Welcome To The Tin Hat

Explore Online Privacy Through:

Tutorials Articles

Notice

This site is no longer maintained and is kept online for archival purposes only.

Latest Posts

Is Bitcoin Actually Private?

A primer on privacy and Bitcoin, why it matters for fungibility, and what cryptocurrencies are trying to fix it.

Slantwise Action | How WhatsApp, Signal, and Steemit Are Feeding the Resistance

Can people meaningfully resist surveillance without knowing it?

The Internet of Things Isn't Just About Networked Juicers | Privacy, Health, & Technology

The privacy failings of the internet of things get worse when we realize its inevitable health applications

But The Data Says So | Why Data Can't Exist in a Social Vacuum

Some people still don't grasp that data can't be removed from society (and it's racist tendencies)

Tahoe-LAFS Tutorial (Part 3) | Running a Storage Node on I2P

Learn how to contribute to Tahoe-LAFS on I2P by running your own storage node!

What is Ransomware and How Do I Protect Against It?

Learn how ransomware is shutting down entire institutions, and how you can defend against it

How Secure Is Email?

A primer on email security. Learn where email is weak and how to make it stronger.

Tahoe-LAFS Tutorial (Part 2) | Running Tahoe-LAFS on I2P

Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial shows you how to run Tahoe-LAFS using I2P on Linux

Tahoe-LAFS Tutorial (Part 1) | Decentralized Cloud Storage

Tahoe-LAFS offers decentralized, resilient, and secure storage. This tutorial is the first in a three part series that teaches you the basics of Tahoe-LAFS

How Do I Start An Anonymous Blog?

If you want to start an anonymous blog, there's a lot of considerations. This primer will point you to the tools and tips you need to get started.

Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils

American ISPs are now selling your data, and despite controversy, a VPN isn't necessarily a bad idea.

4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin)

Brave is disrupting the entire online advertising model for the better. Learn what it can do for you.

Is Tor Safe? | Assessing 5 Claims About Tor’s Security

Is Tor funded by the US government? Can it be hacked? Can it be broken by mere statistics? This article unpacks those claims.

ZeroNet | Introduction & Setup Tutorial

Discover how ZeroNet could revolutionize Tor and I2P's hidden services, before learning how to install it yourself

Why Location Privacy Matters

Location data says a lot about us, with or without Stingrays at work. We need to take it more seriously.

What is Device Fingerprinting?

Learn what browser fingerprinting is and how it canb e used to track you online.