a stage and us men and women merely players. In the world of law and legalism that old saying is paramount. But to what extent does the public realize its interaction with the modern legal systems of today is merely an elaborate performance, rigged to subjugate you through mystical utterances and titles?

Manifestos

  • The GNU Manifesto (1985) [Tor] - document written by Richard Stallman, outlining the goals and principles of the GNU Project, which aimed to develop a free and open-source operating system
  • The Hacker's Manifesto (1986) [Tor] - a declaration expressing the hacker culture's belief in the freedom of information and opposition to restrictions on computer use
  • The Crypto Anarchist Manifesto (1988) [Tor] - advocates for the widespread use of cryptography and anonymous digital currency to uphold privacy and undermine government control
  • A Cypherpunks Manifesto (1993) [Tor] - emphasizes the importance of cryptography as a tool for political and social change, promoting privacy, anonymity, and individual freedom
  • Crypto Anarchy and Virtual Communities (1994) [Tor] - explores the concept of crypto anarchy where technology facilitates individuals to operate beyond traditional societal boundaries using encryption and virtual communities
  • The Cyphernomicon (1994) [Tor] - a guidebook outlining the principles of cypherpunks, focusing on the role of cryptography in protecting privacy and empowering individuals against surveillance
  • A Declaration of the Independence of Cyberspace (1996) [Tor] - asserts the autonomy of the online world from governments and urges policymakers to stay out of cyberspace regulation
  • A Cyberpunk Manifesto (1997) [Tor] - articulates the ethos of the cyberpunk subculture, highlighting dystopian themes, the merging of humans with technology, and resistance against authority
  • b-money (1998) [Tor] - proposed a digital currency system that utilized cryptographic proofs instead of centralized authorities to achieve secure and decentralized transactions
  • Bit-gold (2005) [Tor] - describes a decentralized digital currency system, based on proof of work and cryptography, that influenced the development of Bitcoin
  • State and Terrorist Conspiracies and Conspiracy as Governance (2006) [Tor] - sheds light on the power dynamics between conspiratorial governance and the whistleblowers
  • Guerilla Open Access Manifesto (2008) [Tor] - advocates for open access to academic knowledge and criticizes the current publishing system, calling for civil disobedience to achieve a free and open flow of information
  • The libbitcoin Manifesto (2013) [Tor] - outlines the principles and goals behind the libbitcoin project, emphasizing a focus on privacy, security, decentralization, and empowering individuals in their control over digital assets
  • The Techno-Optimist Manifesto (2023) [Tor] - We are told that technology is on the brink of ruining everything. But we are being lied to, and the truth is so much better

Podcasts

  • Agora Podcast - your home for agorism, localism, radical decentralization, and anti-authoritarian concepts
  • Bit Buy Bit - a podcast for ungovernable misfits who choose Bitcoin, opensource software, privacy and freedom
  • Citadel Dispatch - an interactive live show about bitcoin and freedom tech. Dispatch is audience funded without ads or paywalls. Live unedited shows with direct audience participation via youtube, twitch, and our matrix chats.
  • Cypherpunk Bitstream - A cypherpunk and cryptoanarchy focused podcast
  • Monero Talk - weekly conversations with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become
  • Opt Out [Tor] - a podcast that interviews individuals who are passionate about privacy, explores their reasons for valuing privacy, discusses the tools and techniques they use, and aims to inspire others to prioritize personal privacy and data control
  • Truth for the Commoner - your gateway to a world of truth, knowledge, and empowerment in the digital age. We are dedicated to bringing you content that spans the realms of bitcoin, economics, privacy, freedom technology, and culture
  • Vonu Podcast - the podcast making you invulnerable to the coercion of the State and the servile society

