Welcome To The Tin Hat

Begin Exploring Online Privacy Through:

Tutorials Articles

Latest Posts

Tahoe-LAFS Tutorial (Part 2) | Running Tahoe-LAFS on I2P

Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial shows you how to run Tahoe-LAFS using I2P on Linux

Tahoe-LAFS Tutorial (Part 1) | Decentralized Cloud Storage

Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial is the first in a three part series that teaches you the basics of Tahoe-LAFS

How Do I Start An Anonymous Blog?

If you want to start an anonymous blog, there's a lot of considerations. This primer will point you to the tools and tips you need to get started.

NordVPN 6 Month Free Give-Away!

I'm launching a give-away contest for three lucky winners of 6 months of NordVPN service.

Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils

American ISPs are now selling your data, and despite controversy, a VPN isn't necessarily a bad idea.

4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin)

Brave is disrupting the entire online advertising model for the better. Learn what it can do for you.

Is Tor Safe? | Assessing 5 Claims About Tor’s Security

Is Tor funded by the US government? Can it be hacked? Can it be broken by mere statistics? This article unpacks those claims.

ZeroNet | Introduction & Setup Tutorial

Discover how ZeroNet could revolutionize Tor and I2P's hidden services, before learning how to install it yourself

Why Location Privacy Matters

Location data says a lot about us, with or without Stingrays at work. We need to take it more seriously.

What is Device Fingerprinting?

Learn what browser fingerprinting is and how it canb e used to track you online.

How To Actually Torrent Privately & Anonymously For Free

Learn the pros and cons of using a VPN to torrent, as well as how to use I2P to anonymously torrent for free!

The Best VPN Kill Switch For Linux Using Easy Firewall Rules

Learn how to protect against your VPN disconnecting using these simple Linux firewall rules

Ledger Nano S Review | Why You Need a Bitcoin Hardware Wallet

A review of the Ledger Nano S, and an explanation of why hardware wallets just make life better when using Bitcoin

What is Two Factor Authentication (2FA) And Why Use It?

What 2FA is, why you should use it, and why we need FIDO U2F.

Support The Tin Hat on Patreon!

The Tin Hat now has a few more ways to support the site.

What is a hash?

A simple explanation of what hashing is, and how hashes are used.


What is The Tin Hat?

In 2013, Edward Snowden fundamentally disrupted our understandings of privacy and surveillance. The scope, scale, and intensity of modern government surveillance is tremendous to the point of appearing inescapable. Yet, government surveillance is only one concern in the information age: corporations vacuum our data to create digital doppelgangers that they hope will enable them to sell us their endless product lines. Meanwhile, the databases in which our doppelgangers rest are continually being bought, sold, and stolen, with the latter being the product of ever-more-rapid technological development at the cost of security. Indeed, we now find ourselves grasping for the shadow of privacy in the face of the modern chimera of surveillance.

Despite these challenges, privacy is not dead. Every time we are pushed closer to the wall, many have pushed back by creating tools and techniques that provide a handle on our privacy. Whether it is quantum-proof encryption or a simple add-on that blocks advertisements, there are steps we can take, however small, that limit the ability for adversaries to siphon our data. There is no silver bullet, but by continuing to develop new tools and learning how to use them we push further back in favor of privacy. The Tin Hat teaches you how to make this push by providing clear, understandable information and tutorials on modern privacy tools that help you reclaim your data.

Learn More