Privacy, Security, Anonymity.
Created for the PSA-2 on Simplex Chat
Help support more informative and helpful content with XMR/Monero: 45TftvPzdTNaye3AyftsHLd9p9mHqCLqNcTrbo8TmAMzYr4HmeebKZUMt5WNbmXjxe2p1L5kvQniVdvjuhewmQuKLN6Rmzd
🌐 The Global Surge: From "Conspiracy Theory" to Coordinated Rollout.
What was once dismissed by many as a fringe concern is now a rapidly unfolding reality. As Expose News documents, the past few months have seen a synchronized wave of digital ID adoption across the globe, from Switzerland and the EU to Vietnam, Costa Rica, Papua New Guinea, and Ethiopia. This isn't isolated national action; it appears to be the execution of a long-prepared global playbook, with frameworks published by organizations like the World Economic Forum providing the blueprint for years.
This global coordination raises profound questions about national sovereignty and democratic oversight. The Canadian situation is a prime example, where unelected federal regulators are pushing a national digital ID system without parliamentary approval, despite past rejections by MPs over cost and security concerns. Similarly, the EU's Ursula von der Leyen has explicitly called for a global digital ID framework, building on the infrastructure of COVID-19 vaccine passports.
The core issue is no longer if these systems will be implemented, but how. The rapid, often opaque, nature of these rollouts suggests a deliberate strategy to establish digital identity as a non-negotiable layer of modern life before meaningful public debate can occur.
⚖️ The Age Verification Battleground: Legislation, Litigation, and Loopholes
Age verification is the "gateway" drug for broader digital ID. Laws like California's Age-Appropriate Design Code Act (effective Jan 1, 2027) and the UK's Online Safety Act (OSA) are forcing platforms to implement age checks. The UK's Ofcom has defined "highly effective" age assurance, rejecting methods like self-declaration and pushing for photo-ID matching, facial age estimation, and credit card checks.
This has sparked immediate and fierce resistance. In a landmark case, 4chan and Kiwi Farms are suing the UK government in U.S. federal court, arguing that the OSA's attempt to fine or block them violates U.S. speech protections, as they are U.S.-based entities with no UK operations. This lawsuit highlights the fundamental challenge of applying national laws to a global, borderless internet.
On the ground, implementation is messy. An iOS beta screen revealed Apple’s plan to use credit history, account age, and payment data to verify age. In Australia, new rules will soon require search engines like Google to verify ages for logged-in users, filtering results for minors. Critics point out the glaring loophole: users can simply log out to access unfiltered content, questioning the entire exercise's efficacy.
🔬 Technical Crossroads: Privacy Tokens vs. Biometric Surveillance
The debate over how to verify identity is crystallizing around two starkly different technological paths.
-
The Privacy-Preserving Path: Companies like Google are beginning to explore technologies like Zero-Knowledge Proofs (ZKPs) . As reported by Identity Week, Google Wallet is integrating ZKPs to allow users to prove they are over 18 without revealing their exact birth date or any other personal information. This cryptographic approach, which Google plans to open-source, offers a potential model for age verification that doesn't create a surveillance database. The Fedora discussion on a local OS-based API aligns with this philosophy—keeping verification local and minimizing data sharing.
-
The Surveillance Path: The opposite path is paved with biometrics. The most extreme example is Worldcoin (informationtechnology.news), which forces users to scan their irises with an "orb" in exchange for a digital ID and cryptocurrency. This approach normalizes the collection of the most personal data imaginable—biometrics that cannot be changed if compromised. Privacy advocates like Edward Snowden have vehemently warned against this, stating, "The human body is not a ticket-punch." The integration of such biometrics into national systems, as seen in the EU's new border checks and Mexico's CURP overhaul, represents a massive expansion of state surveillance capabilities.
🛡️ The Security Paradox: Protecting Identity by Creating a Single Point of Failure
Digital ID systems are presented as a solution to identity theft and fraud. However, by centralizing or federating identity, they create a "honeypot" for malicious actors. A single breach could compromise the identities of millions, or even billions, of citizens.
The security risks are compounded by the use of third-party verification vendors. As noted in the Reclaim The Net article on Apple, these providers have an "uneven track record," with major breaches exposing administrative credentials and tens of thousands of government ID photos. The attack surface expands with every new platform that outsources its age or identity checks.
Furthermore, the Utah blockchain-based digital ID pilot introduces its own set of security questions. While blockchain is touted for its immutability, the security of the system depends entirely on the management of private cryptographic keys. If a user's key is lost or stolen, their entire digital identity could be irrecoverably compromised, locking them out of essential services.
💰 The Slippery Slope: From "Optional" to Mandatory, from ID to Control
A recurring theme across all the documents is the "voluntary-to-mandatory" pipeline. What starts as an optional convenience—like a digital driver's license in an Apple Wallet—can quickly become a prerequisite for participation in society.
- Canada's Coercive Approach: The Trudeau government's threat to cut healthcare funding to provinces that refuse digital health ID is a stark example of this. As one commentator noted, this is a "hostage situation of our tax money," using essential services as leverage to force adoption.
- Australia's "Digital Prison": Experts cited in Natural News warn that Australia's myGovID, while currently "optional," is a stepping stone to a "digital dictatorship" where a person's "score" could determine their access to food, travel, and services—mirroring concerns about a social credit system.
- The UK's "Super App": The proposed UK "super app" (surveillance.news) aims to combine digital ID, financial data, and potentially health data into a single tool. This consolidation of data creates an unprecedented instrument for surveillance, financial control, and social sorting, described by critics as the "ultimate control tool."
The potential for abuse is not theoretical. The article on Ukraine's Diia app demonstrates how a peacetime digital ID system was rapidly converted into a wartime tool for distributing subsidies, crowdsourcing intelligence, and coordinating cyberattacks. This illustrates how infrastructure built for convenience can be repurposed for state power, for better or worse.
⚖️ The Unresolved Questions: Democracy, Anonymity, and the Open Source Challenge
The rapid push for digital ID leaves a host of fundamental questions unanswered.
- Democratic Oversight: As seen in Canada, how can citizens ensure democratic control over these systems when they are advanced by unelected regulators? The rejection of such proposals by parliaments is being circumvented by administrative fiat.
- The Right to Anonymity: The internet has thrived on the ability to be pseudonymous or anonymous. Mandatory age or identity verification for accessing core parts of the web—search engines, social media, messaging apps—effectively ends this era. As Professor Lisa Given from RMIT asks in the ABC article, "Are we really, as a country, willing to accept that age assurance is going to be required for … every single thing we do online?"
- The Open Source Conundrum: The Fedora discussion perfectly encapsulates the challenge for open source. How can a global community of developers comply with laws like California's that mandate OS-level age verification? Do they build a privacy-respecting local API (as they hope) or face the impossible task of policing users by geography? The involvement of Fedora's legal team shows this is not a hypothetical concern but an immediate and complex problem.
📝 The Content Control Ecosystem: From Digital Fingerprints to the Censorship Industrial Complex
The drive to verify identity and age is inextricably linked to a parallel, massive effort to control the content itself. This isn't just about blocking illegal material; it's about building the infrastructure to identify, track, and suppress disfavored speech, often under the banner of fighting "misinformation." This section details the key components of this content control ecosystem.
The foundational technology for automated content control is the "digital fingerprint." As hinted at in the Rumble video, this involves creating unique, hashed identifiers for all forms of content—video, audio, text, and even memes. Led by a consortium of major tech companies (Microsoft, Adobe, Intel), the goal is to create a system where every piece of digital media can be instantly identified and matched against a database of flagged content.
While presented as a tool to combat piracy and child exploitation, the potential for censorship is vast. A universal fingerprinting system would allow platforms and governments to automatically filter out not just illegal content, but any content deemed "harmful" or "misinformative." This shifts the burden of proof: instead of a human reviewing content, an algorithm flags and removes it based on a pre-defined fingerprint, making censorship instantaneous, scalable, and opaque.
The engine powering this content filtering is a sprawling, well-funded network that has been termed the "censorship industrial complex." This network comprises government agencies, multinational corporations, advertising cartels, and ostensibly "non-partisan" NGOs.
- Billions in Government Contracts: A report by The Gold Report reveals that the U.S. government has awarded billions of dollars in contracts to major advertising conglomerates (Publicis Groupe, IPG, Omnicom, WPP) that are key members of the Global Alliance for Responsible Media (GARM) . GARM, a project of the World Federation of Advertisers, controls nearly $1 trillion in annual ad spending and uses this leverage to force platforms like YouTube, Facebook, and Twitter to censor content its members deem "harmful" or "misleading." This includes specific campaigns against conservative outlets like Fox News and Breitbart, and even a coordinated effort to "kill Musk's Twitter" after his acquisition, which tanked the platform's ad revenue by 80%.
- Taxpayer-Funded Censorship Groups: In the UK, taxpayer money has flowed to censorship groups through charitable foundations. Reclaim The Net reports that the Center for Countering Digital Hate (CCDH) and Stop Funding Hate received funds from foundations (Esmee Fairbairn, Paul Hamlyn) that had received millions in public money. The CCDH, whose founding director is now a key aide to Prime Minister Keir Starmer, has been at the forefront of campaigns to demonetize and deplatform outlets and individuals who deviate from the establishment narrative.
- International Coordination: This is not just a national phenomenon. The UN and US government are actively expanding censorship efforts, with the Digital Trust & Safety Partnership (DTSP) —a consortium of Google, Apple, Meta, and others—aligning with the UN's call for age assurance, a move critics argue is a Trojan horse for increased surveillance and data extraction. The ultimate goal, as journalist Matt Taibbi observed, is to "restore a system where the only allowable route to a mass audience is through a major institutional partner," effectively reinstating the gatekeeping power of the pre-internet era.
The censorship complex relies on a suite of powerful new tools to operationalize its goals.
- AI-Powered Surveillance and Censorship: The U.S. government, through agencies like the National Science Foundation, has funneled millions of taxpayer dollars into developing AI tools for censorship and propaganda. As detailed by The Alily Bit, projects like the University of Michigan's WiseDex ($750,000 grant) and the University of Wisconsin's Course Correct are designed to facilitate censorship decisions on social platforms and empower "fact-checking" efforts. Bill Gates has also explicitly called for AI-based real-time censorship to combat "vaccine misinformation," arguing for "rules" that would allow for the swift removal of disfavored speech, raising profound questions about First Amendment protections.
- KYC for Cloud Infrastructure: A proposed rule from the U.S. Department of Commerce would require "Know Your Customer" (KYC) procedures for Infrastructure as a Service (IaaS) providers, like cloud servers. This proposal would force U.S. cloud providers and their foreign resellers to verify the identities of foreign clients, particularly those developing large AI models. While framed as a national security measure to combat hackers and foreign adversaries, it creates a system where anonymous use of cloud computing resources—the very backbone of the modern internet—could be eliminated.
- The Subjectivity of "Fact-Checks": The entire censorship apparatus is built on the premise that "misinformation" can be objectively identified. However, as the New York Post editorial board points out, even Facebook's legal defense in a lawsuit brought by John Stossel admitted that its "fact checks" are merely "opinion." The case, involving Stossel's videos on climate change, revealed that the "fact-checkers" (Science Feedback) objected not to factual inaccuracies, but to his "tone." This exposes the core weakness of the "misinformation" framework: it inevitably relies on subjective, often ideological, judgments about what constitutes acceptable discourse, leading to the suppression of views that deviate from a narrow, establishment-approved orthodoxy.
This trend is global. The Civicus Monitor details extreme state control in countries like Turkmenistan, where Wikipedia is blocked for containing unflattering descriptions of the president, and VPNs are being systematically disabled. More alarmingly, research from the University of Michigan shows that "extremely aggressive" internet censorship is spreading in democracies. Using data from their Censored Planet system, they found significant, previously undetected censorship events in countries rated as among the freest in the world, including Norway, Poland, and Japan. In many cases, infrastructure initially built to block obviously illegal content (like child abuse material) is later repurposed to suppress political speech, human rights websites, or dating sites. The architecture for censorship, once built, is easily expanded.
Furthermore, the censorship is ideologically indiscriminate. As journalist Caitlin Johnstone notes, after the mass purge of right-wing accounts following the January 6th Capitol riot, the pendulum swung left, with socialist organizations and Antifa-associated accounts being banned from Facebook and Twitter. This demonstrates that the infrastructure of censorship, once normalized, can be used against any viewpoint that threatens the interests of the powerful, regardless of its position on the political spectrum.
These new files reveal how Digital ID and Age Verification are not separate issues from content censorship; they are the identity and access layers of the same control system.
- KYC for Content Creation: The push for KYC for cloud infrastructure (IaaS) is the logical extension of Digital ID. If you need to verify your identity to use a cloud server, then creating a website, running a forum, or even hosting a blog becomes an activity tied to your legal identity. This ends anonymous speech online.
- Age Verification as a Censorship Gateway: As the Alily Bit article highlights, the DTSP's alignment with the UN on "age assurance" is a strategy to expand their surveillance capabilities. The data collected for age verification (facial scans, government IDs) can be, and likely will be, used for broader identity tracking and content monitoring.
- Accountability Enables Sanctions: Digital ID makes you identifiable; content fingerprinting makes your speech trackable. When combined, they create a system where individuals can be held personally accountable for what they say online. As seen in the Trudeau healthcare funding and Australia examples, this accountability can then be tied to access to essential services—healthcare, banking, employment—creating a powerful deterrent against dissenting speech.
the pieces are rapidly falling into place for a comprehensively controlled internet: a network where your identity is verified (Digital ID), your age is checked (Age Verification), the content you create is fingerprinted and filtered, and your access to essential services can be revoked if you step out of line. The justification is always safety, protecting children, fighting misinformation, preventing fraud. The outcome is the systematic dismantling of the open, anonymous, and free internet that enabled the global exchange of ideas.
this paints a picture of a world at a crossroads. The momentum behind digital ID and age verification is undeniable and globally coordinated. The choice before societies is whether to build systems that prioritize privacy, security, and user control (through methods like local APIs and zero-knowledge proofs) or to accept systems that centralize power, normalize biometric surveillance, and create the infrastructure for pervasive social control. The lawsuits, the legislative battles, and the open-source debates are the front lines of this fight for the future of digital identity.
🧩 The Open Source Patchwork: A Live Tracker of Compliance and Resistance
The BryanLunduke/DoesItAgeVerify GitHub repository serves as a vital, real-time barometer of how the open source world is reacting to new age verification laws in places like Brazil and California. It reveals a fragmented landscape with no unified approach, ranging from outright defiance to grudging compliance.
A significant number of projects have drawn a firm line in the sand, refusing to implement age verification. This group includes:
- Devuan Linux, whose developers have made a clear statement against implementation.
- Artix Linux, with a developer statement refusing implementation.
- FreeDOS, whose founder has issued a developer statement opposing age verification.
- Omarchy Linux, with a developer statement confirming refusal.
- DB48X (calculator firmware), with a developer statement against implementation.
- Arch Linux 32, which has taken the pragmatic step of forbidding its usage in Brazil and California, passing the legal risk to the user.
- A new project, Ageless Linux, has even been created as a Debian fork specifically to protest these laws.
- Slackware Linux, with a developer statement refusing implementation.
- Vendefoul Wolf Linux, with developer statements (second statement) against age verification.
- GrapheneOS (Android-based mobile OS), with a developer statement opposing implementation.
- Garuda Linux, with a developer statement confirming refusal.
- Void Linux, with a developer statement against implementation.
Other major distributions are planning to comply, even when their developers disagree with the mandates.
- Ubuntu is in the planning stages, with a planning discussion On the unfortunate need for an "age verification" API for legal compliance reasons in some U.S. states and an acknowledging the need to follow the law.
- Pop!_OS from System76 has stated it opposes the laws but is planning to implement the required features.
- elementary OS's founder has stated they will comply, with a founder statement confirming their intention.
- Midnight BSD has [temporarily forbidden usage in Brazil and California]https://x.com/midnightbsd/status/2030992394703732872) until its implementation is finished, highlighting the legal pressure these projects are under.
- Fedora Planning Discussion The currently supported approach, by the Fedora Project Leader (a Red Hat employee), appears to be officially adopting Apple's API regarding Age Verification.
A crucial expansion of this tracking is proposed in Pull Request #5, which argues that if the OS is compromised, "there is no more web." This PR broadens the scope to include the entire software stack, showing how age verification is embedding itself at every layer.
- System Components:
- systemd: A
birthDatefield has already been merged into the project, with attempts to revert it rejected. This is a foundational change affecting countless Linux systems. Related article (A Microsoft employee added an age verification API to systemd, raising concerns about corporate influence over Linux’s core infrastructure.)
An Alternative to systemd: Liberated systemd: A hard fork that reverts the surveillance‑enabling commits (including age verification). It tracks upstream changes weekly and provides a privacy‑preserving alternative without introducing new features. - XDG Desktop Portal: A draft pull request for age verification exists, but its discussion was locked by maintainers, indicating deep controversy.
- archinstall: A pull request is open for age verification and awaiting a stance from the Arch Linux organization.
- F-Droid: Ongoing discussions are taking place, though it may be out of scope as a nonprofit.
- systemd: A
Systemd Free Linux
- Devuan: A Debian fork that replaces systemd with sysvinit, runit, or OpenRC. https://www.devuan.org
- Alpine Linux: A security-oriented, lightweight distribution using musl and OpenRC. https://alpinelinux.org
- Void Linux: An independent rolling-release distribution with runit and XBPS. https://voidlinux.org
- Artix Linux: An Arch-based rolling distribution offering OpenRC, runit, s6, and dinit. https://artixlinux.org
- antiX: A Debian-based, ultra-lightweight distribution with runit, dinit, s6, or sysvinit options. https://antixlinux.com
- Slackware: The oldest actively maintained distro; uses traditional sysvinit (and elogind, but not systemd). https://www.slackware.com
- Gentoo: A source-based distribution where you choose your init system (OpenRC, s6, or systemd). https://www.gentoo.org
- KISS Linux: An independent, ultra-minimalist source-based distro using busybox init. https://kisslinux.org (Note: official site may be intermittently available)
- Obarun: An Arch-based distribution using s6 as the init system. https://obarun.org
- Puppy Linux / EasyOS: Ultra-lightweight, Busybox-init-based distros focused on simplicity. https://puppylinux.com / https://easyos.org
- GoboLinux: A unique distro with a custom SysVinit-based system and a hierarchical filesystem. https://gobolinux.org
- CRUX: A lightweight, source-based distro using BSD-style init scripts. https://crux.nu
- Source Mage GNU/Linux: A source-based distro with a dedicated systemd-free channel. https://sourcemage.org
- Debian: The standard installer defaults to systemd, but the Debian Net Install allows selecting alternative init systems (sysvinit, OpenRC) during installation via expert mode. https://www.debian.org
-
Mobile Operating Systems (Already Live):
- Android: The "Play Age Signals API" is Play Age Signals API.
- iOS: The "Declared Age Range API" is Declared Age Range API. This confirms the earlier Fedora discussion about OS-level APIs becoming a reality, and aligns with reporting on Apple's iOS beta screens.
-
Browsers:
- Brave has published a skeptical ZKP analysis but has not implemented any age verification.
- Firefox has made no public statement regarding these specific laws.
- Chromium/Chrome has no formal statement on the specific laws, leaving a massive question mark over the future of web browsing on open source systems.
-
Video Platforms (Both Already Live):
- YouTube is using AI age estimation + Yoti facial scan, live in the UK, EU, and Australia, and rolling out in the US. This aligns with Ofcom's guidance on "highly effective" age assurance methods.
- TikTok uses signal-based detection + Yoti, live globally and complying with Brazil under ANPD order.
-
Messaging Apps:
- Telegram has an official age verification bot live in the UK.
- WhatsApp's "AgeKey Phase 1" is rolling out.
- Discord has delayed its rollout to H2 2026, notably after suffering a data breach of age verification ID data in October 2025 ( statement from discord )—a stark real-world example of the security risks highlighted earlier.
- Matrix is evaluating privacy-preserving compliance options, with no decision yet.
- Signal has made no statement beyond its 13+ Terms of Service.
-
Additional Distros with Ongoing Discussions:
- NixOS, Fedora, Debian, and EndeavourOS are all discussing the issue with no decision yet.
- Fedora discussions can be followed on Fedora Discussion.
- Debian community discussions are happening on the Debian mailing lists.
- Whonix/Kicksecure is investigating a privacy-preserving approach.
- QubesOS: PrivacyGuides.net article - Forum Discussion
- Bazzite: The Brazil block was a mistake, with no official position currently.
This repository and its PR illuminate the core dilemma. As the PR author notes in Pull Request #5, the industry push is for OS vendors to handle verification: "Zuckerberg's entire push is to take the heat (and work required) off of apps and platforms and put them on the OS. If an app can't verify I am assuming they will just be locked."
The PR author further warns: "If the OS is age-gated, everything that executes on it is age-gated, by extension... Apps can be replaced but if the OS is compromised there is no more web :("
The fragmentation is severe—every distribution is considering a different technical and philosophical solution. This lack of a unified, privacy-preserving standard (like the local API discussed in the Fedora thread) leaves the door open for invasive, surveillance-based methods to become the default. The battle for the future of a free and open internet is quite literally being fought in these pull requests, forum discussions, and distribution mailing lists.
🎮 Xbox and Microsoft: Platform-Level Age Verification Arrives on Consoles and PC
The gaming world is becoming a major front in the age verification battle, with Microsoft rolling out its compliance measures for the UK's Online Safety Act. As reported by GameSpew, Xbox users in the UK are now being notified to verify their age, with full enforcement scheduled for early 2026.
According to Microsoft's announcement on Xbox Wire, the process applies to players who indicate their account age as 18 and over and are based in the UK. The verification is described as a "one-time process" handled by a third-party service, offering four methods:
- Uploading a photo of government ID
- Live photo facial age estimation
- Credit card check
- Mobile provider check (by inputting a mobile number)
Once enforced, any UK user who hasn't completed age verification will have limited access to social features, including communication tools and game invites. This directly implements the platform-level controls discussed in the UK's Online Safety Act guidance.
The privacy implications are significant. As GameSpew notes, supplying personal data to "an unknown third party" should be approached with skepticism, yet users are being forced into this under the guise of online safety. The verification methods mirror those listed in Ofcom's guidance on "highly effective" age assurance.
Most concerning for the future: Microsoft states this UK rollout is just the beginning. They explicitly plan to "evaluate how [they] can keep players around the world safe" and expect to roll out age verification processes to more regions if the UK implementation is deemed successful. This confirms the "voluntary-to-mandatory" pipeline identified earlier—what starts as a UK-specific requirement will likely expand globally.
Companies lobbying for age verification playng the scapegoats/figureheads for global plans to push it forward from their investors.
💰 The $2 Billion Lobbying Machine: How Meta Engineered the Age Verification Push
Behind the legislative surge in age verification laws lies a sophisticated, multi-channel influence operation led by Meta, documented in exhaustive detail by an open-source intelligence investigation now hosted on GitHub. What emerges is not a grassroots movement for child safety, but a $2 billion dark money campaign designed to shift regulatory burden onto competitors while exempting Meta's own platforms.
The investigation, first highlighted by a Reddit user and discussed extensively on Resetera, traces Meta's influence through five confirmed channels:
-
Direct Lobbying: Meta spent a record $26.3 million on federal lobbying in 2025, deploying 86+ lobbyists across 45 states. Their own Senate LD-2 filings explicitly list the App Store Accountability Act (ASAA) as a lobbied bill. In Louisiana alone, 12 lobbyists were deployed for a single bill that passed 99-0.
