The year of Guerrilla Privacy
When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at a time. Each month I’ll pick a single, high-impact “privacy theme” and publish a pair of posts: a hands-on tactical guide that shows exactly how to build the tools, followed by a strategic deep-dive that explains why the technique matters and how it fits into a broader threat model. At the end of the month I’ll wrap things up with a short recap, a link to a downloadable PDF of the whole thing and a teaser for the next theme. The result is a compact, repeatable cycle that lets you experiment, measure, and iterate without getting lost in endless theory. This year is the year that I will dedicate to guerrilla privacy. Be a part of it!
The 12-Month Roadmap for 2026
During the next year we will be talking about how to really “up your game” when it comes to privacy and security. I will be doing two blog posts a month. The first one is “tactical” – The series will be down to earth – getting into the coding and setting up the equipment that will help you to be very secure. The second article of the month is “Strategic” – Giving you the “big picture” and the overall strategies and why they matter. Together it is a powerful way of looking at each area and covering it to the fullest.
The roadmap of articles
- January
- Digital Camouflage: How to get lost in the noise.
- Tactical Article: “Noise-Flooding Your Own Metadata”
- Strategic Article:“Making Believable Clones to hide yourself“
- February
- Guerrilla Encryption: Making the Cipher the Target
- Tactical Article: “Self-Made One-Time Pads from Everyday Sources”
- Strategic Article:“Deploying ‘Encryption Honeypots’ “
- March
- SIGINT Counter-Surveillance
- Tactical Article: “Portable ‘Signal-Jamming’ with Legal RF-Quiet Zones”
- Strategic Article:“Electronic Disinformation Drops“
- April
- Metadata Poisoning
- Tactical Article: “Planting Canary Tokens and Honey-Files to Identify Your Adversaries”
- Strategic Article:“‘Metadata Fragmentation for Strategic Advantage“
- May
- Identity Fracturing (Going Beyond Simple Compartmentalization )
- Tactical Article: “RBIO: Obfuscate your Identity without traditional burner phones”
- Strategic Article:“Compartment Templates and Digital Clones“
- June
- Supply-Chain Obfuscation
- Tactical Article: “Supply-Chain Obfuscation – Hiding your Hardware Footprint”
- Strategic Article:“Breaking the Supply Chain with Hardware Clones”
- July
- Algorithmic Sabotage: Turning Big-Tech’s AI Against Itself
- Tactical Article: “Adversarial Image Generation for Social-Media Scrapers”
- Strategic Article:“Poisoning Recommendation Engines – Seeding your own content with crafted tags to drown out profiling”
- August
- Legal-Layer Cloaking: Exploiting Jurisdictional Gaps
- Tactical Article: “ ‘Jurisdiction-Hopping’ VPN/Proxy Chains that land traffic in privacy-friendly enclaves”
- Strategic Article:“Leveraging Data-Retention Laws as a Shield – How to force agencies to request data from a jurisdiction that refuses to comply”
- September
- Social-Engineering Counter-Measures: Turning the Tables
- Tactical Article: “Deploying Automated ‘Fake-Friend’ Bots that flood social graphs with plausible but useless connections”
- Strategic Article:“Strategic ‘Misinformation Seeds’ – Publishing harmless, plausible false statements that dilute profiling algorithms”
- October
- Physical-Digital Hybrid Defenses
- Tactical Article: “Scheduled Cryptographic Key Rotation + Automatic Secure Deletion (shred, scrypt) for long-term archives”
- Strategic Article:“‘Decay-Driven’ Cloud Storage – Using services that auto-expire objects after a configurable TTL”
- November
- Data-Erosion: Making Your Trail Self-Destruct Over Time
- Tactical Article: “Scheduled Cryptographic Key Rotation + Automatic Secure Deletion (shred, scrypt) for long-term archives”
- Strategic Article:“‘Decay-Driven’ Cloud Storage – Using services that auto-expire objects after a configurable TTL”
- December
- Guerrilla Audits: Testing the System From the Inside
- Tactical Article: “Running a ‘Red-Team’ Privacy Audit on Your Own Household – Checklists, tools, and reporting templates”
- Strategic Article:“Publishing Transparent ‘Privacy Incident Logs’ – How public self-reporting forces adversaries to waste resources on verification”
Why This Matters
By coupling a monthly, hands-on curriculum with a privacy-first communication channel, I’m not just preaching “use a VPN and delete cookies” — I’m demonstrating a living privacy architecture that you can adopt, adapt, and extend. Each article gives you a concrete script, each newsletter delivers a ready-made tool, and together they form a feedback loop that lets us walk the walk together, one month at a time.
This is “next-Gen” privacy that is cutting edge. It is not for the faint of heart and it is technical, but I will guide you through it. I will “live it” throughout the year, come with me on the journey.
Stay tuned for the first post on January 5th, and get ready to start hiding in the noise. The newsletter will be live by the first, so signup early.
I am really looking forward to everyone joining in and making this ongoing project a success. This is a BIG commitment for me, so I hope that you will join me on the journey. With everyone experimenting together we will learn a lot. What works and what doesn’t. Please post your comments so that we all can learn from each other. I look forward to breaking new ground in the realm of individual privacy and security in the next year.