Pinterest Hidden Image

Privacy Guide

Step-by-Step Complete Guide

Short. Fast. Direct. Actionable.
The Ultimate collection of all the human knowledge from the most privacy•conscious people through all history, made applicable for the people living in year 2023.

Here in this Guide, you will find everything you are interested in, made fast, simple and easy for you.
You will feel like a kid in a candy store. Just walk in and pick what you like and go enjoy.

There are also links to useful websites. Zero affiliate. This Guide does not sell anything. A great effort has been made to not even mention any company or product with the purpose of pointing what not to do, due to moral and legal reasons.

In the end, every person can write with the purpose of sharing and contributing to this Guide.
If you find a software/service that is better, more private, or if you find out that some recommended service is compromised, please share so we will update the Guide immediately.
We are all in this together!



  1. Some people choose to live in the country/jungle with their family. They plant/raise and hunt for their food. They raise their kids as they see fit. They live as much as possible completely separated from any government. Is this what you want? It is possible. Just say goodbye to all (or almost all) technology and conveniences.

  2. Some people choose to live within the society. They and their families enjoy all the modern life conveniences but also with rights, come responsibilities and privacy loss. At this level, they use as least technology as possible, but just enough to be able to communicate with the rest of the civilization.

  3. Some people don’t care at all about their privacy. They put a chip in their hand, and later in their brain. They make all payments just by thinking about it or swiping their palm. They have as many electronic devices as possible in their home (which they usually rent). They have as much comfortable life as possible. It is their choice. But, this way, they don’t have ANY privacy, and not even their own thoughts are private. If this is your choice, you don’t have any use of this Guide and we wish you all the best.

  • What you think

  • What you speak (home, work & streets)

  • What you do (home, work & streets)

  • What you buy

  • With who you socialize

  • Which persons you value most (blackmailing potential)

  • Which private information you value most (blackmailing potential)

  • Do you have the ability to protect yourself and your family (your threat level)

The UKUSA Agreement is an agreement between 5 countries (5 Eyes) to cooperatively collect, analyze, and share intelligence. The 5 eyes members monitor each other’s citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The 5 eyes alliance also cooperates with third-party countries to share intelligence, together forming the 14 eyes.

  • 5 Eyes:
    Australia, Canada, New Zealand, United Kingdom & United States of America

  • 9 Eyes:
    Denmark, France, Netherlands & Norway

  • 14 Eyes:
    Belgium, Germany, Italy, Spain & Sweden

  • Other: Israel, Japan, Singapore, Thailand, China, India, Kazakhstan, Kyrgyzstan, Pakistan, Russia, Tajikistan, Uzbekistan & South Korea

Which countries require individuals to turn over encryption keys to law enforcement conducting criminal investigations.

  • Key disclosure laws apply:
    Antigua and Barbuda, Australia, France, India, Ireland, Norway, Russia, South Africa & United Kingdom

  • Key disclosure laws may apply:
    Belgium, Estonia, Finland, New Zealand (unclear), Netherlands & United States

  • Key disclosure laws don’t apply:
    Canada, Czech Republic, Germany, Iceland, Italy, Poland, Sweden (proposed) & Switzerland

  1. IceCat
    Java is disabled by default. No spyware.
    Many websites will be broken due to the JavaScript being turned off, but this is the safest way.
    Useful links: Link 1, Link 2, Link 3, Link 4.

  2. LibreWolf
    Firefox fork that is hardened and stripped from spyware.
    Main installations link.
    Recommended for Linux Flatpak link.
    Others: OpenBSD, Windows, macOS.

  3. Pale Moon
    After some tweaks, it is clean of spyware.
    Own versions of: uBlock and uMatrix

This makes the browsers as private and safe as possible.
But the disabled WebRTC will result in us not being able to use some Video Chat software.
Type in the address bar: about:config
Make all these values as they are here on the screen:

  • media.peerconnection > False

  • media.peerconnection.turn.disable > True

  • > False

  • media.peerconnection.identity.timeout > 1

  • media.peerconnection.enabled > False
  • privacy.firstparty.isolate > True

  • privacy.resistFingerprinting > True

  • privacy.trackingprotection.fingerprinting.enabled > True

  • privacy.trackingprotection.cryptomining.enabled > True

  • privacy.trackingprotection.enabled > True

  • browser.send_pings > False

  • browser.urlbar.speculativeConnect.enabled > False

  • dom.event.clipboardevents.enabled > False

  • media.eme.enabled > False

  • media.gmp-widevinecdm.enabled > False

  • media.navigator.enabled > False

  • network.cookie.cookieBehavior > 1

  • network.http.referer.XOriginPolicy > 2

  • network.http.referer.XOriginTrimmingPolicy > 2

  • webgl.disabled > True

  • browser.sessionstore.privacy_level > 2

  • beacon.enabled > False

  • browser.safebrowsing.downloads.remote.enabled > Fake

  • network.dns.disablePrefetch > True

  • network.dns.disablePrefetchFromHTTPS > True

  • network.predictor.enabled > False

  • network.predictor.enable-prefetch > False

  • network.prefetch-next > False

  • network.IDN_show_punycode > True

  • network.http.sendRefererHeader > 0
  • extensions.blocklist.enabled > False

  • > False

  • security.OCSP.GET.enabled > False

  • security.OCSP.require > False

  • security.OCSP.enabled > 0

  • geo.enabled > False

  • Provide search suggestions > OFF

  • Play DRM content > OFF

  • Applications > Action > Always ask (each individually)

  • Send a signal that you don’t want to be tracked > ON

  • When using the location bar, suggest: History > OFF, Open tabs > OFF, Bookmarks > ON

  • History: Use custom settings. When browser closes CLEAR: Browsing and Download history, Active Logins, Form & Search History, Cookies, Cache, Site Preferences, Offline Website Data

  • Enhanced tracking protection. Custom. Choose which trackers and scripts to block. Cookies (All third-party cookies). Block Cryptominers. Block Fingerprinters.

  • Warn me when sites try to install add-ons > ON

  • Remember logins for sites > OFF

  • Automatically fill in log-in details > OFF

  • Use a master password > OFF

  • Search for text when I start typing > OFF

  • Check my spelling as I type > OFF

  • Browser updates > Check for updates, but let me choose whether to install them

  • Automatically update > Search Engines > ON

  • Certificates > Ask me every time > ON

  • Permissions: Location > Block new requests, Camera > Block new requests, Microphone > Block new requests, Virtual Reality > Block new requests

  • Data collection: All > OFF

  • Security > Deceptive Content and Dangerous Software Protection > Block dangerous and deceptive content > OFF
    Yes, this is OFF. It sends all data to third-party data centers. Just do not click on links you do not know and you won’t have any problems.
    The extensions uBlock Origin &/or uMatrix will protect you from most BS. But just in any case do not click on weird links.

