Last update: 09/12/2025. (MM/DD/YY) Or: https://old.reddit.com/user/314stache_nathy/comments/1mej8fo/guide_to_your_freedom/

Acess via: old.reddit + Tor ( https://old.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/ - Disable JavaScript).

In Monero.town: https://monero.town/post/6460173

  • Alternatives to surveillance services (Google, Microsoft and etc):

ClearNethttps://privacyguides.org/

I2Phttp://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p

TOR:  http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/

-> If you use Tor browser, please:

  • Install via https://www.torproject.org/download/ and verify the signatures.
  • Disable Javascript.
  • Use the Safer or Safest mode in Tor.
  • Restart the browser for the configuration to be updated.
  • Use bridges (I recommend SnowFlake, consider host your SnowFlake: https://support.torproject.org/en/censorship/how-to-help-running-snowflake/).
  • You should never install any additional extensions on Tor Browser or edit  about:config settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to fingerprint.
  • Use only HTTPS websites if the website don’t have a .onion version.
  • Change circuits every time you change the website/service, Tor make this every 3 minutes.
  • Don’t download or open documents in Tor Browser.
  • I recommend (optional) you use Tor + VPN (why? If you use Tor + VPN you have best censorship protection and best protection against spy nodes in Tor).

VPNs don’t provide anonimity, I recommend TOR and I2P.

Use: Tor/I2P -> VPN, and NEVER VPN -> TOR/I2P

If you need VPNs (like use with Tor):

  • Mullvad (accept XMR + Wireguard + MultiHop).
  • IVPN (accept XMR + Wireguard + MultiHop).
  • AirVPN (accept XMR + Wireguard + Port forward).

https://offshore.cat/vpn.php

Configuration:

• Enable the kill switch to block all traffic if the VPN disconnects.

• Configure a firewall to restrict all traffic outside the TOR/I2P & VPN tunnel.

• Enable auto-start on boot and make sure your VPN is connected before launching apps or browsers.

• Disable IPv6 and WebRTC to prevent potential leaks.

• Use provider’s DNS servers or custom encrypted DNS (e.g., NextDNS, DNSCrypt) see in PrivacyGuides.

• Use DNSSEC.

• have QNAME Minimization.

• Have ECS disabled or anonymized.

• For extra privacy, use multihop VPN or bridge relays if available.

-> Best practices for VPN:

• Rotate between servers when switching between tasks to minimize correlation and tracking.

• Do not log into personal accounts (email, social media, bank, etc.) while using the same privacy-focused VPN session or with TOR/I2P. This links your real identity to the VPN IP. Use separate devices, browsers profiles and VPN sessions for personal work.

  • For search: Use SearXNG, is decentralized and you can self-host your instance. SearXNG instances: https://searx.space/

Or use Ahmia ( http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/ ).

r/onion and r/onion search tools

Index:

Plus: https://www.reddit.com/r/onions/about/

Browsers: -> In my opinion all browsers are useless for privacy, I recommend you use QubesOS-Whonix for compartimentalization with SearXNG with your own instance or public instances (https://searx.space/) to solve this. (I recommend use your own instance of SearXNG and use with .onion) Make compartimentalization of your activities.

-> The best browsers (use one for at activity - I2P isn’t here because I2P only works in I2P network):

  • Mullvad Browser.
  • Tor Browser (or Onion Browser in IOS).
  • Brave (see below).
  • LibreWolf.

See more (important):

Privacy front-ends (don’t use with a account): Youtube:

  • Invidious (http://c7hqkpkpemu6e7emz5b4vyz7idjgdvgaaa3dyimmeojqbgpea3xqjoid.onion/ - have .onion and .i2p instances - disable javascript + Use Tor browser in safer or Safest mode - https://invidious.io/).

  • Libretube (Use with Tor to protect your IP - Use with a Invidious instance)

  • NewPipe - Android (Use with Tor to protect your IP - Use with a Invidious instance).

  • Yattee - iOS and Apple products (Use with Tor to protect your IP - Use with a Invidious instance).

WARNING: Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google’s servers (e.g. googlevideo.com); however, some instances support video proxying—simply enable Proxy videos within the instances’ settings or add &local=true to the URL.