Projects & Organizations

  • Annas Archive - the worlds largest open-source open-data library. mirrors sci-hub, library genesis, z-library, duxiu, and more. 51,064,327 books, 98,551,617 papers — preserved forever.
  • Cryptome - cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those
  • CensorBib - an archive of selected academic research papers on Internet censorship
  • Electronic Frontier Foundation - the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. EFF's mission is to ensure that technology supports freedom, justice, and innovation for all people of the world.
  • Paralelní Polis - paralelní polis is a one-­of-­a-­kind nonprofit organization founded by members of a contemporary-­art group ztohoven. the mission of paralelní polis is to provide the technology and education people need to participate in an independent society and protect their individual freedom. the vision of paralelní polis is a world where people have the opportunity to disengage from the state and live in a free society
  • Privacy Guides - a non-profit, socially motivated website that provides information for protecting your data security and privacy
  • Tor Project - fights every day for everyone to have private access to an uncensored internet, and Tor has become the world's strongest tool for privacy and freedom online
  • Veilid - framework that allows anyone to build a distributed, private app. Veilid gives users the privacy to opt out of data collection and online tracking. Veilid is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon
  • WikiLeaks - wikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses

Volunteer


Cryptocurrency Resources

NoKYC Guides

Crypto Services Directories

  • KYCNOT.ME [Tor] - directory for No-KYC exchanges and services
  • Monerica [Tor] - exhaustive list of Monero and related resources
  • AcceptedHere- directory for online and offline businesses accepting cryptocurrency
  • CryptWerk - directory with companies, websites, shops, services that accept crypto
  • Bitcoin Bookmarks-directory for premium crypto websites sorted by quality
  • Lightning Network Stores - directory for stores that accept bitcoin through the lightning network

Automated Exchanges

Peer to Peer Exchanges

  • Haveno Reto [Tor] - Haveno (pronounced ha‧ve‧no) is an open source platform to exchange Monero for fiat currencies like USD, EUR, and GBP or other cryptocurrencies like BTC, ETH, and BCH.
  • Bisq - buy and sell bitcoin or monero for fiat using the Bisq peer-to-peer network
  • Robosats [Tor]- a peer to peer exchange for converting bitcoin to national currencies via lightning hold invoices
  • HodlHodl - global peer to peer bitcoin trading platform

Peer to Peer Crypto Marketplaces and Freelancing

  • XMRBazaar - a monero marketplace for advertising goods and services that has a non-custodial escrow system so that both buyer and seller are sure the money is actually there
    • username: beta
    • password: tester
  • TukanMarket - a bitcoin marketplace for advertising goods and services
  • Bitcoin P2P Marketplace - a bitcoin P2P marketplace telegram channel
  • Monero Market - a reddit marketplace for buying and selling items with Monero
  • Microlancer - a freelancing platform designed for quick milestones and secure escrowed payments using the lightning network

Crypto VPS & Domain Services

  • 1984 - high quality web hosting and VPS service provider that respects and protects the civil and political rights of customers
  • Incognet [Tor] - privacy respecting web host and VPS provider
  • Njalla [Tor] - anonymous domain name registrar and VPS provider

Crypto VPN Services

  • Mullvad [Tor] - a Sweden-based VPN provider with a long-standing reputation for privacy and efficiency
  • IVPN - a Gibraltar-registered service that has been preserving customers privacy since 2009

Crypto Credit Cards

  • FCF Pay - Swap cryptocurrencies for virtual prepaid crypto debit gift cards
  • Ezzocard - purchase virutal prepaid cards that work anywhere in the world
  • Pay with Moon - bitcoin/lighting backed virtual credit cards
  • The Bitcoin Company - buy Visa cards, gift cards, phone top-ups, and more

Crypto Gift Cards

  • CardCoins - convert prepaid gift cards into digital currency at over 80,000 locations nationwide
  • Cake Pay - buy gift cards and related products with virtual assets for use at millions of merchants worldwide

Crypto eSim Providers

  • SilentLink [Tor] - a global mobile and phone number provider for eSIM-compatible smartphones

Crypto SMS Providers

  • JMP - allows you to send and receive text messages, pictures, phone calls, and voicemails using a Jabber (XMPP) client
  • TextVerified- SMS verficiation service that accepts Crypto
  • SMSPVA - offers a large list of SMS verification numbers you can rent with BTC
  • JuicySMS - verify online accounts with temporary real phone numbers
  • SMS4Sats [Tor] - offers SMS verification numbers online