You can use these browsers and make sure to not disable WebRTC.
Warning: WebRTC can reveal your real IP address even if you are using VPN.

  1. Ungoogled-Chromium
    A fork of Chrome with all spyware removed.
    For Linux we recommend the Flathub version.

  2. Brave
    A fork of Chromium. It is good for normies.

  • Tor Browser
    A Firefox fork that uses the Tor Network.
    For max anonymity: Hardened hardware + OS like Tails or Whonix + Connected on some public wifi network. Please don’t do anything illegal, because even with these steps some people still have been caught.

None are recommended.
It is very hard to harden those devices.
Usually, there is either software or hardware that logs all data.
Just use a laptop or PC for browsing and phones for calls with normies.
BUT, if you have to use one. Then Mull is the most private browser.

  • uBlock Origin
    A wide-spectrum blocker for browsers with a simple point-and-click interface to allow users to filter and block server requests, domains, scripts, and more. By default, it blocks ads, trackers and malware sites.

  • uMatrix
    A point-and-click matrix-based firewall, with many privacy-enhancing tools. Point and click to forbid/allow any class of requests made by your browser. Use it to block scripts, iframes, ads, social media trackers, etc.
    The creator stopped updating it in 2021. But still it is the best of all privacy extensions. The people with most tech skills can use it together with uBlock by blocking all third-party categories except CSS, Images & Media, and then let uBlock filter the leftovers.

  • Don’t torrent over Tor because P2P apps ignore Tor’s proxy settings and disclose your real IP.

  • Don’t install browser plugins in Tor to bypass its limitations. There’s a reason why Flash and Quicktime are disabled, they can reveal your IP address.

  • Only use HTTPS versions of sites.

  • Close all other browsers before launching Tor.

  • When downloading files through Tor, don’t open them while Tor is still running, especially the .docx and .pdf. They can contain internet sources, and the program you use to open them can reveal your real IP address.

  • You can use Tor and VPN together for improved privacy and security. Some VPNs go as far as embedding the Tor-through-VPN configuration in their clients.

  • If you are very paranoid, you can install Tor as a Flatpak and use the app Flatseal to turn on the network ability only when you are planning to use it.

  1. Qubes OS
    Based on Fedora and similar in function as Tails. It uses the concept of compartmentalization and virtual machines to maintain a secure workspace. Though, it takes modern hardware to run smoothly. Highly recommended for security-focused users.

  2. Hardened BSD
    A security-focused FreeBSD fork. HardenedBSD prioritizes exploit mitigation and cryptography.

  3. Open BSD
    A security-focused BSD, installation is more difficult than TrueOS, so reading is needed. Though, security is top-notch compared to other Linux and BSD distributions.

  4. Debian
    Stable and easy to work with. Highly recommended for advanced users.

  5. Linux Mint Debian Edition
    A fork of Debian which is simple to use. Recommended for beginners.

  1. PureOS on Librem5 (currently not ready for mass market)

  2. Any private distro on PinePhone (currently not ready for mass market)

  3. /e/ on Fairphone

  4. LineageOS

  1. Coreboot

  2. Libreboot

BIOS advice:

  • Put a password in the BIOS with the purpose of preventing a change on that level.

  • You will have to make the first installation and updates online so your current IP address will be visible. For this, you can use VPN placed on your Router.

  • All work should be done Offline. So avoid using Software that requires a 24/7 connection with the internet.

  • All updates should be downloaded from the company’s website, stored on a USB and feed into the OS offline through the USB.

  • There is a Software alternative for every mainstream Software that you “feel” that you must use.
    Check the section: Open Source Software below.

  • Fewer apps

  • Fewer devices

  • Less online / More offline

  • If devices/software are used, they must be privacy-focused products

  • Do not share through your devices anything you don’t wish the public to know. There is no way of knowing if your devices are bugged at the hardware level. So use your devices as least as possible.

  1. System 76 laptops
    Laptops with disabled Intel ME and reasonable prices.

  2. Purism laptops
    Laptops with disabled Intel ME. Has kill switches which cut the power to the Mic, Camera, Wireless & Bluetooth.

  3. Starlabs laptops

  1. No Phone (live in a jungle if you want privacy).

  2. Librem5
    Runs on PureOS. Has kill switches which cut the power to the Mic, Camera, Wifi, Bluetooth and Cellular.
    Currently not ready for mass market.

  3. PinePhone
    Runs on many Linux Distros. Very cheap. The hardware will get the job done. Also has kill switches which are on the inside, next to the battery.
    Currently not ready for mass market.

  4. Fairphone /e/

  5. “Dumbphone”
    No support for Bluetooth, Wifi, Cellular internet, GPS. Only support calls. When not in use, place it back in the Faraday bag. These phones are very hard to find. If you find one, it is even harder to find batteries for it. And even if you find both, it probably won’t be supported by the cellular networks.

  1. F-Droid is an installable catalog of FOSS applications for the Android platform.

  2. Directly from the website of the creator if there is an apt image. Make sure that you trust the creator. Try to have as few apps installed as possible on your devices.

  3. Aurora Store – A fork of the Yalp Store. Usually, people first install F-Droid, then they download the Yalp store APK, which allows them to download apps from the Google Play store directly as APK files.

  • OTP Authenticator
    Two-factor authenticator for Android (F-Droid)

  • andOTP
    Two-factor authenticator for Android

  • Tofu
    Two-factor authenticator for iOS

  1. Automatic Watch
    Buy it once and it is powered by the movement of your hand.

  2. Battery-powered Watch
    The kind of watches that only show the time and nothing more.

  1. IP tables
    A bit hard to learn but excellent.
    How to Link1 & Link2

  2. GUFW
    Simple to use. The basic mode is to just disable incoming connections. The advanced mode is to manually disable outgoing connections.

  1. ClamAV
    Receives the virus definitions. Makes the scan offline without sending anything outside. Linux Distros do not have many virus cases because the .exe extension is disabled by default and the majority of users are not noobs so they don’t click on suspicious links.
    Install ClamAV and a tool to send email notifications: apt-get update && apt-get install clamav clamav-freshclam heirloom-mailx

    Be sure that the virus definition will be updated with: service ClamAV-freshclam start
    To do a manual update of the virus definitions: freshclam -v

  2. Chrootkit
    Linux Rootkit Scanner: apt-get install chrootkit

  3. Lynis
    Universal security auditing tool and rootkit scanner.


  1. Self-host Searx
    Searx is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users.

  2. Use Searx on other people’s hosted servers:
    Option 1, Option 2.

  3. BraveSearch
    Slightly better privacy than DuckDuckGo.

  4. DuckDuckGo
    First was on AWS servers. Now runs on Microsoft servers. Some of its code is open-source. Company based in USA. Advantage over Searx: Gives better Images search. During years, its’ privacy is more and more questioned.

