<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Luftie The Anonymous</title>
    <description>The latest articles on Forem by Luftie The Anonymous (@luftietheanonymous).</description>
    <link>https://forem.com/luftietheanonymous</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp</url>
      <title>Forem: Luftie The Anonymous</title>
      <link>https://forem.com/luftietheanonymous</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/luftietheanonymous"/>
    <language>en</language>
    <item>
      <title>Appeal To Android Developers - Our Last Chance</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Wed, 29 Apr 2026 09:28:05 +0000</pubDate>
      <link>https://forem.com/luftietheanonymous/appeal-to-android-developers-our-last-chance-360d</link>
      <guid>https://forem.com/luftietheanonymous/appeal-to-android-developers-our-last-chance-360d</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dear Readers
&lt;/h2&gt;

&lt;p&gt;Today's article will not be funny as Luftie usually used to write, and I will not joke here. This article is going to &lt;strong&gt;have an severe tone&lt;/strong&gt; and leave you with &lt;strong&gt;severe thoughts and concerns to consider&lt;/strong&gt; on an personal level. &lt;/p&gt;

&lt;p&gt;I'm not a fear-mongering "journalist" (although I don't reckon I'm one, but my work allows me to call myself so), I hate spreading fear because that belongs to garbage media 🗑️ like Linkedin, Instagram, Youtube or X (twitter). So if you would feel threatened or would get anxious, that's not the purpose here 😌.&lt;/p&gt;

&lt;p&gt;I may be emotional and sometimes seem frustrated and sick in this article, but this is coming directly from me, what I think about this all. &lt;/p&gt;

&lt;p&gt;In order not to prelong the article, I want to briefly emphasize what will this article be about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;google Android Monopoly Act&lt;/li&gt;
&lt;li&gt;google x European Union Data Sharing Act&lt;/li&gt;
&lt;li&gt;Developer Request For Action&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Because of those 2 topics, I decided to firmly write an article so that every developer here sees it.&lt;/p&gt;

&lt;h2&gt;
  
  
  google Android Monopoly Act &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusk7nwycrh0f95498593.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusk7nwycrh0f95498593.webp" alt="google-img" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I called it this way, because it is exactly what Sundar Pichai with his fellows plan to introduce. Primarily our Hindi friend stated that &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This update is about to reduce the amount of malware in Android eco-system.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Logically deducting, google should block it's self. Ok, what Pichai said, is only a cover for real incentives.&lt;/p&gt;

&lt;p&gt;That sounds great in PR, but the real incentive is &lt;strong&gt;control&lt;/strong&gt;, &lt;strong&gt;money&lt;/strong&gt; and &lt;strong&gt;power&lt;/strong&gt;. Power to invigilate and make users and developers obedient, just as you were a dog. You have no other choice to use your phone with android based OS, than android phone with google Play Services support and only official app-store. Otherwise ? Otherwise you will starve and be excluded from the herd.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2772oia2y0z72szwpcs0.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2772oia2y0z72szwpcs0.jpeg" alt="dogs" width="800" height="1200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is the harsh truth, willy nilly. Regardless what size of foil cap are you planning to buy for me. I'm going to bark about this so that everyone sees it, my account of dev.to will get blocked, because I allegedly would have posted violent content towards one or another, which is not true.&lt;/p&gt;

&lt;p&gt;Never have I encouraged to violent acts and neither will I. I only encouraged to resist things that are pertaining us, our privacy, our freedom.  &lt;/p&gt;

&lt;h3&gt;
  
  
  What Pichai really wants ?
&lt;/h3&gt;

&lt;p&gt;He wants to:&lt;/p&gt;

&lt;p&gt;Deprive Android users of choice, whether users want to download the app from open-source app store or official one&lt;/p&gt;

&lt;p&gt;Importantly, Pichai wants to decide for a user what OS they should have, leaving simultaneously no option than official android, therefore custom ROMs users suffer and are vulnerable to have issues with usage.&lt;/p&gt;

&lt;p&gt;But what's most important &lt;strong&gt;for us&lt;/strong&gt;, us &lt;strong&gt;developers&lt;/strong&gt;. It deprives us also of freedom of choice. &lt;/p&gt;

&lt;p&gt;It prohibits us to choose &lt;strong&gt;where we want to publish our app to be downloaded&lt;/strong&gt;, because there will be only one choice. &lt;/p&gt;




&lt;p&gt;It will drain our wallets financially and I know a lot of ambitious developers, mainly from from Africa, who are developing open-source projects on android, and they cherish the fact they do not have to pay 25 $ to google to be able to launch the app in official app store.&lt;/p&gt;




&lt;p&gt;It extends the invigilation methods on developers, because if a developer would deploy their app that would prolly not appeal to the any government-institution or google themselves, google has direct access to who you are and you are treated as criminal from day 0. Why ? &lt;/p&gt;

&lt;p&gt;Because the rules are that, in order to be able to deploy apps to their app store, you also need to pass your ID to google now. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I committed this massive failure&lt;/strong&gt; back 2024, I uploaded my ID and I'm ashamed. Ashamed because I promised myself back then already to start taking care about privacy. Though due to my desire to make my start-up appear and succeed at all cost, I violated even my personal rules, I was trying to be Mr. Pie (Perfect In Everything), but I failed tremendously. But that's the past and I don't give a single shit about it.&lt;/p&gt;

&lt;p&gt;As for devs, I see that we are exposed on another threat, namely &lt;strong&gt;censorship&lt;/strong&gt;. Yes you heard correctly, now as developers have only single source of release of their apps, they might challenge censorship issues. So your app can be taken down, removed and you might be incarcerated, sued or whatever legal actions would they take towards you. &lt;/p&gt;

&lt;p&gt;Another Issues I see, are onboarding issues and console usage, to be honest I was developing mobile apps for 2 years and was always confused with the console and sometimes lost quarters to find the  button or feature I want to use. It's highly counter intuitive.&lt;/p&gt;

&lt;p&gt;Your google play developer account might get &lt;strong&gt;suspended from whatever reason&lt;/strong&gt;, interrupting your work and write emails to unlock the account, coming along with the fact they know your address, they have your ID and know what you look like, they might sue you, and the law is easy &lt;strong&gt;"Money Talks"&lt;/strong&gt;, whoever has better lawyers, whoever has more money, there one will be innocent.&lt;/p&gt;

&lt;p&gt;It ruins the entire idea of &lt;strong&gt;open-source android apps&lt;/strong&gt;, because noone can download it without the app being required to appear in a google store (even for testers), without complying to google's restrictive requirements before publishing, which causes waste of time.&lt;/p&gt;

&lt;h3&gt;
  
  
  My Take on google
&lt;/h3&gt;

&lt;p&gt;google is indeed a big company and are earning a lot of money and produce and build phenomenal technology. The question is whether they earn so much due to lack of better products or is it because of the mail monopoly and the setup by default and regular users do not even think about using other tools like email provider.&lt;/p&gt;

&lt;p&gt;I would say it's because of their oligopolistic (together with Apple) dominance over mobile phones OS and because they bribe manufacturers to put that google's android on their phones.&lt;/p&gt;

&lt;p&gt;As you can already suspect and see after me writing name google with lowercase, I don't love google and genuinely condemn their actions and their company as well.&lt;/p&gt;

&lt;p&gt;I can't really believe how anti-human this corporation is. In order to get to someone from any support you're redirected to FAQ-section where finding answer will take you ages.&lt;/p&gt;

&lt;p&gt;And if there is already a human, they will answer you at fastest in 2 days. And also the responses from them are written in such way you wish to become a terrorist and visit google's headquarter in person.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1q8c2a5rqm8sagvglv8q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1q8c2a5rqm8sagvglv8q.png" alt="acc-removal" width="800" height="272"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Me myself removed the account from google play Developer Console, and took back my money. &lt;/p&gt;

&lt;p&gt;Which also was not so easy, because I had done the transaction from an already non-existing bank-account and bank that does not exist anymore and requested to send the refund to my current account. &lt;/p&gt;

&lt;p&gt;After a week they sent the money back to me. They are 3 trillion+ $ company and they have issues to send the refund on different account.&lt;/p&gt;

&lt;h2&gt;
  
  
  EU x google Data Sharing Act
&lt;/h2&gt;

&lt;p&gt;This one is quite fresh, so let's describe what's going on.&lt;/p&gt;

&lt;p&gt;The European Commission issued preliminary findings on April 16, 2026, proposing that &lt;strong&gt;google must allow third-party search engines and AI chatbots to access its search data&lt;/strong&gt; under the Digital Markets Act framework.&lt;/p&gt;

&lt;h3&gt;
  
  
  What's that shit 😮 for ?
&lt;/h3&gt;

&lt;p&gt;The EU promises to ensure that &lt;strong&gt;"data is a key input for online search and for developing new services, including AI."&lt;/strong&gt; The stated aim is to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Level the competitive playing field so rivals can challenge google Search's dominance &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Allow competitors to optimize their services using the same data inputs google has&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prevent market foreclosure and "practices that risk closing markets or limiting choice"&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ensure fair, reasonable, and non-discriminatory access to search data with transparent pricing parameters&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  What Data Must Be Shared ?
&lt;/h3&gt;

&lt;p&gt;google would be required to share the following search data with competitors:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Search rankings data&lt;/strong&gt; — how google ranks search results&lt;br&gt;
&lt;strong&gt;Query data&lt;/strong&gt; — the actual searches users perform&lt;br&gt;
&lt;strong&gt;Click data&lt;/strong&gt; — which results users click on&lt;br&gt;
&lt;strong&gt;View data&lt;/strong&gt; — which results users view without clicking&lt;br&gt;
&lt;strong&gt;AI-related data&lt;/strong&gt; — equally effective access to data used by google's own AI services like Gemini&lt;/p&gt;

&lt;p&gt;The data must be made available to eligible &lt;strong&gt;"data beneficiaries"&lt;/strong&gt;, which include third-party search engines and AI chatbots with search capabilities.&lt;/p&gt;
&lt;h3&gt;
  
  
  The Specific Requirements Under Consideration
&lt;/h3&gt;

&lt;p&gt;The EU's proposed measures would regulate:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Eligibility criteria&lt;/strong&gt; — which companies qualify as data beneficiaries&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Scope of data sharing&lt;/strong&gt; — exactly what data must be shared&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Technical means and frequency&lt;/strong&gt; — how often and through what systems data is transferred&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data anonymization protocols&lt;/strong&gt; — measures to strip personal information while maintaining data usefulness&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From google's side there is of course opposition, however I treat it personally as PR only.&lt;/p&gt;

&lt;p&gt;Clare Kelly, google's senior competition counsel, stated:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Hundreds of millions of Europeans trust google with their most sensitive searches — including private questions about their health, family, and finances — and the Commission's proposal would force us to hand this data over to third parties, with dangerously ineffective privacy protections." &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Ms. Kelly notices the sensitiveness of searches and private data, but on their own they state in the policy that they see all of your emails and thus own your sensitive information. Which than is processed and misused.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Pricing parameters — fair pricing mechanisms for data access&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access governance processes — rules for how beneficiaries use shared data&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Privacy Concerns: EU Data-Sharing Mandate and Potential Threats
&lt;/h3&gt;

&lt;p&gt;The proposal generates unprecedented privacy risks for EU citizens, despite framing the measure as pro-competition. &lt;/p&gt;

&lt;p&gt;Below I listed down what threats I see coming from this data-sharing act:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Search queries reveal the most intimate aspects of human life—medical conditions, mental health struggles, financial desperation, sexual orientation, relationship crises, and illegal curiosities—information people would never voluntarily share with multiple corporations. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Once this data is distributed to "eligible data beneficiaries" such as Microsoft, Apple, Meta, and Amazon, users lose any meaningful control over their most sensitive information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The EU's proposed anonymization safeguards are insufficient: academic research consistently demonstrates that anonymized search datasets can be re-identified when cross-referenced with other data these companies already control (email patterns from Microsoft, device usage from Apple, social graphs from Meta).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Real-world threat scenarios I could think of include&lt;/strong&gt;: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A person searching for depression treatment, suicidal ideation, and debt relief being microtargeted by predatory lenders or high-interest financial services;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Someone researching gender dysphoria or LGBTQ+ resources in conservative EU regions having that data sold or breached, exposing them to discrimination or legal risk;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A woman searching for abortion information in restrictive countries having her data shared across borders with law enforcement; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Aggregated "anonymous" search patterns revealing population-level health crises, enabling governments or insurers to deny coverage to high-risk groups; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Data breaches at any of the multiple vendors now holding search records exposing millions simultaneously rather than concentrating risk in one company. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The proposal does not grant users transparency into who accesses their data, control over sharing, or meaningful consent mechanisms—instead, it mandates data distribution as a condition of market access. This transforms the surveillance apparatus from monopolistic to oligopolistic, spreading vulnerability across more companies, jurisdictions, and profit incentives while maintaining the same fundamental loss of user autonomy.&lt;/p&gt;
&lt;h3&gt;
  
  
  Timeline
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Public Consultation Phase&lt;/strong&gt;: Interested parties (including google, competitors, and civil society) can submit comments until May 1, 2026. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Binding Decision&lt;/strong&gt;: The Commission expects to finalize its ruling by July 27, 2026, which will determine the exact scope and terms of data sharing &lt;/p&gt;

&lt;p&gt;This represents a major escalation in EU antitrust enforcement targeting Big Tech, with significant implications for how competitive search and AI development will operate in Europe.&lt;/p&gt;
&lt;h2&gt;
  
  
  Developer Request For Action (DRFA)
&lt;/h2&gt;

&lt;p&gt;Due to the surging surveillance and more threats to our digital privacy. I call you, you developers, who are the core of every digital product and service. Because it's thanks to you that we use apps in the app-stores. It's all your work spent on every app, extension, website, software comes from a developer. &lt;/p&gt;

&lt;p&gt;That's why if you're actively creating or are just about to join mobile dev, &lt;strong&gt;I request you to&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Not sign up to google play developer console account and remove your account from google play developer console as soon as possible. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are many alternative solutions to have deployed the app instead directly on the app store, &lt;strong&gt;one needs only to truly want to implement them&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;You can run a push notification campaign and in-app alerts saying about the problem and that you plan to move to open-source app-stores where you will continue.&lt;/p&gt;

&lt;p&gt;Make people aware of the actual threat and problem. Will you loose some customers ? Sure, but you will gain other ones.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Talk to your regulatory institutions about the issues&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I recently have distributed 500+ email messages to MPs and requested them for taking action pertaining the European Union implementation and plan do so either for the google's psychopathic desires.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-2049049335061434493-244" src="https://platform.twitter.com/embed/Tweet.html?id=2049049335061434493"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-2049049335061434493-244');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=2049049335061434493&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;p&gt;If you use X, feel free to follow, like and repost.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Fill out the survey where you oppose the update&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The more opposition there appears, the higher the probability that this update will not be implemented. So please go and fill out the survey, tell google what you think of this through &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSfN3UQeNspQsZCO2ITkdzMxv81rJDEGGjO-UIDDY28Rz_GEVA/viewform?pli=1" rel="noopener noreferrer"&gt;their own developer verification survey&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Visit &lt;a href="https://keepandroidopen.org/" rel="noopener noreferrer"&gt;Keep Android Open&lt;/a&gt; Website&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is well described, why the google's update violates privacy with their actions, if I didn't convince you, perhaps the website will.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Talk other developers and organizations out of signing up.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Add the &lt;a href="https://github.com/woheller69/FreeDroidWarn" rel="noopener noreferrer"&gt;FreeDroidWarn library&lt;/a&gt; to your apps to warn users.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Run a website? &lt;a href="https://keepandroidopen.org/banner/" rel="noopener noreferrer"&gt;Add the countdown banner&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;One could argue, why to even bother, it won't give anything anyways. It's wrong. Chat Control got revoked, due to public pressure, there are a lot of cases were pressure simply works. So can it be now as well.&lt;/p&gt;

&lt;p&gt;That's it for today, if you are mobile-dev please consider the measurements from the article. Don't forget to like and share it with friends.&lt;/p&gt;

&lt;h3&gt;
  
  
  Partner Block
&lt;/h3&gt;

&lt;p&gt;If you're about to purchase your first crypto wallet or a new wallet, you remember to checkout &lt;a href="https://onekey.so/shop/?r=Luftie" rel="noopener noreferrer"&gt;OneKey&lt;/a&gt; product and with my promocode: Luftie, you get 10% discount on all products available in their shop, but also 10% off on fees on perpetuals and defi fees like staking etc.&lt;/p&gt;

&lt;h3&gt;
  
  
  Donations
&lt;/h3&gt;

&lt;p&gt;If you appreciate my work, feel free to donate me and message with screenshot on &lt;a href="https://signal.me/#eu/IAg7tcmp_ug7jH0eZUnlufpMOi7FVFSonm5mgjBbZ60QVk-UgRFFr4OV62hpePSI" rel="noopener noreferrer"&gt;Signal&lt;/a&gt; or &lt;a href="https://t.me/LuftieTheAnonymous" rel="noopener noreferrer"&gt;Telegram&lt;/a&gt; :)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Donation Addresses&lt;/em&gt;:&lt;/p&gt;

&lt;p&gt;Monero (XMR): 44mBpaeJSuxTSFTXRxAb289mNiPgHTk6tMaKXPjg2DNQMbmxP1dFA86Q9QnHoU8T62XhQputbGkESiQBD31QrtfN377wGD3&lt;/p&gt;

&lt;p&gt;Bitcoin: bc1q5dxqaf2xva57rlac8gj5g3apmm0edvanvscyhw&lt;/p&gt;

&lt;p&gt;Ether (ETH): 0x524C676f9e31b6a4CaE067c41d01E9878b7FF14B&lt;/p&gt;

&lt;p&gt;Solana (SOL): DgsvUBEvQdQVk7bxQSA2cEjFuJRwMFokeGbMXtq6MY4X&lt;/p&gt;

&lt;p&gt;Mobile Coin (MOB): 7xB623noRRqqMxbTwqvbJWfcpycYyWEvWQAALigKn4VrwhuHZxsFP4Xkexp5MyK53pE8mfomXzDPaLXuwuQPw8RNveTQDSEuDQcPopv6Foyfei6DCkzJJx1j68j4xuXRQ94Q4SoC22vRMWKA58eNmvG2Nx2sy6wY1pu7ZzZTozYqL1vEDzGK1ajGNB9VLxppXarkpw3kBjUVbtjYzWo2iENpBpfVQ4tXaetUiGrv7EvPDa&lt;/p&gt;

&lt;p&gt;Thank you very much for any support, also leave the comment down below: What do you think of google ? Do you like the direction they head towards ?&lt;/p&gt;

&lt;p&gt;Till next one ;D&lt;/p&gt;

</description>
      <category>android</category>
      <category>mobile</category>
      <category>discuss</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Privacy and Security Setup to use in 2026 PART 3 (Payments)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 26 Apr 2026 14:40:32 +0000</pubDate>
      <link>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-3-payments-4pnf</link>
      <guid>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-3-payments-4pnf</guid>
      <description>&lt;h2&gt;
  
