The year of guerrilla privacy
When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at a time. Each month I’ll pick a single, high-impact “privacy theme” and publish a pair of posts: a hands-on tactical guide that shows exactly how to build the tools, followed by a strategic deep-dive that explains why the technique matters and how it fits into a broader threat model. At the end of the month I’ll wrap things up with a short recap, a link to a downloadable PDF of the whole thing and a teaser for the next theme. The result is a compact, repeatable cycle that lets you experiment, measure, and iterate without getting lost in endless theory. This year is the year that I will dedicate to guerrilla privacy. Be a part of it!
The 12-Month Roadmap for 2026
During the next year we will be talking about how to really “up your game” when it comes to privacy and security. I will be doing two blog posts a month. The first one is “tactical” – The series will be down to earth – getting into the coding and setting up the equipment that will help you to be very secure. The second article of the month is “Strategic” – Giving you the “big picture” and the overall strategies and why they matter. Together it is a powerful way of looking at each area and covering it to the fullest.
Anonymous Newsletter
A Private, Tracker-Free Mailing List to keep the conversation going between installments I’m launching a dedicated Guerrilla-Privacy mailing list — but not the kind that harvests your data the moment you click “subscribe”. Instead of handing over a personal address, you’ll use a checked but not-real alias (an anonymous account you create just for this). When you submit that alias, the server stores only a SHA-256 hash of the address and sends you a one-time verification link. The raw email never touches my database, and the verification link expires after first use. All newsletters are sent as plain-text only, with no hidden tracking pixels, no third-party analytics, and a simple one-click unsubscribe that removes the hash from the list. The whole pipeline runs on a self-hosted, open-source mailer (Listmonk) behind a hardened server, so I retain full control over the data and can guarantee that no commercial service is spying on our correspondence.
The roadmap of articles
- January
- Digital Camouflage: How to get lost in the noise.
- Tactical Article: “Noise-Flooding Your Own Metadata”
- Strategic Article:“Living in a ‘Data-Dust’ Ecosystem”
- February
- Guerrilla Encryption: Making the Cipher the Target
- Tactical Article: “Self-Made One-Time Pads from Everyday Sources”
- Strategic Article:“Deploying ‘Encryption Honeypots’ “
- March
- SIGINT Counter-Surveillance
- Tactical Article: “Portable ‘Signal-Jamming’ with Legal RF-Quiet Zones”
- Strategic Article:“Electronic Disinformation Drops“
- April
- Metadata Poisoning
- Tactical Article: “Automated EXIF & GPS Scrubbing + Randomized Noise Injection”
- Strategic Article:“‘Honey-File’ Campaigns“
- May
- Identity Fracturing (Going Beyond Simple Compartmentalization )
- Tactical Article: “Fast-Switch Burner-Phone Networks”
- Strategic Article:“Cross-Platform Persona Management – Using deterministic pseudonyms that never intersect“
- June
- Supply-Chain Obfuscation
- Tactical Article: “Buying, Re-flashing, and Reselling Devices to Break Serial-Number Chains”
- Strategic Article:“Building a disposable workstation that self-destructs after each session”
- July
- Algorithmic Sabotage: Turning Big-Tech’s AI Against Itself
- Tactical Article: “Adversarial Image Generation for Social-Media Scrapers”
- Strategic Article:“Poisoning Recommendation Engines – Seeding your own content with crafted tags to drown out profiling”
- August
- Legal-Layer Cloaking: Exploiting Jurisdictional Gaps
- Tactical Article: “Setting Up a ‘Jurisdiction-Hopping’ VPN/Proxy Chain that lands traffic in privacy-friendly enclaves”
- Strategic Article:“Leveraging Data-Retention Laws as a Shield – How to force agencies to request data from a jurisdiction that refuses to comply”
- September
- Social-Engineering Counter-Measures: Turning the Tables
- Tactical Article: “Deploying Automated ‘Fake-Friend’ Bots that flood social graphs with plausible but useless connections”
- Strategic Article:“Strategic ‘Misinformation Seeds’ – Publishing harmless, plausible false statements that dilute profiling algorithms”
- October
- Physical-Digital Hybrid Defenses
- Tactical Article: “Scheduled Cryptographic Key Rotation + Automatic Secure Deletion (shred, scrypt) for long-term archives”
- Strategic Article:“‘Decay-Driven’ Cloud Storage – Using services that auto-expire objects after a configurable TTL”
- November
- Data-Erosion: Making Your Trail Self-Destruct Over Time
- Tactical Article: “Scheduled Cryptographic Key Rotation + Automatic Secure Deletion (shred, scrypt) for long-term archives”
- Strategic Article:“‘Decay-Driven’ Cloud Storage – Using services that auto-expire objects after a configurable TTL”
- December
- Guerrilla Audits: Testing the System From the Inside
- Tactical Article: “Running a ‘Red-Team’ Privacy Audit on Your Own Household – Checklists, tools, and reporting templates”
- Strategic Article:“Publishing Transparent ‘Privacy Incident Logs’ – How public self-reporting forces adversaries to waste resources on verification”
Why This Matters
By coupling a monthly, hands-on curriculum with a privacy-first communication channel, I’m not just preaching “use a VPN and delete cookies” — I’m demonstrating a living privacy architecture that you can adopt, adapt, and extend. Each article gives you a concrete script, each newsletter delivers a ready-made tool, and together they form a feedback loop that lets us walk the walk together, one month at a time.
This is “next-Gen” privacy that is cutting edge. It is not for the faint of heart and it is technical, but I will guide you through it. I will “live it” throughout the year, come with me on the journey.
Stay tuned for the first post on January 5th, and get ready to start hiding in the noise. The newsletter will be live by the first, so signup early.
I am really looking forward to everyone joining in and making this ongoing project a success. This is a BIG commitment for me, so I hope that you will join me on the journey. With everyone experimenting together we will learn a lot. What works and what doesn’t. Please post your comments so that we all can learn from each other. I look forward to breaking new ground in the realm of individual privacy and security in the next year.