  1. Run your own mail server. Expensive, risky & requires knowledge.
    A. Rent a VPS with a privacy-focused hosting company. Then install CentOS (with CWP, DA, CP), Debian, Ubuntu, or others. With all these web panels there is an automated email setup.
    B. With Ubuntu or others options are:
    Mail-in-a-Box – is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for users to set up their own mail server.
    Mailcow – is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, a web-based administration with 2FA support. Plus link.
    More guides: Link 1 and Link 2

  2. Posteo
    Anonymous payments are supported. Based in Germany. Paid options only.

  3. Tutanota
    No anonymous payments are supported currently, only credit cards and Paypal. Based in Germany. Free and paid options.

  1. If possible avoid using them. It is best to use the email through a secure hardened web browser directly through the website of the company.

  2. Thunderbird – Free, Open-source and secure. Automatically disables the loading of external resources for security reasons.


  1. Briar
    Encrypted peer-to-peer instant messenger. Unlike traditional messaging apps, Briar doesn’t rely on a central server and messages are synchronized directly between the users’ devices.

  2. XMPP clients:
    Aenigma – Secure-by-default XMPP server installer
    Prosody – Modern XMPP communication server
    Ejabberd – Robust, scalable and extensible real-time platform XMPP server
    ChatSecure – XMPP client for android
    Dino – Modern XMPP client for GNOME
    Psi – Cross-platform XMPP client
    Conversations – A Jabber/XMPP client for Android 4.0+ smartphones.
    Gajim – A fully-featured XMPP client

  3. Jami
    Encrypted instant messaging and video calling software. All communications are E2EE using TLS 1.3 and never stored elsewhere than on user’s devices, even when TURN servers are used.

  4. Tox
    Free and open-source with no central servers.

  5. Signal
    Most private when it is used on a laptop/PC that runs on a secure Linux Distro. Connected through a VPN or Tor. When Signal asks for a phone number use a temporary phone number through the many free services. Password protection activated. Then you can use Signal as anonymously as possible. There is also a FOSS on Github.

  6. Retroshare
    Secure communications and file sharing with friends.

  7. Nextcloud
    Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.

  8. Jitsi Meet
    Voice (VoIP), video conferencing and instant messaging application with optional E2EE. Can be used from a browser, in desktop applications, or on smartphones. Requires WebRTC. The best option is to run the server yourself.

    A self-hostable open-source platform for communication.

  • Use as least as possible Social Networks, preferably ZERO.

  • If you use them, share as least private information as possible.

  • If possible, connect from a VPN or Tor.

  • If any messaging is done through them do not share any private information there also.

  • If any images and/or videos are shared, strip them from metadata before uploading. Plus, do not let any image/video show your private address or other private info.

  • Use different email addresses/aliases for each Social Network. Also create different personalities (Ex: John likes skydiving, Jonas likes fishing).

  • Always avoid giving a phone number.

  • If 2FA is used it is best to be used with a USB key.

  • Avoid giving your real name.

  • Choose a strong password that contains 20-30 letters, numbers & characters.

  • Change the privacy settings to the most private options possible.

The difference is that the majority spy and censor their users more and some rare ones do it less.
If the creators of the platform do not spy on their users, the hosting company will try to do it. If the hosting company isn’t doing it, it will get bombarded with court orders non-stop from agencies until it must ditch the social network from its servers or start logging all data.
Even if the 2 factors are fulfilled, by a miracle, the majority of the users are using spyware devices so everything they do is recorded anyway.
The people who know how to be private on social media, either run a company or have ditched social networks ages ago.

  • Aether
    Aether is a free and open-source decentralized social news aggregator with a built-in voting system

  • Tildes
    Tildes is a web-based self-hostable online bulletin board

  • Raddle
    Raddle is a public Postmil instance focused on privacy and anti-censorship

  • Lemmy
    Self-hostable link aggregator intended to work in the Fediverse


  1. Self-host your own VPN. More expensive and requires knowledge.
    Rent VPS from a privacy-focused hosting company, install privacy-focused Linux server Distro, install admin panel (optional), install OpenVPN or WireGuard and secure it hardcore.

  2. IVPN
    Company based in Gibraltar. Anonymous payments supported.

  3. Mullvad
    Company based in Sweden. Anonymous payments supported.

  • VeraCrypt
    Disk Encryption software.

  • eCryptfs
    Is a cryptographic stacked Linux filesystem. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decrypted with the proper key in the Linux kernel transparently embedded in several network-attached storage (NAS) devices.

  • GNU Privacy Guard
    Email Encryption software.

  • 7 Zip
    A free and open-source file archiver. When you archive any file put any password on it. Recommended for sending through cloud storage.

  • Cryptomator
    Free client-side AES encryption for the cloud files. Open-source software.

  1. The best Passwords solution is ZERO software. Use as few services as possible and remember the passwords in your head. If you have too many, type them all on paper and place them in a secret place. Make a backup copy (by hand) and hide it in an even more secret place.

  2. KeePassXC
    Local password manager which keeps everything on your own hardware.

  3. Bitwarden
    Online password manager. It is recommended that you self-host it. It is useful for managing multiple passwords when collaborating with clients and colleagues.


  • MAT2
    Removal of metadata on image, audio, torrent and document file types.

  • ExifCleaner
    Removal of metadata on image, video and PDF documents.


  1. The most private is to go have a beer with your friend and pass him the data on a USB drive.

  2. Nextcloud
    Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.

  3. FreedomBox
    Another self-host option. Send to and from your own server.

  4. Lufi
    Open-source file-sharing software.

  5. Jirafeu
    Open-source file-sharing software.

  6. Syncthing
    Open, trustworthy and decentralized. Synchronizes files between two or more computers in real-time. All computers must be online at the same time because there is no server that is used for storage.
    Or you can run the Syncthing app on a VPS you control, so that it will run 24/7.

  7. OnionShare
    Open-source tool that sends through the Tor Network.

  8. Magic Wormhole
    P2P sending from one computer to another.

  9. Cryptomator
    Free client-side AEC encryption for your cloud files. Open-source software: No backdoors, no registration.

  10. CryptPad
    Free and end-to-end encryption real-time collaboration sharing folders, media, and documents.


  1. Paper
    It is the most private. You write whatever you wish. You control who can see it and you can destroy it anytime you want. Matches and lighters are magical.

  2. If you must use it together with colleagues for work:
    Nextcloud – Store and sync calendars and contacts.
    k5n – PHP-based calendar application.
    EteSync – End-to-end encrypted, cloud backup and synchronization of calendars and contacts.
    Fruux – Contacts and calendaring system.
    DecSync – Synchronize RSS, contacts and calendars.


  1. A regular good old notebook.
    Going old-school is the most private option.

  2. If you must use it together with colleagues for work:
    Joplin – Note-taking, markdown notes, organized with tags & end-to-end encryption.
    Meemo – Simple notes app.
    Turtl – Notes, bookmarks, store documents & store passwords.
    Laverna – Markdown note-taking app focused on privacy.
    Standard Notes – End-to-end encryption on every platform.
    EteSync – Contact, calendars, tasks & notes.
    Org-mode – Notes, Todo lists, planning projects & authoring documents.