  
  GM, Dear Readers !
&lt;/h2&gt;

&lt;p&gt;In last 2 articles, I elaborated on things like OS, Browsers, Search Engines, Messengers and Mail Providers that we could use for increasing our level of privacy.&lt;/p&gt;

&lt;p&gt;Now as we're going deeper and deeper into the digital privacy and digital freedom, let's ask another question.&lt;/p&gt;

&lt;p&gt;What about private payments ? How about being able to pay privately for stuff irl 🏪 and online 🌐 ?&lt;/p&gt;

&lt;p&gt;Before I start with the meaty 🥩 part, if you haven't read my previous articles, check those last 2 ones out. They have low visibility, but have real value and a lot of knowledge in them, so please share with friends and share your feedback.&lt;/p&gt;


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3506511" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 21&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" id="article-link-3506511"&gt;
          Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/opensource"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;opensource&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/os"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;os&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;12&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            24 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;
 


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3437928" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 17&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" id="article-link-3437928"&gt;
          Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/privacy"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;privacy&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tooling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tooling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;14&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              4&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            31 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;Unfortunately my markdown skills are very limited 😆 and idk how to implement such list or series with interactive table with direct links to the article, just like &lt;a class="mentioned-user" href="https://dev.to/francistrdev"&gt;@francistrdev&lt;/a&gt; does it 🧠 (to be honest I'm envious about his skills, shout out to you amigo, love your articles) ! &lt;/p&gt;

&lt;p&gt;In order not to digress however 😄, currently there is a lot of supervision and restriction when it comes to payments. Those restrictions are implemented by the governments and institutions around the world are implying as though everyone was a criminal, therefore requiring your ID, details on where you live, your picture and more. &lt;/p&gt;

&lt;p&gt;That data and images are then stored in the companies cloud storage, which is prone to be hacked and exploited, thus your data might be obtained by an unwanted third-party like data-broker or hacker. &lt;/p&gt;

&lt;p&gt;You cannot pay cash 💰 when the price exceeds some amount (legally you can't ⚖️, others said it's not for hoi polloi, we know it's possible though 🫣). Trust in banks is naive, banks algorithms are flawed and are able to block your account after you make e.g. Github Copilot purchase, you have then to call the bank to unlock your card, being at the same time honeypot for your financial data.&lt;/p&gt;

&lt;p&gt;Meaning that banks 🏛️ are giving access to data to any law-enforcement 👮 without a single moment of hesitation 🫣. &lt;/p&gt;

&lt;p&gt;All of your transactions in the bank 📃, all the details, all that can be passed to a spy-agencies 🕴 of the state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quick Disclaimer (one of many today :D )&lt;/strong&gt;: I spent entire week, sleeping each day about 4 hours a day on average, working on this article. From it's style, fact checking, reviewing my cryptographic knowledge validity, listening to the podcasts with founders, investigation of compliance, asking questions for validation, waiting on the answers to edition, removing the providers that turnt out to be violating the privacy, while I already had a ready version of an article to push. &lt;/p&gt;

&lt;p&gt;I don't write it to make you feel sorry to me or imposing my effort to trigger some of your feelings but rather to personally express my admiration 🫶 to journalists, especially independent ones, who do they work well and in a righteous way just like I tried to do (hopefully I managed to :) ).&lt;/p&gt;

&lt;p&gt;Because I gone through a huge pile 🗄️ of articles with rankings/juxtapositions of cryptocurrencies without much details about their mechanism or non-kyc cards, that haven't been checked 🚫 by the authors, if they are fully non-kyc.&lt;/p&gt;

&lt;p&gt;I did it the hard way and made thorough "investigation" aka. research 🕵 (I kind of like the word investigation, because for some crypto companies or projects, it might be useful to procedure one 🤣).  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Long story short&lt;/strong&gt;, If you enjoy my articles, I decided to open options for you to send donations 🫴🪙, the details are on the end of the article. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My articles always will be free&lt;/strong&gt;, though I leave a free space for people that might want to appreciate my work and so helping me.&lt;br&gt;
Thank you very much for your donations in advance 😄 !&lt;/p&gt;

&lt;p&gt;These funds would be certainly used for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;purposes of newer articles e.g. test of some tool/device and giving a review on it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;for help to my mom 🧕 financially to keep the house on running 💸 smoothly (currently I'm before applying at the uni and well I'm jobless 📂, so I'm sort of parasite 🦠 some of you might think, but I help as much as I can to take the burden off of her 🫂).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;purchase of new equipment 🖥️ to my lab 🧪 aka. room ⛺ for potential co-worker to have workplace and cool experience of working together and perhaps start working jointly 👥 on some project that could then turn into a start-up and potential business (I would never forget the people, who would put a trust in me and help me 🤧).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Perhaps in the future I will grow to a bigger brand 🕶️ and all of the sudden I will start selling hoodies, t-shirts 👕, caps 🧢 with some themes of mine, we will see 😁 On this moment on I want you to make qualitative articles, so we go slowly to the core part of the article now on.&lt;/p&gt;

&lt;p&gt;Additionally, as you could see this article will be only about Payments and I excluded AI from the article. You could ask: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Luftie, wtf is going on ? Why can't you keep one plan and stick to it ?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Grasp you chair and hold it thightly.....&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnckpoiesqczjab2pcvuy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnckpoiesqczjab2pcvuy.gif" alt="grining face"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Because my articles are good and long, bitch ;D&lt;/strong&gt; If I kept Payments and AI format, this article would so long like &lt;strong&gt;distance from 🌏 Earth to exit of our galaxy 🛸&lt;/strong&gt; ! Now I reduced it to a length similar to a &lt;strong&gt;distance from Hicksville in South-Portugal 🇵🇹 to Shenzhen 🇨🇳&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;So I guess you're fine with it and we can fasten ➰ our belts for this beautiful and thriving just like &lt;strong&gt;Rust 🦀&lt;/strong&gt; on your car journey !.... I mean article, I mean..... &lt;strong&gt;JUST SHUT UP and read it 😘&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wr17htqtu5rac03vgci.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wr17htqtu5rac03vgci.jpg" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shout out to Rustaceans&lt;/strong&gt; 😅 !&lt;/p&gt;
&lt;h2&gt;
  
  
  Article Navigation Guide
&lt;/h2&gt;

&lt;p&gt;This article will have multiple sections so you can skip to what interest you the most, so in order to e.g. just find a part of article that is interesting to you here's the overview:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Payments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-- Cash&lt;/p&gt;

&lt;p&gt;-- Cryptocurrencies&lt;/p&gt;

&lt;p&gt;--- Intro, Good Web3 Practices + &lt;strong&gt;SURPRISE 🤩&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;---- # Blockchain 101 explanation &lt;/p&gt;

&lt;p&gt;---- # 1 Rule &lt;br&gt;
----- Detailed Cryptographic Explanation of nuances&lt;br&gt;
&lt;br&gt;
---- # &lt;em&gt;&lt;strong&gt;2 Rule + Surprise 🥳&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;---- # 3 Rule&lt;/p&gt;

&lt;p&gt;---- # 4 Rule&lt;/p&gt;

&lt;p&gt;---- # 5 Rule&lt;/p&gt;

&lt;p&gt;---- # 6 Rule&lt;/p&gt;

&lt;p&gt;---- # 7 Rule&lt;/p&gt;

&lt;p&gt;---- # 8 Rule&lt;/p&gt;

&lt;p&gt;---- # 9 Rules&lt;/p&gt;

&lt;p&gt;--- Privacy Coins&lt;/p&gt;

&lt;p&gt;--- Where to buy anonymously&lt;/p&gt;

&lt;p&gt;--- Other Coins&lt;/p&gt;

&lt;p&gt;-- Virtual, Prepaid and Physical Cards with no-kyc&lt;/p&gt;

&lt;p&gt;-- Alternative forms of payment&lt;/p&gt;
&lt;h2&gt;
  
  
  DISCLAIMER ⚠️
&lt;/h2&gt;

&lt;p&gt;The presented content does not encourage to commit any actions towards using such solutions, I do not take any responsibility if you use one of those tools and loose money. It's not a financial advice, the article has rather an informative and educational purpose. &lt;/p&gt;

&lt;p&gt;The article has not been sponsored by any companies presented in the juxtaposition of card providers or the blockchain organisation.&lt;br&gt;
All opinions on the products are personal, not influenced by any forms of incentive.&lt;/p&gt;

&lt;p&gt;The article in some paragraphs comprises writers personal, subjective opinions, experiences, that can include curse-words, if you're sensitive to language used, please don't take things personally or don't read it at all.&lt;/p&gt;
&lt;h2&gt;
  
  
  Payments &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6mm0pryoyq1onnb59fz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6mm0pryoyq1onnb59fz.jpg" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First of all why might you want to commit transactions privately ? Well that's because:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;you would not like to get questions from some financial institutions in your country where do you have the money from to commit the transaction ? &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you would not like to have an blocked (bank) account all of the sudden and frozen funds on the account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you want to diversify your risk when it comes to payments, because you are afraid that your bank-account can be suspended and funds frozen due to fake allegations or any other reasons.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you don't want your government or any entity besides you and the other party to know about the transaction.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you would like to make finally a utility tool out of crypto instead of just hodling it and waiting for moon time :D&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are yet other reasons why you might like to make transactions privately, I could make a whole article about, but it would be too longish. So now let's discuss the payment options !&lt;/p&gt;
&lt;h3&gt;
  
  
  1. Cash &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzs2rtxncgfyenfkm9kk3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzs2rtxncgfyenfkm9kk3.jpg" alt="cash"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I guess there will be no wonder at all if I say that the most private way of committing a transaction is apparently &lt;strong&gt;Cash&lt;/strong&gt; !&lt;/p&gt;

&lt;p&gt;It's of course not digital form of payment, however cash enables you to pay whenever and wherever you would like to and you have the certainty that those funds will not be stolen. Cash is untrackable, basically government does not track where each coin, banknote is, so paying cash is anonymous and you do not live any digital or trackable fingerprint afterwards.&lt;/p&gt;

&lt;p&gt;You could use cash however in multiple cases for digital I will name later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tradeoffs:&lt;/strong&gt; Large amount of cash can be tough to transport, you could not transport such large amount of cash in the airport and you would need to report it. But not only in the airport, if police would stop you and open the trunk they prolly detain you, even if it's not determined by the law of certain country that you're guilty. Also cash can be lost, so you need to take care of the banknotes so you don't loose them.&lt;/p&gt;
&lt;h2&gt;
  
  
  Cryptocurrencies &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As I'm really deep into this industry and I know the standards and behaviors that are common for this industry (similiar to other indurstries) and because all of the ways to pay privately will be  almost only rely on crypto-currency in terms of replenishment procedure, issuance fee payment and independent payment procedure (meaning you will not have to rely on another person).&lt;/p&gt;

&lt;p&gt;At first I want to emphasize, that cryptocurrencies are still considered as high-risk assets due to their volatility, low capitalisation.&lt;/p&gt;

&lt;p&gt;You might think &lt;em&gt;how come, though Bitcoin was lately for 128k $ ?!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;It all comes to math and the market cap, the maximal market cap of cryptocurrencies was about 4.28 Trillion Dollars (October 2025), now it's about 2.6 Trillion Dollars, so you see that the market cap gone severely down more than 30% in 6 months, which is fast in comparison to traditional markets.&lt;/p&gt;

&lt;p&gt;Also to depict the size of cryptocurrencies in juxtaposition with other markets. At the time of writing the article, &lt;a href="https://companiesmarketcap.com/assets-by-market-cap/" rel="noopener noreferrer"&gt;Global Real Estate Market is worth about 4 trillion Dollars, Total Gold value is about 33 trillion Dollars, Silver is 4.26 Trillion dollars&lt;/a&gt;. It's projected that cryptocurrencies have share of ~2% in Global GDP. So we talk about really microscopic market, compared to the other markets like Stocks or Real Estates.&lt;/p&gt;

&lt;p&gt;My take is that cryptocurrencies always will be treated such more of speculative, more volatile than other advanced markets and lesser regulated asset than the others, it always will be such market (unless people understand not to purchase stupid flashy coins, without reading the details and investing in another 100 shitcoins).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One should educate themselves to know what they are doing&lt;/strong&gt;, before taking any action related to this market whether it goes about first purchase or entering this market should be backed by education. &lt;/p&gt;

&lt;p&gt;Here I will provide a &lt;em&gt;&lt;strong&gt;guide for beginners with crypto&lt;/strong&gt;&lt;/em&gt;, covering the security, not financial rules. So that regardless of who you are, this will fit everyone. &lt;/p&gt;

&lt;p&gt;Because not every developer and especially not every person is acquainted with cryptocurrencies at all. Let's now jump into the details.&lt;/p&gt;
&lt;h2&gt;
  
  
  Intro, Good Web3 Practices + &lt;strong&gt;SURPRISE 🤩&lt;/strong&gt; &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;
&lt;h3&gt;
  
  
  What is Blockchain ? &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Blockchain in a short description is a type of distributed system 🌐, a decentralized ledger 📄 of transactions, distributed over many computers that running a specific computer program, these computers are called nodes, maintained by variously named, depending on the consensus protocol the network operates on maintainers (people), for the most popular cryptocurrency (Bitcoin) it would be miners, for Ethereum it would be validators.&lt;/p&gt;

&lt;p&gt;For the rest of the explanation I will stick to the word miners. The Miners are giving their computational power to the network to validate transactions on the network made by the networks participants. &lt;/p&gt;
&lt;h3&gt;
  
  
  Why do miners keep the network on going ?
&lt;/h3&gt;

&lt;p&gt;Their incentive to keep validating the transaction and supplying the network with their computational power is trying to solve computational puzzle 🧩 for something called block, which is basically a stack of transactions, which is pushed ➡️ in certain intervals (e.g. In Bitcoin it's 10 minutes or in Ethereum 12 seconds) to the blockchain as a sealed registered, irreversible change of the balances of network users, if they are sound with previous block states.&lt;/p&gt;
&lt;h3&gt;
  
  
  What makes cryptocurrencies special 🤔 ?
&lt;/h3&gt;

&lt;p&gt;It offers trustless transactions, and it's durability. Meaning that one Node (a miners devide) that has the last state enables the others to reclaim the state and restart the entire process of validating transactions and mining based on the last state. Also if one Node is down, it does not break the entire network, because as it's said it's decentralized, so there is no central entity governing the network, what complete opposite of current bank system that collapses after one bank's systems shut off.&lt;/p&gt;
&lt;h3&gt;
  
  
  How big is the reward ?
&lt;/h3&gt;

&lt;p&gt;The reward depends on each blockchain, however in Bitcoin Network, for solving the puzzle correctly, currently the prize is 3.125 BTC + fees from the transactions per block. The prize is algorithmicaly determined to be slashed every 4 years on a halve (that pertains only Bitcoin Network, the more blockchains, the more approaches) which is also named halving. It's designed so because the amount of Bitcoins possible to exist is only 21 million of coins, currently the supply is near to 20 million, thus Bitcoin has the got the name of digital gold, at least so called in mainstream. &lt;/p&gt;
&lt;h3&gt;
  
  
  What is cryptocurrency ?
&lt;/h3&gt;

&lt;p&gt;It's more trickier with cryptocurrency to explain, because they split on coins and tokens.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Coins, which are the native currency of the network for miners to get their reward in and for network participants to transfer the coins between each other.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And there are tokens, that just programs/code (in the industry called smart-contracts) deployed on the blockchain that should imitate a coin and should have feature just like a coin has. There are of course various types of tokens, but this goes beyond the frames of the article. For more knowledge, I advice doing personal searches.&lt;/p&gt;
&lt;h3&gt;
  
  
  Where to learn on Web3 ?
&lt;/h3&gt;

&lt;p&gt;I could write about cryptocurrencies more, but for more knowledge about cryptocurrencies I highly encourage to read a book like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.amazon.com/Bitcoin-Standard-Decentralized-Alternative-Central/dp/1119473861" rel="noopener noreferrer"&gt;Standard of Bitcoin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.amazon.com/Bullish-Case-Bitcoin-Vijay-Boyapati/dp/1737204118" rel="noopener noreferrer"&gt;Bullish Case For Bitcoin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;or &lt;a href="https://whiteboardcrypto.com/" rel="noopener noreferrer"&gt;visit this website&lt;/a&gt; and watch the materials, I really enjoyed videos made by that guy (shout out again !)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For those who desire to start with web3 programming&lt;/strong&gt;, here I can recommend checking out &lt;a href="https://www.cyfrin.io/updraft" rel="noopener noreferrer"&gt;Cyfrin Updraft&lt;/a&gt;. They have a ton of courses on web3 programming from smart-contracts for beginners to more advanced topics like work of Uniswap etc.&lt;/p&gt;

&lt;p&gt;I also highly advice to contact people or join a crypto community, who already have experience in the market and will help you go into the world step by step, if you're a freshman.&lt;/p&gt;

&lt;p&gt;Other useful source of knowledge for new and intermediately advanced people who want to broaden their knowledge, would be to join events and conferences and get in touch with people you are interested in, whether a developer, investor, VC, don't hesitate, just talk to them. So have I got my first work as an ambassador in an RWA start-up I worked for 4 months long.&lt;/p&gt;

&lt;p&gt;And of course, there will be as always conceited morons 🤵, who think that if they have a sport-car 🏎 or SUV car 🚙 in leasing and are earning 100k$+ annually, that they are rulers of the world 🫅, but to be honest although those people are indeed a significant fraction of web3, but you should not be discouraged to learn about Web3 only because of them.&lt;/p&gt;

&lt;p&gt;So now, as I explained the basics of blockchain and cryptocurrencies, I can explain couple of good practices for the security and privacy of the funds you have. The advice will not contain the financial advice, rather how one should operate in this market in order not to loose their funds. &lt;/p&gt;
&lt;h3&gt;
  
  
  Rules in Web3 to follow
&lt;/h3&gt;
&lt;h3&gt;
  
  
  1 Rule
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;NEVER SHARE YOUR PRIVATE KEY / SEEDS / MNEMONIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What it means is that you should not give the access to your crypto-wallet to anyone/anything (website, person), unless it's a verified software for a wallet like Metamask, Phantom. It's more of marketing slogan, because what they mean with keys is your seed phrase more known as mnemonic (12-24 words, that are giving you access to your wallet).&lt;/p&gt;

&lt;p&gt;And now Mr. Anonymous 🥷 will come with his educational and technical explanation 🤓 of what is the difference between mnemonic and private-key, public key and address (I read &lt;a href="https://github.com/ethereumbook/ethereumbook" rel="noopener noreferrer"&gt;Mastering Ethereum&lt;/a&gt; 5 times, somewhere I have to utilize this knolwedge). It's fully optional so if you want to go to next rule, skip it.&lt;/p&gt;
&lt;h3&gt;
  