-
The Digital Childhood Alliance (Astroturf Advocacy): Meta covertly funds the Digital Childhood Alliance, a 501(c)(4) "grassroots" group launched on December 18, 2024. As Bloomberg reported, the site was fully formed within 24 hours. Its EIN 33-2669790 reports under $25,000 in gross receipts—impossible for an organization coordinating a 20+ state legislative campaign with paid staff and commissioned polling. The real money flows elsewhere.
-
Super PACs ($70M+): Meta committed over $70 million to four state-level super PACs, including the $45 million ATEP (co-led by Hilltop Public Solutions). These entities are registered at the state level rather than with the FEC, scattering disclosure filings across individual state ethics commissions to evade centralized tracking.
-
The Arabella Network Connection: Meta's Colorado lobbyist Adam Eichberg simultaneously chairs the New Venture Fund board, flagship entity of the Arabella Advisors dark money network. Analysis of 4,433 grants totaling approximately $2.0 billion across all five Arabella entities found zero dollars going to any child safety organization—ruling out one pathway while pointing to even more opaque fiscal sponsorship arrangements.
-
State Legislative Campaigns: ASAA has been signed into law in Utah (SB-142), Texas (SB 2420), Louisiana (HB-570), and Alabama, with roughly 17 additional states considering similar bills. A Meta lobbyist drafted HB-570's legislative language, confirmed by the bill's sponsor.
The technical mandate at the heart of these bills is deceptively simple but profoundly transformative. As the investigation explains, proposed laws would embed persistent identity verification directly into operating systems—creating a permanent identity layer baked into your phone's core functions that every app can query.
Meta's Horizon OS for Quest VR already implements this infrastructure through Family Center controls. Now they want Apple and Google to build similar systems into every device, turning age verification into persistent device fingerprinting. The Resetera thread captures the sentiment: "Your device's trustworthiness hangs in the balance. These laws could force every Linux distribution and privacy-focused Android fork to implement identity verification or face legal liability."
Here's where the lobbying gets surgical. The proposed laws hammer Apple's App Store and Google Play with compliance requirements but reportedly spare social media platforms—Meta's core business. Every confirmed ASAA supporter (Snap, X, Pinterest) is a social media platform that benefits from shifting age verification to the app store layer. Every confirmed opponent operates an app store that would bear the compliance burden.
As one Resetera user noted: "It's like Spotify lobbying for streaming regulations that only apply to Apple Music. The 'child safety' rhetoric masks a competitive strategy that shifts liability from platforms to operating system makers."
The investigation reveals how the Heritage Foundation serves as an "institutional credibility launderer." Heritage awarded Innovation Prizes to three of six named DCA coalition members, including NCOSE ($50K) and the Institute for Family Studies ($50K). Heritage staffs the advocacy pipeline through the Mike Lee (R-UT) to Heritage to DCA pipeline, forming a closed policy loop: Meta funds DCA, DCA's core members are Heritage-funded, Heritage provides conservative institutional credibility.
The EU's eIDAS 2.0 framework offers a starkly different approach. The European Digital Identity Wallet uses zero-knowledge proofs—cryptographic methods that let you verify age without revealing personal data. You can prove you're over 18 without disclosing your birthdate or any other identifying information. It's open-source, self-hostable, and applies only to large platforms while exempting FOSS and small entities.
As the Yahoo News summary observes: "US lawmakers seem ready to let Meta bamboozle them into complete privacy annihilation" while Europe demonstrates that privacy-preserving age verification is technically feasible.
The investigation's 50 proven findings paint an unmistakable picture: Meta has constructed a multi-channel influence operation spanning corporate spending, think tank infrastructure, dark money networks, and competing model legislation templates—all designed to pass age verification laws that burden competitors while leaving Meta untouched. The Resetera thread concludes: "It was never about 'the children.' Anyone finding themselves arguing in favor of whatever Meta wants ought to see that as a red flag."
The choice before lawmakers is whether to follow Meta's playbook toward OS-level surveillance infrastructure, or Europe's path toward privacy-preserving, zero-knowledge verification. The $2 billion question is which path will prevail.
🔍 The System's Demonstrated Purpose: POSIWID in Practice
The British cybernetician Stafford Beer coined the phrase "The purpose of a system is what it does" (POSIWID) . This is a crucial analytical lens. You must judge a technology, company, or government program not by its marketing or stated mission, but by its observable actions and outputs. The documents gathered provide powerful case studies.
- Digital IDs & Wartime Tools: The system's purpose is revealed by its function. Ukraine's Diia app, initially launched for civilian services and "vaccine passports," was rapidly converted into a wartime tool. Its purpose became real-time intelligence gathering (via a chatbot for reporting troop movements), financial warfare (crowdfunding the military), and information operations (streaming state news). This demonstrates how a centralized digital ID system is inherently dual-use, and its purpose can shift instantly based on the needs of the state, not the user.
- Smart Home Devices as Surveillance Networks: Amazon's Ring, as detailed in the California Law Review, presents itself as a home security tool. However, its purpose, demonstrated through its partnership with over 400 law enforcement agencies, is to create a crowd-sourced, warrantless surveillance network. The system's design, which coaches police on how to request footage and defaults users into receiving those requests, shows its true function is to lower the barrier for state surveillance of public and semi-public spaces.
- Identity Verification as a Vector for Mass Data Collection: Services like Persona, used for age verification, claim a narrow purpose: confirm your age. However, the system's architecture, as revealed by the Fortune article, performs 269 distinct verification checks, including screening against watchlists for "terrorism and espionage" and assigning "risk scores." Its demonstrated purpose is not just verification, but broad-spectrum data profiling and risk assessment, often with opaque ties to government infrastructure. When you use such a system, you are feeding a much larger machine.
What this means for your threat model: POSIWID forces you to ask hard questions. Is a "smart city" app's purpose to improve traffic flow, or to create a permanent record of all movement? Is an age verification tool's purpose to protect children, or to create a biometric database linked to your online activity? By analyzing what a system does—its partnerships, its data collection, its funding—you can see its real purpose and adjust your OpSec accordingly.
Hardware Privacy / Security:
CPU backdoor modules
Modern CPU platforms embed trusted subsystems that run outside the control of the main OS. The most widely discussed components are:
- Intel Management Engine (ME) — a proprietary microcontroller inside Intel chipsets with deep hardware privileges and (in some configs) network access via AMT.
- AMD Platform Security Processor (PSP) — AMD’s ARM-based co-processor that implements secure boot and platform security.
- ARM TrustZone / Trusted Execution Environments (TEEs) — hardware partitioning widely used on ARM SoCs to create a Secure World for sensitive code.
These subsystems are closed-source and run below the OS, so researchers treat them as high-value attack surfaces. This report sticks to documented facts (CVE entries, vendor security advisories, academic and industry research) and includes links to the original sources.
The Intel Management Engine (ME) (sometimes referred to in parts as CSME/CSME firmware) is a separate microcontroller and firmware stack embedded in Intel chipsets. It performs platform management and security-related functions and is active whenever the system receives power. For details and security advisories see Intel’s product security center.
- Intel security advisories and firmware updates: Intel Product Security Center
Intel regularly publishes advisories for ME/CSME/AMT vulnerabilities. A few concrete, publicly documented advisories / CVEs:
-
INTEL-SA-01315 (Feb 2026) — Intel published chipset/CSME/AMT advisories describing denial-of-service and information-disclosure issues and issued firmware updates.
Intel INTEL-SA-01315 advisory -
INTEL-SA-00783 (2023 / revised 2024) — chipset/CSME advisory listing multiple issues; use this page to check affected platform lists and mitigation steps.
Intel INTEL-SA-00783 advisory -
INTEL-SA-00295 / CVE-2020-0594 — example AMT/ISM IPv6 out-of-bounds read issue allowing unauthenticated denial of service or information disclosure.
Intel INTEL-SA-00295 advisory (includes CVE list)
NVD: CVE-2020-0594 -
Historical AMT/ME CVEs (e.g., CVE-2017-5712) show remote exploitation of AMT/ME components when reachable.
NVD: CVE-2017-5712
What these mean: some ME/AMT/CSME CVEs can be triggered remotely (network) and operate outside the OS, which is why ME is treated as a serious platform risk when vulnerable firmware is present.
-
Firmware updates from OEMs are the primary official mitigation; apply vendor firmware. See Intel advisories linked above.
-
me_cleaner — community tool for partial de-blobbing / neutralization of Intel ME firmware images (reduces runtime functionality and attack surface). Use with caution; flashing modified firmware can brick devices.
me_cleaner (GitHub) -
Vendor approaches: some privacy-focused vendors and open-firmware initiatives attempt to neutralize or minimize ME at runtime (examples below). Behavior and support vary by model and Intel generation — no universal full-removal method exists for modern chips.
AMD PSP (Secure Processor / ASP) is an ARM Cortex-A5 (or similar) core integrated on AMD CPUs that runs a closed firmware stack (sometimes called ASP / Secure OS). PSP handles secure boot, measured boot functions, cryptographic services, and sometimes virtualization/security features.
- AMD product security and firmware bulletins: AMD Product Security
AMD publishes security bulletins covering PSP and related firmware issues. Representative examples:
-
AMD-SB-5001 (Feb 2024) — lists PSP-related CVEs such as CVE-2020-12930 and CVE-2020-12931 involving improper parameter handling in PSP drivers/kernels.
AMD-SB-5001 (PSP bulletin) -
AMD-SB-5002 (Aug 2024) — additional embedded processor firmware advisories and mitigation guidance.
AMD-SB-5002 (bulletin) -
CVE-2022-23820 / CVE-2022-23821 — high-severity firmware / SMM kernel issues affecting AMD client platforms (SMRAM/SPI ROM access and SMM buffer validation issues). See the NVD and AMD bulletin references for technical details and vendor mitigation guidance.
NVD: CVE-2022-23820
NVD: CVE-2022-23821
What these mean: PSP vulnerabilities commonly require local or privileged access to exploit, but they show that trusted firmware can contain exploitable issues with severe platform-level impact.
- PSPTool / PSPReverse — community tools for extracting and analyzing AMD PSP firmware blobs (useful for research, not for casual disabling).
PSPTool (GitHub) - Research papers demonstrate hardware fault injection and other attacks on AMD secure subsystems (e.g., fault injection research). Example: "One Glitch to Rule Them All" supplemental materials.
amd-sp-glitch (GitHub)
- AMD firmware is signed and required for platform initialization; there is no widely-used neutralizer like me_cleaner for PSP. Firmware updates from OEMs / AMD and secure BIOS settings are the main mitigations.
ARM TrustZone is an architectural extension that divides CPU execution into a Secure World and Normal World, enabling a Trusted Execution Environment (TEE) for secure operations (key storage, secure boot, payment, DRM). TrustZone is not a single closed firmware blob like ME/PSP; it is hardware with vendor-supplied Secure World firmware stacks (many of which are proprietary).
- ARM TrustZone technical overview: Arm: TrustZone for Cortex-A
-
Google Project Zero — "Trust Issues: Exploiting TrustZone TEEs" — in-depth analysis and exploits against real TrustZone TEEs (QSEE/Kinibi), demonstrating how TEE OSes lag in mitigations and how real attack chains were constructed.
Project Zero: Trust Issues: Exploiting TrustZone TEEs -
Academic/systematic reviews of TrustZone/TEE security show many practical attack vectors (TA revocation gaps, memory corruption, lack of modern mitigations).
SoK: Understanding Security Vulnerabilities in TrustZone TEEs (paper)
What these mean: TrustZone hardware is neutral or beneficial by design, but TEE firmware/Trusted Apps frequently contain exploitable problems because many implementations are closed and lack hardening.
| Property | Intel ME / CSME | AMD PSP / ASP | ARM TrustZone (TEE) |
|---|---|---|---|
| Runs below OS? | Yes | Yes | Yes (when Secure World active) |
| Independent network access | Yes (AMT / out-of-band on vPro) | No (not by default) | No (TEE doesn't usually manage NIC) |
| Firmware open? | No (proprietary) | No (proprietary) | TEE OS often proprietary; hardware spec public |
| Typical exploit vector | Network + local | Local / privileged | Local / privileged / side-channel |
| Neutralization available? | Partial (me_cleaner, vendor efforts) | Not generally | Not applicable (hardware feature) |
-
me_cleaner (GitHub) — tool to strip/neutralize ME firmware regions. Use with extreme caution; flashing modified firmware can brick devices.
https://github.com/corna/me_cleaner -
Remove_IntelME_FPT - A guide for disabling Intel Management Engine using FPT on PCH SPI
-
Intel security advisories / vendor firmware updates — official mitigation is vendor firmware; check OEM download pages and Intel advisories listed above.
https://www.intel.com/content/www/us/en/security-center/default.html -
Vendor examples (partial neutralization / open firmware):
- Purism — explains ME neutralization on Librem laptops (historical practices vary by model).
https://puri.sm/learn/intel-me/ - System76 — documents Open Firmware and ME state handling for supported models.
https://support.system76.com/articles/intel-me/
- Purism — explains ME neutralization on Librem laptops (historical practices vary by model).
-
AMD product security bulletins and OEM firmware updates are the primary mitigation path. There is no official/popular neutralizer equivalent to me_cleaner for PSP at time of writing.
https://www.amd.com/en/resources/product-security.html -
PSPTool (GitHub) — firmware analysis / extraction tool for researchers.
https://github.com/PSPReverse/PSPTool
- Use open, auditable TEE implementations where possible (examples: OP-TEE) and apply vendor security updates.
https://www.op-tee.org/
Selected authoritative sources (examples, read these for technical depth)
-
Intel Security Advisories (ME/CSME/AMT):
https://www.intel.com/content/www/us/en/security-center/default.html -
INTEL-SA-01315 advisory (Feb 2026):
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01315.html -
INTEL-SA-00783 advisory (2023 / updated 2024):
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html -
Intel advisory example (INTEL-SA-00295; includes CVE-2020-0594):
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
NVD entry for CVE-2020-0594: https://nvd.nist.gov/vuln/detail/CVE-2020-0594 -
me_cleaner (community tool):
https://github.com/corna/me_cleaner -
AMD Security Bulletins (PSP & embedded processors):
https://www.amd.com/en/resources/product-security.html
AMD-SB-5001: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html
AMD-SB-5002: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html -
NVD entries (examples):
CVE-2017-5712 (Intel AMT): https://nvd.nist.gov/vuln/detail/CVE-2017-5712
CVE-2022-23820: https://nvd.nist.gov/vuln/detail/CVE-2022-23820
CVE-2022-23821: https://nvd.nist.gov/vuln/detail/CVE-2022-23821 -
Project Zero research on TrustZone TEEs:
https://projectzero.google/2017/07/trust-issues-exploiting-trustzone-tees.html -
Academic/systematic survey of TEE vulnerabilities:
https://syssec.dpss.inesc-id.pt/papers/cerdeira-sp20.pdf
Many smaller vendors, open-firmware projects, and hardware suppliers offer machines that ship with or support open firmware (coreboot / Libreboot / Dasharo) — reducing reliance on proprietary BIOS/UEFI and allowing greater control over platform firmware. These vary from full laptops to embedded boards and network appliances.
⚠️ Caution: Support for open firmware and neutralization of proprietary subsystems (e.g., Intel ME) varies by model and vendor. Check specific product documentation before purchasing.
Libreboot is a fully libre distribution of coreboot designed to replace proprietary BIOS/UEFI firmware on select compatible systems. You can also purchase machines with Libreboot pre-installed from associated vendors.
👉 https://libreboot.org (Libreboot main site)
coreboot (formerly LinuxBIOS) is a free and open-source firmware platform that replaces traditional BIOS/UEFI. It is used by many community and vendor projects, including Libreboot, Dasharo, and more:
- Dasharo — a coreboot-based firmware distribution with emphasis on security, stability, and transparency, often used on laptops from community vendors.
- Heads — a coreboot-compatible boot firmware project focusing on secure boot, measured boot, and tamper detection, often paired with a TPM to verify firmware integrity.
- MrChromebox Firmware — community-maintained firmware images for Chromebooks that leverage coreboot/EDK2 to support non-ChromeOS operating systems.
- Skulls — user-friendly coreboot images for ThinkPad laptops.
👉 https://www.coreboot.org (coreboot official project page)
These projects make it easier for users to install and use open firmware on supported systems, increasing transparency and reducing proprietary code in the boot process.
LinuxBoot is another free software firmware project that replaces key parts of UEFI firmware with a Linux kernel and userland tools:
- It runs on top of early firmware (PEI, coreboot, or U-Boot) and boots Linux directly.
- LinuxBoot is already supported on some server platforms and open compute boards.
👉 https://linuxboot.org (LinuxBoot project)
This approach treats the firmware stack more like a small Linux environment rather than a proprietary UEFI runtime, enabling deep customization.
Some independent community projects are pushing open firmware even further on older hardware where firmware signature protections don’t block modification:
- The 15h.org project is developing open-source firmware updates for older AMD Bulldozer/Piledriver platforms, enabling fully open firmware operation without modern signature restrictions.
👉 Search “15h.org firmware support for AMD” (reported project supporting older boards)
These efforts help demonstrate what fully open firmware ecosystems can look like when hardware security restrictions are not enforced.
The following vendors are either referenced directly by coreboot project documentation or widely acknowledged in open firmware communities as shipping systems with coreboot/Dasharo firmware:
Nitrokey refurbishes laptops and sells devices with coreboot + Dasharo firmware and often includes open boot firmware with measured/verified boot options.
👉 https://shop.nitrokey.com (Nitrokey hardware & coreboot)
NovaCustom sells configurable laptops shipped with Dasharo-based coreboot firmware, maintained by 3mdeb, with support for Linux and Windows.
👉 https://novacustom.com (NovaCustom laptops)
Protectli offers Vault network appliances and small PCs with the option of coreboot firmware, or flashing via open tools, often jointly maintained with 3mdeb (Dasharo).
👉 https://protectli.com/coreboot/ (Protectli coreboot info)
Star Labs sells Linux-focused laptops that are available with coreboot firmware and include options such as disabling the Intel Management Engine via NVRAM tools.
👉 https://starlabs.systems (Star Labs laptops)
PC Engines produces embedded hardware (e.g., APU boards) that ship with coreboot firmware and are upstream supported through community channels.
👉 https://pcengines.ch (PC Engines)
Purism sells Librem laptops designed for open source and privacy, with coreboot firmware and ME neutralization as part of their security strategy.
👉 https://puri.sm/learn/intel-me/ (Purism ME/firmware info)
| Vendor / Project | Firmware Type | Notes |
|---|---|---|
| Nitrokey | coreboot / Dasharo | Refurbished open firmware hardware |
| NovaCustom | coreboot / Dasharo | Custom laptops with open firmware |
| Protectli | coreboot / Dasharo | Vault network appliances with coreboot |
| Star Labs | coreboot | Linux laptops with open firmware |
| PC Engines | coreboot | Embedded boards with open firmware |
| Purism | coreboot + ME neutralization | Privacy-focused open firmware laptops |
| Libreboot Project | Libreboot | Fully libre firmware distribution |
- Not all models from the same vendor are open firmware by default — some require user flashing of coreboot/Libreboot.
- On many modern Intel platforms, Intel Boot Guard may prevent flashing alternative firmware unless hardware-specific de-guarding is used (a technical process).
- Some vendors work with firmware integrators like 3mdeb to provide improved firmware quality and security features (measured boot, verified boot).
For users seeking hardware with minimal proprietary subsystems, RISC-V is an emerging alternative:
- It is a completely open instruction set architecture, enabling hardware and firmware designs that are fully open from top to bottom.
- Projects like Raptor Computing Systems offer POWER9-based hardware that eschews Intel/AMD proprietary backplanes in favor of open firmware designs and auditability.
- RISC-V boards (e.g., SiFive) and ecosystem products are growing, providing future paths toward hardware transparency.
Community discussion on RISC-V and alternatives often highlights the lack of opaque controllers like ME/PSP on open architectures.
OS Privacy / Security:
| OS | Type | Best For… | Key Security / Privacy Feature | Trade‑off |
|---|---|---|---|---|
| Qubes OS | Security‑focused Linux (Xen hypervisor) | Users who need strong isolation between activities (e.g., compartmentalised work, high‑threat models). | Compartmentalisation – every app runs in a separate, hardware‑isolated VM (“qube”); disposable VMs; integrated firewall and VPN support. | Steep learning curve; resource‑heavy (needs recent hardware with VT‑x/AMD‑V); some hardware compatibility issues; not for casual use. |
| Proxmox VE | Virtualisation platform (Debian‑based) | Self‑hosting, server virtualisation, labs, and running multiple OSes with high performance. | Flexible virtualisation – supports KVM and LXC; advanced networking; GPU passthrough; open‑source; can be managed via web UI. | Not a desktop OS; requires dedicated hardware or a powerful workstation; administration overhead; less suitable for pure desktop use. |
| Whonix | Anonymity‑focused OS (based on Debian) | Users who need to force all traffic through Tor for anonymity (e.g., activists, journalists). | Tor‑forced networking – two‑VM design (Gateway + Workstation) ensures no IP leaks; transparent Torification. | Slower due to Tor; usability friction; requires virtualisation (VirtualBox or KVM); not a daily driver for most. |
| OpenBSD | BSD Unix | Servers, firewalls, and users prioritising code correctness and minimal attack surface. | Proactive security – extensive code auditing; integrated cryptography; pledge/unveil; minimal default installation; excellent documentation. | Not user‑friendly for beginners; hardware support is limited; desktop experience is rudimentary; niche use. |
| Linux Mint | Desktop Linux (Ubuntu‑based) | Newcomers from Windows who want a polished, user‑friendly experience. | Stable and comfortable – Cinnamon desktop resembles Windows; good driver support; optional telemetry can be disabled. | Privacy is not its primary focus; defaults may include some Ubuntu telemetry; less aggressive hardening out‑of‑the‑box. |
| Pop!_OS | Desktop Linux (Ubuntu‑based, by System76) | Gamers, developers, and users needing good hardware support (especially NVIDIA). | Optimised for workflows – automatic window tiling; out‑of‑the‑box GPU support; System76’s open firmware initiatives. | Still Ubuntu‑based, so inherits some telemetry concerns; privacy not its primary marketing; limited to System76 hardware for full firmware benefits. |
| Fedora | Desktop Linux (upstream of Red Hat) | Users wanting a modern, up‑to‑date distribution with strong security defaults. | Cutting‑edge yet stable – SELinux enabled by default; timely security updates; strong open‑source philosophy. | May require manual hardening for extreme privacy; some telemetry? (Fedora generally respects privacy but connects for updates). |
| Debian | Universal Linux | Users who value stability, free software, and broad hardware support. | Rock‑solid stability – strict free software guidelines; security team; can be hardened extensively. | Older packages in stable; may require configuration for advanced privacy; not as user‑friendly as Mint/Pop!_OS. |
| Arch Linux | Rolling‑release Linux | Enthusiasts who want to build their system from the ground up. | Minimal and transparent – no unnecessary packages; user controls every component; excellent documentation (Arch Wiki). | Not beginner‑friendly; requires constant attention to updates; manual configuration for privacy. |
| Windows (AME / Atlas / Revi) | Modified Windows (based on Windows 10/11) | Users forced to use Windows but wanting to strip telemetry, bloatware, and surveillance features. | Aggressive debloating – AME Playbooks, AtlasOS, ReviOS, RapidOS remove telemetry, Edge, OneDrive, and background services; aim for performance and privacy. | Unofficial modifications – no guarantee of security updates; must reinstall to switch playbooks; can break Windows Update; not recommended for high‑risk users. |
| Windows (stock) | Proprietary OS | General users who need compatibility with proprietary software and games. | – | Designed for data collection – extensive telemetry, forced updates, advertising in UI, integration with Microsoft services. |
- Qubes is recommended for those with the highest threat models, especially when combined with Whonix (via the built‑in Whonix templates).
