Official Onion URL: https://catharibrmbuat2is36fef24gqf3rzcmkdy6llybjyxzrqthzx7o3oyd.onion/
Resources -- Privacy Tools, Guides and External Links | Catharsis Market Wiki

Resources

Curated directory of tools, guides, and references for privacy, anonymity and security research.

Wiki Articles

In-depth guides from our knowledge base covering anonymity networks, encryption, operational security and privacy tools.

Network
The Complete Tor Browser Guide
Installation, configuration, bridge relays, pluggable transports, security levels, and common pitfalls. Everything you need to browse anonymously with the Tor Browser.
Tor, Browser, Configuration Read
Protocol
How Onion Routing Works
Circuit construction, relay selection, cell encryption, directory authorities, and the cryptographic handshakes that establish anonymous connections through the Tor network.
Tor, Cryptography, Circuits Read
Network
I2P: The Invisible Internet Project
Garlic routing, unidirectional tunnels, NetDB, eepsites, and how I2P compares to Tor as an alternative anonymous overlay network.
I2P, Garlic Routing, Eepsites Read
Privacy
DNS Privacy and Encrypted DNS
DNS-over-HTTPS, DNS-over-TLS, DNSCrypt configuration, leak testing, and choosing trustworthy resolvers to stop ISP surveillance.
DNS, DoH, DoT, DNSCrypt Read
Encryption
PGP Encryption: Theory to Practice
GnuPG key generation, encryption, decryption, digital signatures, Web of Trust, and practical PGP usage for secure darknet communication.
PGP, GnuPG, Signatures Read
Crypto
Monero and Cryptocurrency Privacy
Ring signatures, stealth addresses, RingCT, Dandelion++ propagation, and why Monero is the preferred privacy coin over Bitcoin.
Monero, XMR, Ring Signatures Read
OS
Tails OS: Amnesic Live System
USB installation, persistent encrypted storage, built-in Tor routing, RAM wipe on shutdown, and the full Tails security workflow.
Tails, Live OS, Amnesic Read
OS
Whonix Setup: Gateway and Workstation
Two-VM isolation architecture, VirtualBox and KVM installation, Tor gateway configuration, and workstation hardening for leak-proof anonymity.
Whonix, VM, Isolation Read
Security
OPSEC Fundamentals
Five-step OPSEC process, threat identification, compartmentalization, behavioral discipline, and real case studies of critical OPSEC failures.
OPSEC, Compartmentalization Read
Security
Threat Modeling: Know Your Adversary
Asset identification, adversary profiling, attack surface enumeration, STRIDE and DREAD frameworks, and building a personal security plan.
Threats, Risk, Planning Read
Privacy
VPN No-Logs: Claims vs. Reality
Evaluating VPN logging policies, independent audits, jurisdictional analysis, warrant canaries, and why VPN alone is not enough for anonymity.
VPN, No-Logs, Jurisdiction Read
Privacy
Browser Fingerprinting Defense
Canvas, WebGL, AudioContext fingerprinting, font enumeration, Tor Browser's uniform fingerprint approach, and defeating cross-site tracking.
Fingerprinting, Tracking Read
Tools
Secure Messaging Compared
Signal, Session, Briar, and Ricochet Refresh evaluated across encryption strength, metadata protection, decentralization, and threat model suitability.
Signal, Session, Briar Read
Tools
Metadata Removal Guide
Stripping EXIF, GPS, author data from images, documents and PDFs using MAT2, ExifTool, and OS utilities to eliminate digital footprints.
EXIF, MAT2, ExifTool Read
OS
Linux Security Hardening
Kernel sysctl hardening, AppArmor and SELinux, LUKS encryption, iptables and nftables, SSH lockdown, audit logging, and process sandboxing.
Linux, Kernel, Firewall Read
History
History of the Dark Web
From cypherpunk manifestos and anonymous remailers to Freenet, Tor, Silk Road, and the modern darknet ecosystem -- a complete historical timeline.
Cypherpunks, Silk Road Read

External Tools and Software

Open-source privacy software and anonymity tools from trusted organizations and developers.

Network
Tor Project
Official Tor Browser download, relay documentation, and the Tor network's core infrastructure. The foundation of anonymous browsing.
torproject.org
OS
Tails
The amnesic incognito live system. Boot from USB, route everything through Tor, leave no traces. Official downloads and documentation.
tails.net
OS
Whonix
Two-VM anonymity architecture with dedicated Tor gateway. Comprehensive wiki, KVM and VirtualBox images, security documentation.
whonix.org
Guide
Privacy Guides
Community-driven recommendations for privacy-respecting tools. Transparent evaluation criteria for VPNs, email, browsers, and more.
privacyguides.org
Advocacy
Electronic Frontier Foundation
Digital rights advocacy, Surveillance Self-Defense guides, legal analysis of privacy legislation, and tools like HTTPS Everywhere.
eff.org
Security
Surveillance Self-Defense
EFF's practical guide to protecting yourself from surveillance. Threat modeling, secure communication, device encryption, and safe browsing.
ssd.eff.org
Messaging
Signal
Gold standard for encrypted messaging. Open-source Signal Protocol with forward secrecy and deniable authentication. Desktop, iOS and Android.
signal.org
Messaging
Session
Decentralized, onion-routed messenger requiring no phone number. End-to-end encrypted with metadata minimization built in.
getsession.org
Messaging
Briar
Peer-to-peer encrypted messenger over Tor, Wi-Fi, or Bluetooth. Designed for activists and journalists in high-threat environments.
briarproject.org
Tools
KeePassXC
Cross-platform offline password manager. AES-256 and Twofish encryption, TOTP support, browser integration, no cloud dependency.
keepassxc.org
Tools
VeraCrypt
Disk encryption software supporting hidden volumes and plausible deniability. Successor to TrueCrypt with security audit history.
veracrypt.fr
Network
OnionShare
Share files, host websites, and chat anonymously using the Tor network. Creates temporary onion services with no server required.
onionshare.org