  
  Detailed explanation of wallet related terms &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;All blockchains base on one type of cryptography &lt;a href="https://en.wikipedia.org/wiki/Public-key_cryptography" rel="noopener noreferrer"&gt;Public-Key Cryptography&lt;/a&gt; (also known as asymmetric cryptography). &lt;/p&gt;

&lt;p&gt;Essentially, it's feature is based on the fact that users do not have to share the same key for secure interactions with each other (like sending transaction) as in case of symmetric cryptographic algorithms like 3DES, ChaCha, Salsa20, Trivium, AES-256 and more gibberish names you won't probably understand (and you don't have to now). You actually might recall AES and ChaCha from last article mentioned.&lt;/p&gt;

&lt;p&gt;I will explain to you how users can interact with each other on chain, because a lot of tutorials actually screw up explaining this and it's because of misunderstanding of how public key cryptography works.&lt;/p&gt;

&lt;p&gt;In order to understand how public key cryptography works in blockchain properly, I need to explain 2 concepts. In blockchain mostly often 2 schemes of PKC are used:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Elliptic Curve Cryptography&lt;/strong&gt; - for key generation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Diffie Hellman Key Exchange&lt;/strong&gt; - for key-exchange as the name implies, but primarily it also manages the key generation &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now some of you might scratch your head and recall the previous lines that &lt;strong&gt;THE PKC WAS ABOUT NOT USING THE SAME KEY !&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;And you're quite right, nerdy boy/lady. For being alert, you won ticket to become a cricket 🦗🤣 (just kidding)&lt;/p&gt;
&lt;h3&gt;
  
  
  What is then the Diffie Hellman Key-Exchange ?
&lt;/h3&gt;

&lt;p&gt;It's a mathematically defined scheme designed for key generation and exchange of them, without creation one asymmetric key for interactions. For public key cryptography protocols to allow participants to communicate, which security relies on &lt;strong&gt;Discrete Logarithm Problem&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Luftie, WTF IS DISCRETE LOGARITHM PROBLEM ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Discrete Logarithm Problem&lt;/strong&gt; - is a mathematical problem based on difficulty of inversion of exponentiation in finite cyclic groups, the main matter to understand that, for DHKE protocols it is easy to generate the keys, but if you want to invert them it is not feasible given current computer powers (I do not take quantum risk into account, there are of course risks of Shor Alogirthm, that poses the threat to Public Key Cryptography. I will not focus on it in this article).&lt;/p&gt;
&lt;h3&gt;
  
  
  DHKE Framework
&lt;/h3&gt;

&lt;p&gt;Now in order DHKE to work, it needs 2 elements for set-up also &lt;br&gt;
called &lt;em&gt;domain parameters&lt;/em&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The large prime &lt;em&gt;p&lt;/em&gt; - it will be a base for generation of every new key&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The primitive element also called generator (I will define it as &lt;code&gt;g&lt;/code&gt;) - to define the size of the finite cyclic group&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  The Key Generation and Key Exchange Framework
&lt;/h3&gt;

&lt;p&gt;Setup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2 parties willing to communicate with each other without third parties&lt;/li&gt;
&lt;li&gt;The large prime number &lt;em&gt;p&lt;/em&gt; as a base&lt;/li&gt;
&lt;li&gt;The primitive element / finite cyclic group generator &lt;em&gt;g&lt;/em&gt; for defining the size of the group&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now both party, I'll name them A and B have compute their private and then public keys.&lt;/p&gt;

&lt;p&gt;Now what do both parties A and B do ?&lt;/p&gt;

&lt;p&gt;For Party A:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The private key &lt;em&gt;a&lt;/em&gt; is chosen, such that &lt;em&gt;a&lt;/em&gt; belongs to {2, p-2} set of elements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Then they calculate the public-key by performing action below&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;A = p^a mod g
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;ul&gt;
&lt;li&gt;You could ask why isn't the group {0, p} ? It's to avoid results zero values and to ensure there are non-trivial values. A private key of 0 would mean that an individual has no influence on the key exchange process, effectively providing no security. This approach helps prevent predictable outputs and potential attacks, ensuring the robustness of the key exchange.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The same action is performed for B party with only change of the variable names&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The private key &lt;em&gt;b&lt;/em&gt; is chosen, such that &lt;em&gt;b&lt;/em&gt; belongs to {2, p-2} set of elements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Then they calculate the public-key by performing action below&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;B = p^b mod g
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Now, to allow both parties to interact with each other &lt;strong&gt;one party needs to send their public key to the other party&lt;/strong&gt; &lt;strong&gt;and then the receiver party signs the received key with their private key and so has the common key been established&lt;/strong&gt; without a need of chosen symmetric key, so improving the security of our .&lt;/p&gt;

&lt;p&gt;If you're still confused, here a Screenshot from book &lt;a href="https://www.cryptography-textbook.com/" rel="noopener noreferrer"&gt;"Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Second Edition", written by Christof Paar, Jan Pelzl and Tim Güneysu&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2w4ikuiqs6ds8ptw2k6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2w4ikuiqs6ds8ptw2k6.png" alt="paar book img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a great introduction to cryptography and definitely worth buying. If you want to learn about cryptography however, but not want to spend money, Professor Christof Paar (that I personally wish that one day I met with him irl) and ignited my passion to cryptography even stronger, has a &lt;a href="https://www.youtube.com/playlist?list=PL3boZvi-wmN6r4HUGUpRSk5uhEcTNfjSS" rel="noopener noreferrer"&gt;playlist with lectures on cryptography essentials&lt;/a&gt;, so click the link to check it out.&lt;/p&gt;
&lt;h3&gt;
  
  
  Elliptic Curve Explanation
&lt;/h3&gt;

&lt;p&gt;Elliptic Curve Cryptography (for short ECC) - is a scheme of PKC and just like DHKE, it relies on DLP (Discrete Logarithm Problem).&lt;/p&gt;

&lt;p&gt;An elliptic curve itself is a special type of polynomial equation that can be presented on Cartesian Plane just like circle can be, by equaltion of &lt;code&gt;x^2 + y^2 = r^2&lt;/code&gt; and it generates a certain group of solutions, elements that the solution has to be in. &lt;/p&gt;

&lt;p&gt;The difference is for ECs that they are defined over a finite field and not real numbers, mostly it's prime field where all arithmetic is done modulo a prime p. The formula for elliptic curve looks as following&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;y^2 is equivalent to x^3 + a * x + b mod p
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;There are conditions yet to be fulfilled for a valid elliptic curve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;p &amp;gt; 3&lt;/li&gt;
&lt;li&gt;4 * a^3 + 27 * b^2 != 0 mod p
And it comes together with an imaginary point of infinity, which goes beyond the scope of the article.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How is the public key generated in ECC ?
&lt;/h2&gt;

&lt;p&gt;The formula for generation of the key is much easier on the first glimpse than what was presented in DHKE. The formula is&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pubK = G * privKey
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where G is a base point and the final public key is indeed also a point with coordinates of x and y.&lt;/p&gt;

&lt;p&gt;However it's not as easy as it might seem to be calculated and it involves elliptic curve arithmetic and usage of &lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#Double-and-add" rel="noopener noreferrer"&gt;add-double algorithm&lt;/a&gt;&lt;/strong&gt;, which goes beyond the scope of this article. &lt;/p&gt;

&lt;p&gt;** For those sneaky guys, who are alert, might say it's easily breakable, just divide The e.g. PubK x coordinate with base point's x and you got private key. And all might be cool, except the fact that ** there is no such operation as division in modular arithmetic** on which modular cryptography bases. &lt;strong&gt;There are only addition, substraction, multiplication, inversion&lt;/strong&gt;. &lt;/p&gt;

&lt;h3&gt;
  
  
  ECC Arithmetics
&lt;/h3&gt;

&lt;p&gt;Just for those who are curious and those who want to understand the workflow in a deeper level of how Elliptic Curve Cryptography Arithmetic works to generate a public key. There are actually 2 main actions that are performed on elliptic curves and it is adding (for 2 different points) and doubling (for the same points). Now how does is it performed on the curve ?&lt;/p&gt;

&lt;p&gt;I allow my self to quote the explanations from the Professor Paar's Book:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Point Addition P+Q&lt;/strong&gt; This is the case where we compute R = P + Q and P != Q. The construction works as follows: Draw a line through P and Q and obtain a&lt;br&gt;
third point of intersection between the elliptic curve and the line. Mirror this third&lt;br&gt;
intersection point in the x-axis. This mirrored point is, by definition, the point R.&lt;br&gt;
Below you can see how the addition is performed on a curve:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fem4erzutm0l0m5rihb6y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fem4erzutm0l0m5rihb6y.png" alt="img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Point Doubling P+P&lt;/strong&gt; This is the case where we compute P+Q but P = Q. Hence, we can write R = P + P = 2P. We need a slightly different construction here. We draw the tangent line through P and obtain a second point of intersection between&lt;br&gt;
this line and the elliptic curve. We mirror the point of the second intersection in&lt;br&gt;
the x-axis. This mirrored point is the result R of the doubling. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Below I provide the depiction of how doubling is performed on a curve together with formulas to calculate the points.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F216p7nhum0co4si4usdo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F216p7nhum0co4si4usdo.png" alt="dbling"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Additionally, it's worth mentioning that ECC provides the same level of security as discrete logarithm systems with considerably shorter operands (approximately 256–512 bits vs. 2048–4096 bits).&lt;/p&gt;

&lt;p&gt;It's on average twice as slow compared to symmetric cryptographic algorithms, but it provides convenience, independence and facilitated way to set-up a common secret key without relying on the protocol, because de facto we are responsible for this key generation, having our private key.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So to summarize&lt;/strong&gt;: Blockchains use DHKE for key exchange only and ECC for key generation which they next exchange in order to set up and mutual key for communication. Below you can see mathematical notation from Professor Paar's Book:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnd9kkkt2fax1b25f76x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnd9kkkt2fax1b25f76x.png" alt="paar"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Seed ? Private Key ? Public Key ? Mnemonic ? What is different about them ?
&lt;/h3&gt;

&lt;p&gt;Now I hope you survived my technical, mathematical, gibberishy explanations and now I can tell you what are the differences according to the terms.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Seed phrase/Mnemonic&lt;/strong&gt; - A seed phrase or mnemonic is a list of 12 to 24 words that is generated to grant access to a cryptocurrency wallet. The generation process involves taking a private key and adding a checksum to it, which effectively increases the bit length from 132 bits to 264 bits. The resulting data is hashed, and the output is split into segments, each with 11 bits. Since there are 2048 words in the mnemonic dictionary (typically derived from the English language), the segments can be mapped effectively to create meaningful words. Some cryptocurrencies, like &lt;strong&gt;Monero&lt;/strong&gt;, use a longer mnemonic of 25 words for additional security.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Private Key&lt;/strong&gt; - a cryptographic key used to sign transactions on a blockchain. It grants full control over the associated cryptocurrency funds and must be kept secret at all costs. If someone gains access to your private key, they can manipulate your wallet and transfer your assets without your permission. The private key is a long, random string of numbers and letters, and losing it means losing access to the funds tied to that key.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Seed&lt;/strong&gt; - it's essentially a hash of the private key combined with a checksum. It serves as a master key that can be expanded into multiple private keys, facilitating the management of a wallet containing various cryptocurrencies. The seed is usually derived from or represented by the mnemonic phrase, allowing users to retrieve their wallet through the mnemonic if needed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Public Key&lt;/strong&gt; - derived from the private key through a cryptographic algorithm. While the private key must remain confidential, the public key can be shared openly with others. It acts as an identifier associated with a wallet on the blockchain. The public key is necessary for receiving funds, as it allows others to send cryptocurrency to your wallet.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Address&lt;/strong&gt; - a short string derived from the public key, specifically taking the least significant 20 bits (at least for EVM chains) of it and hashing the result. This address serves as your wallet's public identifier on the blockchain, where others can send cryptocurrency. Because addresses are shorter and formatted for easier sharing, they provide a convenient way for users to send and receive funds without exposing the entire public key.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After this explanation you should no longer confuse address with public key. Once you make a transaction you pass an address to your wallet not public key.&lt;/p&gt;

&lt;h3&gt;
  
  
  Personal Story on the rule violation 🥲
&lt;/h3&gt;

&lt;p&gt;It's the most important in my opinion and often forgotten about rule, and I actually also fell victim phishing attack, where I  violated this rule. &lt;/p&gt;

&lt;p&gt;It was back 2024 as I've been developing my start-up 🛠️ &lt;/p&gt;

&lt;p&gt;I regularly invested my money in stocks from 2022/23 in stocks and Bitcoin (only bitcoin back then), back then crypto were yet before hitting 100k and one evening as I've been seeking people who are working or are from Switzerland to connect with them, I joined a discord channel of an Swiss Cheese Exchange, where I fell a phishing scam attack because of an fake bot announcement about the exchange collaboration with Opensea 🌏. The website looked neatly at that time (I had no clue what Opensea is back then). &lt;/p&gt;

&lt;p&gt;I wanted to see/test out how to mint an NFT, I clicked the button to connect my wallet with the website. However it turned out that the popup was coming from the website (it prolly was some shit of absolute position in css or so) and I passed there my seed because it has shown I had no connection of my ledger wallet with metamask. &lt;/p&gt;

&lt;p&gt;I was then shown on their website that something went wrong with the wallet connection and I gave up (it was late night and I was exhausted checking out the internet after work on my project), at the next morning I noticed this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj17ott1rbogp6azroqpn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj17ott1rbogp6azroqpn.png" alt="rekt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I invested back then about 4k $, so if I were to sell it at the peak or a bit below like 120k $ / 1 BTC. I do not blame anyone, because it is my fault only I didn't fact-check. &lt;/p&gt;

&lt;p&gt;I would have earnt about 210% + on the investment. Of course, now one can only contemplate, but apparently I don't regret I lost those funds. Of course it is a loss, but that also made me realise to set certain rules when it comes to my day to day behaviour.&lt;/p&gt;

&lt;h2&gt;
  
  
  Rule Number 2 + SURPRISE 🤩
&lt;/h2&gt;

&lt;p&gt;This rule is namely to grab oneself a hardware wallet also known as cold wallet, why is cold wallet such a big deal ? &lt;/p&gt;

&lt;p&gt;Let's &lt;em&gt;&lt;strong&gt;REALLY shortly&lt;/strong&gt;&lt;/em&gt; explain it. There are 2 types of wallets in web3, Software wallets like Metamask or Phantom that are so called hot wallets and are connected to the internet always. And there are cold wallets which are hardware devices that are needed to approve certain transaction ones you want to perform it in cold wallet's software and so noone can move funds from your wallet if they both don't know your mnemonic and do not have access to your hardware device to validate the transaction.&lt;/p&gt;

&lt;p&gt;Cold wallet would be a perfect solution if you have funds that you would not like to loose, like personal investments, savings etc. Hot wallet's I'd rather use it for some daily transactions like below 500$ valued wallets to prevent from bigger losses.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why to bother really about Cold Wallets ?
&lt;/h3&gt;

&lt;p&gt;In case of software wallets like Metamask or Phantom, the vulnerability lies in the fact that it's always connected to the internet and there might be many cases where you could fell a victim of scam or your keys could be captured by a hacker. Also one never knows if metamask will not be hacked and so one. &lt;/p&gt;

&lt;p&gt;The most known companies offering the wallets are &lt;br&gt;
Ledger, Trezor, Keystone Wallet and for sure many more companies. &lt;/p&gt;

&lt;p&gt;My personally first crypto wallet was Ledger. However due to many controversies with this wallet provider and uncertainties about security of my funds, and the kidnapping of CEO. I thought on buying a new wallet, but always lacked time to do it finally and there was always something more important to be done.&lt;/p&gt;

&lt;p&gt;Here you can see what such wallet looks like (It is jus disasambled by me, no worries you will get a full one :D)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4j1cvf16me417dhhsjp.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4j1cvf16me417dhhsjp.jpeg" alt="wallet"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SURPRISE TIME !
&lt;/h2&gt;

&lt;p&gt;Surprisingly, my posts got enough visibility, to get an email with an enquiry about partnership from OneKey company. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaad3f3gicvk6g3n2noq.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaad3f3gicvk6g3n2noq.jpeg" alt="onekey"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And after my research, answering of my questions and check of the company, I decided to take up the collaboration and I have a big pleasure to announce, that I have a partnership with &lt;a href="https://onekey.so/r/Luftie" rel="noopener noreferrer"&gt;OneKey&lt;/a&gt; and with my promo-code: Luftie, you got 10% discount.&lt;/p&gt;

&lt;p&gt;They are open-source, so I appreaciate the transparency. They are based in Chin, backed by big names but independent and were not involved in any actions with governments like passing data or data breaches, in 2023 there was an vulnerability found that was actually a hardware bug than the firmware, &lt;a href="https://cointelegraph.com/news/onekey-says-it-s-fixed-the-flaw-that-got-its-hardware-wallet-hacked-in-1-second" rel="noopener noreferrer"&gt;here you can read on it&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj2fepj7zty4xp7nwdn3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj2fepj7zty4xp7nwdn3.jpg" alt="surprise-time"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Model of the wallet, I received is OneKey Classic 1S and it looks as above. I have to confess that not the wallet triggered an impression on myself but rather the quality of the box and how well the wallet was packed with add-ons. Shammy leather inside, elegant box, security tapes to strip off to open up the box + cool stickers and equipment like sheets for your mnemonic 😁 and that's for 79$, they have shown care of every detail and took care of customer experience, whereas my Ledger Nano S Plus was bought for about 80$+ and was just a box with set-up but low quality e.g. stickers box.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9khfc7rtrfmrdztv0na5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9khfc7rtrfmrdztv0na5.jpg" alt="wallet-onekey"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The wallet has bluetooth support, so when I was about to confirm the transaction, the connection with e.g. PC is not necessary. This has it's convenience pros, but the one con is that there are cases already that via BLE there were malware spread over AI robots performed, so this is a thing to consider if you want to use it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9uj28vrwomihn9zmrll.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9uj28vrwomihn9zmrll.jpg" alt="cable"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The things that only caused for me a bit of issues was that I could not connect my wallet with my Desktop PC directly, because it doesn't have USB-C gateway and when I used the adapter even with bluetooth on, it could not find the wallet and I had to import the wallet via transfering via QR-code.&lt;/p&gt;

&lt;p&gt;The other things is the Flatpak-version, because it caused crashes on my Linux devices (at least Desktop) so it would be cool if they would have fixed it and also make dedicated versions for distributions specifically like &lt;code&gt;.deb&lt;/code&gt; files, so that I could attach the wallet's software to my panel and access it easily.&lt;/p&gt;

&lt;p&gt;They have support for all Operating Systems and what I appreciate an APK file, so that you can download the software from the website and it matters to me, due to google's psychopathic conquerence wet dreams to make u use only apps from official store. Again I recommend everyone to go to &lt;a href="https://keepandroidopen.org" rel="noopener noreferrer"&gt;Keep Android Open Website&lt;/a&gt; ! &lt;/p&gt;