Notable Git Projects

Mirrors & Collections

  • awesome-mirrors [Tor] - a curated collection of resources and awesome git repos
  • awesome-piracy [Tor] - a curated list of awesome warez and piracy links
  • alternative-front-ends [Tor] - alternative open source front-ends for popular internet platforms
  • awesome-privacy [Tor] - a curated list of services and alternatives that respect your privacy because PRIVACY MATTERS
  • farside [Tor] - A smart redirecting gateway for various frontend services

Crypto & Blockchain

Security, Privacy & Anonymity

  • KryptEY [Tor] - Android keyboard for secure E2EE communication through the signal protocol in any messenger. Communicate securely
  • blue-merle [Tor] - enhance anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
  • mat2-web [Tor] - A web version of mat2
  • into-the-crypt [Tor] - the art of anti-forensics
  • firefox-user.js [Tor] - a comprehensive user.js template for configuration and hardening
  • thunderbird-user.js - comprehensive user.js template for configuration and hardening
  • shaker [Tor] - unman's collection salt stack scripts for Qubes OS
  • qusal [Tor] - Salt Formulas for Qubes OS

Hardware, Firmware & Device Security

  • portapack-mayhem [Tor] - custom firmware for the HackRF+PortaPack H1/H2
  • tillitis-key [Tor] - board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key

Operating Systems & Platforms

Alternative & Decentralized Platforms

Infrastructure, Kernel & Memory

  • constellation [Tor] - constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing
  • EndGame v3 [Tor] - onion service DDOS prevention front system
  • hardened_malloc [Tor] - hardened memory allocator designed for modern systems
  • plague-kernel [Tor] - minimal linux kernel for a reduced attack surface

Reference & Command Line Resources

Networking & Distributed Systems

  • farside [Tor] - A smart redirecting gateway for various frontend services
  • mat2-web [Tor] - A web version of mat2
  • darknet-lantern [Tor] - a minimalistic Peer to Peer Decentralised Search Engine for the Darknet
  • 4get [Tor] - 4get is a proxy search engine that doesn't suck

Archives

  • annas-archive [Tor] - the worlds largest open-source open-data library. mirrors sci-hub, library genesis, z-library, duxiu, and more. 51,064,327 books, 98,551,617 papers — preserved forever.
  • red-arch [Tor] - The goal of this project is to provide a framework for archiving websites and social media - with a particular focus on subreddits - and creating compilations of information in ways that are very easy for non-tech-savy people to consume, copy, and distribute.
  • snowdenarchive [Tor] - A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden
  • 911-truth-resources [Tor] - A curated selection of 911 truth resources

Adversarial Frameworks

Decentralized Messaging, Communications, and Radio

  • GhostNet [Tor] - a collection of communications networks set up to allow users around the world to exchange information without relying on pre-established infrastructure
  • TC2-BBS-mesh [Tor] - A BBS server for Meshtastic for posting bulletins, sending mail to users, and channel directory
  • TC2-APRS-BBS [Tor] - This is the TC²-BBS for APRS. The system allows for basic mail messages for specific users and bulletin boards
  • Reticulum [Tor] - The cryptography-based networking stack for building unstoppable networks with LoRa, Packet Radio, WiFi and everything in between
  • LXMF [Tor] - A universal, distributed and secure messaging protocol for Reticulum
  • Sideband [Tor] - LXMF client for Android, Linux and macOS allowing you to communicate with people or LXMF-compatible systems over Reticulum networks using LoRa, Packet Radio, WiFi, I2P, or anything else Reticulum supports.
  • NomadNet [Tor] - Off-grid, resilient mesh communication with strong encryption, forward secrecy and extreme privacy
  • lxmf_messageboard [Tor] - Simple message board that can be hosted on a NomadNet node, messages can be posted by 'conversing' with a unique peer, all messages are then forwarded to the message board
  • rnsh [Tor] - rnsh is a command-line utility written in Python that facilitates shell sessions over Reticulum networks and aims to provide a similar experience to SSH.