  • OpenStreetMap is a great open-source map for PCs.

  • OsmAnd is a free and open-source mobile maps app for both Android and iOS (based on OpenStreetMap data).

  • Maps (F Droid) uses OpenStreetMap (offline).

  • Here WeGo provides good mapping solutions for both PCs and mobile devices with their app.

  • MapHub is also based on OpenStreetMap data and it does not collect locations or user IP addresses.

  • uMap lets you create maps with OpenStreetMap layers and embed them on your website. Download Link.

  • Marble is a virtual globe and world atlas.


  • Invidious instances:
    Option 1, more comming soon.

  • NewPipe
    An app for watching Youtube videos on Android devices, available on F-Droid.

  • FreeTube
    An app for watching Youtube videos on Linux, Windows & MacOS devices.
    For Linux we recommend the Flathub version.

  1. PeerTube – Self-host your own videos on your server

  2. Publish on a hosted PeerTube Instance:
    Instances list

  3. Mediagoblin

  4. Bitchute

  • Calibre
    An e-book manager that can view, convert, edit and catalog e-books in all of the major e-book formats.

  • GIMP – The best image editing open-source software

  • Krita – The best Photoshop alternative which is a bit more easier to use than GIMP

  • Excalidraw

  • Inkscape – The best vector image editing open-source software. Adobe Illustrator alternative.

  • Pixlr – Online Photo editor

  • Audacity
    It is recommended to be used as a Flatpack with the network access turned off (with Flatseal), due to the telemetry capabilities.

  • Nextcloud
    Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.

  • LibreOffice
    Full Office suite: Word, Spreadsheet, Presentations, Diagrams, Database, Formula editor, Charts, etc.

  • Mattermost
    Open-source alternative to Slack.

  • CryptPad
    Text, Sheets, Code, Presentations, Pools, Kanban, Whiteboard, Pads, Store files, etc.

  • Etherpad
    Online editor providing collaborative editing in real-time. List.

  • EtherCalc
    EtherCalc is a web spreadsheet.

  • Keikai
    Web spreadsheet software.

    Privacy-oriented blogging platform.

Recommended Email Newsletter software:

  • Run the newsletter directly from your own server (Shared or VPS). Just be careful not to pass the email limits of the server and to not send spam so your server IP address won’t be put on spam lists. The best way to do this is to run ListMonk under your control.

  • If you want to reduce the risk of your VPS being put on spam lists, you can use an external SMTP provider. We don’t know if there are any privacy-focused ones yet. Some of the highest quality providers are: Postmark & ElasticEmail.

Coming soon



  1. Njalla
    Privacy-aware domain registration service based in Nevis. Crypto payments accepted.

  2. More coming soon.

(Some can be used for hosting websites that are immune to censorship)

  • I2P Anonymous Network
    A computer network layer that allows applications to send messages to each other pseudonymously and securely. Includes anonymous web surfing, chatting, blogging and file transfers.

  • The Freenet Project
    Peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information.

  • ZeroNet
    Open, free, and uncensorable websites, using Bitcoin cryptography and BitTorrent network. Not anonymous by default. The users must use a VPN or Tor to connect.

  • RetroShare
    An open-source, cross-platform, secure and decentralized communication platform.

  • GNUnet
    Provides a strong foundation of free software for a global, distributed network that provides security and privacy.

  • Nextcloud
    Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.

  • Tahoe – LAFS
    A free and open decentralized cloud storage system. It distributes your data across multiple servers.

  • CryptPad
    An open-source and end-to-end encrypted real-time collaborative editor that lets you share folders, media and documents.

Recommended website analytics:

  • The majority of web panels have default analytics software. It shows basic things like: number of visitors, top countries, top devices, times of visit, most visited pages, top places from where the traffic is coming, etc. For most startup websites this is enough. Only companies who are running heavy marketing and spending +3k per month have a need for more advanced analytics software.

  • Matomo is an open-source analytics platform that respects the privacy of visitors by anonymizing and truncating visitor IP addresses. Anybody can self-host it on his own servers.

  • Fathom Analytics is also another open-source analytics software. It’s minimal, fast, and lightweight.

  • Open Web Analytics is a free and open-source web analytics framework that lets you stay in control of how you analyze the use of your websites.

  • Ackee is a minimal open-source analytics software.

  • PHP – code it yourself and make it a static website instead of a dynamic website

  • Drupal is a self-hosted website publishing platform

  • Joomla is a self-hosted website publishing platform

  • Wordpress is a self-hosted website publishing platform

  • Grav

  • Sandstorm is a web productivity suite that you can host yourself.

  • Yunohost

  • Cloudron


  1. LibreDNS
    Server location: Germany (Hetzner); Logging: No

  2. More comming soon

  • Unbound
    A validation, recursive, caching DNS resolver, supporting DNS-over-TLS.

  • Dnscrypt-proxy
    A DNS proxy with support for DNSCrypt, DNS-over-HTTPS, and Anonymized DNSCrypt, a relay-based protocol that hides client IP address.

  • Stubby
    An application that acts as a local DNS-over-TLS stub resolver. Stubby can be used in combination with Unbound by managing the upstream TLS connections with Unbound providing a local cache.

  • Nebulo
    An open-source Android client supporting DNS-over-HTTPS and DNS-over-TLS, caching DNS responses, and locally logging DNS queries.

  • DNSCloak
    An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and dnscrypt-proxy options such as caching DNS responses, locally logging DNS queries, and custom blocklists, users can add custom resolvers by DNS stamp.

  1. Monero payments

  2. Cash by mail payments

  3. Regular online payments with companies that do not require your private address and other data

  • It is extremely hard to make online payments anonymous.

  • Companies are legally obliged to prove to the governments that they are dealing with law-abiding citizens and that no illegal activities and money laundering are taking place. That is why most companies require your IP address and personal info if they are going to charge you for your online order.

  • The reason the majority of companies that sell physical products (person to person) by charging by cash and cards don’t grow and start selling online is because setting up online payments is a huge headache.

  • Even when a company sets up online payments, the minimum it must do is to have an account at a real bank (some fintech banks also) and then apply to have a payments processor (at the same or another company). When they do that, it must be connected with the accounting and synced monthly. If there is any suspicious transaction, the company might get audited and have its accounts blocked/closed. These are the headaches the company owner has when he makes the effort to offer online payments to his customers.