&lt;p&gt;And they have even extensions for chroemium based browsers, so you can use it in Brave, I would be more than happy however to see Firefox support as well.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq30tc84pzgw9nh6yt5p0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq30tc84pzgw9nh6yt5p0.png" alt="img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Wallet has also a far more advanced Defi activity-participation detection outside of the wallet's software. So it displays more balances and helps you track state of your defi activity and investments like staking, lending or liquidity. Which Ledger does not.&lt;/p&gt;

&lt;h3&gt;
  
  
  Overall
&lt;/h3&gt;

&lt;p&gt;After using the wallet for a week, I can highly recommend this, it's far better than what I experienced with Ledger. As a side-note OneKey wallets support also Trezor-modes, if one would be curious about this. So if you search for a new wallet or you start with crypto and are about to purchase your first hardware wallet, OneKey is a very good option in my opinion, especially with my code 🥰 &lt;/p&gt;

&lt;h3&gt;
  
  
  3 Rule, Be Wary of Phishing Scams
&lt;/h3&gt;

&lt;p&gt;Scammers often create fake websites or emails that mimic legitimate platforms. Always double-check URLs and avoid clicking on links from unsolicited messages. Educating yourself about common phishing signs can significantly reduce risk.&lt;/p&gt;

&lt;p&gt;The best solution would be to use Browser like Brave and Metamask extension that support scam detection on bigger scale.&lt;/p&gt;

&lt;h3&gt;
  
  
  4 Rule, Understand the Basics of Blockchain
&lt;/h3&gt;

&lt;p&gt;Familiarize yourself with how blockchain works, including concepts like decentralization and consensus protocols. This foundational knowledge helps you make informed decisions about which projects to invest in and understand potential risks.&lt;/p&gt;

&lt;h3&gt;
  
  
  5 Rule, Research Projects Thoroughly
&lt;/h3&gt;

&lt;p&gt;Before investing in any cryptocurrency, conduct thorough research regarding its technology, team, community support, and use case. Understanding fundamentals helps to identify potentially fraudulent projects. Be doubtful by default about the projects.&lt;/p&gt;

&lt;h3&gt;
  
  
  6 Rule, Be Aware of Market Volatility
&lt;/h3&gt;

&lt;p&gt;The crypto market is highly volatile, with prices fluctuating significantly in short periods. Prepare for emotional reactions to market swings; consider setting stop-loss limits or using dollar-cost averaging when investing.&lt;/p&gt;

&lt;h3&gt;
  
  
  7 Rule, Beware of Fake or Scam Airdrops
&lt;/h3&gt;

&lt;p&gt;Airdrops can seem appealing but may mask scams. Always validate the legitimacy of the project offering airdrops by checking their official channels. Never provide your private keys to claim an airdrop.&lt;/p&gt;

&lt;p&gt;I myself have plenty of scams ERC-20 tokens and NFT-721, here an example of one pointed out in the red circle.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcua4vjhjs5di9bugmxgi.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcua4vjhjs5di9bugmxgi.jpeg" alt="scam-airdrop"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  8 Rule, Understand Transaction Fees
&lt;/h3&gt;

&lt;p&gt;Different blockchains have varying transaction fees based on network demand. Familiarizing yourself with these costs can help in choosing the right time to make transactions without losing excessive funds to fees.&lt;/p&gt;

&lt;h3&gt;
  
  
  9 Rule, Backup Your Wallets
&lt;/h3&gt;

&lt;p&gt;Regularly backup your wallet data and store it in a safe place. This ensures that you can recover your funds if your device fails. Create multiple copies and consider encrypting sensitive information for added security.&lt;/p&gt;

&lt;p&gt;NOW, enough of the stuff and into details of private payment options we go !&lt;/p&gt;

&lt;h2&gt;
  
  
  Privacy Coins &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;First option of private payments with cryptocurrencies are indeed those coins, whose base on blockchains with enhanced privacy algorithms. And this section will be about privacy coins indeed.&lt;/p&gt;

&lt;p&gt;** Important ⚠️ : In 2027 European Union is about to implement a "ban" 🤣 for privacy coins. Meaning from all the exchanges operating in EU, the privacy coins like Monero (XMR), DASH or ZTrash 🗑... eh sorry, ZCash will be delisted from the exchanges.&lt;/p&gt;

&lt;p&gt;That's why one would need a VPN, noone should decide about what one would should what should not purchase when it comes to assets in which one allocates their money. And next article from this series will be indeed on VPNs. But as you will discover later on you might not need VPN 😉&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Monero
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqp0dlsghxsllax5xcs8h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqp0dlsghxsllax5xcs8h.jpg" alt="xmr"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The golden standard for privacy coins, the most well known, the best privacy coin, the most adopted privacy coin. So could Monero be described and here is what is it's features and why it's so good.&lt;/p&gt;

&lt;p&gt;In the service &lt;a href="https://kynot.me" rel="noopener noreferrer"&gt;kycnot.me&lt;/a&gt; you can find the services that accept monero and you can pay monero with.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is making Monero so private ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring signatures&lt;/strong&gt; - are the foundation. When you send Monero, your transaction is mixed with multiple other transactions from the blockchain—typically 16 decoys by default. To an observer, it's impossible to tell which transaction in the ring is actually yours. The ring signature proves you authorized the payment without revealing which of your past outputs funded it. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stealth addresses&lt;/strong&gt; - handle the receiving side. Instead of having one public address where everyone can see your incoming transactions, Monero generates a unique one-time address for each transaction. &lt;/p&gt;

&lt;p&gt;*&lt;em&gt;RingCT (Ring Confidential Transactions) *&lt;/em&gt; - hides the amounts. Without RingCT, ring signatures would still leak transaction values, allowing someone to statistically determine which transaction in the ring was real by process of elimination. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy guarantee&lt;/strong&gt;: All three layers are mandatory and automatic on every Monero transaction. No user choice required. The sender, receiver, and amount are all hidden from the blockchain. &lt;/p&gt;

&lt;p&gt;HOWEVER ! Despite the strong cryptography, Monero is not perfectly anonymous in practice. The vulnerability is not the on-chain protocol, but metadata leaks: IP addresses, exchange deposit/withdrawal timing, wallet fingerprints, and behavioral patterns. Thus next article on VPNs will be adviced to read.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. ZCash
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuigvdd1cqlerv7hazqn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuigvdd1cqlerv7hazqn.jpg" alt="zTrash"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This cryptocurrency seems to play as "the second best", but as already Micheal Sailor said: "THERE IS NO SECOND BEST !", this pertains privacy coins. &lt;/p&gt;

&lt;p&gt;Personally I never owned ZTrash and never will do, because it's not genuine Privacy Coin as it does not enable privacy by default, last year it's been pushed with marketing everywhere and was backed by Grayscale VC in my opinion only to suck the wallets of investors dry and generate a narrative.&lt;/p&gt;

&lt;p&gt;ZTrash..ekhm, sorry &lt;strong&gt;ZCash&lt;/strong&gt; privacy layer relies on Zero Knowledge Proofs Cryptography, namely a scheme of SNARKs (zero-knowledge Succinct Non-Interactive Arguments of Knowledge, don't fucking worry idk myself yet what it exactly means 😁, but therefore I'm here to learn and educate)&lt;/p&gt;

&lt;p&gt;A zk-SNARK is a mathematical proof that lets you prove a statement is true without revealing any information about the statement itself.  The proof is "non-interactive"—you don't need back-and-forth communication to prove something is valid. &lt;/p&gt;

&lt;p&gt;This is theoretically more sophisticated than Monero's ring signatures. The cryptography is stronger. However, ZCash has a fatal flaw: privacy is not mandatory.&lt;/p&gt;

&lt;p&gt;Privacy guarantee: Only if you manually select shielded z-addresses. If you forget, your transaction is as traceable as Bitcoin. The cryptography is potentially stronger than Monero, but adoption is so weak that practical privacy is minimal.&lt;/p&gt;

&lt;p&gt;Law enforcement reality:  The privacy feature exists, but most people don't use it.&lt;/p&gt;

&lt;p&gt;Thus for me it's &lt;strong&gt;ZTrash&lt;/strong&gt; :D Imo, avoid if possible to use this spy-coin 😘&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Canton - Privacy for Institutions
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frds5kjjrq57o6j925awi.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frds5kjjrq57o6j925awi.jpg" alt="Canton"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Canton is &lt;strong&gt;fundamentally different&lt;/strong&gt; from traditional privacy coins because it's an institutional blockchain designed for enterprise use, not pseudonymous privacy. It employs a "need-to-know" privacy model built on the Daml smart contract language. &lt;/p&gt;

&lt;p&gt;The key innovation is stakeholder-based privacy: only parties explicitly defined in a smart contract (signatories and observers) ever see the transaction data. The system separates "content" from "ordering"—your participant node stores and validates full, unencrypted contract data, but the sequencer (which orders transactions) only sees encrypted metadata and hashes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Private Are Payments ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Payments on Canton are private from public observers and competitors, but not from regulators or law enforcement. Canton achieves sub-transaction privacy, meaning complex multi-party deals can be broken into smaller private pieces where only relevant parties see their portion. &lt;/p&gt;

&lt;p&gt;For example, if Bank A and Bank B are swapping assets via a central bank, Bank A and Bank B can exchange private details that the Central Bank doesn't need to see. However, Canton is explicitly not anonymous-by-design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who Sees Your Payments ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Only the parties you define in your smart contract see your transaction details. A regulator can be added as an "observer" at the contract level for real-time, read-only visibility without exposing data to the market.&lt;/p&gt;

&lt;p&gt;The network uses techniques to mask metadata patterns to prevent traffic analysis. Since Canton requires institutional participation with identified entities (financial institutions, market infrastructure providers, etc.), there is no pseudonymity—your identity is known to the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is Your Balance Publicly Visible ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;No. Your balance is private within your participant node. Canton uses Amulets (UTXO-style contracts) rather than account-based balances, and these follow the same privacy rules as any other asset on the network—only relevant parties can see them. Unlike public blockchains, there is no single global state visible to all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Law Enforcement and Blockchain Analysis risks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Canton is highly traceable by design because it prioritizes regulatory compliance. The system includes built-in auditability and selective disclosure mechanisms. A law enforcement agency can be granted observer access to relevant contracts, providing complete visibility into those transactions.&lt;/p&gt;

&lt;p&gt;Because Canton serves major financial institutions (Goldman Sachs, HSBC, BNP Paribas, DTCC, Deutsche Börse) that already maintain extensive AML/KYC compliance, the infrastructure for law enforcement investigation is inherent to the protocol. There have been no known cases of law enforcement struggling to identify Canton participants because the entire design assumes institutional identity and regulatory oversight.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. MobileCoin - THE ACTUAL SECOND BEST !
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvyk3ct2ozu64zq05if4w.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvyk3ct2ozu64zq05if4w.jpg" alt="MobileCoin"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If we were to estabilish some SECOND BEST PRIVACY COIN, Mobile Coin deserves it fully in my opinion, here is why.&lt;/p&gt;

&lt;p&gt;MobileCoin combines technology from Monero and Stellar, using &lt;strong&gt;CryptoNote technology&lt;/strong&gt; alongside zero-knowledge proofs to hide transaction details. The core cryptographic layers are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring signatures&lt;/strong&gt; (using MLSAG/CLSAG schemes) - hide which output is actually being spent, creating sender ambiguity&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One-time addresses&lt;/strong&gt; (similar to stealth addresses) - prevent linking outputs to a known recipient address&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring Confidential Transactions&lt;/strong&gt; (RingCT) - conceal amounts while preserving verifiability&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intel SGX&lt;/strong&gt; - secure enclaves running on validator nodes to protect transaction processing.&lt;/p&gt;

&lt;p&gt;Transactions are validated in SGX secure enclaves using a consensus protocol adapted from Stellar's Federated Byzantine Agreement. Everything is written in Rust, separating it technically from Monero while maintaining similar privacy principles.&lt;/p&gt;

&lt;h4&gt;
  
  
  How Private Are Payments?
&lt;/h4&gt;

&lt;p&gt;Payments are cryptographically unlinkable on the blockchain—blockchain analysts cannot connect sender to receiver from transaction data alone. The transaction recipients are hidden through one-time addresses that cannot be linked back to the recipient's actual wallet address. Amounts are hidden using RingCT. However, Signal (the messaging app integrating MobileCoin) itself can see behavioral metadata: who you're sending to, when, and how frequently, though not the transaction content itself. This is a critical distinction between on-chain privacy (strong) and metadata privacy (limited).&lt;/p&gt;

&lt;h4&gt;
  
  
  Who Sees Your Payments?
&lt;/h4&gt;

&lt;p&gt;On the blockchain level: nobody can identify the sender or receiver from transaction data alone. The recipient's identity is protected by one-time addresses, and the sender is obscured within a ring of possible signers. However, Signal knows the timing, frequency, and recipient patterns of your financial behavior, even though it cannot see the actual amounts or transaction content. This means Signal could provide this behavioral metadata to authorities if compelled.&lt;/p&gt;

&lt;h4&gt;
  
  
  Is Your Balance Publicly Visible?
&lt;/h4&gt;

&lt;p&gt;No. Your balance is completely private. Only the blockchain contains UTXOs and key images; no addresses or balances are published. However, anyone with your private view key (which you can share for auditing purposes) can see your incoming transactions.&lt;/p&gt;

&lt;h4&gt;
  
  
  Law Enforcement and Blockchain Analysis
&lt;/h4&gt;

&lt;p&gt;MobileCoin transactions themselves cannot be traced via blockchain analysis because of the cryptographic protections. However, law enforcement can compel Signal for transaction metadata (timing, patterns, recipient information). &lt;/p&gt;

&lt;p&gt;The weakness is not the coin itself but the application layer: Signal's servers maintain records of who sends to whom and when. Unlike true decentralized systems, MobileCoin transactions on Signal go through Signal's infrastructure, creating a record even if the blockchain itself is private.&lt;/p&gt;

&lt;p&gt;There have been no major publicized cases of law enforcement successfully de-anonymizing MobileCoin transactions on the blockchain itself, but this is largely because MobileCoin has &lt;strong&gt;limited adoption&lt;/strong&gt; and is primarily used within &lt;strong&gt;Signal&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;However when it comes to an risk of &lt;strong&gt;Signal&lt;/strong&gt; revealing some information about your balance or wallet whatsoever, &lt;strong&gt;I guess&lt;/strong&gt; (check it on your own) they will have everything encrypted and agencies will have troubles detecting detecting the person anyways and likely will not succeed.&lt;/p&gt;

&lt;h2&gt;
  
  
  My take on privacy and psuedo-privacy coins
&lt;/h2&gt;

&lt;p&gt;For the privacy and security of yourself, stick to Monero and MobileCoin and avoid usage of pseudo-private protocols. In time of October 2025 - January 2026, there was a huge boom on privacy coins market, there were new protcols like GHOST or MIDNIGHT announced and the narrative was pushed strongly to drain people's wallets and it ended up as always with a huge dump. &lt;/p&gt;

&lt;p&gt;One important thing we should understand is that, those assets will be volatile and we have to embrace it and have no remorse when e.g. we paid for something with XMR and the price of XMR raised, then such feeling of "Oh fuck, I could have waited to pay less" happens to everyone, but think of it as you would e.g. purchase the headphones for 100$ and after 2 months after purchase, then the price dropped to 85$, would you have remorse of having spent to much ? Well likely not, because you enjoy the headphones technology work and it was worth the price and you live further, no big deal.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where to but crypto-anonymously ? &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Of course if you would like to have cryptocurrencies and you have only fiat, you first need to purchase crypto obviously. But how can you purchase anonymously ? Here I have found approaches you could do.&lt;/p&gt;

&lt;h3&gt;
  
  
  P2P Exchanges
&lt;/h3&gt;

&lt;p&gt;These types of exchanges are connect you directly with a person who wants to sell their assets or want to buy some assets, instead of automating it like Centralized Exchanges usually do, disabling you from direct contact. In order to make a trade however often a deposit is needed in some currency, in order to allow you to betray the seller. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://bisq.network/" rel="noopener noreferrer"&gt;Bisq&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://retoswap.com/" rel="noopener noreferrer"&gt;Haveno&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://robosats.org/" rel="noopener noreferrer"&gt;RoboSats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://localcoinswap.com/" rel="noopener noreferrer"&gt;LocalCoinSwap&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And other one, that I found out about at the NBX event I was and it's prolly more focused sadly only on polish customers but &lt;a href="https://www.spot.club/" rel="noopener noreferrer"&gt;Spot.Club&lt;/a&gt; seems to be interesting. It's not working yet, but it is about to be launched. &lt;/p&gt;

&lt;p&gt;Also there was an CEX that offers privacy preserving solution namely Kanga, a polish exchange offers Kanga-Local, where you can meet in person with the local person and purchase/sell your crypto.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnlgaebl3rube7qn8tj0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnlgaebl3rube7qn8tj0.png" alt="kanga local"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It has it's pros such as possibility to connect with the person and make a relationship, become friends and do something together, but the trade-off here would be the fees to be paid.&lt;/p&gt;

&lt;p&gt;As it will turn out, &lt;strong&gt;PRIVACY COMES AT A PRICE&lt;/strong&gt; ! Price in terms of finances, convenience, social-acceptance (normies might treat you as weirdo) and other layers of where you would need to pay the price of being different.&lt;/p&gt;

&lt;p&gt;The other risk is that the person might be undercover agent or officer that could gather data on you and accuse you and all of the sudden ruin part of your life, it happens, it's not often but it's good to keep it mind.&lt;/p&gt;

&lt;p&gt;I mention it because there are far more cases of innocent people, who try to keep themselves away from government or they are preaching their opinions that are not complimentary towards surrveilance-apparatus of governments. &lt;/p&gt;

&lt;p&gt;To emphasize it: &lt;strong&gt;I'm not supporting criminal activities, I condemn and despise people performing any illegal action, but I condemn even more "legal" actions that violate freedom and privacy of regular people.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  ATMs
&lt;/h3&gt;

&lt;p&gt;On the time of writing there are yet places where there is a limit upto 1000 Euro value transaction to deposit/withdraw from the ATM, so checkout if it's available in your country and if there are any distributors of Crypto ATMs.&lt;/p&gt;

&lt;h3&gt;
  
  
  Exchange Points
&lt;/h3&gt;

&lt;p&gt;In Exchange Points (ger. Wechselstube) you have the same opportunity in some countries in EU yet to make a deposit/withdrawal upto 1000$ value. But from June on it is about to be &lt;/p&gt;

&lt;h2&gt;
  
  
  Alternative Crypto &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;By design, cryptocurrencies were about to liberate people from banks and centralized institutions. By having an (pseudo)anonymous network, people were supposed to make transactions without a trust to the 3rd party and even the person we make the tx with.&lt;/p&gt;