- Proxmox is praised for self‑hosting and virtualisation, particularly for GPU passthrough and LXC containers.
- OpenBSD is noted for its minimal attack surface but is not a daily driver for most desktop users.
- Windows modifications (AME, Atlas, Revi, Rapid) are presented as a way to salvage privacy on Windows, but they are unofficial, require a clean install, and may introduce stability or security risks.
#1 QubesOS - For heightened Security / Pirvacy and a compartmented OS on a single PC via the Xen hypervisor base. features some very interesting methods for security and is worth checking out if you value security / privacy as your top priority.
Additional Qubes resources:
Additional Resources:
Qubes - Community Guides - a List of Guides directly from the QubesOS Community.
Qubes network server - Turn your Qubes OS machine into a network server
saltstack configs - This let's you declaratively manage your whole system.
Ansible plugins for QubesOS - Ansible module and connection plugin for Qubes OS
Qubes OS installation guide
XDA - Qubes OS is the perfect operating system for security-conscious users
QubesOS setup & configuration - Instructions, scripts and files for installing and configuring QubesOS (including VPN and Crpto wallet suggestions.)
Disposables:
How to use disposables - A disposable is a stateless qube, it does not save data for the next boot. These qubes can serve various uses cases that require a pristine environment
Another option for VMs less security focused and headless meant for a server, but some better features:
[Proxmox](https://www.proxmox.com/en/) - For virtualization, self-hosting and all around general usage. it can even be used for gaming and other high performance tasks such as AI within VMs/Containers.
Additional Proxmox resources:
Proxmox VE Helper scripts - Hundreds of scripts to quickly setup a wide range of projects on proxmox.
ProxMenux - Seperate Dashboard / CLI menu with more information & management options handy for proxmox management.
XDA - A beginner's guide to setting up Proxmox
Proxmox Beginner Tutorial: How to set up your first virtual machine on a secondary hard disk.
GPU related:
Simultaneous Intel GVT-G and Nvidia PCIe GPU Passthrough in Proxmox
nvidia:
Jellyfin LXC with Nvidia GPU transcoding and network storage
intel:
Enable Mediated Intel iGPU (GVT-g) for VM's in Proxmox (with Plex)
[Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC
XDA - I tried gaming on a VM hosted on a Proxmox server – here’s how it went
XDA - Running Proxmox VMs with GPU passthrough is much easier than it used to be
Windows Gaming VM on Proxmox: Performance Optimization in MSFS 2020
Other options:
- Whonix – https://www.whonix.org/
- OpenBSD – https://www.openbsd.org/
- Linux Mint – https://linuxmint.com/
- Pop!_OS – https://pop.system76.com/
- Fedora – https://fedoraproject.org/
- Debian – https://www.debian.org/
- Arch Linux – https://archlinux.org/
Windows related:
Windows Ansible Playbook - AME Playbooks: AME Wizard NOTE: if you ever need to uninstall a playbook, you'll need to reinstall Windows.
windows-playbooks - Windows setup and configuration via Ansible.
AtlasOS - AtlasOS - Github - An open and lightweight modification to Windows, designed to optimize performance, privacy and usability.
ReviOS Playbook - A lightweight, stable, and performance-focused customized version of Windows that enhances privacy and compatibility
Redress Server PlayBook - Windows server 2022 -
RapidOS - RapidOS is a powerful modification for Windows 10/11 that radically transforms the OS through deep customization, while maintaining rock-solid stability through the AME Beta playbook system.
Rapid - A tailor-made modification of Windows designed for maximize Gaming performance and latencies.
Windows Group Policy:
Group Policy settings to improve privacy/security
30 Critical Group Policy Settings to Secure & Optimize Windows -
Privacy and security baseline for personal Windows 10 and Windows 11 -
Windows On Reins - Wor is a Powershell script to harden, debloat, optimize, enhance privacy, avoid fingerprinting and improve performance on Windows 10 and 11.
PC-Optimization-Hub - collection of various resources devoted to performance and input lag optimization
-
pluja/Awesome Privacy - A curated collection of privacy-focused software and tools designed to enhance your online and offline privacy and security.
-
paulaime/Awesome-Privacy - A curated list of tools and services that respect your privacy.
| Tool | Platform | Type / Key Feature | Licensing | Trade‑off / Note |
|---|---|---|---|---|
| OpenSnitch | Linux | Interactive application firewall; outbound connection filtering, system‑wide blocklists, nftables integration. | Open source (GPL) | Requires manual rule management; learning curve for advanced features. |
| SimpleWall | Windows | Lightweight front‑end for Windows Filtering Platform (WFP); blocks all apps by default; built‑in telemetry blocklist. | Open source (GPLv3) | No interaction with Windows Firewall; temporary rules reset on reboot; requires admin rights. |
| Little Snitch | macOS | Network monitor with per‑app connection alerts; DNS encryption (DoH/DoT/DoQ); blocklist support. | Proprietary (commercial) | Paid software (30‑day trial); macOS only; advanced features may be overwhelming for casual users. |
| Safing Portmaster | Windows / Linux | Network monitor and firewall; blocks trackers by default; offers “SPN” (privacy network) add‑on. | Open source core; free | Still in active development (v2 stable available); some features require paid SPN subscription. |
| NetLimiter | Windows | Per‑application bandwidth limits, real‑time monitoring, connection blocking, quotas. | Proprietary (commercial) | Paid software (free trial); Windows only; primarily focused on bandwidth control rather than outbound filtering. |
- Linux: OpenSnitch - Network monitoring and rule-based control.
- Windows: SimpleWall - Windows firewall management and rules.
- Mac: LittleSnitch - Network monitoring and control.
- Win/Linux: Safing Portmaster.
- Windows: NetLimiter - Per-application bandwidth limits.
Windows:
- Windows 10/11 Optimization & Customization Guide - A comprehensive guide that helps optimize and customize Windows 10/11 for improved performance, privacy, and overall system experience.
- Microsoft Edge Removal - A tool to fully remove Microsoft Edge from Windows, ensuring it is completely deleted and no longer part of your system.
- OneDrive-Uninstaller - A tool for completely uninstalling OneDrive from your system, preventing it from syncing and taking up system resources.
- Dism++ - A powerful system tool for managing Windows image files, providing options for system cleanup, privacy tweaks, and optimizations.
- Blackbird - A privacy-focused tool that disables tracking, telemetry, and other unwanted data collection by Windows, offering enhanced privacy on your system.
- 10AntiSpy - A privacy-focused tool for disabling unwanted Windows 10 features such as telemetry, Cortana, and other data collection mechanisms.
- UWT4 - A comprehensive tweak tool for Windows 10 that allows you to customize various system settings and privacy options, improving performance and security.
- Win10BloatRemover - A tool that helps you remove bloatware and unwanted apps from Windows 10, freeing up space and improving system performance.
- Intelligent Standby List Cleaner - A tool to reduce system stuttering and improve performance by clearing the standby memory list, optimizing RAM usage.
- Destroy Windows 10 Spying - A privacy tool designed to disable telemetry, tracking, and data collection features in Windows 10 for improved privacy and control.
Older versions some people will still desire to use:
- Windows 7 ESU Patching - A guide for patching Windows 7 Extended Security Updates (ESU) to keep receiving updates and security patches after official support ends.
- Windows 7 Service Pack 2 - A community-driven project to create an unofficial Windows 7 Service Pack 2, adding new features, bug fixes, and improvements to Windows 7.
- Windows 7 SP4 Unofficial - An unofficial Service Pack 4 for Windows 7, designed to enhance the system with additional updates and fixes after the official support ended.
- Windows-7 on Modern Hardware - A guide for installing and running Windows 7 on modern hardware, with advice on drivers, patches, and compatibility tweaks.
- Windows 7 Fan-Made Survival Guide - A fan-made survival guide for using Windows 7 in the modern era, offering tips, tweaks, and tools to keep Windows 7 functional and secure.
the next critical layers of your digital life: the applications you use daily and the operational habits that can either protect or betray you.
This section aims at providing clear comparisons, mitigation strategies, and links to sources. We will explore privacy-respecting browsers, mobile operating systems, secure email providers, encrypted cloud storage, and the crucial concept of operational security (OpSec).
The browser is arguably the most important piece of software on any device. It's the primary interface to the internet and a massive attack surface for tracking, fingerprinting, and data collection. Moving away from mainstream, data-hungry browsers like Google Chrome and Microsoft Edge is a foundational privacy step.
⚙️ The Browsers' Role in the Censorship-Industrial Complex
The browser is your agent on the internet. Choosing one that is aligned with the "Censorship-Industrial Complex" fundamentally undermines your privacy and access to information. The documents reveal this complex is not a theory, but a well-funded reality.
- Government-Led Censorship Infrastructure: Lawsuits and investigations have uncovered a sprawling network of federal agencies (including the White House, HHS, DHS, CISA, CDC, FBI, and State Department) that systematically pressured social media platforms to censor speech. This wasn't a suggestion; it was a coordinated pressure campaign. The browser is the endpoint where this censorship is enforced.
- AI-Powered Pre-Censorship: The government is actively funding the development of AI and machine learning tools (through grants detailed in The Federalist) to monitor "everything every American says on the internet." The goal is "preemptive censorship"—identifying and suppressing "problematic" narratives before they go viral. The World Economic Forum has explicitly called for merging human and AI systems to stop "online harms" before they are even published, meaning monitoring keystrokes in real-time.
- The Advertising Cartel as an Enforcer: Groups like the Global Alliance for Responsible Media (GARM), a coalition of the world's biggest advertisers representing 90% of global ad spend, use their economic power to dictate what content is permissible. They work with organizations like NewsGuard to create blacklists, effectively defunding any outlet that doesn't conform to their ideology. A browser that doesn't actively resist this (like Chromium-based browsers that rely on the ad-funded web) is a participant in this system.
Browser Implication: Mainstream browsers (Chrome, Edge, Safari) are the primary vehicles through which this censorship and surveillance are delivered. Their default settings, partnerships, and business models are aligned with data collection and content control. A privacy-respecting browser like LibreWolf, Mullvad Browser, or a hardened Firefox (with Arkenfox user.js) is not just a tool for privacy; it is an act of resistance against this entire apparatus. It's a choice to opt out of the "Censorship-Industrial Complex."
Here are the leading privacy-focused alternatives, categorized by their philosophy and threat model.
| Browser | Engine | Best For... | Key Privacy Feature | Trade‑off |
|---|---|---|---|---|
| LibreWolf | Gecko (Firefox) | Advanced users wanting maximum hardening out‑of‑the‑box. | Anti‑fingerprinting; removes all Mozilla telemetry; includes uBlock Origin. | Can cause site breakage; no legal entity; no auto‑updates; explicit political stance. |
| Mullvad Browser | Gecko (Firefox) | Anonymity without the Tor network; pairing with a trusted VPN. | Designed to make all users look identical; clears all state on close. | Not a Tor replacement; requires a VPN for IP anonymity; usability friction. |
| Tor Browser | Gecko (Firefox ESR) | High‑risk anonymity needs (journalists, activists, dissidents). | Routes all traffic through the Tor network; New Identity feature. | Slow; frequent site breakage due to high‑security network. |
| Brave | Blink (Chromium) | Everyday users wanting strong, easy privacy with good usability. | Blocks ads/trackers by default; built‑in fingerprinting protection; offline Tor window. | Chromium‑based; past controversies (affiliate hijacking); built‑in crypto may be unwanted. |
| GNU IceCat | Gecko (Firefox) | Free software purists who prioritise ideology over convenience. | LibreJS blocks non‑free JavaScript; pre‑hardened; removes all proprietary components. | Strict blocking breaks many websites; volunteer‑run with potential update delays. |
| ungoogled‑chromium | Blink (Chromium) | Users who need Chromium compatibility without Google integration. | Removes all background requests to Google services. | Small team can lag behind security updates; pre‑built binaries carry tampering risk. |
| Falkon | Qt WebEngine (Chromium) | KDE users wanting a lightweight, integrated browser. | No unsolicited connections; built‑in ad blocking. | Not all privacy features enabled by default; basic ad blocking. |
| qutebrowser | Qt WebEngine (Chromium) | Vim users wanting a keyboard‑driven, minimalist browser. | Does nothing without user consent; highly configurable. | DNS prefetching on by default; ad blocking is hosts‑file based. |
| Orion (Kagi) | WebKit | Mac/iOS users who want WebKit speed with Chrome/Firefox extension support. | Zero‑telemetry; built‑in ad blocking; supports custom blocklists. | Paid model for full features; extension compatibility not universal; Linux/Windows are alpha. |
| Iceraven (Android) | Gecko (Fenix) | Android enthusiasts who want maximum customisation and add‑on support. | Expanded add‑on support; direct about:config access; removes most telemetry. |
No warranties or guarantees; most add‑ons do not work; binaries signed with debug key. |
| Best For... | Key Privacy Feature | Trade‑off |
|---|---|---|
| Apple ecosystem users wanting a solid, integrated baseline. | Intelligent Tracking Prevention (ITP) is highly effective; good fingerprinting resistance. | Tied to Apple ID and telemetry; limited extension ecosystem; engine is proprietary to Apple. |
| Best For... | Key Privacy Feature | Trade‑off |
|---|---|---|
| Users who want a balance of mainstream support and tweakability. | Highly configurable; can be hardened with Arkenfox user.js for extreme privacy. | Not private out‑of‑the‑box; phones home to Mozilla; Cloudflare DoH integration; Google funding creates conflict of interest. |
🦊 LibreWolf: The Hardened Firefox
LibreWolf is a fork of Firefox with a singular mission: to maximize privacy and security. It's not just Firefox with some add-ons; it's a fundamentally reconfigured browser that strips out telemetry, resists fingerprinting, and prioritizes user protection over convenience.
What it is:
LibreWolf is a community-driven, open-source browser based on Firefox. It acts as a drop-in replacement that feels familiar to Firefox users but operates with a dramatically different philosophy. It comes with a custom user.js file that contains hundreds of hardening preferences, applied before you even open the browser for the first time .
Key privacy & security features:
- Telemetry Removal: All communication with Mozilla servers (telemetry, studies, experiments) is disabled. Firefox Sync is also disabled by default, though it can be optionally enabled by the user.
- Out-of-the-Box Hardening: Unlike Firefox, which requires manual tweaking, LibreWolf ships with aggressive privacy settings:
- uBlock Origin is included and pre-configured in advanced blocking mode.
- Strict anti-fingerprinting: It resists techniques used to create a unique browser fingerprint.
- Forces HTTPS on all connections where possible (HTTPS-Only Mode).
- Deletes cookies and website data upon browser close by default.
- Search Default: The default search engine is DuckDuckGo, not Google. It also offers other privacy-respecting alternatives like MetaGer, SearXNG, and StartPage in its dropdown.
- State-Level Partitioning: This advanced feature isolates website data (like cookies and caches) to the domain they came from, making it much harder for trackers to follow you across different sites.
Criticisms and trade-offs:
- Project Structure & Updates: There is no legal entity behind the project, meaning there are no legal ramifications if something goes wrong. The binaries aren't signed, and there is no auto-update mechanism. On Windows, users must rely on a third-party updater, which introduces a middleman and potential security risks. This means LibreWolf is often behind on critical security updates compared to Firefox .
- Outgoing Connections: Despite its privacy focus, a network analysis reveals that the very first time LibreWolf is started, it contacts domains like Mozilla's add-on CDN and Amazon Cloudfront, even with automatic updates disabled. The project justifies this as necessary for updating blocking lists, but critics argue that all update features should be opt-in to prevent any potential privacy leak (e.g., revealing IP address during a VPN failure) .
- Political Stance and Censorship: The project lead, known only as "ohfp (she/her)," has explicitly declared that LibreWolf is "very woke by design" and that the browser is not merely a technical tool but a political platform . This stance has translated into active moderation policies:
- Users and content associated with figures like Lunduke (of the Lunduke Journal) have been banned from project communication channels. When Lunduke himself entered the project's Matrix chat to ask a polite question, he was immediately told "If you are the real Lunduke, please leave" and subsequently banned .
- The stated reason for such bans is that the project considers certain individuals or viewpoints "far-right," "anti-queer," or "racist." The lead developer has stated: "If I kick out a hundred racists and that makes a single person from a minority feel safer, it's worth it" .
- Any attempt to discuss these bans or question the project's leadership reportedly results in immediate banning . A user who opened a polite issue on the project's Codeberg page asking the developers to "keep LibreWolf focused on its core values (no politics!)" received a sarcastic response: "Thanks for enlightening us and making us realize the error of our ways! wasting our time with this issue," before the discussion was locked .
- They also within their rant about the "far right" proclaimed pro-censoship veiws, as long as it was against people they disagree with. which i personally also find concerning.
- Lack of Transparency: The project is led by anonymous figures. The primary maintainer operates under a pseudonym with no real name or verifiable history disclosed. The project website lacks an "About Us" page, and the lead's GitHub profile is largely empty . For a browser handling sensitive user data, this anonymity, combined with the explicit political agenda, raises concerns about accountability and trust .
- Site Breakage: The strict privacy and fingerprinting protections can cause some websites to function incorrectly or break entirely. This is the price of high security.
Installation and resources:
- Official Download: https://librewolf.net/
- Documentation: https://librewolf.net/docs/
- Key Hardening Reference (for any Firefox-based browser): The
user.jsproject https://github.com/pyllyukko/user.js provides a comprehensive configuration file for hardening Firefox, which forms the basis of LibreWolf's philosophy.
🦁 Brave: The Privacy-Questionable Contender
Brave is a Chromium-based browser that promises privacy with built-in ad-blocking and content-blocking protection. It also offers several quality-of-life features and services, like a VPN and Tor access.
What it is: Brave is a free and open-source web browser developed by Brave Software, Inc. based on the Chromium web browser. It blocks ads and website trackers by default, and allows users to opt into privacy-respecting ads that reward them with Basic Attention Tokens (BAT).
Key privacy & security features:
- Built-in Ad & Tracker Blocking: Blocks unwanted content by default, improving both privacy and page load speeds.
- Brave Shields: Provides granular control over fingerprinting protection, cookies, and HTTPS upgrades on a per-site basis.
- Offline Private Window with Tor: Allows users to browse .onion sites and use the Tor network directly from a private window (though this is not a replacement for the Tor Browser).
- Crypto Wallet: Includes a built-in cryptocurrency wallet for interacting with Web3 and managing BAT rewards.
Criticisms and controversies:
- Affiliate Link Hijacking: Brave was found to automatically redirect users to cryptocurrency exchange Binance using an affiliate referral code, meaning Brave profited from user traffic without clear disclosure. While this was removed, it damaged trust.
- "Phoning Home" and Privacy: Despite its privacy promises, network analysis shows that as soon as the browser is started, it begins contacting various domains, including Amazon services. Critics argue a truly private browser should not make any network connections without explicit user consent.
- Crypto and Business Model: The browser's heavy integration with cryptocurrency (BAT) and its CEO's focus on blockchain-based advertising raise concerns. Critics argue this creates a conflict of interest, where the company's revenue model still fundamentally relies on advertising. Ads are still present in the UI out-of-the-box (e.g., Brave Rewards ads).
- Founder's Background: Brendan Eich, the CEO and co-founder, faced significant controversy when he was appointed CEO of Mozilla in 2014. This stemmed from a 2008 donation he made to California's Proposition 8, which sought to ban same-sex marriage. While some argue his personal political beliefs are irrelevant to his professional work, others feel it reflects on the company's values.
- Marketing and "Empty Promises": Some critics label Brave's marketing as misleading, positioning it as a privacy savior while engaging in the same data-driven advertising ecosystem it claims to disrupt.
Installation and resources:
- Official Download: https://brave.com/
🦡 Mullvad Browser: Anonymity-First, VPN-Ready
The Mullvad Browser is a unique collaboration between the Tor Project and Mullvad VPN. It's a hardened version of Firefox designed to minimize tracking and fingerprinting, with the explicit goal of being used with a trustworthy VPN. It brings the Tor Browser's philosophy of "all users look the same" to the wider web.
What it is: The Mullvad Browser is a privacy-focused browser that bundles the Tor Browser's anti-fingerprinting patches and privacy enhancements. However, it is not connected to the Tor network by default. Instead, it's designed to be used with a VPN (like Mullvad's own service) to provide anonymity. If you use it without a VPN, your IP address is still exposed, but you benefit from its fingerprinting defenses .
Key privacy & security features:
- Anti-Fingerprinting: It inherits the Tor Browser's meticulous approach to making all users of the browser appear identical. This includes spoofing screen dimensions, limiting available fonts, and standardizing other browser attributes that are typically used for fingerprinting .
- Letterboxing: A technique that adds padding around a browser window to prevent websites from using the exact window size as a fingerprinting vector.
- No Persistent State: By default, it acts like a private browsing window. History, cookies, and site data are cleared when the browser is closed. This is intentional to prevent long-term tracking.
- First-Party Isolation: This feature ensures that trackers embedded on different websites cannot share information about you, as your identity is isolated to the main domain you are visiting.
- Integration with Mullvad VPN: It can be configured to work seamlessly with the Mullvad VPN client, adding another layer of IP protection on top of its fingerprinting defenses.
Trade-offs and considerations:
- Not a Tor Replacement: It does not route traffic through the Tor network. For anonymity against network-level adversaries, you must pair it with a trusted VPN (or use the Tor Browser instead). Its strength is in application-level uniformity, not network-level anonymity .
- Usability Friction: Like the Tor Browser, some features that compromise privacy (like WebGL or certain JavaScript APIs) are limited or disabled, which can affect website functionality.
- VPN Dependency for Complete Anonymity: To achieve full anonymity, you need a VPN that doesn't log your activity. Mullvad VPN is a strong choice, having passed multiple independent audits confirming its no-logs policy .
Installation and resources:
- Official Download: https://www.mullvad.net/en/download/browser/
- Mullvad VPN Security Audits: https://mullvad.net/en/blog/tag/audits/ (See audit reports confirming no-log policy) .
🧅 Tor Browser: The Gold Standard for Anonymity
The Tor Browser is the culmination of years of work by the Tor Project. It is the only browser that provides both application-level fingerprinting protection and network-level anonymity by routing traffic through the Tor network. It is designed for users with the highest threat models.
What it is: The Tor Browser is a modified version of Firefox ESR (Extended Support Release). It includes numerous patches to enhance privacy and integrates the Tor network for routing all traffic. It is the primary tool for people who need to protect their identity from state-level surveillance, such as journalists, activists, and whistleblowers .
Key privacy & security features:
- Network Anonymity: Your traffic is bounced through a series of three volunteer-operated relays (nodes), encrypting it multiple times. This makes it nearly impossible for anyone to trace the traffic back to your IP address. The Tor Project has a strict no-logging policy .
- Unified User Base: By making all users look the same (same screen size, same user agent, limited fonts), it creates a large anonymity set. "You are just one of many," making it extremely difficult to single out an individual user based on their browser fingerprint .