  • After a company manages to offer regular online payments, it can try/risk and offer anonymous payments. There are 2 options:
    1. Cash payments by mail – hard to achieve but possible. It is hard to find out the legal requirements and how it will be done with the accounting, and then how to anonymize the identity of each customer but to know what service/product to make available for him. This is much harder for subscription services.
    2. Crypto payments. Bitcoin payments are very hard to make anonymous. The solution is for the customer to use Bitcoin Mixers so that his wallet is harder to identify in auditing. The best so far is Monero because it is designed with anonymity by default. There are a couple of other crypto coins that are trying to do this but so far Monero is the best option. If someday it is hacked there will be a change here. If there are other Monero alternatives they will be noted here as soon as they arrive.

  • The company takes a huge additional responsibility when except just offering the regular online payments it starts to offer anonymous payments. Even if it manages to make it all legit, there is always the risk that the companies that provide them the services for the regular online payments might flag the company as high risk and block their accounts anyway. This might happen even if no suspicious transaction went through them. They have this right because they also are regularly audited by other legal entities and they also must prove that their customers (the companies) are law-abiding companies. Nobody here is the “bad” guy. Everybody is trying to feed their families. It’s just the way the system is designed.

  • One other way for anonymity is: A single person (not a company) to offer his services/products to another person (not a company) and the payment is done through cash by mail or Monero payments. In this way there is no requirement by the one offering services to ask for the identity of the customer, nor to pay taxes, nor to pay for accounting, nor to give refunds (risk for the customer). It is all based on mutual trust. The same principle applies when people do business person to person by barter or trade.

  • In the end, what is the purpose of online purchases? We pay for something and it arrives digitally or by mail. So the easiest way is to always buy legal products and services. This way even if our purchase history is known to everybody we won’t have any troubles. If there are some products/services that are illegal in our countries that were legal before but suddenly changed with a new law (example: legally owning guns and the right to protect your family), then it is best to do the purchase in person in your own town. Or buy the tools which are legal to buy and then make your own device at home. The safest advice is to always abide by the rules. When someday those making the rules turn against you, take your family and move to another country. The best time to leave a country is wayyyy before it goes bust. There are many signs of the degradation of civilization. Just research them and you’ll have that priceless knowledge in your arsenal.

  • If paying with a debit/credit card, make sure that you have the option with your online banking provider to create Virtual Credit Cards. Each is connected with your real physical card. You can create and destroy them with the click of a button. It is great for subscriptions and one-time payments.

  • If you use a debit/credit card contact the bank to increase the length of the PIN number from 4 to 6-8 digits.

  • If you use a debit/credit card always carry it in an RFID blocking wallet. It will protect you from card skimmers.

  • If you use a debit/credit card never open a rewards account.

  • If stores in which you spend money ask for personal info, either shop at another store, either do not give it or give them sudo: Mail, phone, address.

  • Always prefer to checkout as a guest while doing online shopping.

  • Services for connecting your own card and creating virtual cards through them: for USA & for EU (prepaid cards topped up via IBAN).

  • If paying with Monero, make sure that when you make the purchase the company does not require your address and other private information. That defeats the purpose of paying with Monero.

  • If paying with a Cash-by-mail, check what is the process that the company has for anonymizing your data later.

  1. Wallets:
    – Monero GUI – Easiest and originates from
    MyMonero wallet – Easy and private.
    Ledger NanoS + Monero GUI – receive through Monero GUI and then transfer it to the Ledger NanoS (cold storage).
    Tails wallet (cold storage).
    Exodus wallet – 100+ crypto coins. Send, receive & exchange. It is also possible to transfer the coins later to cold storage.

  2. Monero GUI info: Download the wallet from or Flathub on your laptop/PC which is using Linux/BSD. The easiest option is to pick the Simple mode which does not download the whole blockchain (+90GB) on your device. But the most private option is to pick the Simple mode (bootstrap) which will download the blockchain and your device will be the one processing the transactions which offers much higher privacy and security.

  3. Write down the Mnemonic seed (backup & restore), the wallet restore height code, the password and the private address. Keep them in a very safe and secret place. If you lose them, you lose the Monero.

  4. Keep the public address on a side and create many more. Each public address will be used for different purposes.

  5. You can add Monero by mining. This uses only the CPU of your devices. Your wallet can be used as a sole miner but this is not advised. The best way to mine Monero is through: 1. Cudominer; 2. Kryptex; 3. Web Browser Sites. Currently, Monero mining is not profitable. Example: 1 gaming PC working 24h/30days per month will mine Monero which are worth 3-10 euro/dollars. The risks and costs are the high electricity bill and the amortization of your devices. A more profitable mining coin is Etherium (30-60 euros/dollars per month with the same specs), but it is your choice if you want to risk breaking down your PC.

  6. You can add Monero through an Exchange. Here is a list recommended by the company behind Monero: Link

  7. You can add Monero by offering services to other people and them paying you with Monero.

  8. You can add Monero by accepting donations for some service/help you are offering people.

  9. You can add Monero by finding people in your town who are selling Monero for cash on hand. There are some scammers but the majority of the people who are passionate about crypto are awesome. Recommended webiste:

  10. You can add Monero by an exchange for gift cards bought anonymously in stores & sent through VPN/Tor. Example: Amazon gift cards.

  11. You can add Monero by converting other coins into Monero coins and sending them to your wallet. Recommended websites:,,,,

  12. You can spend Monero at many places. Example list: Link

  13. You can spend Monero at places that do not accept Monero but accept Bitcoin through this website:
    Update: is currently down. We are looking for alternatives.

  14. If you think that the Monero coin could lose its value in the long run you can convert it to other coins that you think will hold/raise its value. Great ones for this are stable coins like BUSD, USDC and others. Then only convert to the sum of Monero you need before you make a transaction.

  • An account with a regular bank. The majority of banks require the account to be opened in person. Then you receive a debit/credit card and some login information which you enter in the web browser. The majority provide a way for you to make transactions online from your home. The verification is done with OTP issuing device (small USB with a screen), by typing 1 of the codes on paper (list of 50+ codes issued by the bank), SMS, or by a smartphone app. The most private are the first 2 options.

  • An account with a fintech company. The majority are insured up to 100.000 euros or more, so your funds are safe. Majority offer account opening to be done online. Some require identity confirmation only with sharing passport/license/ID card data. Others require that, plus smartphone video recording/streaming identification. Fintechs are known to close accounts more frequently than regular banks due to the higher risk of opening accounts online. The majority offer payment verification only by SMS and/or smartphone app.

  • There is no privacy with electronic banking due to the regulations all banks are required to respect. It is done with the purpose to restrict thefts, scams, money laundering, etc.

  • Wise
    Unique advantage: Very low prices.

  • Payoneer
    Unique advantage: Individual people can issue invoices to companies, get paid fast and use their fiat currencies directly from their debit card.

  • Revolut
    Unique advantage: Has the option for Virtual Credit Cards.

  • Paysera
    Unique advantage: The company also has a payments processing service.


