Planting Canary Tokens and Honey-Files to Identify Your Adversaries

Planting canary tokens and honey files to identify adversaries

Introduction: Knowing Your Adversary You’ve already done the heavy lifting. You’ve scrubbed your footprint from data brokers, opted out of the marketing machine, and locked down your digital life with the precision of someone who understands the stakes. But there’s a gap in that armor that standard privacy tools can’t patch: the sophisticated adversary who […]

Read More… from Planting Canary Tokens and Honey-Files to Identify Your Adversaries

Electronic Disinformation Drops

Electronic Disinformation Drops (Banner)

  Feeding false location & biometric data to crowd-sourced apps The proactive, Guerrilla approach to privacy doesn’t wait for threats to materialize — it anticipates surveillance, then floods the zone with plausible noise. Rather than hiding in the shadows, you create the shadows. With electronic disinformation drops, you don’t just obscure your location — you […]

Read More… from Electronic Disinformation Drops

Layered Signal-Silence Tactics

Layered Signal Silence Tactics

Setting the Scene Over the past half-century, U.S. policing has steadily absorbed military tactics, equipment, and training. The turning point came in the late 1960s when high-profile shootings left officers feeling outgunned; the federal 1033 program (established in 1990) then institutionalized the flow of surplus assault rifles, armored vehicles, and tactical gear into local departments. By the […]

Read More… from Layered Signal-Silence Tactics

Self-Made One-Time Pads from Everyday Sources

Making one-time pads to make the cipher the target

Introduction – Making the Cipher the target Self-Made One-Time Pads from Everyday Sources – Making the Cipher the target dives deep into a technique that goes far beyond the standard “VPN + strong passwords” checklist. The goal is simple but powerful: make the cipher itself the target so that anyone who intercepts our traffic is […]

Read More… from Self-Made One-Time Pads from Everyday Sources

Making Believable Clones to hide yourself

Making Believable Clones to Hide yourself

Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]

Read More… from Making Believable Clones to hide yourself

Noise Flooding your metadata for privacy

Noise Flooding your Metadata

  Noise flooding explained Noise Flooding your metadata for privacy is a technique of artificially creating believable metadata so that real traffic is lost. Every day your device leaves a trail of tiny data points — URLs you visit, timestamps, user-agent strings, and IP addresses. To a data-broker or advertising network those points are the […]

Read More… from Noise Flooding your metadata for privacy

The year of guerrilla privacy

guerrilla-privacy banner - 2026

  The year of guerrilla privacy When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at […]

Read More… from The year of guerrilla privacy