- Built-in Defenses: It includes HTTPS-Only mode, disables risky plugins and JavaScript where necessary, and bundles NoScript for advanced script control.
- New Identity Feature: A single click allows you to discard all current browsing data (cookies, history) and open a new browser window with a fresh Tor circuit, effectively giving you a new, clean identity.
Trade-offs and considerations:
- Performance: Routing through multiple relays inherently introduces significant latency. Browsing can be very slow, especially for media-rich websites.
- Website Functionality: Many modern websites rely on technologies or scripts that Tor Browser blocks or limits. Captchas are notoriously frequent and difficult on Tor. Some sites may refuse to function at all .
- Entry Nodes: In censored environments, Tor Browser may use "pluggable transports" to disguise its traffic. The initial connection to fetch bridge information requires a brief non-Tor connection, but the Tor Project does not log this .
- Not for Everyday Browsing: For most users' daily needs, it is too slow and inconvenient. It is a specialized tool for a specific, high-risk purpose.
Installation and resources:
- Official Download & Project: https://www.torproject.org/
- Tor Browser Privacy Policy: https://tor.eff.org/tk/about/privacy_policy/ (Details its zero-data-collection approach) .
🛡️ Other Notable Mentions
While the above browsers represent the pinnacle of specific privacy philosophies, other browsers offer compelling features for different use cases.
Brave is a Chromium-based browser that has built a strong reputation for putting privacy first by default. It blocks ads, trackers, and fingerprinting out of the box. It also offers unique features like a built-in Tor window for private tabs (though this only protects that tab, not the whole browser).
- Pros: Excellent usability, fast, strong defaults, available on all platforms, built-in crypto wallet (if you use it) .
- Cons: It is still based on the Chromium engine, which is largely controlled by Google. Its business model, which includes optional privacy-respecting ads and a crypto token, can be a point of distrust for some purists .
For users deep in the Apple ecosystem, Safari is a surprisingly strong contender. Apple's Intelligent Tracking Prevention (ITP) is highly sophisticated and effectively limits cross-site tracking.
- Pros: Excellent fingerprinting resistance, deeply integrated with the OS for performance and battery life, strong on-by-default protections.
- Cons: It is tied to your Apple ID, creating a different kind of privacy trade-off. Extensions are less powerful than on desktop. Its engine (WebKit) is proprietary to Apple .
DuckDuckGo offers a browser for mobile (and recently desktop) that focuses on simplicity and strong tracker blocking.
- Pros: Extremely easy to use, "Fire Button" to clear all data instantly, forces HTTPS, provides simple privacy grade ratings for sites.
- Cons: Lacks the deep, advanced fingerprinting defenses of LibreWolf or Mullvad Browser. It's an excellent choice for a "casual privacy upgrade" but not for high-risk scenarios .
Other Browsers and Considerations:
Beyond the browsers detailed above, the landscape is filled with options that are often recommended for privacy but fail to deliver upon closer inspection. Based on a comprehensive analysis from Unix Digest, here is a breakdown of how various browsers measure up regarding privacy, transparency, and user control.Mozilla Firefox
While highly tweakable, Firefox is not private out-of-the-box. It "phones home" to multiple Mozilla domains (e.g., detectportal.firefox.com, location.services.mozilla.com) every time it starts, even with telemetry disabled. Data collection is opt-out, meaning the browser connects to Mozilla before a user can disable it.
- Major Concerns:
- Cloudflare DoH Integration: Mozilla made Cloudflare the default DNS-over-HTTPS provider. Cloudflare, a US company, logs DNS requests for 24 hours and retains "anonymized" samples indefinitely. This subjects user data to US law and introduces a significant trust intermediary.
- Funding Conflict: Google is Mozilla's default search engine because they pay for the position, creating a fundamental conflict of interest with Mozilla's stated privacy principles.
- Telemetry Practices: Past incidents like the silent inclusion of Cliqz in Germany and the "Telemetry Coverage" system to check if telemetry was disabled have eroded trust.
Google Chrome & Chromium These browsers are designed for data collection. Every startup contacts Google, and almost every keystroke in the address bar is logged. Google openly states it collects information to build advertising profiles, even for users not signed into a Google Account. Chrome contains closed-source elements, making independent verification of its data handling impossible.
Pale Moon Sometimes recommended for privacy, but it is not promoted as such by its developers. Network analysis shows it connects to Google on startup, similar to Chromium.
Waterfox Despite being a popular Firefox fork, it connects to the Mozilla add-on CDN and Amazon Cloudfront on startup. Its privacy policy includes troubling clauses, such as passing user information to a successor if acquired, and states it uses cookies and third-party web analytics.
GNOME Web (Epiphany) & Eolie
These browsers aim for good privacy but fail by design. On first startup, they contact easylist-downloads.adblockplus.org to update ad filters. This sends data to eyeo GmbH (the company behind AdBlock Plus), which has its own privacy policy for collecting personal information.
Midori Now part of the Astian Foundation, its future direction is uncertain. Its privacy policy is vague and disclaims responsibility. Enabling its ad-blocking extension triggers requests to Amazon Cloudfront, which logs user activity.
These browsers adhere more closely to the principle that a browser should not make network connections without explicit user action.
Tweaked Firefox (The Best Solution) The article concludes that using a standard, up-to-date Firefox installation hardened with the Arkenfox user.js is the superior approach. This provides the timely security updates of mainstream Firefox while achieving privacy that meets or exceeds specialized forks. Crucially, it allows users to disable all automatic outgoing connections, giving them full control. This is recommended over LibreWolf because it avoids update delays and allows for a truly opt-in connection policy.
Falkon A KDE browser using the Qt WebEngine (Chromium backend). It is lightweight, fast, and respects privacy by not making unsolicited connections. It includes built-in ad blocking and Greasemonkey support. Users should review all settings, as not all privacy features are enabled by default.
qutebrowser A browser with Vim-style key bindings and a minimal GUI. It uses Qt WebEngine and is highly configurable. It does nothing without user consent, though features like DNS prefetching are enabled by default and must be manually disabled. Ad blocking is basic (hosts file based), but it can be configured to open videos in an external player.
ungoogled-chromium A set of patches for Chromium that removes all background requests to Google services. It is a true drop-in replacement for users who need Chromium compatibility without Google integration.
- Reservations: The small team can lag behind Chromium's security updates. Downloading pre-built binaries carries a risk of tampering; compiling from source or using a distribution's package manager is strongly recommended.
Tor Browser The gold standard for anonymity when used correctly. It routes traffic through the Tor network, makes users indistinguishable from one another, and clears all state on exit. It is not for speed or convenience, but for high-risk privacy needs. Even without the Tor network, its hardened configuration makes it a truly privacy-respecting browser.
Note: My personal views, are that Google Chromium is apart of an AI surveillance framework and is something worrying by design. it has capabilities to monitor everything, hijack site requests / dns traffic to redirect queries, place overlays over site logins and other aspects of websites, screen and rewrite pages, change results, access local user files, spy on other applications, spy on your microphone / camera, infect your devices, etc.
bases such as electron place chromium between you and your most privacy dependant applications. chat software, password managers, note apps, clipboard managers, browsers, even VPN softwares.
Electron/Chromiums role in your software:
The Chromium browser engine is the foundation for a vast number of applications, primarily through frameworks like Electron. This framework allows developers to build desktop applications using web technologies (HTML, CSS, JavaScript), which are then run within an embedded Chromium instance .Here is a list of notable applications built with Electron, organized by category.
This category includes some of the most widely used team messaging and video conferencing tools.
- Discord: A popular voice, video, and text chat app for communities and gamers .
- Slack: A team communication platform for workplace messaging and collaboration .
- Microsoft Teams: Microsoft's hub for teamwork, integrating chat, meetings, and files .
- Signal: A private messaging app focused on security and end-to-end encryption .
- WhatsApp: The desktop companion app for the ubiquitous mobile messaging service .
- Twitch: The primary desktop app for streaming and watching live gaming and creative content .
- Yammer: An enterprise social networking service used for internal communication within organizations .
Many essential tools for programmers and developers are built on Electron.
- Visual Studio Code: A immensely popular, free, and open-source code editor from Microsoft .
- GitHub Desktop: A GUI application for managing Git repositories and GitHub workflows .
- Postman: An API platform for building, testing, and documenting APIs .
- Atom: A "hackable" text editor developed by GitHub (now discontinued) that originally popularized Electron .
- GitKraken: A graphical Git client with an intuitive interface .
- MongoDB Compass: A GUI for managing and querying MongoDB databases .
- Altair GraphQL Client: A feature-rich GraphQL client for debugging and testing .
- Docker Desktop: The main application for managing Docker containers and images on a local machine .
- Eclipse Theia: An extensible platform for building cloud and desktop IDEs, similar to VS Code .
This group covers tools for note-taking, project management, and personal organization.
- Notion: An all-in-one workspace for notes, tasks, wikis, and databases .
- Obsidian: A powerful knowledge base that works on local Markdown files .
- Trello: A web-based, list-making project management application .
- Asana: A work management platform designed to help teams organize and track their work .
- Dropbox: The desktop client for the popular cloud file storage and synchronization service .
- WordPress.com: The desktop app for managing WordPress sites .
- Basecamp 3: A project management and team communication tool .
- Joplin: An open-source note-taking and to-do application with synchronization capabilities .
- LosslessCut: A tool for lossless trimming and cutting of video and audio files .
Essential applications for passwords, file management, and system utilities.
- 1Password: A leading password manager for securely storing and using passwords .
- Bitwarden: An open-source password manager with a free tier .
- Keybase: An app for secure messaging and file sharing that combines cryptography with social proof .
- Mullvad: The desktop client for the Mullvad privacy-focused VPN service .
- Samsung Magician: The official software for managing Samsung solid-state drives (SSDs) .
- Logitech Options+: The configuration software for Logitech mice and keyboards .
- OpenVPN Connect: The official client for connecting to OpenVPN servers .
Tools for designers and creative professionals.
- Figma: A collaborative interface design tool that runs in the browser and as a desktop app .
- TIDAL: The desktop application for the high-fidelity music streaming service .
- Splice: A platform for music producers offering samples, loops, and production tools .
- Boxy SVG: A vector graphics editor for creating and editing SVG files .
- Blockbench: A 3D model editor, particularly popular for creating models for Minecraft .
This list represents only a fraction of the applications built with this technology. For a more comprehensive and up-to-date collection, you can explore the official Electron Apps Showcase .
Absolutely. Here is an expanded section for VPN software that uses the Electron framework, including many of the most popular services.
Many major VPN providers have adopted Electron to build their desktop applications.
- NordVPN: One of the most widely used VPN services, NordVPN's desktop client is built with Electron. The application provides an interactive map interface for server selection, specialized servers for specific tasks (like P2P or Onion over VPN), and comprehensive settings for features like Threat Protection, Meshnet, and split tunneling.
- ExpressVPN: Industry-leading VPN known for its speed and reliability. While their underlying connection technology is proprietary, the desktop interface across Windows and macOS is built using web technologies, consistent with an Electron-based approach to achieve cross-platform parity and a polished UI .
- Proton VPN: The official desktop clients for Windows and macOS are built with Electron. (Note: The Linux client is a separate, native Python/OpenVPN CLI tool, though community projects have explored Electron-based interfaces for Linux ). The Electron app provides a graphical interface for connecting to Proton's secure Core servers, managing VPN configurations, and accessing features like NetShield Ad-blocker and Secure Core.
- Surfshark: A feature-packed VPN that has gained popularity rapidly. Its desktop application is developed using Electron, enabling a consistent experience across platforms. The interface includes a quick-connect button, server location lists, and access to features like CleanWeb, GPS spoofing, and the static IP server list.
- CyberGhost: A user-friendly VPN with a large server network. The desktop client is built on Electron, featuring a smart rules dashboard that allows users to automate connection actions (e.g., connect automatically on untrusted Wi-Fi) and easy access to streaming-optimized servers.
- IPVanish: A VPN service that emphasizes speed and configuration flexibility. Their desktop software utilizes Electron to provide a clean interface with real-time connection statistics, server latency graphs, and easy switching between VPN protocols (WireGuard, OpenVPN, IKEv2).
- Private Internet Access (PIA): Known for its transparency and customizable encryption settings. The PIA desktop client is built with Electron, offering both a standard view for casual users and an "expert" view that exposes detailed settings like port forwarding, DNS configuration, and proxy controls.
- Atlas VPN: A freemium VPN service (now part of Nord Security). Their desktop application is developed using Electron, focusing on a streamlined and modern interface with features like a data breach monitor, SafeBrowse, and streaming-optimized servers.
- TunnelBear: A whimsically designed VPN focused on simplicity and ease of use. The desktop client, built with Electron, features a distinctive bear-themed interface with a simple on/off switch and a world map for selecting connection countries.
- Windscribe: A VPN with a generous free tier and a focus on ad and tracker blocking. Their desktop application is Electron-based, providing a straightforward interface for server selection and managing the built-in ad blocker, firewall, and proxy settings.
some of my personal favorites:
🦊 GNU IceCat: The GNU Project's Free Software Browser
GNU IceCat is a web browser developed by the GNU Project, based on Mozilla Firefox. Its primary mission is to provide a version of Firefox that is entirely free software, removing any components that are proprietary or recommend non-free plugins. It is part of the GNUzilla suite, which is the GNU project's effort to create a full range of Mozilla-based applications.What it is: Formerly known as IceWeasel, the browser was created to address restrictions Mozilla placed on the redistribution of modified Firefox binaries. Its goal is to offer a browsing experience identical to Firefox in function, but with a strict commitment to software freedom. This means no proprietary add-ons, plugins, or components are included or recommended by default.
Key features and privacy focus: IceCat distinguishes itself through a combination of pre-applied privacy and security measures, making it a strong choice for users prioritizing freedom and protection against tracking.
· LibreJS: This GNU plugin is included to automatically block non-free, non-trivial JavaScript. This prevents scripts that track users or perform other functions without the user's transparent consent. · Enhanced Privacy Protections: IceCat includes features to prevent browser fingerprinting by modifying APIs that sites use to uniquely identify a browser. It also blocks tracking cookies and provides notices for suspicious redirects. · Default Hardened Configuration: Unlike standard Firefox, where users must manually adjust settings for maximum privacy, IceCat ships with a configuration that has already been optimized for security and privacy out-of-the-box. · Completely Free Software: It removes any non-open source code, trademarks, or dependencies found in Firefox, ensuring that every line of code is free for users to study, modify, and share.
Availability and installation: GNU IceCat is available for multiple operating systems, including GNU/Linux, Windows, macOS (10.14 onwards), and Android (via F-Droid). However, the project's commitment to freedom means it does not always provide official, pre-compiled binaries for every platform.
· Recommended Installation (GNU/Linux): The preferred method is using the GNU Guix package manager by running guix install icecat. · Community Packages: For other distributions like Debian, Ubuntu, and Mint, community members have created resources. For example, a third-party repository and packaging script are available on GitHub to help users build and install IceCat on these systems. · Direct Downloads: The official website provides source tarballs, installers for Windows and macOS, and links to a Debian repository on Codeberg.
History and development: The browser originated in 2005 as GNU IceWeasel. The name was changed to IceCat in 2007 to avoid confusion with Debian's independently modified Firefox version, which also used the IceWeasel name. It is maintained by the GNUzilla team and the free software community, with development driven by volunteers. IceCat typically bases its code on Firefox's Extended Support Release (ESR) versions to maintain a stable core while incorporating security patches.
Criticisms and considerations: While GNU IceCat is highly regarded for its adherence to free software principles, there are practical trade-offs to consider.
· Usability vs. Freedom: The strict blocking of non-free JavaScript via LibreJS can cause many modern websites to function incorrectly or break entirely. This aligns with the project's philosophy but can be frustrating for general users. · Update Cadence and Availability: Because it relies on volunteer effort and does not always provide official binaries, IceCat may not receive updates as quickly as mainstream browsers. This potential delay in security patches is a noted concern, and users on some platforms may need to rely on third-party packagers or compile it themselves. · Niche Appeal: IceCat is designed for users who place absolute software freedom above all else. For those who simply want strong privacy without the ideological commitment to free JavaScript, a hardened version of standard Firefox (like using the Arkenfox user.js) might offer better site compatibility with similar privacy outcomes.
In summary, GNU IceCat is a specialized tool that fulfills a specific mission: to offer a fully free, privacy-respecting browser based on Firefox. It is an excellent choice for free software advocates and users willing to accept potential site breakage for the sake of ideological purity and out-of-the-box privacy hardening.
- Android:
🦎 Iceraven: The Customizable Firefox Fork for Android
Iceraven Browser is a web browser for Android, based on Mozilla's Fenix version of Firefox (the current Firefox for Android codebase), GeckoView, and Mozilla Android Components. It is an independent, community-driven fork that aims to provide users with more options, greater customization, and access to a broader range of extensions than the official Firefox for Android.What it is: Iceraven is a close fork of Firefox for Android that seeks to combine the power of the modern Fenix codebase with the spirit of the older Fennec browser. It is an all-volunteer project with no affiliation to Mozilla, and it is not an official Mozilla product. Its primary goal is to offer users more control and customization, particularly through enhanced add-on support.
Key features:
· Expanded Add-on Support: Iceraven allows users to attempt to install a much wider range of add-ons than the official Firefox for Android. It queries a custom AMO collection, giving access to many extensions that are not on Mozilla's recommended or curated lists for mobile. Note: The project warns that many of these add-ons will not work because they depend on code that Mozilla is still developing for the mobile Android Components. · about:config Support: Users have direct access to about:config, allowing them to tweak hundreds of advanced Firefox preferences and hidden settings for deep customization. · Enhanced Privacy Controls: Iceraven includes features like Enhanced Tracking Protection, HTTPS-Only Mode, and site permission controls inherited from Firefox. It also offers an option to not display recently visited websites on the homepage and an option to suspend tabs to prevent them from being killed for memory usage. · Customization Options: The browser provides extensive settings for tailoring the user experience, including home screen customization (top sites, recent tabs, bookmarks), tab behavior, and more.
Installation:
· Iceraven is not available on the Google Play Store. It can be downloaded directly from the Releases page on GitHub as an APK file. Users need to select the correct version for their device architecture (arm64-v8a for most modern devices, armeabi-v7a for older ones). · It is also available on the F-Droid alternative app store.
Privacy approach and data collection: The Iceraven project states that it does not collect or report any user information to the fork-maintainers. It actively works to remove or disable most telemetry and tracking features from upstream Firefox that would send data to Mozilla, Adjust, Leanplum, or Google. However, users should be aware of the following:
· Potential Residual Data Flow: Due to the complexity of the codebase, the project cannot guarantee that no data is sent. If a user catches the app sending data to any third-party service, they are encouraged to open an issue. · Google Safe Browsing: This feature, which protects against malicious sites, is retained and on by default. It may collect some browsing data and is subject to Google's privacy policy. · Crash Reporter: Iceraven retains Mozilla's crash reporter. Users may choose to submit crash reports to Mozilla. · Firefox Sync: The optional Firefox Sync feature is available. Any data synced is subject to Mozilla's privacy policy.
Criticisms and considerations:
· Stability and Security Guarantees: The project explicitly states "No warranties or guarantees of security or updates or even stability!" . It includes unstable code from Mozilla with additional modifications, and binaries are signed with a debug key, not a proper release key. Users are cautioned against relying on it as a primary browser if they are not comfortable with "alpha" quality software and potential bugs. · Add-on Compatibility: The flagship feature of expanded add-on support comes with a major caveat: most of them will not work. This is due to ongoing development work in Mozilla's Android Components. · Community Feedback: Some users report that the browser can be "a touch buggy for some builds". There have also been discussions and confusion around tracker detection apps flagging Iceraven, although this is often due to these apps being unable to distinguish between the browser's own connections and those of the websites it loads. · Alternative Recommendation: In the privacy community, Mull Browser (another Firefox fork) is sometimes recommended over Iceraven for users who prioritize privacy and stability, as it incorporates the Arkenfox user.js for hardening and has a clearer security stance.
In summary, Iceraven is a browser for enthusiasts and advanced users who prioritize customization and access to a wide range of add-ons above all else. It is a powerful tool for those who want to experiment and tweak their browsing experience, but its alpha-level stability and lack of security guarantees make it less suitable for users whose primary concerns are privacy and reliability out-of-the-box.
- IOS:
🌐 Orion Browser by Kagi: WebKit Speed with Cross-Platform Extension Support
Orion is a native web browser developed by Kagi, designed for macOS, iOS, and iPadOS, with alpha versions for Linux and Windows in development. It aims to combine the speed and efficiency of Apple's WebKit engine with the flexibility of supporting extensions from Safari, Chrome, and Firefox, all while maintaining a strict zero-telemetry privacy policy.What it is: Orion positions itself as a browser that refuses to compromise on three core pillars: WebKit performance, full extension compatibility, and absolute privacy . It is built natively for Apple ecosystems but is expanding to other platforms. Unlike many mainstream browsers, Orion is 100% funded by its users through a subscription or one-time lifetime license (Orion Plus), with no ads, no third-party deals, and no data selling.
Key features:
· Cross-Platform Extension Support: Orion is touted as the only browser that supports extensions from Safari, Chrome, and Firefox's stores. The team has curated a list of 20 guaranteed-working extensions to ensure a smooth experience. · Zero-Compromise Privacy: The browser promises complete zero-telemetry browsing. It includes built-in ad-blocking and anti-tracking, uses the pure WebKit engine, and explicitly states there is no AI data collection or hidden surveillance . · Deep Customization: Users can configure far more than just themes, with options to tailor every detail of the browsing experience to their exact needs. · Kagi Services Integration: For users of Kagi's search engine and other services, Orion offers seamless, built-in integration for search, translation, and more, creating a cohesive "Kagiverse" experience. · Native Performance: The browser is built natively for each platform, promising fast speeds, low resource usage, and excellent battery life on Mac and iOS devices.
Availability and versions:
· macOS: The flagship version, refined over five years. · iOS and iPadOS: Trusted by over 4 million users, offering features not typically found in other mobile browsers. · Linux: An alpha version is currently available for users who value choice and independence. · Windows: An alpha version is in active development.
Privacy approach and funding model: Orion's privacy stance is central to its identity. The website emphasizes "complete zero-telemetry browsing" and that the software is "made to work for the people funding it". To sustain development without compromising user data, Orion operates on a user-funded model:
· Orion Plus: This is a subscription or a one-time lifetime license that users can purchase to support ongoing development. The base browser is functional, but Plus features and the license directly fund the project.
What people are saying: Reviews cited on the site highlight Orion's strengths:
· ZDNet noted it's "fast, easy on the battery, and far more flexible than Safari," calling it what Safari would be if Apple "loosened the reins a bit." · Mac Observer praised its "blazing speed while using a fraction of the resources" and its unique support for Chrome and Firefox extensions. · OMG! Ubuntu emphasized its clean model: "No data collection. No telemetry. No sponsored junk, partnerships or tie-ups. No incessant upsells."
Criticisms and considerations:
· Extension Compatibility Limitations: While supporting extensions from multiple stores is a standout feature, the curated list of only 20 guaranteed-working extensions suggests that not all extensions will function correctly. Users with niche or complex add-ons may encounter issues. · WebKit Dependency: As a WebKit-based browser, Orion inherits both the performance benefits and the limitations of Apple's engine. It may not support certain web standards or features as quickly as Blink-based browsers. · Alpha Status on Linux/Windows: The versions for Linux and Windows are in alpha, meaning they are likely unstable, feature-incomplete, and not recommended for daily use by users who require reliability. · Paid Model for Full Features: While the browser itself is usable, some advanced features are locked behind the Orion Plus subscription or lifetime payment. Users seeking a completely free browser may find this limiting. · Smaller Ecosystem: Compared to giants like Chrome or Firefox, Orion's user base and extension ecosystem are smaller. Community support and third-party integrations will naturally be more limited.