&lt;p&gt;And although the first one is partially achieved, the second one has been screwed up and currently if you go through KYC on an exchange in any form you can at most remain pseudo-anonymous, and if you do full KYC then it's just as though a woman (or man, coz people might squeek in the comments that I'm misogynist) would say they care about their privacy, but walks out in transparent clothes outside, hope you get the point.&lt;/p&gt;

&lt;p&gt;However, as mentioned earlier. There STILL (26.04.2026) are in some places options available to remain private without identification requirement.&lt;/p&gt;

&lt;p&gt;Most blockchains are transparent, therefore by chain-analysis law-enforcement can easily determine which wallets are yours together with CEXes support. &lt;/p&gt;

&lt;p&gt;And here are suggestions how to preserve anonymity in public blockchains (use EVM-chains, Bitcoin or Solana for convenience):&lt;/p&gt;

&lt;h3&gt;
  
  
  Coin mixing services
&lt;/h3&gt;

&lt;p&gt;Mixing or tumbling services pool transactions from multiple users, breaking the link between input and output addresses. Services like Tornado Cash (though now sanctioned in some jurisdictions) or CoinJoin for Bitcoin shuffle transactions together, making it harder to trace funds to their original source.&lt;/p&gt;

&lt;h3&gt;
  
  
  Address separation
&lt;/h3&gt;

&lt;p&gt;Create new addresses for each transaction rather than reusing the same wallet address. This prevents someone from linking multiple transactions to a single entity, though sophisticated chain analysis can still correlate addresses with patterns.&lt;/p&gt;

&lt;h3&gt;
  
  
  Use multiple wallets
&lt;/h3&gt;

&lt;p&gt;Maintain separate wallets for different purposes (trading, savings, donations) and avoid sending funds between them in traceable ways.&lt;/p&gt;

&lt;h3&gt;
  
  
  Non-custodial solutions
&lt;/h3&gt;

&lt;p&gt;Self-custody with hardware wallets means no exchange holds your identity data, though KYC (Know Your Customer) requirements at on/off-ramps still create on-chain entry points traceable to you.&lt;/p&gt;

&lt;h3&gt;
  
  
  VPN and Tor
&lt;/h3&gt;

&lt;p&gt;Route your blockchain activity through privacy tools like Tor or a VPN to hide your IP address from node operators and observers monitoring network traffic.&lt;/p&gt;

&lt;h3&gt;
  
  
  Non-KYC CEXes
&lt;/h3&gt;

&lt;p&gt;If you have already some crypto and you want to trade it or purchase e.g. coins that are not available in P2P and you want to use CEX, there are CEXes that allow you to use it without going through KYC, email is enough (use aliases ;D for that)&lt;/p&gt;

&lt;p&gt;Such exchanges are e.g. &lt;a href="https://www.htx.com/" rel="noopener noreferrer"&gt;HTX&lt;/a&gt; or &lt;a href="https://www.coinex.com/en/" rel="noopener noreferrer"&gt;CoinEx&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Virtual &amp;amp; Physical Cards
&lt;/h2&gt;

&lt;p&gt;The most desired option to pay and acquire goods is to have a card with some fiat. And here is where Visa/Mastercard Prepaid Virtual or even Physical cards come into play.  This comes with certain risks which I will describe, but for now I want to focus on the products specifically.&lt;/p&gt;

&lt;p&gt;I just want to emphasize the fact that it took 4 days, with 4 days in a row sleeping on average 3/4 hours a day to make this ranking/list. A lot of other articles on the internet are outdated and most of the products turnt into KYC-required cards or were just non-KYC the same as &lt;a href="https://zebec.io/" rel="noopener noreferrer"&gt;ZEBEC&lt;/a&gt; is.&lt;/p&gt;

&lt;p&gt;There are a lot of scammy non-kyc cards providers, that after linking you to the provider to activate the card, they require KYC there. One of such companies is &lt;a href="https://zebec.io/" rel="noopener noreferrer"&gt;ZEBEC&lt;/a&gt; (I still wait for my refund 10$ 😘), that does not require KYC from you on &lt;strong&gt;their side&lt;/strong&gt;, but when you get your activation token with link to &lt;strong&gt;third-party&lt;/strong&gt;, either pass the ID or you got rekt.&lt;/p&gt;

&lt;p&gt;That of course is nicely inserted in terms/privacy policy in one of their points:&lt;/p&gt;

&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;Third-Party Services &amp;amp; Wallet Control
Independent Partners
Some features rely on independent third parties such as:
Wallet providers
Card issuers
Payment processors
Blockchain networks
Staking providers
Banking partners
These companies operate separately from Zebec and may have their own rules. We do not control their operations and cannot guarantee their performance or availability.&lt;/li&gt;
&lt;/ol&gt;
&lt;/blockquote&gt;

&lt;p&gt;And it occured in 10+ cases with other providers/softwares. The inferrance is simple, READ FUCKING TERMS AND POLICIES ! If not all,  then filter it out to check parts you are interested in by searching for keywords (&lt;code&gt;CRTL&lt;/code&gt; + &lt;code&gt;F&lt;/code&gt;) and discover what the app legally is. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://laso.finance/" rel="noopener noreferrer"&gt;Laso.Finance&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qrg66gchrrozblbackr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qrg66gchrrozblbackr.png" alt="laso"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First there will be Laso Finance, probably mostly known No-KYC card issuer. &lt;/p&gt;

&lt;p&gt;And they offer only one time load cards, so the cards are not reloadable, basically the amount you will be willing to spend, so much only you will be able to spend. And you cannot top-up again.&lt;/p&gt;

&lt;p&gt;Laso Finance supports a lot of tokens from 3 chains EVM, Solana and Stellar (Beta).&lt;/p&gt;

&lt;p&gt;They offer 3 types of cards:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;US Only card&lt;/strong&gt; - Basically a one-time load card, that you can attach to your digital wallet and pay for products. Payments are possible only in US.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Push to Card&lt;/strong&gt; - This solution is not a card, rather a tool to replenish your debit card e.g. of your bank or any other card provider with cryptocurrencies without KYC. And usefull for crypto-offramp without KYC, recurring payments, ATMs withdrawals, etc.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;International&lt;/strong&gt; - This card has the same terms as the US one, with the difference that it has a 3.8% from the initial card load (min 100$ - max 1000$)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;&lt;p&gt;&lt;strong&gt;Canada Card&lt;/strong&gt; - The same card type as US and international one, enables you to spend canadian dollars without a fee.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  Feature Comparison
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Feature&lt;/th&gt;
&lt;th&gt;Wise (Multi-Currency Card)&lt;/th&gt;
&lt;th&gt;Push to Card&lt;/th&gt;
&lt;th&gt;Internationalp (USD)&lt;/th&gt;
&lt;th&gt;Canada&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Deposit Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;4.8%&lt;/td&gt;
&lt;td&gt;3.8%&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Transaction Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Withdrawal Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Minimum Order&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$20&lt;/td&gt;
&lt;td&gt;$10&lt;/td&gt;
&lt;td&gt;$100&lt;/td&gt;
&lt;td&gt;$20&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Maximum Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;td&gt;$9,541.98&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Apple Pay&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Google Pay&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Reloadable&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Automatic Balance/Transaction on Updates&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;FX Rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;-2%&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;3D Secure (3DS)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Daily Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Monthly Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;As in other cases, there is a list of countries where the product is not available, thus I advice to &lt;a href="https://laso.finance/international/nr" rel="noopener noreferrer"&gt;familiarize yourself with the list before purchasing&lt;/a&gt;. The list on the picture is trimmed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3vpn8mkl31gevozghzq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3vpn8mkl31gevozghzq.png" alt="list"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://privacygateway.io/prepaid-cards" rel="noopener noreferrer"&gt;Privacy Gateway&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;This is non-kyc virtual card provider but besides that they also have their bridge for any coins/tokens to purchase or sell XMR for other crypto, they have plenty of available tokens/coins you can exchange on. I will focus however only on the card this time here are the features that the card offers:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4qqele3qahf3aii8gsm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4qqele3qahf3aii8gsm.png" alt="PRIVATE-KYC"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The card it's self that they offer is re-loadable and they have chosen a different approach when it comes to business model compared to the previous options.  So you can actually reload this card as much as you would like to and enjoy private payments.&lt;/p&gt;

&lt;h3&gt;
  
  
  Card Features
&lt;/h3&gt;

&lt;p&gt;✓VISA virtual card&lt;/p&gt;

&lt;p&gt;✓Instant card issuance&lt;/p&gt;

&lt;p&gt;✓No KYC, just name and email&lt;/p&gt;

&lt;p&gt;✓$10,000 monthly limit&lt;/p&gt;

&lt;p&gt;✓Tap to pay worldwide&lt;/p&gt;

&lt;p&gt;✓Add to Google Pay&lt;/p&gt;

&lt;p&gt;✓Apple Pay (coming soon)&lt;/p&gt;

&lt;p&gt;✓3DS support&lt;/p&gt;

&lt;p&gt;✓0% fee on USD purchases&lt;/p&gt;

&lt;p&gt;✓3.5% loading fee&lt;/p&gt;

&lt;p&gt;✓24/7 support&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No Samsung Wallet Support (checked personally :D)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And instead of some one-time payments they decided to run a subscription model, they charge 5$/mo  (currently there is a discount from 10 $ dollars a month) &lt;/p&gt;

&lt;p&gt;No other fees included.&lt;/p&gt;

&lt;h3&gt;
  
  
  How the Card Purchase Works — Step by Step
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This explanation comes from official PrivacyGateway.io Support, after contacting them.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Choose your amount&lt;br&gt;
Pick one of the fixed denominations: $250, $500, or $1,000.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enter your details&lt;br&gt;
• A name (this is what gets printed on the card — it doesn’t have to be your legal name)&lt;br&gt;
• An email address&lt;br&gt;
• Choose your payment method: XMR, BTC, LTC, SOL, USDT/USDC (POL) — and we keep adding more!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Send crypto to your payment address&lt;br&gt;
You get a unique deposit address and an exact crypto amount to send. The amount already includes the 3.5% service fee.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card is created after a few confirmations&lt;br&gt;
Once your transaction gets enough blockchain confirmations, the system automatically creates your virtual Visa card. You receive a 32-character access hash — this is your only credential. There is no account, no password, no email login. Copy it and save it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The swap happens automatically&lt;br&gt;
The system automatically converts your crypto to load the card in USD. You do nothing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card goes active&lt;br&gt;
Once the funds arrive, your card balance updates. You log into your dashboard with your access hash to see the balance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reveal card details&lt;br&gt;
Click “Reveal Card Details” to see your full card number, expiry, and CVV — and you’re ready to use it!&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;I have to express my gratefulness to the Privacy Gateway Support, who has given me possibility to test out the card on my own and check, if the card will be supported by Samsung Wallet (as I decided to test my setup for private payments): Samsung + No SIM-CARD + dumb email + digital wallet (optionally VPN with thetered internet from my other one) as shown below (yes I glued over the cameras, lol):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwcgqmfzjveeogiavppia.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwcgqmfzjveeogiavppia.jpg" alt="shown below"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And for that money as a genuine tech-jounalist I grabbed my free meal, so thanks Leo 🫡 for giving me the opportunity. So did my meal look like, absolute aristocracy 🙌&lt;/p&gt;

&lt;p&gt;Btw do not allege me with being bribed, because if the product would not work or the support would not be so transparent about helpful, I would not put it on the list.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbjipcoe27nhjf9xryo7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbjipcoe27nhjf9xryo7.jpg" alt="free meal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Take&lt;/strong&gt; : This is a very low-budget, reasonable option to get started private payments with and to use on a daily basis for expenditures. I personally will soon think about using their product.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.goblincards.com/" rel="noopener noreferrer"&gt;Goblin Card&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvvjm7rjk1gfxfk1hchh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvvjm7rjk1gfxfk1hchh.jpg" alt="gbc"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I have to confess at first, I was skeptical about this product because of the fact that it's the only &lt;strong&gt;&lt;em&gt;PHYSICAL&lt;/em&gt;&lt;/strong&gt; card that is &lt;strong&gt;non-kyc&lt;/strong&gt;. And you might also have such an impression ? But therefore I gone and asked questions about the details of how the products work, I watch materials available and research the internet and not blindly copy paste from Gepetto-AI or any other Clueless Models (just kidding, lol). &lt;/p&gt;

&lt;p&gt;I also faced a bit of behavior, words from people in the group, that I was not about to expect and they weren't nice experiences. However, with the support of Goblin Cards, we jointly clarified everything and all my doubts got resolved. Shortly describing the company, it is a company based in Mexico, with small team, originally being and OTC exchange transforming into an card provider, which as the founder said was &lt;em&gt;natural move&lt;/em&gt;. &lt;/p&gt;

&lt;p&gt;People might yet be skeptical about the location, but a lot of that has been explained in &lt;a href="https://www.youtube.com/watch?v=Buwqib-h6BY&amp;amp;t=638s" rel="noopener noreferrer"&gt;the podcast by the founder (check it out)&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Really interesting stuff to learn about the financial system. The names of the systems like SPEI or Archus caught my interest and I will definitely read about it in my free time). The company attended Monerotopia event in Mexico and intend to be active in that space as well.&lt;/p&gt;

&lt;p&gt;I must say that my suspicion was wrong, already after I watched the interview, I had an impression of being wrong. I mean the founder was too transparent and shared so many details about how their product works, that some stupid big-tech CEOs would not share. So I decided to ask directly and clarify it.&lt;/p&gt;

&lt;h3&gt;
  
  
  How is this legally compliant ?
&lt;/h3&gt;

&lt;p&gt;It bases on physical reloadable &lt;strong&gt;PREPAID&lt;/strong&gt; mastercard cards. The &lt;strong&gt;PREPAID&lt;/strong&gt; adjective to this card makes the situation turn 180 degrees. Because if it was a regular card just like offered by Revolut or any other FinTech, then it would demand KYC/AML.&lt;/p&gt;

&lt;p&gt;However, due to the fact that it bases on prepaid cards, just like those one can purchase in a mall, gas-station next to gift cards. It makes it fit completely different category of cards. That's how I understood the compliance. &lt;/p&gt;

&lt;p&gt;And the fact that it's both reloadable and prepaid, makes it work and there are people who are actually satisfied with their products on SimpleX or Telegram chat and they offer a great support. Shout out to the Goblin Cards support for collaborating to make this article exist 😎&lt;/p&gt;

&lt;p&gt;And to me, it makes sense and I really support such initiatives. If there is a grain yet of the free market and this approach is not forbidden, then it's allowed and noone should be treating them as criminals or shady guys. &lt;/p&gt;

&lt;p&gt;In Europe the VISA or Mastercard prepaid cards are barely if at all visible or accessible and it sounds strange to a lot of people. Whereas in US or in countries in the south-america and mexico, those seem to be very popular and often used.&lt;/p&gt;

&lt;p&gt;If you want to &lt;a href="https://youtu.be/_ZFWuztgPvI" rel="noopener noreferrer"&gt;watch a video on the steps and see that the card works&lt;/a&gt;, there is an hindi guy with guideance and PoW of this card at ATM, you can turn on the automatic transalation (don't forget to like if you enjoy and write some shout-out from me 😁) !&lt;/p&gt;

&lt;h3&gt;
  
  
  How does the workflow from order to activation work ?
&lt;/h3&gt;

&lt;p&gt;*Explanation provided by official Goblin Cards Support. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Purchase the card, &lt;/li&gt;
&lt;li&gt;Send shipping address&lt;/li&gt;
&lt;li&gt;Receive the card&lt;/li&gt;
&lt;li&gt;Message support to activate&lt;/li&gt;
&lt;li&gt;Receive login instructions&lt;/li&gt;
&lt;li&gt;Proceed to deposit via bot and spend
&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;That are six simple steps, that are allowing you to reclaim the control over your finances and keep it private, independent of banks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Product Details
&lt;/h3&gt;

&lt;p&gt;Card type: &lt;strong&gt;Mastercard Prepaid Reloadable&lt;/strong&gt; (Physical)&lt;/p&gt;

&lt;p&gt;∙ $5,000 USD daily spending limit&lt;br&gt;
∙ $25,000 USD monthly spending limit&lt;br&gt;
∙$500 daily ATM withdrawal limit&lt;br&gt;
∙ Balance maintained in Mexican Pesos&lt;br&gt;
∙ Chip + contactless (tap to pay)&lt;br&gt;
∙ Shipped via UPS (3–5 days worldwide)&lt;br&gt;
∙ Dedicated app for balances and transaction history&lt;/p&gt;

&lt;h3&gt;
  
  
  Pricing
&lt;/h3&gt;

&lt;p&gt;∙ Card: $350 USD one-time&lt;br&gt;
∙ Deposit fee: 3.5% (XMR: 4%)&lt;br&gt;
∙ Renewal: $100 (after 3 years)&lt;/p&gt;

&lt;p&gt;The coins they support for deposit and pay for the card is basic, but solid: BTC, SOL, ETH, USDT, XMR&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Take&lt;/strong&gt;: I would be keen to buy this card after like 1/2 years of usage of the virtual card provided by PrivacyGateway.io&lt;/p&gt;

&lt;p&gt;This solution looks very promising, but we never know what the future regulation might look like and if such solution would not be basically be banned either in EU or somewhere else. But definitely good for diversifying source of payments, if one gets blocked I can use the other.&lt;/p&gt;

&lt;p&gt;Shout out to the Goblin Cards support, who answered all my questions and resolved doubts.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.trocador.app/en/" rel="noopener noreferrer"&gt;TroCador&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yw3012vkobbgzftvrtp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yw3012vkobbgzftvrtp.png" alt="TroCador"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A service that offers variety of private solutions for payments like cross-chain swaps, bridges, anon donations (to implement for devs), gift-cards to be purchased. However we will focus this time only on the visa cards and how can we pay anonymously.&lt;/p&gt;

&lt;p&gt;Trocador offers up to $1000 prepaid visa cards. There is no limit on the number of cards you can buy. You can top-up this card with any cryptocurrency available in Trocador, they support Bitcoin, XMR, ZCash, MobileCoin, Ether, Solana, their tokens and many more (checkout their site)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Issuance fee&lt;/strong&gt;: 3%, depending on the provider.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2-Monthly payment&lt;/strong&gt;:  2.5 $&lt;/p&gt;

&lt;p&gt;Tx fee: Instead of the usual 2% Currency Conversion Fee, they charge $0.75 for each non-USD transaction&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prepaid Card Providers&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt; MyPrepaidCenter (US Only) (US Dollars) - as the owners of the service say, it might be also used anywhere else but they do not guarantee it will work (likely will not).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prepaid Cards Provided by Reward (US Only) (US Dollars) - the same as previous option.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prepaid Cards Provided by Swype (US Dollars) - Available internationally.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trocador issues a card from 3 different card providers:&lt;/p&gt;

&lt;p&gt;Transactions in different currencies than that of the card may incur a currency conversion fee by the card provider (usually 2% or $0.75).&lt;/p&gt;

