Setting the Scene Over the past half-century, U.S. policing has steadily absorbed military tactics, equipment, and training. The turning point came in the late 1960s when high-profile shootings left officers feeling outgunned; the federal 1033 program (established in 1990) then institutionalized the flow of surplus assault rifles, armored vehicles, and tactical gear into local departments. By the […]
Category: Guerrilla Privacy
A year-long project to delve into proactive privacy techniques and keeping personal data safe, secure and available.
Deploying Encryption Honeypots
Luring surveillance tools into dead-end crypto puzzles In this article I’ll walk you through a modest but powerful honeypot you can host on any domain — preferably behind a VPN so your IP stays hidden. The goal is simple: publish files that look like ordinary data dumps, but that actually lure surveillance tools into costly, […]
Self-Made One-Time Pads from Everyday Sources
Introduction – Making the Cipher the target Self-Made One-Time Pads from Everyday Sources – Making the Cipher the target dives deep into a technique that goes far beyond the standard “VPN + strong passwords” checklist. The goal is simple but powerful: make the cipher itself the target so that anyone who intercepts our traffic is […]
Read More… from Self-Made One-Time Pads from Everyday Sources
Making Believable Clones to hide yourself
Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]
Noise Flooding your metadata for privacy
Noise flooding explained Noise Flooding your metadata for privacy is a technique of artificially creating believable metadata so that real traffic is lost. Every day your device leaves a trail of tiny data points — URLs you visit, timestamps, user-agent strings, and IP addresses. To a data-broker or advertising network those points are the […]
The year of guerrilla privacy
The year of guerrilla privacy When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at […]
Thanksgiving Data Stuffing Recipe
Thanksgiving Data Stuffing Recipe Every Thanksgiving the house fills with laughter, the aroma of roasted turkey, and — unfortunately— a swarm of unfamiliar devices. Smartphones, tablets, laptops, smart-watches, and even Bluetooth-enabled wearables all plug into the guest Wi-Fi, broadcast their presence, and begin chatting with the world outside. In today’s data-driven economy those signals […]