In summary, Orion is a compelling option for users deeply integrated into the Kagi ecosystem, those who want a privacy-respecting WebKit browser with multi-store extension support, and individuals willing to pay for software to avoid data monetization. Its alpha-stage status on non-Apple platforms and potential extension quirks mean it is best suited for enthusiasts and early adopters on those systems.
Note: Orion is also Available for MacOS with new Alpha stages in development for Linux and Windows. it allows you to specify custom blocklists for content blockers and has a wide range of addon support plus a privacy orientated zero telemetry focus.
📱 The Mobile Browser Battlefield
Your mobile browser choices are even more critical than desktop ones, as mobile devices are more surveilled.
- The Google Play Services Dependency: Most Android browsers, even privacy-focused ones, run on devices with Google Play Services—a proprietary background process with system-level privileges. As the GrapheneOS documentation explains, this creates a fundamental trust issue. Your browser may be private, but the OS beneath it is reporting to Google.
- Mullvad Browser's Mobile Implications: The Mullvad Browser's approach—making all users look identical to resist fingerprinting—is even more powerful on mobile, where device characteristics are more standardized. However, as the Mullvad Browser documentation notes, it requires a trusted VPN for IP anonymity, and on mobile, that VPN must be carefully chosen to avoid leaking data.
- The Iceraven Trade-off: As noted in the Iceraven documentation, this Firefox fork offers expanded add-on support and
about:configaccess on Android, but comes with explicit "no warranties or guarantees of security or updates." For high-risk users, this may be unacceptable; for enthusiasts, it's a powerful customization tool.
🔐 The Encryption Paradox: Why Your "Secure" Browser Isn't Enough
- The NSA's Bullrun Program: The Snowden documents revealed that the NSA spends $250 million annually on programs to "defeat the encryption used in specific network communication technologies." They've inserted backdoors into commercial encryption products, influenced international standards, and collaborated with tech companies to weaken security.
- The Five Eyes Encryption Pressure: The Five Eyes intelligence alliance (US, UK, Canada, Australia, New Zealand) has repeatedly called for encryption backdoors, arguing they need access for national security. This is a sustained, multi-decade campaign to undermine the very technology your browser relies on.
- The Telegram Precedent: The FBI's attempts to bribe Telegram developers for backdoor access shows that even end-to-end encrypted services are under constant pressure. Your browser's security is only as good as the ecosystem it connects to.
Browser implication: Even the most hardened browser (LibreWolf, Tor, Mullvad) connects to a network where the underlying encryption may be compromised. This doesn't mean you shouldn't use them—they're essential—but it means you must layer defenses. Use Tor for network anonymity, VPNs for IP masking, and treat all encrypted traffic as potentially observable by sufficiently motivated adversaries.
| Tool | Platform | Key Feature | Licensing | Trade‑off / Note |
|---|---|---|---|---|
| uBlock Origin | Browser extension | Lightweight, highly efficient content blocker | Open source (GPL) | Firefox Android only supports a limited set of extensions; does not block in‑app ads. |
| AdAway | Android | Hosts‑file based ad blocker, requires root | Open source (GPL) | No root = limited functionality; may need to use VPN‑based alternatives. |
| AdGuard | Win, Mac, Android, iOS | System‑wide ad blocking, DNS filtering | Proprietary (freemium) | Free version is browser‑only; paid apps cost money; some privacy concerns about the company. |
| Blokada | Android, iOS | VPN‑based ad blocker, no root | Open source (GPL) | Uses VPN slot; can conflict with real VPNs; iOS version limited. |
| Pi‑hole | Network‑wide (any device) | DNS‑level blocking for entire network | Open source (GPL) | Requires a dedicated device (Raspberry Pi, etc.); does not block ads in YouTube (DNS level). |
| pfSense + pfBlockerNG | Network‑wide (requires pfSense firewall) | DNS‑level blocking (DNSBL) + IP reputation filtering + GeoIP blocking; operates at firewall level | Open source (BSD‑style for pfSense; pfBlockerNG is free package) | Requires pfSense as base system; complex setup; overkill for casual users; needs dedicated hardware or VM. |
Notes on Pi‑hole
-
What it is: Pi‑hole is a free, open‑source DNS‑based ad blocker that runs on a variety of platforms. It acts as a DNS sinkhole for your entire network, intercepting requests to known ad, tracker, and malware domains before they reach the client .
-
How it works: You configure your router to hand out Pi‑hole’s IP address as the DNS server for all devices. When a device requests a domain that is on one of Pi‑hole’s blocklists, Pi‑hole returns a null address (e.g.,
0.0.0.0), effectively blocking the request at the DNS level . -
Key features:
- Centralised management – Blocklist updates, whitelists, and statistics are controlled from a lightweight web interface .
- Extensive blocklist support – Works with many pre‑curated lists (e.g., StevenBlack, EasyList, OISD) and allows custom lists .
- Low resource usage – Can run on a Raspberry Pi Zero, Docker container, old hardware, or even a virtual machine .
- Conditional forwarding – Can forward internal domain requests to your existing DNS server if needed .
- API support – Allows integration with home automation and monitoring tools .
-
Limitations:
- DNS‑level only – Cannot block content that is served from the same domain as the main site (e.g., YouTube ads) because the domain itself cannot be blocked without breaking the service .
- Bypass potential – Any client that manually changes its DNS settings (e.g., to
8.8.8.8) will circumvent Pi‑hole entirely. This can be mitigated by blocking outbound DNS at the firewall . - No IP‑based blocking – Unlike pfBlockerNG, Pi‑hole does not natively block by IP reputation or GeoIP (though you can integrate with tools like
ipseton a router) .
-
Hardware / deployment options:
- Raspberry Pi – Most popular choice; runs on any Pi model (Zero W or higher recommended for network performance) .
- Docker – Easy to run on any Linux server or NAS .
- Virtual machine – Works on Proxmox, VMware, VirtualBox, etc. .
- Cloud / VPS – Can be hosted remotely, but then all DNS traffic must be routed over the internet .
-
Comparison with pfSense + pfBlockerNG: Pi‑hole is simpler to set up and works with almost any router. pfBlockerNG, being part of a full firewall OS, offers deeper integration (e.g., IP blocking, GeoIP) and ensures that clients cannot bypass the filter by changing DNS settings. However, pfBlockerNG requires a pfSense installation, which is a larger commitment than a lightweight Pi‑hole .
Notes on pfSense + pfBlockerNG
- pfSense is a free, open‑source firewall and router distribution based on FreeBSD .
- pfBlockerNG is an add‑on package that extends pfSense with:
- DNS‑based ad and malicious site blocking (DNSBL) using blacklists like EasyList, StevenBlack, and Adaway .
- IP‑based filtering – blocks traffic to/from known malicious IP addresses .
- GeoIP filtering – allows or denies traffic based on country of origin (requires free MaxMind license) .
- Key advantage over Pi‑hole: Because pfBlockerNG operates at the firewall level, clients cannot bypass the blocking by changing their DNS settings. The firewall enforces the policy for all devices on the network .
- Setup complexity: Requires a working pfSense installation and manual configuration of feeds, aliases, and firewall rules . Not recommended for users without networking experience.
- Hardware: pfSense can run on dedicated x86 hardware, virtual machines (Proxmox, VMware, etc.), or low‑power appliances (Protectli, PC Engines APU, etc.) .
- uBlock Origin – https://github.com/gorhill/uBlock
- AdAway – https://github.com/AdAway/AdAway
- AdGuard – https://adguard.com/
- Blokada – https://blokada.org/
- Pi‑hole – https://pi-hole.net/
- pfSense – https://www.pfsense.org/
(pfBlockerNG is a package available within pfSense; documentation: https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html)
On mobile, the operating system is the ultimate arbiter of privacy. Stock Android (from Google) and iOS (from Apple) both have significant privacy trade-offs, primarily due to their integration with their parent companies' services. For those seeking true privacy and control, alternative Android-based operating systems are the only viable path.
🤖 GrapheneOS: The Hardened Android
GrapheneOS is widely considered the most secure and privacy-focused mobile operating system available. It is a non-profit, open-source project that builds on the Android Open Source Project (AOSP) with extensive security hardening and privacy enhancements. It is only available for Google Pixel devices, as these have hardware security support (like Titan M2 chips and, on newer models, Memory Tagging Extensions (MTE)) .
What it is: GrapheneOS is a hardened variant of Android. It doesn't just de-Google the OS; it fundamentally strengthens the Android security model. It focuses on reducing the attack surface and mitigating entire classes of vulnerabilities.
Key privacy & security features:
- Hardened Memory Allocator: It replaces the standard memory allocator with a hardened one that is much more resistant to memory corruption exploits, a common attack vector.
- Hardened Kernel: The kernel is patched with additional security features from the Linux kernel community and GrapheneOS's own projects.
- Network & Sensor Permissions: It adds highly granular permissions, allowing you to deny an app internet access or access to sensors (like the camera, microphone, or motion sensors) individually. You can give an app camera access, for example, but deny it internet access, preventing it from exfiltrating photos.
- Sandboxed Google Play: Instead of integrating Google Play Services deep into the OS (which creates a massive privacy and security hole), GrapheneOS allows you to install it as a regular, sandboxed user application. You get the functionality (like push notifications) without the special, privileged access .
- Secure Camera & PDF Viewer: Includes rebuilt apps that minimize metadata (like removing EXIF data from photos) and reduce attack surface.
- Full Verified Boot: Uses customAVB (Android Verified Boot) keys to ensure the OS hasn't been tampered with, and the bootloader remains locked for full security.
- Memory Tagging Extensions (MTE): On Pixel 8 and later, GrapheneOS fully leverages MTE in hardware to detect and prevent memory safety exploits across the system and in all installed apps, a groundbreaking security feature .
Trade-offs and considerations:
- Device Limitation: It only supports Google Pixel devices. This is a deliberate choice to leverage the best hardware security .
- Usability for Some: While highly usable, the lack of Google Play Services integrated by default means some apps that rely on them for core functionality (like some banking or ride-sharing apps) may not work, or may require the sandboxed Play Services installation. This is a trade-off for privacy.
- Connectivity Checks: By default, it checks for connectivity with GrapheneOS servers, not Google. This hides your IP from Google but makes your OS visible to a network observer. This can be changed to "Standard (Google)" in settings if you use a VPN to blend in with other Android devices .
Installation and resources:
- Official Site & Installer: https://grapheneos.org/
- Features Overview: https://grapheneos.org/features
note: The fact GrapheneOS is only available on Google Pixel is concering. But that will soon end. Motorola (owned by Lenovo) is going to make a new GrapheneOS device that will be the first to ship with the OS pre-installed.
🌱 CalyxOS: Privacy and Usability in Balance
CalyxOS is another excellent de-Googled Android operating system. It shares many goals with GrapheneOS but takes a slightly different approach, focusing on a balance between strong privacy and out-of-the-box usability on a wider range of devices.
What it is: CalyxOS is an AOSP-based operating system that removes Google services and replaces them with free and open-source alternatives. It runs on Google Pixel devices, as well as some Fairphone and Motorola models, broadening its accessibility .
Key privacy & security features:
- microG Integration: Unlike GrapheneOS's sandboxed approach, CalyxOS offers the option to include microG, a free and open-source re-implementation of Google Play Services. This allows many apps that depend on Google's libraries (like push notifications and maps) to work seamlessly without connecting to Google servers .
- Built-in Firewall: CalyxOS includes a powerful, easy-to-use firewall that lets you control which apps have access to the internet, either on Wi-Fi or mobile data, on a per-app basis .
- Calyx VPN: It provides a built-in, free VPN service operated by the Calyx Institute, offering an easy way to mask your IP address.
- Encrypted Backups: An included backup app allows for encrypted, seed-word-protected backups that you can store remotely, a feature often missing from stock Android.
- Sensitive Number Hiding: A thoughtful privacy feature that hides calls to sensitive numbers (like abuse hotlines) from your call log.
Trade-offs and considerations:
- Security Model: CalyxOS is very secure, but its security hardening is generally considered less aggressive than GrapheneOS's. It makes compromises for wider compatibility and usability. For instance, its reliance on microG, while convenient, introduces a larger and less auditable codebase than GrapheneOS's sandboxed approach .
- Update Cadence: While it receives timely updates, GrapheneOS is typically faster and more consistent with security patches due to its narrower device focus.
- Repository Management: Users may occasionally encounter issues with app updates due to the priority of different F-Droid repositories, requiring manual adjustment .
Installation and resources:
- Official Site & Installer: https://calyxos.org/
- Features Overview: https://calyxos.org/features/
Email is a notoriously difficult protocol to secure. Its very nature involves sending messages to servers that may be outside your control. However, using a provider that implements end-to-end encryption (E2EE) and zero-access architecture is a massive step up from Gmail, Outlook, or Yahoo.
🔒 Tuta vs. Proton Mail: A Detailed Comparison
Tuta (formerly Tutanota) and Proton Mail are the two leaders in the consumer encrypted email space. Both are based in countries with strong privacy laws (Germany and Switzerland, respectively) and offer robust security. However, their approaches differ, making them suited for different threat models .
- Tuta: Takes a more aggressive approach to metadata protection. It encrypts the entire email, including the subject line, body, and attachments. It also does not collect IP addresses by default. It uses a proprietary, hybrid encryption method (AES and RSA) .
- Proton Mail: Encrypts the email body and attachments using the OpenPGP standard. However, it does not encrypt the subject line. It minimizes IP logging but may retain some basic metadata for delivery. Its use of a well-known standard (PGP) offers greater interoperability .
- Tuta: All encryption and authentication happen within its own apps (web, mobile, desktop). There is no bridge for third-party email clients. This is simpler and reduces potential security risks but locks you into their ecosystem.
- Proton Mail: Offers Proton Mail Bridge for desktop users. This application allows you to use Proton Mail with any standard email client that supports IMAP/SMTP (like Thunderbird, Outlook, or Apple Mail), providing flexibility for users who need to integrate with existing workflows .
- Tuta: Focuses on a tightly integrated, secure suite including email, calendar, and contacts, all fully encrypted.
- Proton Mail: Has expanded into a full privacy ecosystem with Proton VPN, Proton Drive, Proton Pass, and Proton Calendar. If you need an all-in-one privacy suite, Proton is the clear choice .
| Feature / Consideration | Choose Tuta if... | Choose Proton Mail if... |
|---|---|---|
| Primary Focus | Maximum metadata privacy (encrypted subject lines, no IP logging). | A balance of privacy and productivity features. |
| Technical Need | You want a simple, self-contained, highly secure system. | You need PGP compatibility or want to use a desktop email client via the Bridge. |
| Ecosystem | You primarily need secure email and calendar. | You want an integrated suite of privacy tools (VPN, Drive, Pass). |
| Threat Model | Journalists, activists, or anyone where metadata privacy is paramount. | Businesses, teams, or individuals who need privacy but also workflow flexibility. |
Resources:
- Tuta: https://tuta.com/
- Proton Mail: https://proton.me/mail
Proton Mail and Tuta (formerly Tutanota): Controversies Regarding User Data Disclosure:
This section examines significant controversies surrounding two major encrypted email providers—Proton Mail and Tuta—specifically concerning their handling of user data in response to law enforcement requests. Both services market themselves on strong privacy and security, yet have faced scrutiny over instances where user information was disclosed to authorities.
Proton Mail, the Swiss-based provider known for its end-to-end encrypted email and VPN services, has faced repeated controversy over its disclosures of user data to law enforcement. These incidents have drawn attention to the gap between certain marketing claims and the legal realities of operating under Swiss jurisdiction.
The French Activist Case (2021)
The most prominent incident occurred in 2021. Proton Mail provided Swiss authorities with the IP address and device details of a French climate activist who was part of a group called "Youth for Climate." The activist was later arrested Read more on Restore Privacy. This case sparked significant backlash because Proton Mail had long advertised that it did not log IP addresses. A cached version of their website from August 2021 stated: "No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first" Archive.org cache.
Following the public outcry, Proton Mail quietly removed all claims about not logging IP addresses from its website. The company explained that under Swiss law, they were compelled to comply with a legally binding order from the Swiss Federal Office of Justice, which had been requested by French authorities via Europol. They maintained that they do not log IPs by default, but can be forced to do so on a case-by-case basis for specific users under investigation Proton Mail Blog.
The "Stop Cop City" Case (2024)
Another significant disclosure came to light in early 2024. Proton Mail provided Swiss authorities with payment data linked to the account defendtheatlantaforest@protonmail.com, which was associated with protests against the "Stop Cop City" movement in Atlanta. The FBI obtained this information through a Mutual Legal Assistance Treaty (MLAT) request on January 25, 2024. The data shared included credit card identifiers, which allowed authorities to identify the activist behind the anonymous account Read more on The Intercept.
The Catalan Activist Case
In a separate incident, Proton Mail handed over a user's recovery email address to Spanish police investigating individuals suspected of supporting Catalan separatists. Spanish authorities then passed this recovery address to Apple, which was able to identify the individual associated with the account. Proton confirmed they were obligated to comply with Swiss laws concerning terrorism Read more on Techdirt.
Transparency Data and Official Position
Proton's own transparency report shows thousands of legal orders complied with annually. In 2023, for example, Proton Mail complied with 5,971 orders out of 6,378 received Proton Transparency Report.
The company's current position, articulated by CEO Andy Yen, is that Proton provides "privacy by default and not anonymity by default." They argue that true anonymity requires users to take specific operational security measures, such as not using a recovery email or paying by credit card Read more on Slashdot. The company also emphasizes that they are legally unable to comply with direct foreign requests and only respond to orders channeled through the Swiss legal system. Furthermore, they stress that the content of encrypted emails remains inaccessible to them.
Tuta, a German-based encrypted email provider, faced a different but equally serious controversy: an allegation that it operated as a "storefront" or "honeypot" for an intelligence agency.
The Cameron Ortis Allegation (2023)
In November 2023, during the trial of Cameron Jay Ortis, a former Royal Canadian Mounted Police (RCMP) intelligence official, a startling claim emerged. Ortis, who was accused of leaking secrets, testified that a foreign ally had informed him of a plan to encourage investigative targets to use an online encryption service—Tutanota (now Tuta)—which he alleged was a "storefront" operation created by intelligence agents to spy on adversaries Read more on The Register.
Ortis claimed he was told that a "storefront" had been created to attract criminal targets to use Tutanota, allowing the agency behind it to collect intelligence. He stated that he began enticing targets through promises of secret information with the aim of getting them to communicate via the service Read more on CBC News.
Tuta's Strong Denial and Response
Tuta responded swiftly and forcefully, calling the claim "completely false" and denying any ties to any intelligence or law enforcement agency Tuta Blog: "We are not a honeypot".
In a detailed blog post titled "We are not a honeypot," the company outlined several key points:
- No Government Ties: Tutao GmbH, the company behind Tuta, is fully and solely owned by its founders, Arne Möhle and Matthias Pfau, who started the company in 2011. It is not liable to any external entity or government.
- Legal Jurisdiction: As a German company, Tuta only responds to valid court orders from German authorities. They do not and cannot comply with direct requests from foreign agencies.
- Open Source Code: The entire client-side code is published on GitHub, allowing anyone to verify that there are no hidden backdoors and that end-to-end encryption works as advertised.
- Commitment to Mission: The founders stated that operating as a front for intelligence agencies would completely contradict their mission as a privacy protection organization.
The company characterized Ortis's statements as an unsubstantiated lie, made without any supporting evidence. They noted that during cross-examination, Ortis responded to questions with phrases like "I can't say" or "I don't remember" when pressed for specifics Read more on The Register. The allegation was widely seen as a baseless claim made by a defendant in a criminal trial, and Tuta's denial was accepted by the privacy community.
- Proton Mail has repeatedly disclosed user metadata (IP addresses, recovery emails, payment data) to authorities when legally compelled under Swiss law. This led to the quiet removal of their "no IP logging" marketing claims.
- The content of Proton Mail messages remains encrypted and inaccessible to the company.
- Tuta faced a serious allegation of being an intelligence "storefront," which it vehemently and credibly denied, backed by its open-source code and German legal structure.
- The "Zero-Knowledge" Distinction: Both companies maintain "zero-knowledge" architectures for message content, meaning they cannot decrypt and read user emails. However, both collect and can be forced to disclose metadata (like IP addresses, recovery emails, and payment information) that users provide or generate when using the service.
- Operational Security (OpSec) Matters: Users seeking true anonymity must take additional steps beyond simply using an encrypted email provider. This includes not providing recovery emails, not using credit cards for payment, and using Tor to access the service.
Popular cloud storage services like Google Drive, Dropbox, and OneDrive have full access to your files. They can scan them for content, hand them over to authorities, or be breached. Zero-knowledge (or end-to-end encrypted) storage ensures that only you can read your data.
There are ways to achieve zero-knowledge cloud storage: using a provider that builds it in by default (Tresorit), or using client-side encryption software to lock your files before uploading them to any cloud (Cryptomator).
Tresorit: The End-to-End Encrypted Cloud
Tresorit is a Swiss-based cloud storage service that builds end-to-end encryption into its very fabric. The name "Tresorit" comes from "tresor" (vault), and its entire infrastructure is designed as a zero-knowledge platform.- How it works: Files are encrypted on your device before they are uploaded. The encryption keys are never sent to Tresorit's servers. This means Tresorit employees, hackers, or government agencies with a warrant cannot read your files. It has a "zero-knowledge" policy.
- Key features:
- End-to-end encrypted file sync and sharing.
- Granular permission management for shared folders ("tresors").
- Secure link sharing with passwords and expiration dates.
- Camera upload for automatic, encrypted photo backups.
- No tracking, no access to your contacts.
- Trade-offs: It's a paid service with limited free storage. You are trusting the company's implementation of security, though they have a strong reputation.
Cryptomator: The Universal Client-Side Encryptor
Cryptomator is a free, open-source tool that acts as a guardian for your files. It doesn't provide cloud storage itself; instead, it creates encrypted "vaults" on your device that you can then sync with **any** cloud provider (Dropbox, Google Drive, iCloud, OneDrive, etc.).- How it works: You create a vault, assign a password, and mount it like a virtual drive. Any file you put in the vault is automatically encrypted on your device before being synced to your chosen cloud folder. To access files, you unlock the vault, and Cryptomator decrypts them on the fly.
- Key features:
- Open Source & Auditable: Its code is publicly available for scrutiny on GitHub.
- Platform Agnostic: Works with any cloud service, including Sync.com, Icedrive, or even your own Nextcloud instance.
- Filename Encryption: It can optionally encrypt filenames to hide directory structure.
- Award-Winning: Received the CeBIT Innovation Award for Usable Security and Privacy.
- Trade-offs: It requires you to manage your own cloud storage and the encryption process. While user-friendly, it adds an extra step to file management. You are still using the potentially privacy-invasive cloud provider's infrastructure, but they only see encrypted, unreadable data.
Sync.com: The Privacy-First Canadian Alternative
Sync.com is another leading zero-knowledge cloud storage provider, based in Canada. Like Tresorit, it is designed with privacy as its core principle, ensuring that only you have access to your data.- How it works: All files are encrypted and decrypted locally on your device. Sync.com never has access to your encryption keys, making it impossible for them (or anyone who compromises their servers) to view your files. This is a true zero-knowledge architecture.
