Use case guides
Step-by-step playbooks for actual situations.
Harden a Laptop's Privacy in One Evening
Six concrete changes that take about an hour total and remove the worst of casual surveillance from your laptop. No threat-model fanfare, just the steps.
Leave Google Without Breaking Your Life
A realistic path off Gmail, Drive, Photos, and Maps without losing your data, your contacts, or your Tuesday morning. Six switches, ordered by leverage.
Stay Private on Public Wi-Fi
Coffee shop, airport, hotel — what actually matters and what is just paranoia. The 2026 honest version.
Set Up Pi-hole at Home in 30 Minutes
Network-wide ad and tracker blocking on a $35 Raspberry Pi. Step-by-step from blank SD card to ad-free smart TV in half an hour.
Encrypt Files Before They Hit the Cloud (Cryptomator Recipe)
Use any cloud — Dropbox, Drive, OneDrive, S3 — and keep the provider from reading your files. Cryptomator vault setup, sync mechanics, and recovery in one go.