&lt;p&gt;The discomfort might come for VPN users as they will be blocked from redeeming their cards and you would have lost your funds (not worth it, buddy :( )).&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://stealths.net/" rel="noopener noreferrer"&gt;Stealths&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xvls33byy4yezfg5e20.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xvls33byy4yezfg5e20.png" alt="Stealths"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stealths as their competitors besides offering visa/mastercard prepaid cards, it also has e-sim card plans and gift cards in their offer. But as said before, here I focus on payment cards only. &lt;/p&gt;

&lt;p&gt;There are 4 types of Cards that they offer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Visa Gift Card (Only US) with upload topup from 5 to 1000$ only one time&lt;/li&gt;
&lt;li&gt;American Express Gift Card (Only US) topup from 5 to 3000$ only one time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here are the details of those products:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This product is delivered automatically. &lt;/li&gt;
&lt;li&gt;Card activation code and instructions will be added to order page.&lt;/li&gt;
&lt;li&gt;American Express gift cards are issued by amexrewardcard.com &lt;/li&gt;
&lt;li&gt;It's possible to view transaction history and balance details on card issuer's website.&lt;/li&gt;
&lt;li&gt;Location to use: Only US&lt;/li&gt;
&lt;li&gt;Cards are issued by U.S. bank and card currency is USD (Amex).&lt;/li&gt;
&lt;li&gt;Support of Digital wallets (Google Pay, Apple Pay, etc.):  Yes,  But digital wallets checks your IP and trust scores, so we don't guarantee you can link it.&lt;/li&gt;
&lt;li&gt;support 3D secure: No. Some merchants may decline the transaction for this reason.&lt;/li&gt;
&lt;li&gt;ATMs or recurring billing: Not allowed &lt;/li&gt;
&lt;li&gt;Online Acceptance: limited, you are advised to test the product with low amount at first.&lt;/li&gt;
&lt;li&gt;Expiry time: 6 months (extension and reload not available) .&lt;/li&gt;
&lt;li&gt;You should not redeem more than 2 gift cards from same device in 24 hours.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fees &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;5% of the card top-up amount or minimal  5$ 
## Reloadable Cards&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Stealths also offers reloadable prepaid cards. One of the product is Rewarble Voucher&lt;/p&gt;

&lt;h3&gt;
  
  
  Rewarble Voucher
&lt;/h3&gt;

&lt;p&gt;Fees: min 5$ or 7.5% of the amount topped up.&lt;/p&gt;

&lt;p&gt;Details for the product:&lt;br&gt;
Delivery: automatic, comes together with &lt;/p&gt;

&lt;p&gt;Support for Problem: Rewarable (MasterCard) / Visa Support&lt;/p&gt;

&lt;p&gt;You need to activate card after purchase. Card issuer will ask for email and address. It's not allowed to use VPN on redemption, you should provide a valid email address.&lt;/p&gt;

&lt;p&gt;Issuance of first prepaid card on Rewarble is free, additional cards and reloads cost 4.5% + $1.99. For more details on pricing, check their website.&lt;/p&gt;

&lt;p&gt;It's possible to view card balances and transactions on the issuer's website.&lt;/p&gt;

&lt;p&gt;Rewarble offers multiple prepaid card options, we recommend "Suna Mastercard" product. Card availability and mobile wallet acceptance might be limited in your region. It's recommended to test with small amount first.&lt;/p&gt;

&lt;p&gt;You can use Rewarble voucher code to reload existing card.&lt;/p&gt;

&lt;p&gt;Cards are issued by U.S. bank and card currency is USD. Card supports foreign transactions, FX fee may be charged by card issuer.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rewarble cards are valid for 7 days (+ another 7 days with free extension) initially, after validity period it costs $1.49/mo to keep card active.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Single-Use VCC (High Limit)
&lt;/h3&gt;

&lt;p&gt;Intial topup: min 500$ - max 30k $&lt;br&gt;
Fee: 8% or minimum 40$&lt;/p&gt;

&lt;h3&gt;
  
  
  Product Details
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Delivery of this product is manual. Please do not create order without contacting us, delivery is possible in work hours.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This is a virtual card, not a prepaid card. Virtual cards have higher approval rates.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The card is not for long term use, you need to spend the balance in the same day you receive card details (up to 3 transactions allowed).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card currency is USD. It can be used internationally with different currencies. The bank charges 2.5% fee for non-USD transactions, please keep that in mind.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The card supports 3D secure. It works on most online merchants; including PayPal, Amazon EU, Stripe checkouts. It does not support mobile wallets.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://stealths.notion.site/Welcome-to-Stealths-NET-27b6dfb81d098021ad49e096bbcb00d1" rel="noopener noreferrer"&gt;Terms of the card&lt;/a&gt; are available in this link for more info.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.bitrefill.com/" rel="noopener noreferrer"&gt;BitRefill&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl09ip1gqqj1dxlkeb5h1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl09ip1gqqj1dxlkeb5h1.png" alt="bitrefill"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a marketplace with a variety of gift-cards and products (e.g. E-SIM cards, Phone-refills) you could purchase with crypto. They do not support Monero or from privacy coins, they support only DASH. They support as the name might suggest, Bitcoin, Ether, Solana, LTC, DOGE, TON, SUI and USDC and USDT&lt;/p&gt;

&lt;p&gt;How their business model works, is that they apply a fee to your final checkout, when you are about to pay.&lt;/p&gt;

&lt;h2&gt;
  
  
  How do they earn money ?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqm2oo5oiyebxjk1lics0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqm2oo5oiyebxjk1lics0.png" alt="screenshot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From the example you can see they apply some fees to the final checkout. They have lower rate of ETH/EUR pair (at the time of writing it was 2049.65) and there it's 2031.30. So allegedly they charge ETH rate + about 1% fee (222.08 Euro in total), but they can sell it on the market for 224.10 Euro (just as an example, if they would have sold it after the payment would have arrived how the money would be made). So in total they earnt about 2%&lt;/p&gt;

&lt;p&gt;The fee might vary depending on the selected coin/token to be paid with.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My take&lt;/strong&gt;: This product would be used by me in case I would like to gift someone a b-day a gift card, or if I would like to pay for booking or AirBnb wihout attaching my card to their service. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://linkpay.io/" rel="noopener noreferrer"&gt;LinkPay&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsplfigeof2rd99ypacd0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsplfigeof2rd99ypacd0.png" alt="link-pay"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a virtual visa/mastercard card provider, that issues cards for specfic usage like to spend for ChatGPT subscription, Netflix.&lt;/p&gt;

&lt;p&gt;I messaged the support with request for clarification, what card can be purchased without KYC and here is the answer I got.&lt;/p&gt;

&lt;p&gt;Without KYC verification, you can still use basic operations with Linkpay, but there are limitations. The monthly spending limit is $500, and only advertisement cards are available for issuance. Verification is required to increase limits and enable full card functionality. &lt;/p&gt;

&lt;p&gt;Verification in Linkpay increases your limits and enables full card functionality. While basic operations are available without it, verification is required for higher limits and extra security. Here are the verification levels: &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No Verification&lt;/strong&gt;: &lt;br&gt;
Monthly spend limit: $500 &lt;br&gt;
Only advertisement cards are available. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Basic Verification&lt;/strong&gt; (Email and other details + ID Upload): &lt;/p&gt;

&lt;p&gt;Monthly spend limit: $2000 &lt;br&gt;
All cards are available except Apple/Google Pay. &lt;br&gt;
Requirements: Full name, address, and valid ID details. &lt;/p&gt;

&lt;p&gt;Unlimited Verification: &lt;/p&gt;

&lt;p&gt;No limits on spend or card types. &lt;br&gt;
Requirements: Valid ID photo and passing a live check. &lt;/p&gt;

&lt;h2&gt;
  
  
  Other Cards (to personal verification)
&lt;/h2&gt;

&lt;p&gt;Above were all card solution presented, that I accessed as legal, not shady, plausible. As I said before there were a lot of cards, who seemed to by non-kyc only, but there are solutions where I had issues to access them if they are scammy or not. Thus I list it here, so you can check it on your own.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.bingcard.com/" rel="noopener noreferrer"&gt;BingCard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.kardpay.app/" rel="noopener noreferrer"&gt;KardPay&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://veil.cards/" rel="noopener noreferrer"&gt;Veil&lt;/a&gt; (this one really looks sketchy, similiarly to Privacy.com design, almost all scam opinions on trust pilot)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://superwallet.xhype.io/" rel="noopener noreferrer"&gt;XHype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.solcard.cc/product" rel="noopener noreferrer"&gt;Solcard&lt;/a&gt; - Although it looks fully legit, their privacy policy and terms of usage didn't allow me to determine whether they their 3rd party does require KYC or not. About the product they offer, they offer a reloadable virtual card. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The offer of this card however is very limited, and if you have the virtual card without KYC, you are not able to attach it to your digital wallet. Here you have the details on the product they offer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuctbxv0pn6ceya6eh8m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuctbxv0pn6ceya6eh8m.png" alt="solcard-3"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Below you got a screenshot, where they advertise themselves, having non-KYC card:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foz4sasi9nf724zuy13de.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foz4sasi9nf724zuy13de.png" alt="solcard-3"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao0snyefx9wxorebxvy5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao0snyefx9wxorebxvy5.png" alt="solcard-2"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fateqfxmnb95vlea4kyy3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fateqfxmnb95vlea4kyy3.png" alt="solcard-1"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Again any action you take, you take it on your own, do not allege me afterwards if you loose money and don't come to me whining you lost money, I warned you.&lt;/p&gt;

&lt;h2&gt;
  
  
  Other Option to pay anonymously/pseudoanonymously &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Other methods I thought about to preserve privacy are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pay someone cash to pay for the money transfer from their account&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Solution that perhaps is the most ridiculous, but &lt;strong&gt;having a bank account&lt;/strong&gt; would be a.....&lt;/p&gt;

&lt;p&gt;LET ME FINISH, OK ? DON'T KILL ME YET 🫣.  &lt;/p&gt;

&lt;p&gt;Having a bank account in a countries without CRS, so that your financial activity stays in that country and is not reported to countries that request the data about you. Cambodia is one of such countries, that offers friendliness towards cryptocurrencies and are allowing people to pay and purchase goods with cryptocurrencies. It of course will demand you to provide your government-ID to open an account, however due to the fact that only you and your bank know about the transaction, some minimal privacy remained, but still not fully private.&lt;/p&gt;

&lt;p&gt;Also an interesting fact, Cambodia's National Bank launched &lt;strong&gt;Bakong&lt;/strong&gt;, a blockchain-based digital payment system, which represents one of the most prominent real-world implementations of blockchain technology in a national banking system.&lt;/p&gt;

&lt;p&gt;The system was designed to achieve three key objectives: improve financial inclusion (Cambodia had ~78% unbanked population at launch), modernize digital payments infrastructure, and &lt;strong&gt;reduce reliance&lt;/strong&gt; on the US dollar in everyday transactions.&lt;/p&gt;

&lt;p&gt;I find it's bold and I find it banger-news ⚡&lt;/p&gt;

&lt;p&gt;Again I mention Cambodia, because I reminded myself about the talk I had pleasure to have with people from &lt;a href="https://dev.tourl"&gt;&lt;strong&gt;Relocatify&lt;/strong&gt;&lt;/a&gt; at NBX-event, shout out to them 🫡 !&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Phew..., it's been quite a long ride, didn't it ? I hope you did enjoy the article and it was insightful to you, if so please leave a comment and a like. If you have suggestions what to change, please share it in the comments. &lt;/p&gt;

&lt;p&gt;If you're about to purchase your first wallet or a new wallet, you remember to checkout &lt;a href="https://onekey.so/r/Luftie" rel="noopener noreferrer"&gt;OneKey&lt;/a&gt; product and with my promocode: Luftie, you get 10% discount on all products available in their shop, but also &lt;strong&gt;10% off on fees on perpetuals and defi fees like staking etc.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once again, I want to express my gratefulness to OneKey team, that they noticed me and believed in me. That means a lot to me, because such things do not happen to all of small creators and I got noticed and I'm happy about it, which only propels me to create better content for you.&lt;/p&gt;

&lt;h3&gt;
  
  
  Donations
&lt;/h3&gt;

&lt;p&gt;As I promised above, here you have the addresses to my wallets for certain chains, if you want to send some coins/tokens to support me, feel free to do so. I'll be more than glad and you can send me the message on &lt;a href="https://signal.me/#eu/IAg7tcmp_ug7jH0eZUnlufpMOi7FVFSonm5mgjBbZ60QVk-UgRFFr4OV62hpePSI" rel="noopener noreferrer"&gt;Signal&lt;/a&gt; (you can also use &lt;a href="https://t.me/LuftieTheAnonymous" rel="noopener noreferrer"&gt;Telegram&lt;/a&gt;, but please avoid it, I prepare to remove my account from there. I'm fed up with it's flashiness, people that are running scams there and hoes with their channels)&lt;/p&gt;

&lt;p&gt;Crypto Addresses:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monero (XMR)&lt;/strong&gt;: 44mBpaeJSuxTSFTXRxAb289mNiPgHTk6tMaKXPjg2DNQMbmxP1dFA86Q9QnHoU8T62XhQputbGkESiQBD31QrtfN377wGD3&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bitcoin&lt;/strong&gt;: bc1q5dxqaf2xva57rlac8gj5g3apmm0edvanvscyhw&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ether (ETH)&lt;/strong&gt;: 0x524C676f9e31b6a4CaE067c41d01E9878b7FF14B&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solana (SOL)&lt;/strong&gt;: DgsvUBEvQdQVk7bxQSA2cEjFuJRwMFokeGbMXtq6MY4X&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mobile Coin (MOB)&lt;/strong&gt;: 7xB623noRRqqMxbTwqvbJWfcpycYyWEvWQAALigKn4VrwhuHZxsFP4Xkexp5MyK53pE8mfomXzDPaLXuwuQPw8RNveTQDSEuDQcPopv6Foyfei6DCkzJJx1j68j4xuXRQ94Q4SoC22vRMWKA58eNmvG2Nx2sy6wY1pu7ZzZTozYqL1vEDzGK1ajGNB9VLxppXarkpw3kBjUVbtjYzWo2iENpBpfVQ4tXaetUiGrv7EvPDa&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Once again&lt;/strong&gt;. &lt;em&gt;If you donated on one of those addresses, thank you very much for your support 💜&lt;/em&gt;&lt;/p&gt;

</description>
      <category>defi</category>
      <category>privacy</category>
      <category>cryptography</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Tue, 21 Apr 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36</link>
      <guid>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36</guid>
      <description>&lt;h2&gt;
  
  
  Gm Hackers !
&lt;/h2&gt;

&lt;p&gt;In recent post, I presented to you what Operating Systems to use, Browsers and search engine. This time we're going into something that also pertains every internet user and namely the communication 📞&lt;/p&gt;


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3437928" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 17&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" id="article-link-3437928"&gt;
          Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/privacy"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;privacy&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tooling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tooling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;14&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              4&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            31 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;If you did not read my last post, do it before reading that one, by clicking above 😁&lt;/p&gt;

&lt;p&gt;Over what channels/apps should you actually communicate anonymously ? This post will cover the essentials to start using more private tech. &lt;strong&gt;But before..., I have something relevant to announce&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  IMPORTANT ANNOUNCEMENT ⚠️
&lt;/h2&gt;

&lt;p&gt;In September 2026, Google plans to officially block any app that does not belong to a developer, who do not have an account in Google Play Developer Console, haven't uploaded their ID there and paid a fee. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yhyel3uefnaeinxvxap.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yhyel3uefnaeinxvxap.jpg" alt="android-behind bars"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From someone who is kind of a normie guy, does not care about the tech, surrounding world and their only worry is about to be right on time to watch their movie in TV, it might sound as a rational argument, they want to prevent android from having malware/spyware/scam-apps on their systems, thus they require their ID and pay the fee for app deployment and demand the apps to be deployed only via Play Store. &lt;/p&gt;

&lt;p&gt;Whereas on the other hand, Android natively with google is the biggest malware and spyware together with Microslop OS (known by Normies as Windows). &lt;/p&gt;

&lt;p&gt;By default your Google Play Services have access to all your accessories in the phone like camera, microphone and location. So if you do not turn them off, there is more chance your data is gathered, misused and sold. In such way, you are controlled by the technology and not conversely.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why it matters ?
&lt;/h3&gt;

&lt;p&gt;The opportunity to build, launch your apps on android without needing to pay fees, load your ID to the Third-party company that is prone to frequent breaches and is has the worst products that could be ever given is exactly the normality the user and developer wants to have.&lt;/p&gt;

&lt;p&gt;Developers can independently deploy their apps without needing to have any financial commitments or needing to identify themselves to a third-party company.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5v01tjznhb4is3cx50af.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5v01tjznhb4is3cx50af.jpg" alt="nigerian"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Think about programmers, youngster coders from African Countries (I have many friends from Nigeria (shout out to all my Nigerian brothers 💚, you're phenomenal hard-workers. I love you all)). Do you think they will have enough money to purchase a subscription and simultaneously keep their life at the standard they have without any external support ? &lt;/p&gt;

&lt;p&gt;I truly doubt it, of course for some it would be feasible, but I hear personally how those people are misused and paid slavery-salaries and try to handle somehow the money for another data packages (they do not have wi-fi, you white-trash morron 😘).&lt;/p&gt;

&lt;p&gt;Another thing is that the app might not comply with often imaginary Google Play Requirements to push the app to be visible to the Store.&lt;br&gt;
For now, indie mobile app devs simply can attach an &lt;code&gt;.apk&lt;/code&gt; to their website/webapp and let users download from there, which is actually a common solution on the internet e.g. for games.&lt;/p&gt;

&lt;p&gt;From the other perspective, it also is a violation of freedom of users of phones with custom ROMs like GrapheneOS or LineageOS, but also the average pure android user, that should decide themselves and take the risk on their own where they want to download their apps from, and it should not be estabilished by only-profit driven company, that is seeing the competition in solutions like &lt;a href="https://f-droid.org/" rel="noopener noreferrer"&gt;FDroid&lt;/a&gt; and wants to have a monopoly.&lt;/p&gt;

&lt;p&gt;When it comes to custom ROM users without default Google Play Services Support, this hits hard, because it basically disables them from using any apps at all, if the update from google comes irl.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxqe8f7d4hmqgs769dygy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxqe8f7d4hmqgs769dygy.jpg" alt="split"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Having done this, Google not only dictates you what is the source of your apps but also what OS you should have your mobile device. This is rudiculous and I will not be silent.&lt;/p&gt;

&lt;p&gt;Internet should remain free and this is an attack on digital freedom. And this freedom is about to be violated by an enterprise for profit.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyykjtnjtug28yeddt2x6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyykjtnjtug28yeddt2x6.png" alt="dev-console"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There for I gently request you&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;-- Go to the &lt;a href="https://keepandroidopen.org/" rel="noopener noreferrer"&gt;KeepAndroidOpen website&lt;/a&gt; and perform as many action from the site there as you can do.&lt;/p&gt;