- Key features:
- End-to-end encrypted file storage, sync, and sharing.
- Strict zero-knowledge policy, enforced by design.
- Advanced sharing controls, including password protection, expiration dates, and access permissions for shared links.
- Vault feature for secure backup of files from any device.
- Teams features for secure collaboration, including shared folders and team management.
- Trade-offs: While it offers a generous free tier, advanced features and larger storage plans require a paid subscription. Its jurisdiction (Canada) is part of the Five Eyes intelligence alliance, which is a consideration for some threat models, though the zero-knowledge encryption mitigates this risk significantly.
Icedrive: The Modern, Feature-Rich Option
Icedrive is a newer entrant in the zero-knowledge cloud storage space, known for its sleek, modern interface and competitive pricing. It uses the Twofish encryption algorithm, which is less common but highly respected.- How it works: Icedrive provides client-side encryption, meaning your data is encrypted before it leaves your device. They offer two modes: a standard, convenient mode for most users, and a "zero-knowledge" mode where the client handles all encryption, ensuring your password and keys are never known to Icedrive's servers.
- Key features:
- Zero-knowledge, client-side encryption using the Twofish algorithm.
- Virtual drive functionality (similar to Cryptomator) that lets you access files without downloading them locally first, saving disk space.
- Clean, fast, and intuitive user interface across web, desktop, and mobile.
- Competitive pricing for both monthly and lifetime plans.
- Built-in file versioning and trash retention.
- Trade-offs: It is a younger company with a shorter track record than Tresorit or Sync.com. Its zero-knowledge implementation requires careful attention during setup to ensure it is enabled correctly.
Nextcloud: The Self-Hosted Powerhouse
Nextcloud is fundamentally different. It is an **open-source, self-hosted** content collaboration platform. Instead of paying a third party, you host the server software on hardware you control (at home, on a VPS, or with a provider). This gives you ultimate control but requires technical expertise.- How it works: You download and install Nextcloud on a private server. It provides a web-based interface and sync clients for all your devices. Because you control the server, no third party has access to your unencrypted files by default. For an extra layer of security, you can use server-side encryption or pair it with client-side tools like Cryptomator.
- Key features:
- Complete Control: You own your data and server. There are no third-party privacy policies to trust. As Nextcloud's slogan states, it's about regaining control over your data.
- Full-Featured Platform: It's far more than simple storage. Nextcloud Hub combines file sync with collaboration tools, including group chat and web conferencing, team calendaring and email, a self-hosted online office suite, and even AI integration for content creation and assistance.
- Scalability & Community: It scales from a Raspberry Pi to massive global deployments and is backed by a huge, transparent open-source community.
- Compliance & Security: Designed with compliance in mind (GDPR, HIPAA), it offers extensive access control, encryption, and auditing capabilities.
- Trade-offs: Requires technical knowledge to set up and maintain (server administration, updates, backups). While the software is free, you must pay for server hardware or hosting. The responsibility for security and backups rests entirely on you.
Which to choose?
- Choose Tresorit for a seamless, integrated, all-in-one secure cloud storage experience with a long-standing reputation.
- Choose Cryptomator for maximum flexibility, to add a security layer to an existing (or free) cloud account, or to further protect data on a self-hosted solution.
- Choose Sync.com for a user-friendly, zero-knowledge service with a generous free tier and strong privacy credentials.
- Choose Icedrive for a modern, feature-rich interface and competitive pricing, especially if you are interested in a lifetime plan.
- Choose Nextcloud if you have the technical skills and desire ultimate control, want a full collaboration platform, and prefer open-source software.
Resources:
- Tresorit: https://tresorit.com/
- Sync.com: https://www.sync.com/
- Icedrive: https://icedrive.net/
- Nextcloud: https://nextcloud.com/
- Cryptomator: https://cryptomator.org/
Not all platforms are created equal. Some have architectural features or business models that make them inherently dangerous for privacy-conscious users.
📘 Facebook/Meta: The Case Study in Platform Risk
Meta's platforms (Facebook, Instagram, WhatsApp) appear repeatedly in your documents as vectors for harm. This isn't coincidental; it's architectural.
- Design for Addiction, Not Safety: Instagram's recommendation algorithms were found to actively promote pedophile networks. Following just a handful of accounts "was enough to flood a test account with content that sexualizes children." This isn't a bug; it's the engagement-maximizing algorithm working as designed, surfacing whatever content keeps users on the platform.
- Data Architecture Failures: Facebook stored up to 600 million user passwords in plain text, accessible to tens of thousands of employees. This wasn't a sophisticated hack; it was basic security hygiene failure at massive scale.
- Active Harm Facilitation: The Human Trafficking Institute's 2020 report found that 59% of online recruitment for sex trafficking occurred on Facebook, with 65% of child victims recruited through the platform. The Texas Supreme Court ruled that Facebook can be held liable for this—a rare legal finding that the platform's design actively enables harm.
- "Fact-Checking" as Ideological Enforcement: Facebook's admission that its "fact checks" are actually opinion reveals that content moderation is fundamentally political, not scientific. When journalist John Stossel's climate videos were flagged as "false" based on "tone," not factual inaccuracy, the system's true purpose was exposed.
📹 YouTube/Google: The Surveillance-Advertising Nexus
- Digital ID Expansion: Google is actively expanding digital ID capabilities through Google Wallet, partnering with the UK government to certify digital IDs. They're integrating zero-knowledge proofs for age verification—a cryptographic technique that could be expanded to other attributes.
- Censorship as Feature: YouTube CEO Susan Wojcicki explicitly called on governments to pass laws defining "harmful" content so platforms could implement censorship "cleanly and clearly." This is a request for legal cover to remove content they already consider problematic.
- UN Partnership for Narrative Control: The UN's partnership with Google to elevate climate content in search results shows how algorithmic curation is used to shape public discourse. When the UN official says they "own the science" and want to ensure the "right messages" get through, they're describing a censorship operation.
📱 Discord: The Verification Trap
- Third-Party Verification Risks: Discord's brief use of Persona for age verification exposed how identity verification systems can leak. Persona's code was found on a U.S. government server, performing 269 distinct verification checks including screening against watchlists for "terrorism and espionage."
- Data Retention Contradictions: Discord claimed IDs were deleted immediately, but archived FAQ pages showed data was stored for up to seven days. This pattern—contradictory statements about data handling—is common across platforms.
Technology is only one part of the equation. Your habits, behaviors, and understanding of the risks are just as important. This section covers the often-overlooked human element of privacy.
🎯 Threat Modeling: The Foundation of All Privacy
Before you choose any tool, you must define your threat model. This is a structured way to identify your risks and decide which strategies are most appropriate. A threat model answers four basic questions:
- What do I want to protect? (e.g., my identity, my location, my communications, my files, my contacts).
- Who do I want to protect it from? (e.g., advertisers, my ISP, a nosy family member, a corporation, a government agency).
- What is the likelihood of the threat? (e.g., is a state-sponsored actor likely to target you, or are you more concerned about data brokers?).
- How bad are the consequences if I fail? (e.g., embarrassment, financial loss, physical danger, imprisonment).
Your threat model determines your tools. A journalist facing a repressive regime has a radically different threat model (and thus, toolset) than a casual user wanting to stop ad tracking. LibreWolf might be overkill for the casual user, while Tor Browser is essential for the journalist. Always choose your tools based on your specific, realistic risks.
Refining Your Threat Model: Think Like an Adversary To build a realistic threat model, you must move beyond abstract fears and consider the actual capabilities of your adversary.
- Understand Your Attack Surface: Your attack surface is the sum of all the ways an adversary could potentially interact with you or your data. This includes your devices, online accounts, physical location, and even your social media posts. Auditing your attack surface is the first step in reducing it.
- Learn from Real-World Mistakes: History is filled with examples where poor OpSec led to downfall. Studying cases like the LulzSec chief, the Bayrob malware gang, or the AlphaBay takedown reveals how simple errors—like reusing usernames or bragging online—can unravel anonymity. LAPSUS$ and Pompompurin are more recent, stark reminders.
- Beware of "Privacy Laxism": A major pitfall is privacy laxism—the tendency to downplay risks or accept inadequate solutions for the sake of convenience. This mindset, often found in mainstream privacy communities, can lead you to believe that privacy is possible on inherently compromised systems like Windows or macOS, a claim that more rigorous resources explicitly challenge.
🧩 Identity Separation & Digital Footprint
A key operational security practice is to compartmentalize your online identities. Don't use the same accounts, browsers, or even devices for different personas (e.g., your professional self, your personal self, and a "research" self).
- Separate Browsers/Profiles: Use one browser (e.g., Brave) for your everyday, logged-in life (social media, banking). Use a completely different, hardened browser (e.g., LibreWolf or Mullvad Browser) for anonymous research and browsing where you are not logged in. For high-risk activities, consider using a dedicated virtual machine, like a Whonix workstation, to create a hardware-level separation.
- Dedicated Email Addresses: Use different, unlinked email addresses for different purposes. For example, use Proton Mail for sensitive communications, and a completely separate, alias-based email (e.g., from SimpleLogin or AnonAddy) for newsletter signups. For maximum anonymity, explore methods to get an email account without any personal identifiers.
- Avoid Cross-Platform Linking: Be mindful of how your accounts can be linked. Posting the same username on Reddit and Twitter, or using the same profile picture across platforms, can help data brokers and adversaries connect your identities. This is a classic OpSec failure; even sophisticated actors have been caught because they reused a username, password, or email pattern.
- Segment Your Internet Usage: A powerful method is to practice Internet usage segmentation. This means creating distinct, isolated environments for different activities—for example, one for your real identity, one for a pseudonymous research identity, and one for high-anonymity work. This limits the damage if one identity is ever compromised.
- Transferring Between Identities: If you need to move information or value between your separated identities, do so with extreme care. There are methods to transfer activities across identities without creating a link, often involving the use of privacy-preserving technologies like Monero and intermediate, ephemeral identities.
🗑️ Data Broker Opt-Outs & Personal Information Removal
Data brokers are companies that collect, aggregate, and sell personal information about you. They are a massive source of data for advertisers, background check services, and even stalkers. Your name, address, phone number, age, relatives, and more are likely for sale on dozens of these sites.
Manually opting out of every data broker site is a tedious but worthwhile task. There are services that automate this, but they cost money and require you to trust them with your information.
- Manual Opt-Out Guides: Websites like inteltechniques.com maintained by Michael Bazzell, provide extensive, step-by-step guides for manually removing your information from the most common data broker sites.
- Automated Services: Services like DeleteMe (Abine) or OneRep will, for a fee, submit opt-out requests on your behalf and monitor for your information to reappear.
🏴☠️ Physical OpSec & Real-World Behavior
Digital privacy is meaningless if you are compromised in the physical world. Your online and offline lives are deeply connected, and adversaries will target the weakest link.
- The Danger of Metadata: Files you share online contain hidden data. Photos, documents, and videos often include metadata like GPS coordinates, camera model, and creation time. Before sharing anything sensitive, learn how to remove metadata from pictures, videos, and documents. A single photo can reveal your location to a sophisticated adversary or a stalker on a forum.
- Physical Surveillance & "Shoulder Surfing": Be aware of your surroundings. Shoulder surfing—someone looking over your shoulder at your screen or keyboard—is a simple but effective way to steal passwords or see sensitive information. Use privacy screens in public and be mindful of who is around you.
- Social Engineering & IRL Encounters: Your biggest vulnerability is often yourself. Adversaries may try to lure you into meeting someone in real life or compromise you through friends, family, or colleagues. Be extremely cautious about translating online relationships into the physical world without rigorous verification and OpSec. The risks range from blackmail to physical violence or being forced to become an informant.
- Operational Security is Real-Life Chess: Ultimately, good OpSec is about thinking several moves ahead. It’s a continuous process of anticipating how your actions today could be used against you tomorrow. As the saying goes, "OPSEC is real-life chess." You must always consider the adversary's potential response to your moves.
The principles above are just the beginning. For a deeper dive, the following resources are considered foundational by many in the OpSec community:
- The Hitchhiker's Guide to Anonymity: A primary inspiration for modern OpSec guides, this is a comprehensive (though dense) resource covering a huge range of topics.
- Kicksecure Documentation: Explains how to achieve privacy, anonymity, and deniability at the operating system level.
- Whonix Documentation: The go-to resource for understanding and using Whonix, a desktop operating system designed for advanced security and anonymity.
- GrapheneOS: The gold standard for a hardened Android OS, removing Google services and adding significant security improvements.
- Sam Bent's YouTube Channel: Practical OpSec advice from a former darknet vendor, with a strong focus on legal realities.
- Beginner Privacy: A straightforward guide with practical steps and clear threat model advice, making it an excellent starting point.
I hope this section provides practical guide. The key takeaway is that OpSec is a holistic practice, it requires constant vigilance, learning from the mistakes of others, and protecting your digital life as if your physical safety depends on it, because sometimes it does.
📉 The Data Broker Economy: Your Digital Shadow
The documents provide concrete evidence of how your data is bought, sold, and weaponized.
- The Scale of Data Collection: The IARPA anticipatory intelligence program aims to continuously collect "all data about everyone in real time"—every Facebook post, tweet, YouTube video, tollbooth tag, GPS download, and street camera video. This isn't future tech; it's current R&D.
- The Fusion Center Network: As detailed in the Contact Tracing article, state and local "fusion centers" across the US monitor social media, license plate readers, and surveillance cameras in real-time. They use tools like Clearview AI (facial recognition), BriefCam (video analytics), and Ring doorbell partnerships to create comprehensive movement profiles.
- The Public-Private Surveillance Partnership: The lawsuit documents reveal that at least 11 federal agencies coordinated with social media platforms to suppress speech. This wasn't ad-hoc; it was systematic collaboration with message templates and pressure campaigns.
OpSec implication: Your threat model must account for the fact that data brokers are aggregating information from thousands of sources. Even if you're careful on one platform, you may be exposed through another. This reinforces the need for strict identity separation and compartmentalization.
⚖️ The Legal Architecture of Surveillance
Understanding the legal framework enables you to anticipate where surveillance is heading.
- The Smith-Mundt Modernization Act (2012): As noted in the Dead Internet Theory timeline, this act gave the U.S. government full legal authority to use propaganda against its own populace, reversing rules put in place after the Church Committee exposed CIA domestic propaganda operations.
- The UK Online Safety Act: The Ofcom guidance mandates "highly effective age assurance" for all websites, with enforcement beginning in 2025. This legally compels platforms to implement the very surveillance infrastructure critics warn about—photo ID matching, facial age estimation, digital identity services—all under the banner of child protection.
- The Texas Supreme Court Ruling on Section 230: The Texas ruling against Facebook's Section 230 immunity for human trafficking connections creates a precedent that platforms can be held liable for how their systems are used. While this seems pro-accountability, it also incentivizes platforms to surveil and moderate more aggressively to avoid liability.
OpSec implication: These laws create legal requirements for surveillance that didn't exist before. Your OpSec must account for the fact that platforms are now legally obligated to collect more data, verify identities more thoroughly, and report more activities to authorities.
The tools and habits discussed in this guide exist within a rapidly changing global environment. Understanding these macro trends is essential for grounding your personal threat model in reality. The internet's foundational principles are being challenged by a confluence of state and corporate actions.
🏛️ The Drive for Digital Sovereignty & Control
- The "Westphalian" Internet: Nations are increasingly asserting control over their digital borders. As this BBC analysis explains, the idea of a single, global, borderless internet is fading. Countries like Russia are developing technical means (e.g., national DNS systems) to isolate their national internet segments, a trend others may follow. This fragmentation means access to information is becoming geographically determined.
- The Global Push for Digital IDs: What was once dismissed as a conspiracy is now coordinated global policy. From the EU's push for a bloc-wide digital ID wallet to the rapid rollout in countries like Vietnam, Mexico, and Papua New Guinea, as documented by Expose News, a global system is being built. These systems are framed as convenient, but their architecture enables comprehensive surveillance, tying access to essential services (banking, travel, social media) to a single, state-controlled credential. The UN has explicitly called for a global framework for this.
- The "Super-App" Trajectory: The ultimate goal, as described by a leading UK banker, is the "super-app" that combines digital ID, financial data, and health records into a single tool. This centralizes immense power and creates a single point of failure for individual autonomy. If you are locked out of your "super-app," you are locked out of society.
🤖 The Weaponization of AI & the "Dead Internet"
- AI-Powered Censorship & Surveillance: Government and corporate use of AI is not neutral. Documents reveal agencies like the FBI use CIA and NSA data to spy on Americans. The U.S. government has authorized access to everyone's social media via the Five Eyes alliance. IARPA is developing AI to predict future events by continuously analyzing all data about everyone.
- The Dead Internet Theory: This is no longer a fringe idea. The theory, articulated here, posits that most online traffic, content, and interaction is now generated by AI, bots, and paid influencers to manufacture consent and normalize specific cultural products. The goal is to create a sterile, controllable environment where genuine human discourse is drowned out. The statistical likelihood that you are interacting with a bot in any given online space is now significant.
- Encryption Under Attack: The 2013 Snowden revelations, summarized in The Guardian and ProPublica, showed that the NSA and GCHQ have actively worked to undermine encryption standards, insert backdoors into commercial products, and collaborate with tech companies to weaken security. This is a persistent, well-funded campaign to ensure that no digital communication is truly private from state surveillance.
Implication: The individual is now navigating a digitally hostile environment. The platforms are weaponized, the content is often synthetic, and the infrastructure is being re-engineered for control. Your OpSec is no longer just about protecting your passwords; it's about navigating a fundamentally manipulated information space.
📡 The Architecture of Censorship: How It's Actually Implemented
Understanding how censorship is technically implemented helps you choose effective countermeasures.
- Network-Level Interference: The University of Michigan's Censored Planet project collected over 21 billion measurements across 221 countries, revealing that censorship is increasing even in democracies like Norway, Japan, and Poland. The technical methods include:
- DNS poisoning and TCP/IP reset attacks that interrupt connections to specific sites
- SNI (Server Name Indication) inspection to block based on the domain name within encrypted connections
- BGP hijacking to reroute traffic through inspection points
- The "Great Firewall" Model Spreads: Countries are adopting China's multi-layered filtering approach. As the internet censorship statistics show, China employs 30,000 internet police and blocks over 1 in 4 websites through a four-level filtering process. This technical architecture is now being exported through initiatives like China's Belt and Road digital infrastructure projects, offering a "plug-and-play authoritarian internet" to other nations.
- VPN Blocking as a Technical Arms Race: Turkmenistan's escalating campaign against VPNs, documented by CIVICUS, shows how states are moving beyond simple site blocking to actively identify and block circumvention tools. They're creating dedicated "internet security" services specifically to defeat VPN protocols.
What this means for your tool selection: Your choice of VPN and circumvention tools must account for the specific censorship architecture in your threat model. For high-risk environments, tools like Tor with pluggable transports (which obfuscate traffic to look like ordinary HTTPS) may be necessary, not just a standard VPN.
🏦 Financial Infrastructure as a Control Layer
The documents reveal that financial technology is becoming a primary vector for surveillance and control.
- Know Your Customer (KYC) Expansion to Cloud Services: The U.S. Department of Commerce's proposed KYC regulation for Infrastructure as a Service (IaaS) would require cloud providers to verify the identity of foreign customers developing AI models. This extends financial surveillance logic to the entire tech stack. Failure to comply carries penalties up to $1 million and 20 years imprisonment.
- Programmable Money and Digital ID Convergence: The UK's proposed "super-app," described by UK Finance chairman Bob Wigley, will combine digital ID with financial data—credit scores, KYC data, and transaction history—into a single tool. This is the technical infrastructure for programmable money, where your spending can be restricted based on your "score" or compliance.
- Deplatforming Through Financial Chains: The Global Alliance for Responsible Media (GARM) case, detailed in The Gold Report, demonstrates how advertising boycotts can destroy a platform's revenue (they reduced X/Twitter's ad revenue by 80%). This is censorship enforced through financial choke points, not technical blocks.
Practical implication: Consider using privacy-respecting payment methods (cash, prepaid cards, cryptocurrency like Monero) when possible. Be aware that linking your financial identity to your digital activities creates a permanent, auditable trail.
🌍 The Global Coordination of Digital Control
The documents reveal that digital ID and surveillance systems aren't being adopted in isolation—they're being rolled out simultaneously across the world.
- Synchronized Global Rollout: As Expose News documents, in just three months, Switzerland, the EU, Vietnam, Costa Rica, Papua New Guinea, the UK, Laos, Mexico, Ethiopia, and Zambia all advanced digital ID systems. This isn't coincidental national action; it's coordinated implementation of frameworks developed over years by organizations like the World Economic Forum.
- The WEF's Digital ID Blueprint: The WEF published "Identity in a Digital World" (2018) and "A Blueprint for Digital Identity" (2016) years ago, sketching the governance models now being implemented. The technical work was done; national politics simply opened the door.
- The UN's Role: UN Deputy Secretary-General Amina Mohammed's role on the WEF's Young Global Leaders Board illustrates the interlock between international organizations. The UN's Sustainable Development Goal 16.9 explicitly calls for "legal identity for all, including birth registration" by 2030—a global digital ID mandate framed as humanitarian aid.
Implication: This isn't conspiracy theory; it's documented coordination. The systems being built are designed to be global and interoperable. Your local digital ID isn't just a national tool—it's a node in an emerging global identity infrastructure.
💀 The Dead Internet Theory: You're Talking to Machines
The Dead Internet Theory posits that most online content and interaction is now generated by AI, not humans. The documents provide evidence this is happening.
- AI Sentiment Analysis at Scale: The U.S. Department of Homeland Security is funding AI systems from Fivecast that "detect sentiment and emotion in social media posts" and automatically report "problematic" content to law enforcement. These systems don't just flag keywords; they analyze emotional tone. Using a frown emoji could get your account flagged.
- Bill Gates' Call for Real-Time AI Censorship: Gates has explicitly called for AI systems to encode "rules" and censor "misinformation" in real-time, arguing that if you catch it a day later, "the harm is done." This is preemptive censorship by algorithm.
- The Feedback Loop: When you interact online, you may be training the systems that will eventually be used to surveil you. The IARPA program aims to use "human forecasters" to train AI to predict geopolitical events. Your online behavior is data for these systems.
What this means for your OpSec: Assume that in any public online space, you may be interacting with:
- Bots designed to shape discourse
- AI monitoring systems analyzing your sentiment and predicting your behavior
- Paid influencers manufacturing consent
Your genuine human interaction should move to private, encrypted, peer-to-peer channels. Your public online presence should be treated as performance, not conversation.
- Why avoid Session / Matrix (element) / Telegram ?
Session:
This summarizes various security concerns, design criticisms, and controversies associated with the Session messenger application. It compiles user claims, technical analyses from online communities, and a professional security audit conducted by Quarkslab (Quarkslab Audit 2021).