Reddit:

TikTok:

  • ProxiTok (Have TOR/I2P instance - disable javascript + Use Tor browser in safer or Safest mode).

Others: https://github.com/digitalblossom/alternative-frontends

<<<FORUMS>>>

Dread (recommended):

Pitch (recommended):

CryptBB:

Ramble:

Query:

Germania:

Cebulka:

SuprBay:

EndChan (8Kun):

Out3rSpace:

s-config:

Defcon forums:

WARNING: verify all OpenPGP keys, DON’T TRUST IN ANYONE, use pseudo-anonymous names (a diferent username for all accounts, NEVER just don’t reuse usernames, don’t have a tractable pattern to your usernames.), and don’t open untrusted archives, AND NEVER GIVE YOUR PERSONAL DATA/INFO.

Similarly, never use actual answers with secret questions.

Always use some random string that you record for yourself.

Darknet Market Maximalism: https://antimoonboy.com/darknetmarketmaximalism/ \\\\\\\\

When generating keys I suggest using the future-default command as this will instruct GnuPG use modern cryptography such as Curve25519 and Ed25519:

gpg --quick-gen-key alice@example.com future-default

  • Messagers: SimpleX.chat, XMPP (with OMEMO + self-hosted server), Cwtch and Molly.im are the bests (install Molly via Fdroid, Molly is compatible with Signal, is a Signal fork but is 100% FOSS). But Signal is secure too.

To off-grid messager I recommend Meshtatic.

Configuration:

• Disable displaying your phone number (in Molly and Signal), if you use Molly, use the Molly 100% FOSS version (https://molly.im/fdroid.html - Molly has 3 versions) Warning: If you use Molly you are trusting in 2 dev team(s).

• Enable automatic chat deletion (after 24h or after X day for example).

• Enable passcode/password protection.

• Disable lock screen notifications in mobile phone settings.

-> How config XMPP for max privacy and security

• Self-host your XMPP server for more metadata protection. • Use OMEMO with OpenPGP. • Use TOR/I2P with your own XMPP server.

-> Best practices:

• Manually delete chats for all participants after exchanging sensitive info.

• Use OpenPGP encryption to ensure your messages are fully protected and verifiably signed.

  • To OS (Computer/laptop): Linux based: QubesOS (use with Whonix), KickSecure, SecureBlue (Fedora-based), TailsOS.

BSD based: OpenBSD and HardenedBSD.

A Anarchist guide to Internet anonimity:

https://www.whonix.org/wiki/Comparison_with_Kicksecure

  • When to Use Whonix: For tasks that require guaranteed Tor routing and anonymity.

-> Whonix is good to protection against fingerprinting, I recommend so much use with QubesOS.

  • When to Use Kicksecure: For applications needing security hardening without anonymity.

To OS (Smartphone): GrapheneOS with Pixel phone.

-> Protection against ISP censorship:

  • Freifunk (mesh network).
  • Use OpenWRT or LibreCMC (libreCMC is an FSF-endorsed derivation of OpenWrt with the proprietary blobs removed. If your device is supported by libreCMC, definitely use it over OpenWrt.), OPNsense (private alternative to Pfsense) is good too.
  • Use WPA3.
  • https://www.torbox.ch/

The best anti-malware:

  • Good sense ;)

For hosting:

USE OPENPGP.

OpenPGP tools:

-> Physical Surveillance

Agents first monitor your address, then attempt to follow you discreetly using vehicles or on foot.

How to evade:

• Plan a long and confusing route. Periodically but discreetly check if you’re being followed.

• Avoid using the same route to prevent predictability.

• Watch for recurring people or vehicles – seeing the same person/car in three different locations is a red flag. Memorize the face/car and proceed with increased awareness.

• Take short breaks to observe and analyze your surroundings.

• Dress neutrally and suitably for the environment. Avoid bright clothing and regularly change your appearance.

• Act like a normal person – avoid unusual behavior, don’t stare, and stay calm.

• Don’t forget that agents can track your GPS location via your mobile device.

And use Monero (XMR) to finantial privacy.

