Privacy

  • If You Must Use Signal, Use Molly
    If You Must Use Signal, Use Molly
    While I’m critical towards the Signal messenger, I understand that network effects are strong and even though many people would much rather prefer a different platform, it’s not easy to get friends and family onto something better. In this brief write-up, I’ll introduce an alternative Signal client to make using Signal at least slightly less troublesome.
  • Hardened Gentoo with Full Disk Encryption on the Star Labs StarBook Mk VI
    Hardened Gentoo with Full Disk Encryption on the Star Labs StarBook Mk VI
    A brief guide on installing Gentoo Linux with Full Disk Encryption and the hardened profile, with SELinux, on the Star Labs StarBook Mk VI.
  • Run a Nostr Relay as Tor Hidden Service on OpenBSD
    Run a Nostr Relay as Tor Hidden Service on OpenBSD
    Let’s set up and run our own “private Twitter” on Nostr, a simple, open protocol that enables truly censorship-resistant publishing on the web!
  • A World without Passports
    A World without Passports
    According to my analytics dashboard, there’s a 70% chance you’re reading this on your phone. Maybe at home, or maybe while commuting to work, using your mobile data connection, for which you’ve probably signed up on a mobile contract. A contract for which you had to prove that you are you, likely by showing your national ID or passport. A contract for which you have to pay regularly, probably using a bank account that you also had to identify yourself for upon opening.
  • An Overview of Privacy-Focused, Decentralized Instant Messengers
    An Overview of Privacy-Focused, Decentralized Instant Messengers
    An overview of privacy-focused, decentralized, open source alternatives to popular non-free spyware instant messengers like WhatsApp, Telegram, Signal, Viber, Facebook Messenger, Skype, and Apple iMessage.
  • How Do You Trust That Your Personal Machine Is Not Compromised?
    How Do You Trust That Your Personal Machine Is Not Compromised?
    A while ago I stumbled upon a simple yet surprisingly interesting question on Hacker News, which seemed to have some people (re-)evaluate their current setups and look for ways to improve. Hence I figured that it might be an interesting subject to cover.