&lt;p&gt;E.g. Install F-Droid, message your local regulators and inform about the monopoly attempt, Provide feedback directly to Google using their &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSfN3UQeNspQsZCO2ITkdzMxv81rJDEGGjO-UIDDY28Rz_GEVA/viewform?pli=1" rel="noopener noreferrer"&gt;Android developer verification requirements survey&lt;/a&gt;, &lt;a href="https://www.change.org/p/stop-google-from-limiting-apk-file-usage" rel="noopener noreferrer"&gt;sign the petition&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;All action matters, and even if in the end it will be implemented, you should not have any remorse to yourself, because you did something towards stopping it and were not passive.&lt;/p&gt;

&lt;p&gt;Therefore I'm requesting you, If you have the account on Google Developer Console, the best decision would be to remove it. Do not upload any IDs if you haven't yet.&lt;/p&gt;

&lt;h3&gt;
  
  
  Self-confession time
&lt;/h3&gt;

&lt;p&gt;Me myself unfortunately committed back October/November 2024 a failure by uploading the sensitive data to Google, only because I was in a process of building my start-up and wanted to have a greater outreach with my app. That project has been terminated and failed, but the data remained. Thus I recently decided to remove my account from Google Play Developer Console:&lt;/p&gt;

&lt;p&gt;Candidly speaking, when I look at how much spam I got to my gmail and how much I get to my private email addresses, 1 gmail outperforms 5 private mail addresses I have.&lt;/p&gt;

&lt;p&gt;Spam/Scam mails quantities on my email addresses in one month: &lt;br&gt;
1 Gmail: 257 mails&lt;br&gt;
5 Private Mail: 0 mails&lt;/p&gt;

&lt;h3&gt;
  
  
  Announcement Summary
&lt;/h3&gt;

&lt;p&gt;That's it from the announcement. Leave a comment down below what actions have you taken and what do you think about it, and now we can head over to the main part of the article !&lt;/p&gt;

&lt;h2&gt;
  
  
  Messengers &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauefwjaqi2h6meageuwx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauefwjaqi2h6meageuwx.jpg" alt="apps"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ok, until now we only discussed the Operating Systems to be used, but this is not all. You would not like your messages to be spied, misused on or be breached, right ?&lt;/p&gt;

&lt;p&gt;Thus we need a private communicators. Me myself on a daily basis use variety of communicators, which I really do not like being completely honest. I use:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Signal (my favorite one)&lt;/li&gt;
&lt;li&gt;Telegram&lt;/li&gt;
&lt;li&gt;SimpleX&lt;/li&gt;
&lt;li&gt;Matrix/Element&lt;/li&gt;
&lt;li&gt;Whatsapp&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From those 5, only 3 are fully reliable when it comes to privacy respecting and that are:&lt;br&gt;
Signal, SimpleX, Matrix&lt;/p&gt;

&lt;p&gt;Before I discuss those 3 chat-apps, here is why I did not include Telegram and Whatsapp&lt;/p&gt;

&lt;h3&gt;
  
  
  Why not Telegram ?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;E2EE is &lt;strong&gt;NOT&lt;/strong&gt; default—standard chats are server-side encrypted, meaning Telegram can decrypt them&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Custom encryption protocol (MTProto) instead of widely-audited standards like Signal Protocol&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IP address leak vulnerability (MTProxy doesn't actually hide IPs as users think)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2024-2026: 200+ million records leaked via various breaches; 122GB credential archive (361M unique emails) distributed across Telegram channels in late 2023/early 2024&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2024: Hackers leaked 31M+ Star Health insurance customers' medical data via Telegram bots&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2025: 43.5M Telegram channels blocked for illegal activity, but actors just recreate channels within days (low cost to operate)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Why not Whatsapp ?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Meta collects metadata ruthlessly—who you message, when, how often, your contact lists&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Meta monetizes this data for ad targeting&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;November 2025: Researchers at University of Vienna + SBA Research found 3.5 billion WhatsApp accounts via API scraping due to weak rate-limiting. They extracted profile pictures, "about" text, linked devices, OS info. One researcher: "This is a cybercriminal's dream working list."&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;June 2025: 16 billion credentials breach affecting Facebook/Instagram/WhatsApp (infostealer malware)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Early 2025: Graphite zero-click spyware (Paragon Solutions) targeted ~90 journalists/activists—gave attackers access to encrypted messages, microphone, location&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2021: 533M Facebook accounts scraped; 58% still active on WhatsApp in 2025—leaked phone numbers have permanent value&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thus I really wish to move away from using Telegram. Unfortunately a lot of people from the crypto-industry prefer convenience and flashy effects over security and privacy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why the others ?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Signal 💙
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e6roajwla77bkyynrro.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e6roajwla77bkyynrro.jpg" alt="signal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Signal Protocol (&lt;a href="https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm" rel="noopener noreferrer"&gt;Double Ratchet&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECDH&lt;/strong&gt;: Curve25519&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: AES-256-GCM&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HMAC&lt;/strong&gt;: SHA-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Perfect Forward Secrecy&lt;/strong&gt;: Yes (every message has unique keys)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Post-Compromise Security&lt;/strong&gt;: Yes (ratcheting)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Centralized servers (Signal Messenger Inc.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimal data collection&lt;/strong&gt;: No message history, no contact lists stored server-side&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;: Phone-number based&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-device&lt;/strong&gt;: Supported but uses Sesame protocol&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata Protection&lt;/strong&gt;: Reasonable—server doesn't see message content, but does see phone number, online status, contact discovery&lt;/p&gt;

&lt;p&gt;End-to-end encryption is mandatory across all chats&lt;/p&gt;

&lt;p&gt;Open-source, regularly audited, nonprofit model&lt;/p&gt;

&lt;p&gt;Zero metadata collection unlike WhatsApp—doesn't store who you message or call logs&lt;/p&gt;

&lt;p&gt;Post-quantum cryptography roadmap in progress.&lt;/p&gt;

&lt;p&gt;Before I move to the next recommendation, I have to explain couple of terms that will actually repeat themselves throughout the article.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ratcheting&lt;/strong&gt; - A cryptographic algorithm for dynamical updates of encryption keys to ensure forward secrecy and post-compromise security. This means that even if a key is compromised, past messages remain secure, as new keys are generated for each message exchange.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm" rel="noopener noreferrer"&gt;Double Ratchet&lt;/a&gt;&lt;/strong&gt; - It's an key-management algorithm designed by first Signal's CEO. The feature of this algorithm is that after the initial key-exchange, it handles the ongoing renewal and maintenance of short-lived session keys. &lt;/p&gt;

&lt;p&gt;It combines a cryptographic so-called "ratchet" based on the Diffie–Hellman key exchange and a ratchet based on a key derivation function, such as a hash-function, and is therefore called a double ratchet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://signal.org/docs/specifications/sesame/" rel="noopener noreferrer"&gt;Sesame Algorithm&lt;/a&gt;&lt;/strong&gt; - It's an algorithm designed for message encryption sessions management in an asynchronous across multiple devices. It is however vulnerable due to the lack of cryptographic proof of ownership. Which means that if an attacker gains access or intercepts some messages of a victim, it allows the attacker to register their device and gain access to the victim's account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Forward_secrecy#" rel="noopener noreferrer"&gt;Forward Secrecy&lt;/a&gt;&lt;/strong&gt; - An encryption system has the property of forward secrecy if plain-text (decrypted) inspection of the data exchange that occurs during key agreement phase of session initiation does not reveal the key that was used to encrypt the remainder of the session.&lt;/p&gt;

&lt;p&gt;All is more nicely described by &lt;a href="https://research.uni-luebeck.de/en/publications/help-my-signal-has-bad-device-breaking-the-signal-messengers-post/" rel="noopener noreferrer"&gt;researchers from University of Luebeck&lt;/a&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  Now although there is no flaw in a protocol, meaning that it would leak some information, by falling a victim of social engineering, phishing attack or your device being compromised there are no prevention measurements to cease attacker from accessing the account.
&lt;/h2&gt;

&lt;h3&gt;
  
  
  SimpleX
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj5l6pjrhdr0z7ynuyrt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj5l6pjrhdr0z7ynuyrt.jpg" alt="simplex"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: SimpleX protocol (custom, but well-designed)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: ChaCha20-Poly1305 (AEAD)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key encryption&lt;/strong&gt;: XChaCha20-Poly1305 (extended nonce for random salt)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key exchange&lt;/strong&gt;: Curve448 ECDH&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Forward Secrecy&lt;/strong&gt;: Yes (ratcheting model similar to Signal)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Fully decentralized—no central server required&lt;/p&gt;

&lt;p&gt;Users run their own SMP (SimpleX Messaging Protocol) relays or use community-hosted ones&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-knowledge&lt;/strong&gt;: SMP relays don't store messages; they're purely transient delivery points&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No user accounts&lt;/strong&gt;: Connections are queue-based, not identity-based—no UIDs linking users to the network&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata Protection&lt;/strong&gt;: Exceptional—even relay operators can't see who's talking to whom&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tor Support&lt;/strong&gt;: Built-in Tor integration (transport isolation per contact)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Audit&lt;/strong&gt;: Trail of Bits security assessment (2022, 2024)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Trade-off&lt;/strong&gt;: SimpleX prioritizes privacy over convenience. No multi-device sync yet, no cloud backups, slower message delivery. &lt;br&gt;
But this is intentional—they refuse the push-notification trap that other apps use.&lt;/p&gt;

&lt;h3&gt;
  
  
  Matrix/Element
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bilc44v5ugaeabvjas0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bilc44v5ugaeabvjas0.png" alt="matrix"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Olm + Megolm&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1-to-1&lt;/strong&gt;: Olm (Double Ratchet variant, similar to Signal Protocol)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECDH&lt;/strong&gt;: Curve25519&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: AES-256-CBC (non-standard; should be GCM or &lt;br&gt;
ChaCha20-Poly1305)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HMAC&lt;/strong&gt;: SHA-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Group chats&lt;/strong&gt;: Megolm (sender-key model)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Session key&lt;/strong&gt;: AES-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ratcheting&lt;/strong&gt;: Weaker than 1-to-1; Forward secrecy limited by key reuse&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Federated—users can run their own home-server&lt;/p&gt;

&lt;p&gt;Protocol is open, but implementations vary in security&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Default E2EE&lt;/strong&gt;: Yes&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Backup Vulnerability&lt;/strong&gt;: Server-side encrypted key backups can be exploited if home-server is malicious&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata&lt;/strong&gt;: Partially exposed (room names, user IDs, member lists visible to homeserver)&lt;/p&gt;

&lt;h2&gt;
  
  
  Other worth-mentioning messengers
&lt;/h2&gt;

&lt;p&gt;There also other emerging private messengers that are worth to be paid attention to, namely &lt;a href="https://gen6.app/ncrypt" rel="noopener noreferrer"&gt;NCrypt&lt;/a&gt; and also &lt;a href="https://www.sealed.channel/" rel="noopener noreferrer"&gt;Sealed&lt;/a&gt;. Both are blockchain focused, and the messages are stored on blockchain at least in Sealed.&lt;/p&gt;

&lt;p&gt;Here are some information about Sealed and NCrypt I could find in their privacy policy and on the internet. &lt;/p&gt;

&lt;h3&gt;
  
  
  Sealed
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxrridqbsfq68nf7lg99.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxrridqbsfq68nf7lg99.jpeg" alt="Sealed"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Sealed Actually Is (The Honest Technical Take) ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is a blockchain-based, end-to-end encrypted messaging app built on a three-tier data architecture. Unlike most messengers that centralize everything on company servers, Sealed explicitly separates data into three distinct realms, each with different controllers. This is the critical design choice that sets it apart.&lt;/p&gt;

&lt;p&gt;The app is currently live on iOS and Android, operating on Algorand. The foundational principle is brutal: no single party—not even Sealed's operators—has full control over all your data. That's architecturally honest in a way Signal and Telegram aren't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Three Data Realms: How the Architecture Actually Works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm A&lt;/strong&gt;: Your Device (You Alone Control This)&lt;/p&gt;

&lt;p&gt;Everything that matters cryptographically stays on your device. Your BIP39 seed phrase, your Ed25519 wallet signing key, your X25519 encryption keypair, and all decrypted message content lives exclusively in your device's secure enclave—iOS Keychain or Android Keystore. There is no recovery mechanism. If you lose your device without a seed phrase backup, your account is gone permanently. Sealed cannot recover it, nor can any authority compel them to.&lt;/p&gt;

&lt;p&gt;Your contact list (wallet addresses plus usernames) also stays local. The implication here is clear: Sealed has zero visibility into your social graph. They can't tell who you're talking to, how often, or in what pattern.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm B&lt;/strong&gt;: The Public Blockchain (No One Controls This)&lt;/p&gt;

&lt;p&gt;Every message you send goes onto a public blockchain as an immutable transaction. This is where the privacy model gets interesting.&lt;/p&gt;

&lt;p&gt;Messages are stored as AES-256-GCM encrypted ciphertext—unreadable without your private key. But the blockchain stores more than just content. Each message includes an ephemeral sender public key (a one-time X25519 key per message, not your permanent identity), a 32-byte HMAC recipient tag used for "stealth addressing," the block-level timestamp, and your sender wallet public key (your pseudonymous identity).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here's the friction&lt;/strong&gt;: if you register a human-readable username, that gets written to the blockchain permanently. This is where anonymity breaks if you're not careful. Register as "john_crypto_banker" and link your Twitter, and the pseudonymity collapses. But if you stay wallet-address-only, the blockchain sees only a pubkey, not a name.&lt;/p&gt;

&lt;p&gt;The critical point: blockchain data is permanent and immutable. No deletion rights apply. You cannot request removal. An observer can see that a message was sent to a particular wallet address at a particular time, and if encrypted properly, they cannot read it. But the metadata—that a message exists, when it was sent, and who the recipient pseudonymous identity is—that's forever.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm C&lt;/strong&gt;: The Indexer Server (Sealed Controls This, With Guardrails)&lt;/p&gt;

&lt;p&gt;This is where Sealed takes a calculated privacy trade-off. To deliver push notifications and enable efficient message sync, they operate an indexer server that stores limited data:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your wallet public address (for identity and auth)&lt;/li&gt;
&lt;li&gt;Your X25519 view key (this is the big one—see below)&lt;/li&gt;
&lt;li&gt;SHA-256 hash of your view key&lt;/li&gt;
&lt;li&gt;Firebase Cloud Messaging token (for push delivery)&lt;/li&gt;
&lt;li&gt;Device platform identifier (iOS or Android)&lt;/li&gt;
&lt;li&gt;Optional username&lt;/li&gt;
&lt;li&gt;Message metadata pointers (blockchain transaction references for sync, not content)&lt;/li&gt;
&lt;li&gt;Last seen timestamp&lt;/li&gt;
&lt;li&gt;IP address (standard server logging)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The view key is the most significant privacy tradeoff and Sealed is honest about it. Your X25519 scan/view private key is shared with their indexer server. This allows the server to detect incoming messages addressed to you on-chain and trigger push notifications. The view key does not decrypt content—that's a separate key path. The view key only reveals that a message was sent to you, not what it says.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is crucial&lt;/strong&gt;: if Sealed's indexer is compromised, attackers learn who's messaging you. But they don't learn what was said. Content requires your full private key, which never leaves your device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Retention is clear&lt;/strong&gt;: indexer data expires after 90 days of inactivity. Message metadata expires after 30 days. IP logs rotate per standard practice (7–30 days). You can manually delete your account at any time with a signed deletion request, and they'll purge the view key and FCM token within 30 days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt;: No Phone Number, No Email, No Password&lt;/p&gt;

&lt;p&gt;Sealed uses pure wallet-based authentication. When you log in, your app signs a time-limited challenge string with your Ed25519 wallet private key. The signing key never leaves your device. This means there's no email-based password reset, no SIM-swap attack surface, no centralized identity store. You are your keys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The tradeoff&lt;/strong&gt;: if you lose both your device and your seed phrase, you're locked out forever. There's no "I forgot my password" recovery. This is hardcore, but it's the price of true key custody.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption Details&lt;/strong&gt;: Where Sealed Gets Technical&lt;/p&gt;

&lt;p&gt;Message content uses AES-256-GCM with per-message ephemeral keys. The key derivation path is X25519 (ECDH) + HKDF, which is industry standard. Messages are padded to a uniform 1,024 bytes before encryption to prevent length-inference attacks—a sophisticated move that prevents attackers from guessing message type based on ciphertext size.&lt;/p&gt;

&lt;p&gt;The ephemeral key per message is the Double Ratchet-adjacent concept: each message has a unique encryption key. This gives forward secrecy—if one key is compromised, only that one message is exposed, not past or future ones.&lt;/p&gt;

&lt;p&gt;The roadmap includes ML-KEM-512 (Kyber-512) as a hybrid post-quantum layer on top of X25519. This is planned but not yet deployed. Currently Sealed is quantum-vulnerable, like all classical asymmetric crypto.&lt;/p&gt;

&lt;p&gt;API communication to the indexer uses Ed25519 signature-based authentication with signed time-limited nonces, enforced over HTTPS/TLS. The server implements helmet security headers and rate limiting (100 requests/minute per IP).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Sealed Does NOT Collect (The Important Negatives)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is where Sealed differs sharply from WhatsApp, Telegram, and especially Messenger:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No real name&lt;/li&gt;
&lt;li&gt;No email address&lt;/li&gt;
&lt;li&gt;No phone number&lt;/li&gt;
&lt;li&gt;No device contacts imported&lt;/li&gt;
&lt;li&gt;No location data&lt;/li&gt;
&lt;li&gt;No advertising identifiers (IDFA/GAID)&lt;/li&gt;
&lt;li&gt;No biometric data&lt;/li&gt;
&lt;li&gt;No analytics or behavioral tracking&lt;/li&gt;
&lt;li&gt;No crash reports or telemetry beyond server-side operational logs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is a stark contrast to Signal, which collects your phone number and uses it as your identity. Sealed's wallet-first model means they have no way to know who you are unless you tell them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Dependencies: Where Trust Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed uses only two external services:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Firebase Cloud Messaging (FCM)&lt;/strong&gt;: For push notifications. Sealed sends Firebase only your FCM device token and a notification payload containing the sender's wallet address and a message reference—not the message content. This means Google sees that you received a message from a particular wallet, but not what was said. Google's privacy policy applies to this data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AlgoNode (Algorand RPC)&lt;/strong&gt;: A third-party public Algorand node. Transactions you broadcast are globally visible by nature. No personal identifying data beyond your wallet address and encrypted message ciphertext is transmitted.&lt;/p&gt;

&lt;p&gt;Sealed explicitly does not use advertising networks, analytics platforms, or data brokers. This is a hard line.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Privacy Model: Honest About Tradeoffs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is architected for a specific threat model: you want encryption that no single entity can break, pseudonymity rather than anonymity, and no central server controlling your social graph.&lt;/p&gt;

