Beginner~12 min read

Privacy setup in one evening

Install a reputable password manager, turn on disk encryption where available, pick a privacy-oriented browser, and enable DNS-over-HTTPS or a trusted resolver—then revisit VPNs once you understand what they do and do not hide.

Password managers Browsers

Intermediate~10 min read

Threat modeling without the jargon

List assets (accounts, devices, data), plausible adversaries (thieves, advertisers, states), and failure modes. Match controls to actual risks instead of buying every gadget advertised as “military grade.”

Curated stacks

Advanced~18 min read

Linux desktop hardening primer

Partitioning, Secure Boot, firewall defaults, MAC frameworks where appropriate, and keeping secrets off the browser profile—aimed at readers ready to migrate from proprietary OS defaults.

Privacy OS listings

Browse by topic

Filter cards client-side; server search can reuse the same data-guide-keywords pattern later.

Beginner

Beginner~8 min

Accounts, 2FA, and recovery codes

Use unique passwords, prefer passkeys or hardware tokens where supported, and store recovery codes offline. Pair with private email when you outgrow ad-supported inboxes.

Beginner~9 min

VPN basics: what changes on the wire

A VPN shifts trust to another network; it does not magically anonymize accounts you log into. Learn when TLS already covers your threat and when a tunnel helps (VPN directory).

Beginner~7 min

Secure browsers: defaults that matter

Block third-party cookies, split work and personal profiles, and avoid extension sprawl. Compare engines in privacy browsers.

Intermediate

Intermediate~14 min

Linux privacy workflow

Flatpak vs. native packages, permission models, and keeping sync folders off proprietary daemons. Jumping-off point: open operating systems.

Intermediate~11 min

Password security beyond “strong characters”

Length beats complexity; vault backups must be tested. Explore password managers with audited cryptography.

Intermediate~10 min

Metadata-aware messaging

Who can see contact graphs, timing, and IP addresses? Pair private messengers with network-level controls when needed.

Advanced

Advanced~16 min

Anonymous browsing realities

Tor Browser and similar stacks change the threat model; VPN+Tor combinations have trade-offs. Start with browser listings, then study network correlation risks before relying on any single hop.

Advanced~20 min

Self-hosting: minimum viable hygiene

TLS, backups, updates, and abuse handling. Many readers begin with sync and file tools before running public services.

Advanced~13 min

Encryption at rest and in motion

Understand key custody, authenticated encryption, and restore drills. Related tools: file encryption.

Coming to this space

Article permalinks, reading-time automation, and author metadata will integrate cleanly with the same card grid. Community discussion can attach via the reusable engagement model used on tool pages.