  1. Do not use a SIM for communication. Use a hardened Laptop or Smartphone through the internet using your most private software.
  2. Regular SIM card bought anonymously from a small store (cash)
  3. Regular SIM card bought anonymously from a supermarket (cash)
  4. Travelsim phone numbers
  5. Twilio phone numbers
  6. Routee business numbers


  • Laptop/PC cameras – Best is to physically remove them. Easiest is to cover them with black electric tape/plastic piece. Then if you need a camera just connect an external one or uncover the existing one.

  • IoT devices – Best is to avoid them unless you specifically need one. If you must use one then make sure it is not connected to the internet and set up a home server that is connected through ethernet cables.

  • CCTV cameras – These cameras are usually placed at highways, crossovers, public areas, government buildings. Their purpose is not to be discussed here. They can’t be avoided because even if we use masks there is a trail we leave from the moment we leave home and it is all tracked with AI. If this bothers you the only solution is to live in a village/forest or just move to another country.

  • Satellites – The all-seeing-eyes above us. You are in their focus only if you are considered a danger to the present ruling class. One solution that is hard to apply is living underground but it is way too much for most people, and frankly, an overkill.

  • Drones – Depending on the laws in your country, if you live in USA, if they fly through your land you can shoot them. But first, check the regulations in your country. This will be changed with drone delivery laws updating everywhere.

  • More coming soon.


  • Laptop/PC microphones are best to be physically removed. The easiest solution is to first click Mute in the system settings, put headphones in the jack and then snip the cables with scissors (it is called a dummy mic). When you need a microphone, put a dedicated microphone in the jack.

  • IoT devices – the majority have microphones. Ask yourself do you have any real need for these devices.

  • Modern cars have microphones and are constantly connected to the internet. There is some beauty to old cars. Feel free to research them and find the one you like best.

  • Phones/tablets have microphones. The best solution is to physically remove them and when there is a need for using the microphone, just put a headset.

  • More coming soon.

  • There are microchips in cards, “smart” devices, IoT devices, pets, and even on grocery products.

  • Faraday bags protects you from your devices always broadcasting your location. Plus health protection.
    Just make sure to put your smartphone on Airplane mode before putting in a Faraday bag. If the celluar network is left turned on, the device will try harder to find network and as a result, deplete the battery extremely faster.

  • Faraday wallet and RFID card protect your cards from being skimmed by a scanner.

  • Some people chose to put microchips on their hands and in their brains. That technology was initially created for helping people with health problems and is very useful for that purpose. All other uses can make our lives more comfortable, but at what price…

  • More coming soon.


  • For maximum privacy, it is best to “Go-Caveman-Style” as much as possible. This means if you own a house there are minimum electronics inside. And if you own a car, it works on gas and the only electronics inside is the accumulator for making the spark.

  • If you place any electronics inside the house they are all connected with wires. Ethernet cables are fast and private. You can even put cameras that are connected with Ethernet cables and a home server.

  • If you place any electronics inside the car it is advisable to place a front and back camera that stores the data in a USB. It rewrites the data on top of the existing so only when something happens you will have the required recording.

  • If you have the privilege to design/build your own house make sure to place all electronics, piping and other installation only on 1 of the 4 walls. Isolate those installations as much as possible and then on the inside side of the wall place a double layer of aluminum foil. This is great for privacy and health purposes.

  • Rent a PO box and set all possible mail to be sent there instead of your personal address. Travel 1-3 times per week to the PO box and collect the mail that way.

  • If you have the money it is advisable to buy an armored SUV which is bulletproof, mine-proof and EMP-proof. It is basically a tank, disguised as an SUV. Always disguise your wealth to not become a target, and this stands for the house, car and everything else. The less you seem to “shine”, the less you are a target for theft.

  • If you use laptops, PC, tablets and smartphones, always connect them to the internet only through an RJ-45 adapter which is connected with an Ethernet cable. This gives you the best speed and privacy. All connections are done through Ethernet cables and no other way.

  • There are researches that prove that LED light bulbs can be used to spy on what the people inside are speaking. This is the reason why the best light bulbs are: Halogen and Incandescent. Yes, they are more expensive and more consuming but better. Also, there are health benefits. Note: Always pick lights with 500-2000K.

  • More coming soon.

Coming soon

  • Before and during the travel, do not post anything about the trip on the internet. Thieves may use that information to rob your home. Disable location tracking on social media.

  • Always avoid bringing big bags. You have much great use in being as flexible as possible. Just bring a small backpack with as least things as possible in it. This also makes you lesser of a target.

  • What to pack: t-shirt, jeans, shoes, backup prints of all important documents (health insurance, passport, visa, credit/debit cards), minimum 200 euros/dollars converted in the local currency, small locking cable & lock for the baggage while in transport, electronic dictionary for the local language and paper traveling guides.

  • Know what types of charging ports are used in the country you are traveling to and buy them in advance. Useful site: WorldStandards.

  • Find out the international dialing codes for the country that you are traveling to.

  • How to book a cheap airplane ticket: Reserve the ticket minimum of 3 months in advance or at the last moment 4-5 days. Plan to deploy and return on Tuesday and Thursday. Useful sites: Orbitz and Kayak.

  • Useful sites to find and reserve accommodation: Hostelworld & more coming soon.

  • Satellite phones (Satphonestore) are excellent if you are traveling to areas with low/no cellular coverage. Good coverage networks are Iridium (pole to pole) and GlobalStar (three continents). Options: rent or purchase.

  • Pocket-size-solar panels are excellent if you are traveling in areas with low/no electricity coverage. Satellite phones are of no use if their batteries die.

  • It is very useful to know some basic martial arts and constantly being aware when you are in crowds to not get mugged and hurt. When you are walking in public, NEVER listen to music on your headphones. You MUST always be aware of your surroundings.

  • Avoid USB charging stations, which can be hijacked. Use electrical outlets or a USB cable that doesn’t carry data.

  • Disable auto-connect to available wi-fi.

  • Always use a VPN when using public wi-fi, to encrypt and encapsulate emails, sites you visit, credentials, etc.

  • Use cellular data rather than public wi-fi. If possible, use VPN with this too.

  • Carry only necessary payment info and ID documents.

  • Don’t post photos of boarding passes, passports, or other travel documents.

  • Remove sensitive info from devices and voicemail.

  • Take a “burner” (temporary) phone, not your phone.

  • When having sensitive conversations, turn off the phone and remove the battery.

  • Put black tape over the camera if not using. Most private option: physically remove the camera and mic from the phone and use a headset as the mic.

  • Upon return home, wipe the burner phone and change all passwords.

  • Always research the places where you travel.
    Example: Jamaica is great if you stay inside the hotel. If you step outside you will be in danger. The government of Jamaica is very strict toward its people in terms of forbidding robbery towards tourists up to a level that it is punishable with death/life sentence. This is the reason why when you get robbed in Jamaica they prefer to kill you later because if you snitch on them, they will be in great danger. Something simple as a 500 euro theft could make you lose your life. Btw Jamaica is awesome and also its people. Recommended movie: Cool Runnings (1993).