- Network & Sybil Resistance Mechanism
- Cryptographic Design & Implementation
- Application & Network Flaws
- Moderation, Jurisdiction, and Governance Issues
- Recent Developments (Protocol V2)
- Summary of Findings
| Issue | Details |
|---|---|
| Claimed vs. Actual Sybil Resistance | The mechanism to prevent Sybil attacks (requiring a large stake of Oxen cryptocurrency to run a node) is criticized as ineffective and counterproductive. Instead of fostering a decentralized, accessible network, it creates a financial barrier. Critics argue this "guarantee[s] only governments and other well-funded organizations... will ever have the financial resources to run nodes," which is the opposite of the project's stated goal of protecting against powerful adversaries (THGTOA Caution). |
| Mechanism | The Session network (LokiNet) requires operators to stake $12,000 worth of Oxen to run a node, which is framed as a conflict of interest due to the project's promotion of its own cryptocurrency (THGTOA Caution). |
| Issue | Details |
|---|---|
| Seed Length and Security | Session uses 128-bit seeds for account generation. The Quarkslab audit formally identified this as a weakness (SESS-AND-04, SESS-IOS-04), referencing DJ Bernstein's warning about the dangers of insufficient randomness in keys. The auditors noted it as a "Low" severity finding but confirmed the practice of generating the seed from 16 bytes (128 bits) of randomness (Quarkslab Audit 2021, pages 30-31). |
| Developer Response on Seed Length | The developers defended this choice, arguing that because the 128-bit seed is hashed with SHA-512 for Ed25519 key generation, it does not weaken the cryptographic properties. They stated the reduction was a deliberate UX choice for a shorter 13-word recovery phrase and that a brute-force attack against (2^{128}) possibilities is "simply not practical" (Quarkslab Audit 2021, pages 8, 10). This remains a point of contention between security purists and the project. |
| Lack of Perfect Forward Secrecy (PFS) | Session has been criticized for dropping Perfect Forward Secrecy (PFS) and deniability, which are considered essential security features in other messaging apps like Signal. The removal of PFS means that if a user's long-term private key is compromised, all past messages can be decrypted, greatly increasing the potential damage of a successful attack (THGTOA Caution). The developer rationale was that "under typical circumstances, the only way long term keys can be compromised is through full physical device access — in which case an attacker could simply pull the already-decrypted messages from the local database" (Lemmy Discussion). |
| Public Keys as AES-GCM Keys | Security researcher Soatok identified a serious cryptographic misuse where Session reportedly uses public keys directly as keys for AES-GCM symmetric encryption (Dan Goodin/Mastodon). |
| Signature Validation Issue | Public keys are sent within the same message they're meant to verify, meaning there's no out-of-band verification that the public key actually belongs to the claimed sender. As one commenter noted: "if the protocol expects you to just trust the public key sent in the very same message as the signature, then the signature serves no purpose" (Robert Gützkow/Mastodon). |
| Protocol V2 and ML-KEM (Kyber) Concerns | Session Protocol V2 plans to implement the ML-KEM (Kyber) post-quantum algorithm. Critics, referencing public comments made to NIST, have raised serious concerns about the use of Kyber, particularly if it is not implemented as an "extra layer of defense" alongside existing pre-quantum encryption. The concern is that attackers could be breaking Kyber-512 today and storing encrypted traffic for future decryption (D.J. Bernstein NIST Comments, Nov 2023). |
| Kyber Standardization Concerns | Further concerns about Kyber include the removal of a security feature (a hash over the DRBG output) during the NIST standardization process, which critics like Jacob Appelbaum argue accommodates potential backdoors like the one in the flawed Dual_EC_DRBG standard (Jacob Appelbaum NIST Comments, Nov 2023). |
| Issue | Details |
|---|---|
| CVE-2024-2045: Path Traversal Vulnerability | A documented security vulnerability (CVE-2024-2045) was discovered in Session version 1.17.5 that allows unauthorized local file access through chat attachments. Attackers with low privileges can obtain internal and public files from a user's device without consent. CVSS Score: 5.5 (Medium) with "High" confidentiality impact (CVE-2024-2045 Details). |
| Critical TLS Verification Failure (Android) | The Quarkslab audit identified a High severity vulnerability (SESS-AND-03) where the Android client completely lacked TLS certificate verification when fetching the initial list of Service Nodes (seed nodes). This allowed an attacker capable of DNS poisoning or MITM attacks to feed the client a rogue list of nodes, effectively taking control of the user's connection to the network. The vendor fixed this in releases 1.5.4 and 1.9.0 (Quarkslab Audit 2021, pages 27-30). |
| Lack of Certificate Pinning (iOS) | A similar, though less severe, issue (SESS-IOS-02) was found on iOS. The initial connection to seed nodes did not use certificate pinning, making it vulnerable to a compromised Certificate Authority. This was fixed in iOS release 1.9.4 (Quarkslab Audit 2021, pages 39-40). |
| Plaintext Attachment Storage (iOS) | The audit found that message attachments on iOS were stored in plaintext (SESS-IOS-01), which could expose them to an attacker with physical access to an unlocked device. The vendor's response was that they were working on a user-defined password option to encrypt the local database (Quarkslab Audit 2021, pages 38-39). |
| File Server Unauthenticated Upload | The audit discovered that the file server (file.getsession.org) allowed arbitrary file uploads and downloads without any authentication. While files were encrypted with unique keys, this behavior raised concerns about the potential for abuse and server-side vulnerabilities (Quarkslab Audit 2021, pages 22-23). |
| Link Preview IP Leak (Desktop Client) | A reported critical flaw is that when link previews are enabled, the Session desktop client generates the preview by connecting directly to the target website. This bypasses Session's own onion routing and leaks the user's real IP address to the web server hosting the link. This behavior has been confirmed by both users and a Session developer (GitHub Issue #1743, Privacy Guides Community). |
| Developer Response on Link Previews | A Session developer noted that this feature is disabled by default and that future integration with Lokinet is intended to route these requests through the onion network (GitHub Issue #1743). The official explanation is that the client connects directly to fetch preview metadata, then encrypts and uploads the image via onion routing (Privacy Guides Community). |
| Non-Lokinet Traffic (Android & iOS) | The audit flagged that push notification registration (SESS-AND-05) and file downloads (SESS-IOS-03) were not routed through the Lokinet onion network, potentially leaking user metadata to ISPs. These issues were reportedly fixed in subsequent releases (Quarkslab Audit 2021, pages 28, 32-33, 40). |
| Voice/Video Call IP Exposure | When you enable calls, a pop-up alert informs you that your IP address will be visible to the person you're calling and a Session server. This means voice/video calls are not anonymous and can reveal your geolocation, contradicting the app's core privacy promise for users who enable calling features (PCMag Review). |
| Deterministic File Encryption | An upcoming change to Session's file encryption has been criticized for making the encryption of attachments deterministic. This would mean that the same file uploaded multiple times by the same user would produce an identical encrypted blob. This could allow an attacker who can observe the file server to identify when a specific file (e.g., a signal for illegal activity) is being sent, without needing to break the encryption (Privacy Guides Discussion). The cited reason is for server-side deduplication. |
| Issue | Details |
|---|---|
| Centralized Moderation and "Shadowbanning" | Public groups on Session are controlled by server operators who appear to collude. This gives them ultimate power over non-private communications, leading to a form of "shadowbanning" where a user banned from one group can be effectively banned from nearly all groups for voicing concerns (Reddit Discussion). Communities (open groups) rely on community-operated servers and may have different moderation policies (OSINT Team Article). |
| No In-App Reporting Mechanism | Multiple users have reported that when encountering abusive content or CSAM in groups, there is no way to report within the app. One top Google Play Store review (Feb 2026) stated: "Session was great until I got added to a group chat that was just posting child porn. I could find no way to report that... there's no way to link the full group, and no way to report them or the entire group on the app itself". |
| Session's Official Response on Reporting | "Due to Session's decentralized design, groups cannot be centrally moderated or reported within the app. We appreciate you taking the time to report these users to the authorities". |
| User Reports of CSAM in Groups | Multiple App Store reviews corroborate concerns: "there needs to be a report system in place. ive come across too much stuff that should not be allowed on any platform"; "This app is mostly used by creeps and offenders there should at least be a report feature because it is vile what I have seen"; "Many p3d0s use this app to chat with children or exchange illegal stuff". |
| Company Jurisdiction | The company behind Session is based in Australia, a country with what some privacy advocates describe as "very unfavorable privacy laws" due to mandatory data retention and other surveillance legislation (THGTOA Caution). Note: The Session Technology Foundation is now based in Switzerland, though the original company connections remain (OSINT Team Article). |
| Funding Transparency | The project's funding is described as "completely opaque," adding to the concerns of privacy-focused users (THGTOA Caution). |
| Cryptocurrency Conflict of Interest | Critics argue that running the Oxen token (now Session Token) alongside the messenger creates a conflict of interest, as the Sybil resistance mechanism doubles as a way to increase token value (THGTOA Caution). |
| Privacy Policy Contradiction | While Session markets itself as collecting no data, their privacy policy acknowledges that Apple and Google may store information about users and their devices when downloading the app from official app stores (OSINT Team Article). |
It's worth noting that Session has announced plans to address some criticisms in their upcoming V2 Protocol (Privacy Guides - V2 Announcement):
| Planned Improvement | Details |
|---|---|
| Reintroducing Perfect Forward Secrecy (PFS) | After years of criticism for removing PFS, Session plans to bring it back using rotating key pairs. Accounts will establish rotating key pairs for each linked device, with old keys deleted after a period of time. |
| Adding Post-Quantum Encryption | Will use ML-KEM (Kyber), the NIST-approved standard already used by Signal and iMessage. |
| Linked Device Management | Users will be able to see when new devices are linked to their account and remove them remotely. |
| Infrastructure Upgrades | Migration of core cryptographic logic into a shared library called libsession and development of "Config Messages" for synchronizing data across linked devices. |
However, these are announced plans, not yet implemented features. The V2 Protocol is not finalized, and additional details are expected in 2026.
| Category | Specific Issue | Summary / Status |
|---|---|---|
| Network | Sybil Resistance | Staking model criticized as paywall for node operators, not effective Sybil protection (THGTOA Caution). |
| Network | Node Operation Cost | $12,000 staking requirement creates barrier to entry for node operators (THGTOA Caution). |
| Cryptography | Seed Entropy | 128-bit seeds confirmed by Quarkslab audit; defended by devs for UX (Quarkslab Audit 2021, pages 8, 10, 30-31). |
| Cryptography | Perfect Forward Secrecy | Deliberately removed (to be reintroduced in V2 Protocol); greatly increases impact of key compromise (THGTOA Caution, Privacy Guides). |
| Cryptography | Public Keys as AES-GCM Keys | Cryptographic misuse where public keys are used directly for symmetric encryption (Dan Goodin/Mastodon). |
| Cryptography | Signature Validation | No out-of-band verification that public keys belong to claimed senders (Robert Gützkow/Mastodon). |
| App Security | CVE-2024-2045 Path Traversal | Documented vulnerability allowing unauthorized local file access via chat attachments (CVE-2024-2045). |
| App Security | High Severity - TLS Verification (Android) | Fixed. Complete lack of TLS verification during node bootstrap. Patched in versions 1.5.4 and 1.9.0 (Quarkslab Audit 2021, pages 27-30). |
| App Security | No Certificate Pinning (iOS) | Fixed. Initial node connections lacked pinning. Patched in version 1.9.4 (Quarkslab Audit 2021, pages 39-40). |
| App Security | Plaintext Attachments (iOS) | Unresolved (as of audit). Attachments stored unencrypted on device. Vendor planned to add database encryption option (Quarkslab Audit 2021, pages 38-39). |
| App Security | File Server Behavior | Unauthenticated uploads possible; server returned useful error messages, aiding potential attackers (Quarkslab Audit 2021, pages 22-23). |
| App Security | Link Previews | Desktop client leaks IP by fetching previews directly, bypassing onion routing (GitHub #1743). |
| App Security | Non-Lokinet Traffic | Fixed. Push notification registration (Android) and file downloads (iOS) were not onion-routed. Patched in 1.5.4 and 1.5.3 respectively (Quarkslab Audit 2021, pages 28, 32-33, 40). |
| App Security | Voice/Video Calls | IP address visible to call recipient and Session servers (PCMag Review). |
| App Security | File Encryption | Planned deterministic encryption could allow traffic analysis of file content (Privacy Guides Discussion). |
| Moderation | Centralized Group Control | Reports that public group server operators collude, enabling cross-group "shadowbanning" (Reddit). |
| Moderation | No Reporting Mechanism | No in-app way to report abusive content or CSAM in groups. |
| Moderation | CSAM Presence | Multiple user reports of CSAM in groups with no recourse. |
| Governance | Jurisdiction | Company connections to Australia with unfavorable privacy laws (THGTOA Caution). |
| Governance | Funding | Project funding described as "completely opaque" (THGTOA Caution). |
| Governance | Conflict of Interest | Cryptocurrency integration creates financial incentives tied to network participation (THGTOA Caution). |
| Usability | Performance | Slow text messaging and media file loading due to decentralization trade-offs (PCMag Review). |
| Usability | Platform Inconsistency | Screenshot alerts work on Android but not iOS (PCMag Review). |
Note: Some references (such as the GitHub issues) represent ongoing discussions and may have been updated or resolved after the time of this writing. The Protocol V2 improvements are announced but not yet implemented.
Matrix(element):
This summarizes various security concerns, design criticisms, and governance controversies associated with the Matrix protocol and its flagship client, Element. It compiles community analyses, technical critiques, and reports on organizational practices.
- Protocol Design & Metadata Leakage
- Malicious Homeserver Admin Capabilities
- Core Protocol Weaknesses
- Encryption Protocol Issues (Megolm)
- Resource Consumption & Scalability
- Organizational & Governance Issues (Matrix.org)
- Comparison with SimpleX
- Summary of Findings
| Issue | Details |
|---|---|
| Inherent Metadata Exposure | Federated networks like Matrix are naturally more vulnerable to metadata leaks than P2P or centralized networks. Some leaks are necessary for protocol functionality (e.g., verifying messages requires knowing the sender's device), while others are accepted for performance (e.g., unencrypted reactions and read receipts) (Hack Liberty Forum). |
| Unencrypted Data Fields | Matrix's end-to-end encryption does not encrypt the following information, leaving it visible to homeservers and observers (Hack Liberty Forum): |
| • Message senders and timestamps | |
| • Join/leave/invite events | |
| • Message edits (though not content) | |
| • Reactions and read receipts | |
| • Nicknames and profile pictures | |
| Design Flaws vs. Features | While some metadata leaks are inherent to the protocol's design, others are simply failures to consider encryption. For example, room-specific nicknames, room-specific profile pictures, and message edit events could all be encrypted without breaking the protocol, making their exposure a design flaw (Hack Liberty Forum). |
| Attack Type | Details |
|---|---|
| Passive Information Gathering | A malicious homeserver admin can retroactively gather extensive metadata by querying the Synapse database, including (Hack Liberty Forum): |
| • Chat history of any unencrypted room | |
| • User information (devices, IP addresses) | |
| • Reactions to encrypted messages (since they are unencrypted) | |
| • Room metadata for encrypted rooms: participants, avatars, nicknames, topics, message frequency and timing | |
| • URL previews of shared links (if enabled) | |
| Active Attacks - Room Manipulation | An admin can impersonate users to send unencrypted "state events," enabling various social engineering attacks (Hack Liberty Forum): |
| • React to messages as the impersonated user | |
| • Set room topic to an attacker-controlled URL (visible to all participants) | |
| • Invite malicious accounts into the room | |
| • Kick, ban, or modify power levels of users | |
| • Send "tombstone" events to mark rooms as replaced | |
| Active Attacks - Device Compromise | An admin can add a new device to a user's account, allowing them to send and receive encrypted messages. While this typically shows as an "unverified device" with a warning shield, the article notes that "most people, even privacy minded tech savvy ones, simply ignore this for various reasons" (Hack Liberty Forum). |
| Issue | Details |
|---|---|
| Append-Only Design | Events in Matrix cannot be deleted, leading to endless history accumulation. Redaction events are merely advisory; poorly behaving servers may ignore them and retain content. This compromises user deniability and can lead to data persistence beyond a user's control (Hack Liberty Forum). |
| State Resolution Complexity | The consensus algorithm for resolving conflicting room states is complex and not foolproof. Servers with different implementations can experience "split-brained" rooms where views diverge, leading to "state resets" that can strip admins of their powers and cause significant disruptions (Hack Liberty Forum). |
| Message Forging | It is possible to insert plausible-looking events into message history. Due to the complexity of state resolution and signature verification across different server implementations, such forgeries may go unnoticed by users (Hack Liberty Forum). |
| JSON Interoperability Issues | The lack of a strict definition for "canonical JSON" leads to signature mismatches between different server implementations (e.g., Python vs. Rust). This can cause events from one server to be rejected by another, contributing to split-brain scenarios (Hack Liberty Forum). |
| Media Handling Vulnerabilities | Unauthenticated media uploads and eager replication create significant risks (Hack Liberty Forum): |
| • Anyone can use a server's media repository for storage | |
| • Homeservers can be tricked into replicating media from other servers, potentially leading to denial-of-service | |
| • No default scanning for illegal content (CSAM, viruses) | |
| • Servers may become liable for hosting illegal media replicated from undesirable rooms |
| Issue | Details |
|---|---|
| Published Cryptographic Vulnerabilities | A security analysis ("Nebuchadnezzar") reported multiple practically-exploitable vulnerabilities in Matrix's Megolm protocol, even when encryption and verification are enabled. These include (Hack Liberty Forum): |
| • Simple confidentiality break | |
| • Attack against out-of-band verification | |
| • Semi-trusted impersonation | |
| • Trusted impersonation | |
| • Impersonation leading to confidentiality break | |
| • IND-CCA break | |
| Attacker Model | All reported attacks require cooperation of the homeserver. This is considered a natural threat model for end-to-end encryption, which aims to provide protection against untrusted third parties (Hack Liberty Forum). |
| Fragile Encryption | Matrix's encryption relies on reliable device list updates. Failures in this system can lead to broken encryption or situations where messages are sent to unverified devices without proper warnings (Hack Liberty Forum). |
| Optional Encryption | End-to-end encryption is not mandatory in Matrix. Rooms can be created without it, potentially exposing message content in federated rooms if participants are not vigilant (Hack Liberty Forum). |
| Issue | Details |
|---|---|
| High Operational Costs | Running a public Matrix server (Synapse) requires significant resources. Depending on user count, multiple worker containers are needed—effectively requiring between 4 and 12 instances of Synapse (Hack Liberty Forum). |
| Resource Intensity | Synapse is described as "hard drive hungry, memory hungry, relatively CPU hungry, and also uses a lot of bandwidth." The article warns: "Don't expect to run this pile of bloat without throwing money at it" (Hack Liberty Forum). |
| Issue | Details |
|---|---|
| Data Collection Practices | Research documented in "Notes on privacy and data collection of Matrix.org" reveals that matrix.org and vector.im receive extensive personal data even when users host their own instances (Hack Liberty Forum). Data collected includes: |
| • Matrix IDs (including usernames) | |
| • Email addresses and phone numbers | |
| • Associations between email/phone and Matrix IDs | |
| • Usage patterns | |
| • IP addresses (providing geolocation) | |
| • Device and system information | |
| • Other servers users communicate with | |
| • Room IDs (including potential identification of direct chats) | |
| Publicly Accessible Data | With default settings, Matrix.org allows unrestricted public access to (Hack Liberty Forum): |
| • Mappings of Matrix IDs to email addresses/phone numbers | |
| • Every uploaded file (images, videos, audio) | |
| • Profile names and avatars | |
| CSAM and Abuse Problems | The platform has been criticized as a "safe haven" for abusive content (Hack Liberty Forum): |
| • Rooms cannot be forcibly shut down across the entire federation, allowing abusive rooms to persist on other servers | |
| • Media replication can cause servers to unknowingly host illegal content (CSAM, copyrighted material) | |
| • The Matrix.org abuse team is described as "notoriously unresponsive" to reports | |
| • The article claims: "Every homeserver in the federation is likely hosting child sexual abuse images and videos" | |
| Cloudflare Man-in-the-Middle | Matrix.org and vector.im terminate TLS connections through Cloudflare, evidenced by cf-ray and server: cloudflare headers. This introduces Cloudflare as a man-in-the-middle capable of inspecting traffic, contradicting claims of end-to-end encryption alone being sufficient (Hack Liberty Forum). |
| Removed Tor Browser Support | Element-web no longer supports Tor Browser, with a developer comment stating: "Due to lack of funding Tor is not considered a supported browser." This limits anonymous access for privacy-conscious users (Hack Liberty Forum). |
The Hack Liberty article announces a move to SimpleX Chat and provides a detailed comparison. The key differences are summarized below:
| Feature | SimpleX | Matrix |
|---|---|---|
| User Identifiers | No user identifiers at all; uses unidirectional message queue addresses that can be rotated (Hack Liberty Forum). | Uses Matrix IDs (usernames) as persistent identifiers (Hack Liberty Forum). |
| Metadata Protection | Private 2-hop onion routing protects connection metadata from server operators (Hack Liberty Forum). | Federated architecture inherently leaks metadata; many fields are unencrypted (Hack Liberty Forum). |
| Encryption Protocol | Double-ratchet with post-quantum resistant key exchange and additional encryption layers (Hack Liberty Forum). | Megolm protocol with known cryptographic vulnerabilities (Hack Liberty Forum). |
| Decentralization Model | Fully fragmented network with no central components, bootstrap nodes, or global state. Servers are not connected or known to each other (Hack Liberty Forum). | Federated network with central components (like matrix.org) and global shared state. Relies on DNS for discovery (Hack Liberty Forum). |
| Media Handling | Local file encryption; manual message queue rotations for moving conversations (Hack Liberty Forum). | Unverified uploads by default; eager replication can cause servers to host illegal or copyrighted material (Hack Liberty Forum). |
| Tor Support | Native Tor support with proxy and onion-only routing features (Hack Liberty Forum). | Tor browser support removed; not considered a supported platform (Hack Liberty Forum). |
| Cloudflare Dependency | No Cloudflare dependency; TLS is terminated directly on servers (Hack Liberty Forum). | Matrix.org uses Cloudflare for TLS termination, introducing a MITM point (Hack Liberty Forum). |
| Category | Specific Issue | Summary / Status |
|---|---|---|
| Metadata | Unencrypted Fields | Message senders, timestamps, join/leave events, reactions, read receipts, nicknames, and profile pictures are not encrypted and visible to servers (Hack Liberty Forum). |
| Admin Threats | Passive Data Gathering | Malicious admins can access extensive metadata from database, including IPs, devices, message timing, and room information (Hack Liberty Forum). |
| Admin Threats | Active Attacks | Admins can impersonate users to manipulate rooms (topic, invites, kicks) or add devices to read encrypted messages (Hack Liberty Forum). |
| Protocol | Append-Only Design | Events cannot be deleted; redactions are advisory and can be ignored by malicious servers, compromising deniability (Hack Liberty Forum). |
| Protocol | State Resolution | Complex consensus algorithm leads to "split-brained" rooms and state resets that can remove admin powers (Hack Liberty Forum). |
| Protocol | Message Forging | Possible to insert plausible-looking events into history due to implementation inconsistencies (Hack Liberty Forum). |
| Encryption | Megolm Vulnerabilities | Multiple published exploits (confidentiality breaks, impersonation) requiring only homeserver cooperation (Hack Liberty Forum). |
| Encryption | Optional & Fragile | E2EE is not mandatory; relies on reliable device list updates which can fail, leading to broken encryption (Hack Liberty Forum). |
| Media | Unauthenticated Uploads | Anyone can use server storage; no default scanning for illegal content (Hack Liberty Forum). |
| Media | Replication Risks | Servers can be tricked into replicating media from undesirable rooms, potentially hosting CSAM or copyrighted material (Hack Liberty Forum). |
| Governance | Data Collection | Matrix.org collects extensive personal data (IDs, emails, IPs, usage patterns) even from users on other servers (Hack Liberty Forum). |
| Governance | CSAM Problems | Platform criticized as safe haven for pedophiles; abuse team unresponsive; replication means many servers likely host illegal content (Hack Liberty Forum). |
| Governance | Cloudflare MITM | TLS termination through Cloudflare introduces a man-in-the-middle capable of inspecting traffic (Hack Liberty Forum). |
| Governance | Tor Support Removed | Element no longer supports Tor Browser, limiting anonymous access (Hack Liberty Forum). |
| Operations | Resource Consumption | Running Synapse requires significant hardware resources (multiple workers, high RAM/CPU/bandwidth) (Hack Liberty Forum). |
Note: This analysis draws heavily from community critiques and technical assessments linked in the source article. Some claims (particularly regarding CSAM prevalence) are difficult to verify independently but represent significant community concerns.
