Resources
Curated directory of tools, guides, and references for privacy, anonymity and security research.
Wiki Articles
In-depth guides from our knowledge base covering anonymity networks, encryption, operational security and privacy tools.
Network
Installation, configuration, bridge relays, pluggable transports, security levels, and common pitfalls. Everything you need to browse anonymously with the Tor Browser.
Protocol
Circuit construction, relay selection, cell encryption, directory authorities, and the cryptographic handshakes that establish anonymous connections through the Tor network.
Network
Garlic routing, unidirectional tunnels, NetDB, eepsites, and how I2P compares to Tor as an alternative anonymous overlay network.
Privacy
DNS-over-HTTPS, DNS-over-TLS, DNSCrypt configuration, leak testing, and choosing trustworthy resolvers to stop ISP surveillance.
Encryption
GnuPG key generation, encryption, decryption, digital signatures, Web of Trust, and practical PGP usage for secure darknet communication.
Crypto
Ring signatures, stealth addresses, RingCT, Dandelion++ propagation, and why Monero is the preferred privacy coin over Bitcoin.
OS
USB installation, persistent encrypted storage, built-in Tor routing, RAM wipe on shutdown, and the full Tails security workflow.
OS
Two-VM isolation architecture, VirtualBox and KVM installation, Tor gateway configuration, and workstation hardening for leak-proof anonymity.
Security
Five-step OPSEC process, threat identification, compartmentalization, behavioral discipline, and real case studies of critical OPSEC failures.
Security
Asset identification, adversary profiling, attack surface enumeration, STRIDE and DREAD frameworks, and building a personal security plan.
Privacy
Evaluating VPN logging policies, independent audits, jurisdictional analysis, warrant canaries, and why VPN alone is not enough for anonymity.
Privacy
Canvas, WebGL, AudioContext fingerprinting, font enumeration, Tor Browser's uniform fingerprint approach, and defeating cross-site tracking.
Tools
Signal, Session, Briar, and Ricochet Refresh evaluated across encryption strength, metadata protection, decentralization, and threat model suitability.
Tools
Stripping EXIF, GPS, author data from images, documents and PDFs using MAT2, ExifTool, and OS utilities to eliminate digital footprints.
OS
Kernel sysctl hardening, AppArmor and SELinux, LUKS encryption, iptables and nftables, SSH lockdown, audit logging, and process sandboxing.
History
From cypherpunk manifestos and anonymous remailers to Freenet, Tor, Silk Road, and the modern darknet ecosystem -- a complete historical timeline.
External Tools and Software
Open-source privacy software and anonymity tools from trusted organizations and developers.
Network
Tor Project
Official Tor Browser download, relay documentation, and the Tor network's core infrastructure. The foundation of anonymous browsing.
torproject.org
OS
Tails
The amnesic incognito live system. Boot from USB, route everything through Tor, leave no traces. Official downloads and documentation.
tails.net
OS
Whonix
Two-VM anonymity architecture with dedicated Tor gateway. Comprehensive wiki, KVM and VirtualBox images, security documentation.
whonix.org
Guide
Privacy Guides
Community-driven recommendations for privacy-respecting tools. Transparent evaluation criteria for VPNs, email, browsers, and more.
privacyguides.org
Advocacy
Electronic Frontier Foundation
Digital rights advocacy, Surveillance Self-Defense guides, legal analysis of privacy legislation, and tools like HTTPS Everywhere.
eff.org
Security
Surveillance Self-Defense
EFF's practical guide to protecting yourself from surveillance. Threat modeling, secure communication, device encryption, and safe browsing.
ssd.eff.org
Messaging
Signal
Gold standard for encrypted messaging. Open-source Signal Protocol with forward secrecy and deniable authentication. Desktop, iOS and Android.
signal.org
Messaging
Session
Decentralized, onion-routed messenger requiring no phone number. End-to-end encrypted with metadata minimization built in.
getsession.org
Messaging
Briar
Peer-to-peer encrypted messenger over Tor, Wi-Fi, or Bluetooth. Designed for activists and journalists in high-threat environments.
briarproject.org
Tools
KeePassXC
Cross-platform offline password manager. AES-256 and Twofish encryption, TOTP support, browser integration, no cloud dependency.
keepassxc.org
Tools
VeraCrypt
Disk encryption software supporting hidden volumes and plausible deniability. Successor to TrueCrypt with security audit history.
veracrypt.fr
Network
OnionShare
Share files, host websites, and chat anonymously using the Tor network. Creates temporary onion services with no server required.
onionshare.org
Open-Source Repositories
Key GitHub projects powering the privacy and anonymity ecosystem.
Code
torproject/tor
Core Tor daemon implementing onion routing, circuit construction, and relay software. Written in C.
github.com
Code
Signal Protocol
Open-source end-to-end encryption protocol with forward secrecy and deniable authentication. Used by Signal, WhatsApp, and others.
github.com
Crypto
monero-project/monero
Official Monero implementation with ring signatures, stealth addresses, and RingCT for untraceable cryptocurrency transactions.
github.com
Tools
OnionShare
Securely share files, host websites, and chat over Tor. Developed by Micah Lee of The Intercept. Python-based with cross-platform GUI.
github.com
Network
OnionBalance
Load balancing for Tor onion services. Distribute a single .onion address across multiple backend servers for redundancy and scalability.
github.com
Tools
MAT2
Metadata Anonymisation Toolkit for removing identifying metadata from images, documents, PDFs, audio and video files.
github.com
Educational Channels
Video content creators covering privacy, security and anonymity topics.
Video
Computerphile
University-level computer science videos covering cryptography, networking, security, and privacy concepts with expert explanations.
youtube.com
Video
Mental Outlaw
Privacy-focused tech content covering Linux, open-source tools, VPNs, anonymity networks, and digital rights news.
youtube.com
Video
The Hated One
In-depth analysis of surveillance, privacy tools, VPN comparisons, Tor usage, and digital freedom advocacy.
youtube.com
Research and Academia
Academic institutions and organizations publishing peer-reviewed research on anonymity networks, cryptography and darknet ecosystems.
Research
USENIX Security
Premier security symposium with peer-reviewed papers on Tor de-anonymization, hidden service security, and cryptocurrency analysis.
usenix.org
Research
RAND Corporation
Policy research on darknet commerce, vendor migration patterns, and the socioeconomic impact of anonymous marketplaces.
rand.org
Advocacy
Freedom of the Press
Operates SecureDrop for anonymous whistleblowing, advocates for press freedom, and develops tools protecting journalist-source communication.
freedom.press