  • Always keep your electronic devices in a Faraday bag. Take them out only when you need to use them.

  • Better health

  • Socializing

  • Striving for greatness

  • Recreation

  • Reading books

  • Taking courses

  • HIIT workouts

  • Push-ups, Pull-ups & Burpees

  • Martial arts

  • Swimming

  • Jogging & Sprinting

  • Soccer

  • Basketball

  • Archery

  • Target practice

  • Gymnastics

  • Calisthenics

  • Planting & collecting food

  • Skydiving

  • Weapons training

Note: All of these activities can be performed with maximum privacy kept.

  • Access to easy-to-read information about many website’s privacy rules:

  • More coming soon.

  1. Disconnect your computer from the internet.

  2. Restart in “safe mode”.

  3. Back up to secure external drive.

  4. Check for malware.

  5. From a known clean device, change the credentials of the account that was targeted.

  6. Enable fraud alert and credit freeze with credit bureaus.

  7. If you have decided to delegate your personal authority to others, you can report to government authorities and forward phishing emails, including full email header. File a complaint to a specific government agency. If the damage was high enough, file a report with local law enforcement. If needed take the necessary steps to minimize the risk of ID theft.

  1. Gather evidence (symptoms, etc). Take screenshots/photos of the ransom note.

  2. Disconnect the computer from the internet.

  3. Restart the computer in safe mode.

  4. Use anti-malware to scan for ransomware.

  5. Use Crypto Sheriff to check for solutions.

  6. Search for additional decryption tools (search “decryption” and name of ransomware).

  7. Reinstall the operating system to ensure ransomware is completely removed.

  1. Disconnect your device from the internet.

  2. Restart in “safe mode”.

  3. Back up to secure external drive.

  4. Delete temp files.

  5. Scan for malware using installed anti-malware. Then use a different computer to put antivirus software on a USB drive, and use that to install it on an infected computer and scan it with it.

  6. Reboot to normal mode.

  7. Scan for malware again.

  8. Install updates to OS and applications.

  9. Fix browser settings (if needed).

  10. Reinstall OS if the computer still seems infected, or if you want to be sure to be clean.

  11. Change credentials for all accounts (if your passwords were stored in the browsers/pass manager)

  1. Reset password to a strong password.

  2. Enable 2FA.

  3. Check email settings for any sign of an attacker.

  4. Check forwarding settings.

  5. Check the sent email.

  6. Change credentials for all accounts.

  1. Freeze credit with credit bureaus.

  2. Put a security freeze on mobile numbers.

  3. Opt-out of pre-approved credit offers.

  4. Shred unnecessary sensitive documents. Store necessary sensitive documents in a locked safe.

  5. Remove mail from the mailbox ASAP. Dropping outgoing mail off at the post office is safer than using your mailbox.

  6. Beware phishing. Be careful with links and attachments.

  1. Research if the company that creates the toys is trusted. Most aren’t.

  2. Only connect the toy to a network you own, preferably one separated from your main network.

  3. Turn off the toy when not used.

  4. Or just not use them. The people who are alive in the year 2022 and are 20+ years old have played hide & seek, marbles, soccer, basketball…and most turned great, almost none had access to “smart” toys.

  • Enable 2FA and create nonsense answers to security questions.

  • Write the passwords on a piece of paper and hide it well. Also create unique, complex, 20-30 characters passwords.

  • Use a separate email account for finances.

  • Use separate, locked-down devices for finances. An option is to use a privacy-focused Linux Distro which is booted from a USB drive.

  • Bookmark financial websites; don’t type their URLs.

  • Either don’t use financial apps and use their website platform. Or if you must use them make sure they are verified.

  • Freeze credit.

  • Enable alerts.

  • Ensure accounts have 0% fraud liability.

  • Watch for card-skimming devices. Cover the keyboard as you type PIN into the card reader. Use card readers in busy areas covered by security cameras.

  • Keep your card in an RFID wallet.

  • Use a privacy-focused email service.

  • Use strong, long & complex passwords.

  • Use separate email account for separate purposes (banking, shopping, media, social media, etc). The majority of good email providers offer 5+ email aliases within each account.

  • Move sensitive info from an email to secure external file storage.

  • Review activity and settings.

  • Make sure that you have disabled automatic external image loading.

  • Before clicking on a link point on the link with the mouse and look at the popup address where it is pointing to. Avoid clicking on any links.

  • If you receive a link that you are the winner of 1 Billion dollars and some prince is going to give them to you, we are telling you here…everyone wants that to happen but it is more likely that it’s a fishing hook for dummies.

  • Use a strong, long & complex password. Create nonsense answers to security questions.

  • Write down your passwords on a piece of paper and make sure that you are the only one who knows the location.

  • Consider a VPN to shield you from your ISP.

  • Before clicking a link, hover over it to see the destination. Expand shortened URLs with CheckShortURL.

  • When a site you use is breached, change your password ASAP.

  • Enable security and activity notifications.

  • Ensure the site is encrypted (using HTTPS) before entering sensitive info.

  • Install ad-blocking and script-blocking browser extensions like uBlock and uMatrix.

  • Never use social logins.

  • Access accounts from a secure device.

  • Review privacy settings.

  • Use a securely designed, modern router. Replace router when no firmware has been released in the last year.

  • Lockdown router’s admin console by setting a strong password.

  • Set SSID (network name) to something generic that doesn’t identify you.

  • Use the internet from the router only through ethernet cables and never use wi-fi.

  • Regularly update the router firmware. Enable auto-updates if possible.

  • Use WPA2 with a strong password.

  • Lockdown router configuration. Disable insecure options such as WPS, UPnP, Ping, Telnet, SSH, HNAP. Disable remote management. Enable firewall.

  • Never connect any IoT devices. Each has a unique setup, many are highly hackable and most are a privacy nightmare.

This option is only for people who want to get away from the current digital society and start again.
It’s definitively not for everybody.

  • Remove yourself from internet search results & hide your identity. Tools to search for your images and other data: Talkwalker Alerts, TinEye & Google Image Search.
    Find out the website on which your data is hosted and file a DMCA takedown request.
    If the individual website owner doesn’t remove the data, then you can forward the DMCA notice to the hosting company on which servers the data is stored.
    Tools for finding out the hosting company: CheckHost & NStools. The majority of hosting companies are legally obliged to respect DMCA notices. If some stolen images or videos depict a child, then you can freely contact the police.

  • Accounts, tools usage & companies, apply to be erased/forgotten, create different personalities, use different emails.

  • How to destroy all the data on your hard drive: 1. Delete all the files. 2. Boil the hard drive. 3. Smash it with a hammer. 4. Run a Degausser/electromagnetic wand over the drive to obliterate all information it may contain. 5. Send it in a electronic devices recucling bin. Diclaimer: This is dangerous and not environmentally friendly and we do not advise anyone to do this.