Monerica:

WARNING: Bitcoin ISN’T PRIVATE use MONERO to have financial privacy.

How use Monero: https://www.getmonero.org/resources/user-guides/

“But Monero can have a inflation bug” -> https://www.moneroinflation.com/

Other tools: -> https://moneroconsensus.info/ -> https://gupax.io/guide/ -> https://monero.garden/

P.S. -> Use Monero (XMR) with your OWN NODE AND OPEN THE 18081 PORT + USE YOUR NODE VIA TOR/I2P, and use Wallets like Anonero, Feather Wallet, GUI/CLI oficial wallets (in https://getmonero.org/). Buy Monero via RetoSwap.com, Eigenwallet.org, BasicSwapDEX or Serai.exchange (coming soon). Make Monero mining via P2Pool (or P2Pool mini) and use Gupaxx.

  • WARNING Don’t make this with Monero:

  • DON’T USE A REMOTE NODE (use your OWN NODE via TOR/I2P to max privacy)

  • DON’T USE KYC - CEX (Use the recomended DEX like RetoSwap.com, Eigenwallet.org and BasicSwapDEX, I recommend use Trocador.app or Cyphergoat.com has agregator).

  • NEVER SHARE YOUR PRIVATE KEYS, AND USE ONE-TIME ADRESSES FOREVER (STEALTH ADRESS), DON’T RE-USE ADRESS.

  • Verify Monero binaries: https://docs.getmonero.org/interacting/verify-monero-binaries/

  • NOT YOUR KEYS, NOT YOUR COINS, have SELF-CUSTODY of your keys, have air-gapped encrypted wallets with MULTISIGS (use Veracrypt for plausible deniability).

  • DON’T USE MYMONERO, they have some Red flags (and can see your view key).

  • The recomended wallets are (all fully are open-source):

-> Hot wallets:

-> Cold wallets:

  • Stell wallet (fully off-line, but don’t have encryption or password).

  • Paper wallet (fully off-line, but don’t have encryption or password).

  • Brain wallet (your brain, you have a good memory?).

  • Anonero.io

  • CupCake.

  • SideKick (by Monerujo, disable PocketChange).

-> Hardware wallets:

  • Trezor (Reccomended).

  • Keystone.

Why not Ledger?

-> OTHER:

  • Make Monero mining via Solo mining, P2Pool or P2Pool mini (use Gupaxx).

  • Buy and sell things for Monero in XMRBaazar (and NeroShop in future).

Consider all other wallets and CEXs not mentioned here as SCAM.

Any seed typed on the keyboard of any device should be considered possibly compromised.

NOTE: NEVER SEND ANY CRYPTOCURRENCY STRAIGHT FROM YOUR EXCHANGE WALLET TO YOUR MARKET WALLET!

You have question? Ask or see:

Detail: I recommend read the nihilist OPSEC bible and OPSEC manual.

OPSEC Bible:

OPSEC Manual: http://jqibjqqagao3peozxfs53tr6aecoyvctumfsc2xqniu4xgcrksal2iqd.onion/ (.onion)

OPSEC: DNM buyers bible:

Legal side:

  • Shut up and don’t say anything without a lawyer.

  • Don’t say anything if they ask about something, anything can be used against you.

  • Don’t let any authority enter your property without a valid judicial warrant, and it’s essential that you use strong passwords with an encrypted hard drive (restart your phone/laptop if they try to take it from you).

-> The best thing(s) you can buy for Physical security:

EXTRA

I u/314stache_nathy created this for research and archival purposes, an document created on Reddit to protect historical data (all in this document are public tools & data). I do not suport or gain money from any of the activities or services described. All services/tools are open-source, I don’t have control over the services/tools, open-source is from the people.

I am not responsible for any activities done with the tools listed, I do not have access to sites with illegal content, if any of the links I have posted have any reference to such sites it was done accidentally, as I have never entered such sites with the intention of promoting the purchase and sale of such things illegal or not.

This document was created in international waters.

If you have questions, info or other questions, please, comment.

Guide to your freedom   by 3.14stache_nathy is marked CC0 1.0 Universal. To view a copy of this mark, visit https://creativecommons.org/publicdomain/zero/1.0/