Learn what browser fingerprinting is and how it canb e used to track you online.
A review of the Ledger Nano S, and an explanation of why hardware wallets just make life better when using Bitcoin
What 2FA is, why you should use it, and why we need FIDO U2F.
The Tin Hat now has a few more ways to support the site.
A simple explanation of what hashing is, and how hashes are used.
FAST is a program that attempts to wirelessly detect whether youre a terrorist, and its in Trump's back pocket.
TheTinHat has moved to a new server, with a new I2P hidden service to accompany it.
Disassociating decentralized networks with the term 'darknets'.
Why I've reversed my opinion on Protonmail and Tutanota
A rundown of the tools I use to power my blog, hidden services.
How I've set up a lightweight, yet still private browser.
How blogs can make money without exploiting their audience.
Skype is easily one of the worst applications that privacy-conscious users could install.
If The Pirate Bay wants to survive in the long term it needs to innovate.
I2P is for more than just drug markets. This is a list of services I2P has to offer.
My experience with syncthing after having used it for a few weeks.
A geographic look at the I2P network
Security and privacy tools are constantly appearing on the web, and we need to stop funding them blindly
Why saying that we have no expectation of privacy in public is fundamentally flawed, and how facial recognition threatens this privacy.
This is a small review on Qubes having used it for three weeks, as well as a quick primer on what QubesOS is and how it can help you.
A quick and dirty infographic on the absolute basics of how I2P's garlic routing works
We are building the nervous system of our species. Tor and I2P allow us to build it right
Learn to care about privacy, the fundamental human right that is integral to free speech.