  • Collect all your personal photos, videos, notes and put them in an external HDD. Make a backup copy on another external HDD. Then put it in a Faraday bag and now you know where everything is. This is the best option instead of having all your data on 10 social media accounts, 4 smartphones, 2 tablets, 2 PCs, 3 laptops, 4 cloud accounts, 5 email accounts, and if one gets hacked you have no idea what they got.

  • Shred all your personal info and unused credit cards/bank statements/etc with a Micro-cut shredder. Then take the shredded material and spread it around in a bunch of trash bags and leave the bags at various dumpsters around the city, or if it’s winter use it as heating material.

  • Don’t terminate your social network sites as you can use these sites to provide disinformation.

  • For maximum anonymity, get rid of all your electronic devices (tablets & smartphones).  If you want to take it to the next level, wipe all of your info from your smartphone and then you can leave it at a train or bus station so that someone else will pick it up and start using it, thus providing a source of disinformation.

  • If you drive a car and you don’t want your routes to be tracked, the only way for slight privacy is to avoid the interstate highways. Also, get rid of the GPS device that comes with the car. The GPS device can also be activated remotely and be used to listen in on your conversations. Make sure your tires don’t have RFID chips in them. Get rid of the toll pass that can track your movements through the RFID chip in the pass. Some countries do not give YOU the right to remove some devices from YOUR CAR, so research the restrictions in your area.

  • Shop at non-chain shops and restaurants.

  • Pay for everything with cash.

  • Use alcohol wipes to remove fingerprints.

  • When you are out in public, disguises you can wear are a beard, hat and sunglasses.

  • Get your food to go from restaurants, so you don’t leave DNA on the plates, utensils and glasses.

  • When traveling, stay in small motels, pay with cash, cover the peephole and sleep in your sleeping bag so no DNA is left behind.

  • How to check a room: Use a Multi Sweep Hidden Camera & Bug Detector to check for hidden bugs/cameras/etc.

  • Buy a basic pre-paid cell phone (not a smartphone) which you only use for outgoing calls (turn off the caller ID). Replace the pre-paid phone frequently, about every 2 weeks. When you are not using the cell phone, remove the battery. Check the laws it that certain country if this is possible.

  • At night you can avoid being seen on cameras that use infrared light (90% do) by fashioning a cap with LED lights on the front of it that makes a “halo” and shields your face from the cameras. Looks silly but works.

  • If you want to restart your life:
    Pick a mid-sized city with a good climate. Big cities and small towns are not good places for anonymity.
    To change your identity, petition the court to change your name legally to a new and common name.
    Apply for a drivers’ license under your new name.
    Use an RFID-blocking wallet and place the driver’s licenses, passports, ID’s and everything else that has an RFID chip in it.
    Use a new laptop to get back online. Stay away from libraries.
    Always connect to the internet through an Ethernet cable and never a wi-fi.
    Put a cover over your webcam and a dummy mic, or just remove them physically from the device.
    Install anti-keylogger software on your laptop.
    To connect on the internet always use VPN or Tor.
    Be aware of the existence of technology that scans the internet for specific keywords and messages. When it finds those specific words it pings the agencies’ servers and initiates an automated tracking.
    When shopping never use store club cards.
    Be aware that nearly all food packaging now contains RFID tags. To be sure that those aren’t used for tracking repackage food once you purchase it and get rid of the store packaging.
    Change jobs often.
    Create a “back story” for your new identity and practice it.
    Open a bank account, preferably at a small, local credit union.
    Be aware of video surveillance cameras which are everywhere.
    Avoid contacting people from your past.
    Airlines sometimes put locator chips on your bags so be aware of this.
    The less you interface with technology, the more anonymous you will be.


  • There are countries that offer citizenship, passport, bank accounts, company formation and much more for an exchange.

  • The laws in all countries constantly change so it’s best to first have at least $100.000+ and then contact one of these companies:
    FlagTheory, BankAccounts, Passports, Residencies, Incorporations.

  • The options these countries offer is done in many ways: Get married to one of their citizens; Put money in a bank and keep it there; Put money in government bonds; Put money in Real Estate; Live there many years as a visitor; Open a company there and employ people; Get a working visa and stay there couple years; Prove that you have family origins in that country; etc.

  • The first level is to open a bank account in another country just to keep your money safe.

  • The next level is to get a passport in another country which will not limit you to only your first passport (if your country gets banned for travel).

  • Another option is to get a driver’s license in every country you stay in. When you drive in your country and a police officer asks for your license you can give them your foreign license. In the majority of countries, no police officer has the right to take the driver’s license from a citizen from another country without doing the due diligence (making calls, etc). It is possible for them to take it, but it’s a headache. Even if he takes that one, you have many more licenses so you are not left without the right to drive your car in that country.

  • Some rare countries have very beneficial tax laws. Some do not have a corporate income tax (if you have a company there). Some do not have a personal income tax (or very low). Others do not have capital gains tax (or very low). Just check with your primary country, if it has laws that allow it to get money from you no matter where you live (example: USA, and many more coming soon). If your primary country taxes you no matter where you live, you can cancel that citizenship and go live in another country that will treat you better.

  • Some countries are great for opening a company. The minimum requirement is the one that does not require you to pay corporate tax on every monthly revenue. Instead, you can keep all the revenue inside the company and pay for expenses, reinvest in the company and pay corporate tax only when you decide to take out money (get paid with salary or dividends). Some countries have very low social & pensions tax, compared to some that ask up to 50% from the whole salary. This way you can employ more people. Just be careful. If you are not living more than 6 months in that country, your primary country could say that because you are living in there, then your offshore company is based in their country and not where you picked. This is the reason why entrepreneurs love working with lawyers and accountants. They pay their own salaries by knowing the laws and finding ways to save you money. If your lawyer or accountant does not pay himself this way, then he doesn’t know jack-shit about his industry. In that case, find another one.

  • One great benefit of having an offshore company is picking a country that does not issue gag orders to the companies incorporated in it. Also, there are some countries that do not share the data of their companies with other countries. Some of those countries have banks that also respect the privacy of their customers and this is the best way to protect your company from lawsuits whose purpose (majority) is only to leach money and not to solve injustice.
    Note: It is not advised to do illegal activities with your offshore company due to ALL countries are being very strict on those activities.

  • In a nutshell: Having second citizenship is a great backup strategy. If something happens you can take your USB (crypto) and your jewelry (gold in the form of jewelry is okay to be transported through borders, but gold bars not), and you are off to the beach and margaritas.

Legal Disclaimer: All information shared is intended for your personal and informational purposes only. You should consult with a professional before taking any action. In no event shall the Company or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever arising out of or in connection with your access or use or inability to access or use the information shared in this website. For more info read our Disclaimer Policy.


Share Your Thoughts