Telegram:
This summarizes various security issues, cryptographic critiques, and significant governance changes associated with the Telegram messaging app. It compiles information from academic research, news reports, and public disclosures.
- Cryptographic Protocol & Design Issues
- Platform Security & Infrastructure Concerns
- Governance, Data Sharing & Legal Issues
- Targeted Surveillance & Device-Level Vulnerabilities
- Summary of Findings
| Issue | Details |
|---|---|
| MTProto 1.0 Vulnerabilities | In December 2015, researchers from Aarhus University demonstrated that Telegram's original MTProto 1.0 encryption protocol did not achieve indistinguishability under chosen-ciphertext attack (IND-CCA) or provide authenticated encryption. While the attack was theoretical and not a full plaintext recovery, it highlighted the use of a less secure scheme when better alternatives existed. Telegram responded that the flaw did not affect message security and later patched it (Wikipedia). |
| MTProto 2.0 Improvements | Telegram 4.6, released in December 2017, introduced MTProto 2.0, which satisfied the conditions for IND-CCA. Cryptographers view this as a vast improvement over the original protocol (Wikipedia). |
| 2021 Security Analysis | Researchers from Royal Holloway, University of London and ETH Zurich published an analysis of MTProto 2.0 in July 2021. They concluded the protocol could provide a "confidential and integrity-protected channel" but identified theoretical vulnerabilities, including the potential for message reordering. Telegram patched the issues before publication and paid a security bounty to the researchers (Wikipedia). |
| Lack of Default End-to-End Encryption | A long-standing criticism is that Telegram does not apply end-to-end encryption to all chats by default. Only "Secret Chats" use E2EE, while regular cloud chats are encrypted client-server. This has led organizations like the Electronic Frontier Foundation and the Norwegian National Security Authority to advise caution, especially compared to apps like Signal and WhatsApp which enable E2EE by default (Wikipedia). |
| Non-Standard Protocol | Telegram's use of its own MTProto protocol, rather than a well-reviewed standard like the Signal Protocol, has been repeatedly flagged by cryptography researchers, including Matthew Green, as a point of concern (Wikipedia). |
| Issue | Details |
|---|---|
| Server-Side Code Not Open Source | Despite a 2014 promise to eventually release all server-side code, Telegram has not done so. In 2021, Pavel Durov explained this decision, citing the difficulty for users to verify that the released code matches the code run on servers, and concerns about governments forcing the company to hand over server code to create competing networks (Wikipedia). |
| Russian Infrastructure Concerns (2025) | In June 2025, an investigation by iStories and OCCRP revealed that key parts of Telegram's technical infrastructure are operated by companies owned by a network engineer with a history of collaboration with Russian intelligence services. This raised serious concerns over potential metadata access and user surveillance (Wikipedia). |
| Self-Destruct Bug (2021) | A Russian researcher discovered a bug in the self-destruct feature that allowed users to recover deleted photos from their own device. Telegram patched the issue before public disclosure and offered a €1,000 bug bounty, though the researcher declined the award due to an accompanying NDA (Wikipedia). |
| Malware Exploit (2024) | In July 2024, cybersecurity firm ESET reported a vulnerability that allowed malicious files to be sent to users while being masked as legitimate multimedia (Wikipedia). |
| Issue | Details |
|---|---|
| FBI Backdoor Approaches (2016-2017) | Pavel Durov has repeatedly stated that FBI agents approached him and a Telegram developer on multiple occasions, including at his rented home in San Francisco during Google I/O 2016. The agents allegedly offered a bribe of "tens of thousands of dollars" to a developer to act as an informer and requested a "backchannel process" for handing over user data in emergencies. Durov claims he refused, citing Telegram's lack of legal presence in the US as a reason for non-cooperation (Neowin, Wikipedia). |
| Post-Arrest Data Sharing Pivot (2024-2025) | Following the arrest of Pavel Durov in France in August 2024 on charges related to Telegram's use for organized crime, the company made a significant policy shift. Durov promised to improve cooperation with authorities and provide IP addresses and phone numbers of users who violate rules in response to valid legal requests (SecurityWeek, Forbes Archive). |
| Massive Surge in Data Disclosure (2024) | Data from Telegram's transparency reports shows a dramatic increase in cooperation following Durov's arrest. Specific figures include (Forbes Archive): |
| • United States: 900 requests affecting 2,253 users (compared to only 14 requests in the first nine months of 2024). | |
| • Germany: 945 requests affecting 2,237 users. | |
| • Spain: 213 requests affecting 518 users. | |
| • United Kingdom: 142 requests affecting 293 users. | |
| Impact on Criminal Networks | The policy shift has had a tangible deterrent effect. A federal law enforcement investigator stated that individuals creating child sexual abuse material (CSAM) are "increasingly aware that [Telegram] is not always the case [safe from government reach] and are exploring new tactics to avoid detection" (Forbes Archive). |
| Telegram's Profitability | The company became profitable for the first time in 2025, with total revenue surpassing $1 billion (Forbes Archive). |
| Account Hijacking via SMS Interception | Multiple incidents have been reported where Telegram accounts were hijacked by intercepting SMS login codes. This has occurred in Iran, Russia, and Germany, possibly in coordination with telecom companies. Durov has recommended users enable two-factor authentication to mitigate this risk (Wikipedia). |
| Denial-of-Service Attack (2019) | Telegram confirmed a one-hour denial-of-service attack in June 2019, with Durov stating that the IP addresses used in the attack mostly came from China (Wikipedia). |
| Issue | Details |
|---|---|
| Pavel Durov on Pegasus Leak List (2018) | The leaked data from the Pegasus Project revealed that Pavel Durov's UK mobile number appeared on a list of individuals selected by an NSO Group client government in early 2018. The timing coincided with Durov changing his official residence to the UAE, leading to speculation that he may have been of interest to authorities there. NSO stated that appearing on the list does not necessarily mean a number was selected for surveillance, and it is unknown if any attempt to install Pegasus was made (The Guardian). |
| Device as the Weakest Link | Security experts note that powerful spyware like Pegasus renders the security of any individual messaging app irrelevant once a device is infected. The spyware can access data from Telegram, WhatsApp, Signal, and other apps post-infection. The only fully secure device is one that is turned off (The Guardian). |
| RampantKitten Campaign (2020) | Check Point Research uncovered an Iranian surveillance group, RampantKitten, which ran a phishing and surveillance campaign targeting dissidents. The attack involved malware that replaced Telegram files on compromised devices to clone session data. This highlights that device compromise, rather than app protocol flaws, is often the attack vector (Wikipedia). |
| Iranian Hackers (2016) | Reuters reported that Iranian hackers compromised over a dozen Telegram accounts and identified the phone numbers of 15 million Iranian users by exploiting a programming interface. Telegram later limited such mass checks in its API (Wikipedia). |
| Unofficial Clients Data Leak (2020) | An Elasticsearch database holding 42 million records containing user IDs and phone numbers of Iranian users was exposed online. The data was extracted from unofficial "Telegram" clients, not the official app, in what appeared to be a government-sanctioned fork (Wikipedia). |
| Category | Specific Issue | Summary / Status |
|---|---|---|
| Cryptography | MTProto 1.0 IND-CCA Flaw | Theoretical vulnerability allowing message modification; fixed in MTProto 2.0 (2017) (Wikipedia). |
| Cryptography | MTProto 2.0 Analysis | 2021 analysis found theoretical vulnerabilities (message reordering); patched before publication (Wikipedia). |
| Cryptography | Non-Default E2EE | Regular cloud chats are not end-to-end encrypted, only "Secret Chats" are. A major, long-standing criticism (Wikipedia). |
| Cryptography | Non-Standard Protocol | Use of proprietary MTProto instead of vetted protocols like Signal's is a recurring concern from experts (Wikipedia). |
| Infrastructure | Closed Server-Side Code | Server code is not open source, contrary to early promises, preventing independent verification (Wikipedia). |
| Infrastructure | Russian Intelligence Links | 2025 investigation linked key infrastructure operators to a figure with ties to Russian intelligence, raising metadata access concerns (Wikipedia). |
| Platform Security | Account Hijacking | Multiple incidents of SMS interception leading to account takeovers; 2FA recommended (Wikipedia). |
| Platform Security | Self-Destruct Bug | 2021 bug allowed recovery of "deleted" photos from local device; patched (Wikipedia). |
| Platform Security | Malware Vector | 2024 vulnerability allowed malicious files disguised as media; patched (Wikipedia). |
| Governance | FBI Backdoor Requests | Repeated alleged attempts by FBI to gain backdoor access or bribe a developer (2016-17); refused by Durov (Neowin, Wikipedia). |
| Governance | Post-Arrest Data Sharing | Following Durov's 2024 arrest, Telegram shifted policy to share IP/phone data with authorities in response to valid legal requests (SecurityWeek, Forbes Archive). |
| Governance | Data Sharing Surge (2024) | Massive increase in disclosures: 2,253 U.S. users (900 requests), 2,237 German users (945 requests). This shift is causing CSAM creators to consider leaving the platform (Forbes Archive). |
| Governance | Telegram Becomes Profitable | Company reached profitability in 2025 with revenue exceeding $1 billion (Forbes Archive). |
| Surveillance | Pegasus Target List | Durov's number appeared on a 2018 list of individuals of interest to an NSO client government, possibly the UAE. No confirmation of infection (The Guardian). |
| Surveillance | Device-Level Compromise | Powerful spyware like Pegasus compromises the device, not the app, rendering any messaging app's encryption moot post-infection (The Guardian). |
| Surveillance | RampantKitten Campaign | Iranian group used malware to clone Telegram session data from compromised devices, targeting dissidents (Wikipedia). |
other problematic messengers:
Discord:
This summarizes various security issues, third‑party vendor controversies, and platform‑specific vulnerabilities associated with the Discord messaging platform. It compiles information from technical research, security disclosures, and investigative reporting.
- Technical Architecture & Electron Foundation
- Surveillance & Third-Party Vendor Controversies
- Data Breaches & Security Incidents
- Anti-Forensics & Platform Vulnerabilities
- Governance & Privacy Policy Analysis
- Summary of Findings
| Issue | Details |
|---|---|
| Outdated Electron Framework | Discord's desktop application is built on Electron, which packages a Chromium browser engine with Node.js. Community analysis indicates that Discord runs on Electron versions that may lag behind latest releases—for example, Discord was observed running on Electron 22.x after its support lifecycle ended. While Discord may manually backport specific security patches for critical vulnerabilities like the WebP RCE exploit, this piecemeal approach can leave users exposed to unpatched Chromium vulnerabilities (Sergey's Lemmy). |
| Custom Electron Fork | Discord uses a forked, custom version of Electron where they "cherry fixed" specific patches rather than updating the entire framework. This approach addresses performance issues but means version numbers alone don't indicate security posture (GitHub Issue #18). |
| Chrome Extension Injection Risk | Because Electron embeds Chromium, Chrome extensions can technically be installed in Discord's desktop client. This creates a potential security risk—attackers could potentially develop malicious extensions designed to install on the desktop app, leading to account takeover and data theft scenarios (Sergey's Lemmy). |
| Tencent Shareholder Concerns | Community discussions have noted that Tencent, a Chinese multinational conglomerate, is a significant shareholder in Discord. Some users have raised speculative concerns about potential data access given Tencent's relationships with the Chinese government, though no public evidence confirms actual data sharing or government access arrangements (Sergey's Lemmy). |
| Architecture‑Induced Memory Issues | Electron's multi‑process architecture spawns multiple renderer threads, each maintaining JavaScript heaps, DOM state, and cached media frames. This architecture contributes to the memory consumption patterns that enable certain anti-forensics attacks (Medium Whitepaper). |
The most significant public confirmation of surveillance concerns involves Discord's abandoned partnership with identity verification vendor Persona.
| Issue | Details |
|---|---|
| Exposed Government‑Authorized Infrastructure | In February 2026, security researchers investigating Discord's age‑verification implementation discovered a publicly exposed Persona frontend on a U.S. government‑authorized FedRAMP server. The exposed server contained approximately 2,500 accessible files totaling 53 megabytes of data before being secured (The Express Tribune, Fortune). |
| Extensive Verification Capabilities | The exposed code revealed that Persona's software performed far more than simple age estimation. It executed 269 distinct verification checks including (The Express Tribune, Fortune): |
| • Facial recognition against watchlists and lists of "Politically Exposed Persons" | |
| • Screening for "adverse media" across 14 categories including terrorism and espionage | |
| • Assigning risk and similarity scores to individuals | |
| • Age inconsistency checks and selfie analytics | |
| Government Reporting Modules | Analysis of the exposed codebase revealed modules for submitting FinCEN Suspicious Activity Reports (SARs) and Canadian FINTRAC可疑交易 reports—functionality far beyond typical age verification systems, suggesting a full Know Your Customer (KYC)/Anti-Money Laundering (AML) platform (Nat Zone Analysis). |
| Data Collection Scope | Persona collected—and could retain for up to three years—extensive personal data including (The Express Tribune): |
| • IP addresses and browser fingerprints | |
| • Government ID numbers and phone numbers | |
| • Biometric face data and device fingerprints | |
| • Names and selfie analytics | |
| Discord's Response | Following public outcry, Discord announced it would not continue using Persona for age verification. The partnership lasted less than a month and involved limited testing in the UK, with Discord stating submitted information would be stored for up to seven days before deletion (The Express Tribune, Fortune). |
| Broader Industry Usage | Persona continues providing age verification services to other major platforms including (The Express Tribune, Fortune): |
| • Roblox: Uses Persona's facial age estimation and ID verification | |
| • OpenAI/ChatGPT: Described as "a trusted third‑party company" for age verification | |
| • Lime: Deploys custom age verification flows with Persona | |
| Government Connections | The exposed files were found on a Federal Risk and Authorization Management Program (FedRAMP) server—certification required to sell services to the U.S. government. Persona CEO Rick Song confirmed the company was pursuing FedRAMP authorization but denied direct relationships with ICE or Palantir, stating: "We have no relationship whatsoever with ICE, Palantir" (Fortune). |
| Researcher Observations | The researchers noted: "We didn't even have to write or perform a single exploit, the entire architecture was just on the doorstep," adding that the endpoint "tags reports with codenames from active intelligence programs" (The Express Tribune, Fortune). |
| Issue | Details |
|---|---|
| Incident Overview | In October 2025, Discord disclosed a security incident involving unauthorized access to customer support data hosted through third‑party vendors. Attackers exploited legitimate third‑party access credentials to gain access to support tickets (Security Affairs, WION). |
| Scope of Exposure | Approximately 70,000 users globally had their government‑ID photos potentially exposed. The stolen information included names, usernames, emails, contact details, billing information (partial credit card details), IP addresses, and message exchanges with customer support agents (Security Affairs, WION). |
| Attackers' Claims | Threat actors claimed to have stolen 1.6TB of data including 8.4 million support tickets, demanding $5 million (later reduced to $3.5 million). They allegedly used Zendesk integrations to run millions of API queries into Discord's internal systems to retrieve additional user data (Security Affairs). |
| Discord's Response | Discord revoked the third‑party provider's access, launched an internal investigation with computer forensics experts, notified law enforcement, and contacted affected users. The company refused to pay the ransom and stated that its core production authentication systems were not breached (Security Affairs, WION). |
| Vendor Disputes | Discord identified 5CA as the compromised provider, though 5CA issued statements denying involvement with government ID handling, suggesting the incident may have been caused by "human error" outside their systems (WION). |
| Third‑Party Risk Highlight | The incident underscored persistent cyber risks including vendor access abuse, identity governance failures, and sensitive data handling within support platforms. Support tickets often contain sensitive operational context and identity verification documents that can be weaponized for identity theft (Security Affairs). |
A technical white paper documented an undocumented feature where Discord silently restarts itself when its process reaches approximately 4 GB of RAM usage, creating a powerful remote anti‑forensics attack vector (Medium Whitepaper).
| Issue | Details |
|---|---|
| The Mechanism | Discord monitors its own RAM consumption and performs a graceful restart when reaching the threshold, generating no user notifications, system alerts, or forensic crash logs. The restart clears all volatile state including message caches, renderer artifacts, decoded frames, and crash diagnostics (Medium Whitepaper). |
| Remote Triggering | An adversary in a shared server, channel, or direct message can remotely trigger this without code execution or user interaction by exploiting memory‑intensive content (Medium Whitepaper): |
| • Large animated PNGs or high‑resolution WebP/AVIF files | |
| • WebSocket message flooding with structured JSON | |
| • Malformed media blocks triggering excessive decoding | |
| • Recursive embed structures and massive emoji payloads | |
| Victim Conditions | The restart only occurs when the user is AFK (idle detection active) and not in active voice calls or streams—precisely when users are not monitoring their devices (Medium Whitepaper). |
| Forensic Impact | This behavior destroys all volatile evidence and leaves investigators with no crash reports, memory artifacts, or local cache traces. It effectively turns Discord into a "remote‑controlled evidence shredder" for malicious activity, enabling attackers to (Medium Whitepaper): |
| • Deliver malicious payloads with ephemeral effects | |
| • Force evidence erasure immediately after payload delivery | |
| • Conduct operations with no persistent footprint | |
| Defense Bypass | Because this mechanism requires no exploit code, it bypasses most endpoint detection and response (EDR/XDR) monitoring which tracks executable creation and DLL injection but not "application purposely restarted due to memory pressure" (Medium Whitepaper). |
| Adversarial Environmental Manipulation | This vulnerability exemplifies a broader threat category: Adversarial Environmental Manipulation (AEM) , in which attackers weaponize defensive system behaviors—in this case, Discord's memory‑protection routine—as an anti‑forensics tool (Medium Whitepaper). |
| Issue | Details |
|---|---|
| Data Collection Scope | According to Discord's official Privacy Policy, the platform collects (Discord Privacy Policy): |
| • Account information: username, email, phone number, birthday, age verification documents | |
| • Content you create: messages, posts, voice messages, uploaded files | |
| • Payment information: billing details (processed by third‑party processors) | |
| • Automatically collected data: IP addresses, operating system, browser information, device settings including microphone and camera status | |
| • Usage information: friends added, servers joined, roles, purchases, game activity while Discord is running | |
| Data Usage | Discord states they use information to provide services, develop and improve features (including safety features that identify harmful content), and enforce terms and Community Guidelines. The company explicitly states they do not sell personal information to third parties, with business funded through subscriptions, paid products, and sponsored content (Discord Privacy Policy). |
| Content Moderation | Discord may use content posted in larger spaces (servers accessible without invite links or with publicly shared invites) to develop, improve, and power services including safety features that identify harmful content. Users can limit this usage through privacy controls (Discord Privacy Policy). |
| Data Retention | Discord's Japanese data retention policy specifies: |
| • Age verification IDs: Deleted within 60 days of ticket closure | |
| • Database backups: Retained 30-45 days | |
| • Trust and safety data: Retained up to 180 days after deletion (up to 2 years for policy violations) | |
| • Legal compliance data: Retained up to 5 years for dispute purposes | |
| Persona Incident Contradiction | The Persona incident revealed that third‑party vendors may operate under different standards—Discord's UK FAQ (since deleted) indicated Persona stored information for up to seven days, contradicting earlier statements about immediate deletion (Fortune, Nat Zone Analysis). |
| Category | Specific Issue | Summary / Status |
|---|---|---|
| Technical Architecture | Outdated Electron Framework | Discord runs on custom Electron versions that may lag behind upstream; manual patching approach used (Sergey's Lemmy) |
| Technical Architecture | Extension Injection Risk | Chrome extensions can be installed in Discord desktop, creating potential for malicious extension‑based attacks (Sergey's Lemmy) |
| Surveillance | Persona Vendor Partnership | Discord contracted with identity verification vendor operating technology on U.S. government‑authorized FedRAMP infrastructure with extensive surveillance capabilities including facial recognition against watchlists and adverse media screening (The Express Tribune, Fortune) |
| Surveillance | Government Reporting Modules | Persona codebase included modules for FinCEN SAR and FINTRAC reporting—functionality far beyond age verification (Nat Zone Analysis) |
| Surveillance | Data Retention by Vendors | Third‑party vendors operated under different standards than Discord's stated policies; UK FAQ indicated 7-day storage (Fortune) |
| Security Incidents | Zendesk/5CA Breach (2025) | Approximately 70,000 users had government ID photos exposed via compromised third‑party support vendor. Attackers accessed support tickets and identity verification documents (Security Affairs, WION) |
| Anti‑Forensics | MIARA Vulnerability | Discord's 4 GB memory threshold auto‑restart can be remotely triggered to silently wipe volatile evidence without user notification, enabling anti‑forensics attacks (Medium Whitepaper) |
| Anti‑Forensics | Evidence Destruction | The mechanism destroys RAM artifacts, renderer state, message caches, and crash logs, bypassing EDR/XDR monitoring (Medium Whitepaper) |
| Governance | Privacy Policy Commitments | Discord states they do not sell personal information, but third‑party vendors may operate under different standards (Discord Privacy Policy) |
| Governance | Data Retention | Official policy: Age verification IDs deleted within 60 days; trust/safety data retained 180 days to 2 years (Discord Japanese Policy) |
| Governance | Tencent Investment | Chinese conglomerate Tencent is a significant shareholder; speculative concerns about government access remain unconfirmed (Sergey's Lemmy) |
🛡️ Additional Tools for Your Arsenal
-
For Censorship Circumvention:
- Pluggable Transports (obfs4, Snowflake) - Built into Tor Browser, these disguise your traffic to look like ordinary HTTPS, defeating Deep Packet Inspection
- Shadowsocks - An encrypted proxy protocol designed to evade sophisticated censorship systems
- Lantern - A peer-to-peer circumvention tool that routes traffic through trusted users
-
For Metadata Removal:
- MAT2 - A metadata removal tool for multiple file types (as mentioned in The Opsec Bible)
- ExifTool - Powerful command-line tool for reading, writing, and editing metadata
-
For Secure Communication:
- SimpleX Chat - The platform your PSA-2 group uses; it has no user identifiers (not even random numbers), making it resistant to metadata analysis
- Briar - A peer-to-peer messaging app that works without a central server, using Tor and Bluetooth for offline messaging
- Cwtch - A decentralized, metadata-resistant messaging protocol built on Tor
-
For Financial Privacy:
- Monero - The only major cryptocurrency with strong privacy guarantees by default (transaction amounts, sender, and receiver are all hidden)
- LocalMonero / AgoraDesk - Peer-to-peer Monero exchanges that don't require KYC
- Cash - Still the most private payment method; use it when possible
