In 2013, Edward Snowden fundamentally disrupted our understandings of privacy and surveillance. The scope, scale, and intensity of modern government surveillance is tremendous to the point of appearing inescapable. Yet, government surveillance is only one concern in the information age: corporations vacuum our data to create digital doppelgangers that they hope will enable them to sell us their endless product lines. Meanwhile, the databases in which our doppelgangers rest are continually being bought, sold, and stolen, with the latter being the product of ever-more-rapid technological development at the cost of security. Indeed, we now find ourselves grasping for the shadow of privacy in the face of the modern chimera of surveillance.
Despite these challenges, privacy is not dead. Every time we are pushed closer to the wall, many have pushed back by creating tools and techniques that provide a handle on our privacy. Whether it is quantum-proof encryption or a simple add-on that blocks advertisements, there are steps we can take, however small, that limit the ability for adversaries to siphon our data. There is no silver bullet, but by continuing to develop new tools and learning how to use them we push further back in favor of privacy. The Tin Hat teaches you how to make this push by providing clear, understandable information and tutorials on modern privacy tools that help you reclaim your data.
I feel that it is only ethical that I clearly describe my qualifications. While I do deal with the theoretical and social implications of surveillance in my professional life, I am not formally trained in Information Security or Computer Science. What I have learned I have taught myself. Nevertheless, my posts are the product of much research, and I consider my strength to be that I am able to distill complex aspects of technology into a more understandable form. Consider me a translator, a messenger. Of course, what this means is that I will be prone to mistakes, however I make every attempt to ensure that this does not happen. If on the off chance it does, I urge you to please contact me immediately such that I can review the mistake and correct it if necessary.
There are two ways to access this site that are vastly more secure and anonymous than over the regular internet. These are through Tor and I2P:
To access the site through Tor use this hidden service:tinhat233xymse34.onion
To access the site through I2P use this hidden service:Secure.TheTinHat.i2p
Preferred method of contact. Email from ProtonMail users will automatically be encrypted. No longer using PGP. If higher security communication is required, please request to chat through Ricochet and I will provide a Ricochet ID.
Alternatively, just message me through Twitter.
The Tin Hat uses Piwik Analytics. This means that the following information is recorded when you visit the site:
The Tin Hat does not send or sell this data to third parties. The primary use for this data is to see where traffic is referred from, and how much traffic the site undergoes each day. Cookies are also used to achieve this goal.
Last Edited: February 27, 2015
Like the site? There are a variety of ways to help me create more content:
Patreon: support me directly on Patreon by donating every time I write a new post
Why Support Me? Because you want to support my ability to write content for the site. My content will always be free, but earning income from my work on the site enables me to focus more attention to it, resulting in more content. The server that the site is running on also powers a Tor relay and a high bandwidth I2P router, so you're supporting those as well.