&lt;p&gt;If your threat is a government subpoena, Sealed has a clean answer: indexer data expires, blockchain data is public, and Sealed cannot hand over decrypted messages because they don't have your private key. The police would need your device or seed phrase.&lt;/p&gt;

&lt;p&gt;If your threat is Sealed itself, you get a partial win: Sealed cannot read your messages, but they can see who's messaging you (via the view key). If you're concerned about this, you should assume the view key is compromised.&lt;/p&gt;

&lt;p&gt;If your threat is length-based message inference, Sealed padded messages to 1,024 bytes, so attackers can't guess what you're saying based on ciphertext size.&lt;/p&gt;

&lt;p&gt;If your threat is quantum computers, you're vulnerable until they deploy Kyber-512.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Uncomfortable Realities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Realm B is permanent: Anything you write to the blockchain stays forever. If you message someone's wallet address, that metadata (sender, recipient, timestamp, message reference) is immutable. In a world of blockchain analysis and wallet clustering, this is a permanent link. Sealed can't delete it, and neither can you.&lt;/p&gt;

&lt;p&gt;The view key is a vulnerability: It's the single point where Sealed can learn your incoming message graph. If the indexer is breached, attackers get a list of everyone messaging you. Sealed is transparent about this, but it's still the biggest attack surface in the architecture.&lt;/p&gt;

&lt;p&gt;Usernames break pseudonymity: If you register a human-readable name, it's on-chain forever. Anyone can link your wallet to your identity. Sealed can't prevent this; it's a user error problem.&lt;/p&gt;

&lt;p&gt;Firebase adds a Google dependency: FCM tokens reveal to Google that you're using Sealed, and when you receive messages. Google's privacy standards are better than most, but it's still a third party with visibility.&lt;/p&gt;

&lt;p&gt;No audit: The privacy policy doesn't mention any independent security audit. The encryption primitives (AES-256-GCM, X25519, HKDF) are solid, but there's no third-party verification that the implementation is correct.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How This Compares to the earlier mentioned ones ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is architecturally more honest than Signal or SimpleX about what data they hold and why. Signal doesn't explain its data architecture; they just say "we don't store messages." Sealed breaks it down into three realms and explains the controller for each.&lt;/p&gt;

&lt;p&gt;Sealed is less mature than Signal (which has been battle-tested for a decade) and less audited than SimpleX (which had Trail of Bits assessment).&lt;/p&gt;

&lt;p&gt;Sealed is more decentralized than Telegram (which holds all data server-side) but less decentralized than Element (which is federated) or SimpleX (which has no central relays—queues are ephemeral).&lt;/p&gt;

&lt;p&gt;Sealed is more private than WhatsApp or Messenger because it doesn't collect phone numbers, emails, or contact graphs.&lt;/p&gt;

&lt;h4&gt;
  
  
  NCrypt (Gen6 Dapp)
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdtodgxlyrmu30m6lmvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdtodgxlyrmu30m6lmvb.png" alt="screenshot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NCrypt is a decentralized messaging app built as part of the Gen6 ecosystem. It's E2EE messaging integrated with &lt;strong&gt;Gen6's decentralized identity system (Gen6.Me).&lt;/strong&gt; Messages are encrypted, transmitted through Gen6 validator nodes, and stored on the Gen6 blockchain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Technical Stack:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blockchain:&lt;/strong&gt; Gen6's own chain (Enhanced Proof-of-Authority consensus)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Validator Network&lt;/strong&gt;: 100+ distributed validators securing the chain&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity Layer&lt;/strong&gt;: Gen6.Me (verified, pseudonymous, or fully private)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Not explicitly stated, but likely AES-256 or ChaCha20-Poly1305 (industry standard)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;: Encrypted messages on Gen6 blockchain&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Roadmap&lt;/strong&gt;: Q4 2026 includes post-quantum security upgrade&lt;br&gt;
Integration with Gen6 Ecosystem:&lt;/p&gt;

&lt;p&gt;NCrypt isn't standalone—it's one dApp in a larger system:&lt;/p&gt;

&lt;p&gt;RealSeal: On-chain cryptographic signing and timestamping&lt;br&gt;
Gen6.Me: Verifiable identity (proof-of-attendance, credentials)&lt;br&gt;
FONO: Event verification and community management&lt;br&gt;
GSX Token: Utility token for transaction fees and ecosystem incentives&lt;/p&gt;

&lt;p&gt;The Reality Check:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NCrypt is more honest but less audited than it claims:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;No independent security audit — Gen6 was founded by security experts (David Pethes, Sergey Gerodes) but that's not a substitute for third-party audit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Validator-dependent privacy — Your messages go through Gen6 validators. If a validator node is compromised, they see metadata (though not content if encryption is solid)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity is optional but integrated — You can be pseudonymous, but the whole ecosystem incentivizes verified identity (which is good for trust, bad for pure privacy)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Post-quantum still in roadmap — They're targeting Q4 2026; currently quantum-vulnerable like most messengers.&lt;br&gt;
Smaller community — ~30,000 users vs millions for Signal. Smaller attack surface, but also less battle-testing.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Emails
&lt;/h2&gt;

&lt;p&gt;Alright forwards we go ! We have now private OS, Private Browser, so we reduced successfully amount of spyware on our day-to-day activity on the internet. We keep our messages secure, by using Signal or SimpleX, but what if we want to receive mails and send mails in a more private way ? For that there is also a couple of solutions and for that I highly recommend checking out the &lt;a href="https://privacysavvy.com/email/best/secure-email-providers/" rel="noopener noreferrer"&gt;Privacy Savvy article&lt;/a&gt;. I think this blog is a huge source of knowledge when it comes to privacy (So shout out to them :D):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ProtonMail&lt;/li&gt;
&lt;li&gt;TutaMail&lt;/li&gt;
&lt;li&gt;StartMail&lt;/li&gt;
&lt;li&gt;MailFence&lt;/li&gt;
&lt;li&gt;AtomicMail&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Tuta (formerly Tutanota) – Most Privacy-Focused
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfqj5yphyt3pfv05vun7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfqj5yphyt3pfv05vun7.jpg" alt="tuta"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Germany 🇩🇪&lt;br&gt;
Founded: 2011&lt;br&gt;
Business Model: Private company, no outside investors, subscription-based&lt;br&gt;
Free Tier: Yes (very limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
Tuta's doing it right here. They encrypt everything – emails, subject lines, calendar events, contacts. Most providers skip subject lines (that's a metadata vector), but Tuta's like "nah." They've implemented TutaCrypt, a proprietary hybrid system using:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CRYSTALS-Kyber (post-quantum key exchange)&lt;/strong&gt; + &lt;strong&gt;X25519&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES encryption for content Zero-access architecture&lt;/strong&gt; – they literally can't read your stuff, even if they wanted to.&lt;br&gt;
They don't use PGP (which has known weaknesses), so no pulling of Google Play services like ProtonMail does.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Government Interventions &amp;amp; Data Compliance&lt;/strong&gt;&lt;br&gt;
No major data breaches on record.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transparency Report (Jan-Dec 2025)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Received&lt;/strong&gt;: 389 total requests from German courts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Complied&lt;/strong&gt;: Only ~75 cases out of ~389 (they rejected 75% of requests)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key insight&lt;/strong&gt;: Tuta can only be compelled by German courts under German law. No backdoors, no FISA orders ever received. They publish a warrant canary confirming this.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they CAN release&lt;/strong&gt;: Metadata (sender/receiver emails, timestamps, IPs), NOT encrypted content&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Notable incident (2019-2021)&lt;/strong&gt;: A German court tried to force Tuta to capture unencrypted incoming emails before they encrypted them – essentially creating a backdoor. &lt;/p&gt;

&lt;p&gt;Tuta appealed, saying this violates German law. Court still ordered it, but Tuta refused to implement system-wide monitoring, only complying for specific cases. They appealed to German Federal Court and stood firm. No data was handed over that compromised encryption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;False Accusations (2023)&lt;/strong&gt;: A former Canadian RCMP officer claimed Tuta was a "storefront" for Five Eyes intel agencies. Completely false. Tuta denied it, published their entire codebase on GitHub for peer review, and pointed out they've zero FISA orders.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support mobile apps for android and IOS, they have also proton mail desktop app but this one is paid and is available for Linux, windows and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: ~1 GB&lt;br&gt;
Aliases: 15-30 depending on plan&lt;br&gt;
Accounts deleted after 6 months inactivity (this is intentional for privacy – they don't want ghost data)&lt;br&gt;
Support: Forum-only for free users&lt;br&gt;
Custom domain: No&lt;br&gt;
IMAP: Not supported (design choice, not a limitation)&lt;/p&gt;

&lt;h3&gt;
  
  
  ProtonMail
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2buhm2d6r84czz5b5d3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2buhm2d6r84czz5b5d3.jpg" alt="proton-mail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Server Location&lt;/strong&gt;: Switzerland 🇨🇭&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: 2013&lt;br&gt;
&lt;strong&gt;Business Model&lt;/strong&gt;: NOT a non-profit – it's a for-profit company funded by investors. This matters because pressure to monetize is real.&lt;br&gt;
&lt;strong&gt;Free Tier&lt;/strong&gt;: Yes (extremely limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;End-to-end encryption for user-to-user emails (between ProtonMail accounts)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-access encryption&lt;/strong&gt; – they encrypt with your public key, can't decrypt&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES encryption for storage&lt;/strong&gt; - Supports PGP for external recipients (standard, but not as comprehensive as Tuta's approach)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Does NOT encrypt subject lines – metadata leakage&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Uses Google Play Services on Android (Tuta doesn't)&lt;br&gt;
Government Interventions &amp;amp; Data Sharing – THIS IS CRITICAL&lt;br&gt;
Confirmed data breaches to law enforcement:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2021 French Climate Activist Case&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;French police obtained ProtonMail user's IP address via Swiss legal channels. Activist was identified and arrested.&lt;/p&gt;

&lt;p&gt;ProtonMail did comply – they had no "legal possibility to appeal"&lt;br&gt;
2022-2023 FBI Case:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FBI obtained recovery email address and phone number from ProtonMail&lt;/strong&gt;&lt;br&gt;
User in US harassment investigation was de-anonymized&lt;br&gt;
Again, ProtonMail complied&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transparency Report (2022)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;5,957 data requests received&lt;br&gt;
Complied with significant portion – they don't break down exact numbers clearly.&lt;/p&gt;

&lt;p&gt;They contest requests they can legally contest (~750 in 2022), but they will hand over metadata if Swiss courts order it&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Real Talk&lt;/strong&gt;: ProtonMail markets itself with "Swiss privacy laws" but:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;They can be legally compelled to enable real-time IP logging for specific users&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They will share recovery emails, phone numbers, payment info, IP addresses&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Swiss courts work with other governments – their "strict Swiss law" claim is marketing BS&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They have secondary offices in the US, which complicates jurisdiction&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No warrant canary. They don't publish a statement saying they've never received FISA orders (unlike Tuta).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support PWAs, mobile apps for android and IOS, they have also proton mail desktop app but this one is paid and is available for Linux, windows and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: 500 MB (brutally limited)&lt;br&gt;
1 email address only&lt;br&gt;
No folders (can't organize)&lt;br&gt;
Limited sending (cap per day)&lt;br&gt;
Paid plans start at $4.99/month – one of the most expensive&lt;/p&gt;

&lt;p&gt;To me proton is like "private google", as they are the most well known company and the most visible (advertised) one, that provides private mail services and generally cloud-services as well.&lt;/p&gt;

&lt;h3&gt;
  
  
  MailFence
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk1xymjfj6dxnyjor4q6b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk1xymjfj6dxnyjor4q6b.webp" alt="mailfence"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Belgium 🇧🇪&lt;br&gt;
Founded: 2013&lt;br&gt;
Business Model: Subscription-based&lt;br&gt;
Free Tier: Yes (limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
OpenPGP encryption (industry standard, not proprietary)&lt;br&gt;
Encrypts emails, calendar, contacts&lt;br&gt;
Zero-knowledge architecture&lt;br&gt;
IMAP/SMTP support (unlike Tuta, easier migration)&lt;br&gt;
Belgian servers under GDPR&lt;br&gt;
Government Interventions&lt;br&gt;
No major breaches reported.&lt;/p&gt;

&lt;p&gt;Mailfence doesn't publish as detailed a transparency report as Tuta or ProtonMail, but they're transparent about responding to valid Belgian court orders and cannot decrypt encrypted content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support only PWAs and mobile apps for android and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: 500 MB&lt;br&gt;
1 email address&lt;br&gt;
Limited folders&lt;br&gt;
Paid plans start at €2.75/month (cheaper than Proton)&lt;/p&gt;

&lt;h3&gt;
  
  
  StartMail
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydrsn78xms9kz0evqx97.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydrsn78xms9kz0evqx97.png" alt="StartMail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Netherlands 🇳🇱&lt;br&gt;
Founded: 2013&lt;br&gt;
Business Model: Subscription (no free plan)&lt;br&gt;
Free Tier: No (7-day trial only)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
OpenPGP encryption (standard)&lt;br&gt;
IMAP/SMTP support (great for external clients)&lt;br&gt;
Dutch servers under GDPR&lt;br&gt;
Unlimited aliases even on base plans&lt;br&gt;
Government Interventions&lt;br&gt;
Netherlands has reasonable privacy laws, but they can be compelled by Dutch courts. No major incidents reported.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pricing&lt;/strong&gt;&lt;br&gt;
Starts at $5-7/month (no free option, disqualifying for your "free only" requirement)&lt;br&gt;
Honorable Mentions (Active but Limited Free Tiers)&lt;br&gt;
Atomic Mail – The New Kid on the Block&lt;br&gt;
Founded: 2024&lt;br&gt;
Server Location: Germany&lt;br&gt;
Free Tier: Yes (generous – unlimited storage, rare for new providers)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They have only a PWA support, so you can see the icon of them and it will bring you to your mail in browser, which I find cool and I really appreciate them to implement PWA.&lt;/p&gt;

&lt;p&gt;Very new, so limited track record&lt;br&gt;
Claims to have passed 1M users in &amp;lt;1 year&lt;br&gt;
Offers unlimited storage free (vs. competitors' 500 MB-1 GB)&lt;br&gt;
No security incidents yet (new service)&lt;br&gt;
Cons: In beta, unproven long-term&lt;/p&gt;

&lt;h3&gt;
  
  
  Atomic Mail (The Underdog 🐶)
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fld1ou956oujuvww6kqix.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fld1ou956oujuvww6kqix.jpg" alt="Atomic Mail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Headquarters in Estonia 🇪🇪, Servers in Germany 🇩🇪&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Founded&lt;/strong&gt;: 2024 (launched by a team of privacy advocates and cybersecurity engineers)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Company Structure&lt;/strong&gt;: AtomicMail Systems OÜ (private company, not a non-profit)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Current Status&lt;/strong&gt;: Beta release (actively in development, iterating fast)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Growth Rate&lt;/strong&gt;: Hit 1 million users in &amp;lt;1 year (straight up aggressive expansion)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy &amp;amp; Encryption Tech Stack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Core Encryption Primitives:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECIES (Elliptic Curve Integrated Encryption Scheme)&lt;/strong&gt; – Asymmetric key exchange between Atomic users. Fast, modern, not some legacy PGP garbage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES-256&lt;/strong&gt; – Symmetric content encryption (industry standard, trusted by security researchers globally)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SHA-256&lt;/strong&gt; – Cryptographic hashing for data integrity verification&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TLS 1.3&lt;/strong&gt; – In-transit encryption (TLS 1.2 is dated, they went for the newest standard)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BIP39 seed phrases&lt;/strong&gt; – &lt;strong&gt;THIS IS THE CRYPTO TOUCH&lt;/strong&gt;. Users recover accounts with a 12-word seed phrase (like a blockchain wallet), &lt;strong&gt;NOT a phone number or backup email&lt;/strong&gt;. That's genuinely novel for email. No five-eyes backdoor through phone carriers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-Access Architecture (The Real Deal)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here's the trick&lt;/strong&gt; – Atomic Mail uses a client-side encryption model:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Client encrypts before upload&lt;/strong&gt; – Your plaintext message is encrypted on YOUR device&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Server only sees ciphertext&lt;/strong&gt; – It gets transmitted and stored as meaningless scrambled data&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Only recipient decrypts&lt;/strong&gt; – Private keys never leave your device&lt;br&gt;
Atomic Mail literally can't read encrypted messages – Even if hackers breach them, or a government issues a court order, the data is mathematically useless without your private key&lt;/p&gt;

&lt;p&gt;This is fundamentally different from ProtonMail (which CAN decrypt if forced) because the architecture prevents them from having the keys in the first place.&lt;/p&gt;

&lt;p&gt;Data-at-Rest + Data-in-Transit Protection:&lt;/p&gt;

&lt;p&gt;All emails encrypted at rest (AES-256)&lt;/p&gt;

&lt;p&gt;All communication encrypted in transit (TLS 1.3)&lt;/p&gt;

&lt;p&gt;7-day log retention for IP addresses and SMTP metadata (troubleshooting + spam/phishing detection). Logs auto-delete after 7 days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User vault storage&lt;/strong&gt; – All messages sit in encrypted user vaults on secure servers.&lt;/p&gt;

&lt;p&gt;Government Compliance &amp;amp; Legal Requests&lt;br&gt;
Atomic Mail's Policy (From Official Privacy Policy, Last Updated: March 3, 2026):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"We will only comply with requests from &lt;strong&gt;Estonian judicial authorities&lt;/strong&gt; and will not honor requests from other authorities. Atomic Mail does not cooperate with voluntary surveillance programs."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So only Estonian courts can force Atomic Mail to comply&lt;br&gt;
No FBI, no GCHQ, no Five Eyes – They explicitly refuse non-Estonian requests. No secret surveillance programs – No FISA, no Tempora, no bulk metadata tapping.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real-World Application:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If a US court demands data on an Atomic Mail user, Atomic Mail's legal stance is: "Get an Estonian court order or nothing happens." Since the US and Estonia don't have an automatic data-sharing treaty that works like that, this is effectively a firewall.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Requests:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;"We will not comply with requests for user information from private third parties unless we receive a valid court order from an Estonian court."&lt;/p&gt;

&lt;p&gt;So even if Facebook or your ex's lawyer demands user data – no way. Only Estonian courts.&lt;/p&gt;

&lt;p&gt;Data Breach History&lt;br&gt;
As of April 2026: ZERO confirmed security incidents or data breaches on record. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why does this matter?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They're new enough (founded 2024) that they haven't had time to accumulate the baggage of older providers.&lt;br&gt;
Their encryption design means even if they were breached, attackers get useless ciphertext.&lt;br&gt;
They practice extreme data minimization – less data = less to leak&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Comparison&lt;/strong&gt;: Tuta (been around since 2011) has no breaches. ProtonMail has complied with government data requests multiple times and handed over metadata. Atomic Mail's track record is clean, and the architecture prevents worst-case scenarios.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unique Features (The Tech Deep Dive)
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;1. Seed Phrase Recovery (Borrowed from Crypto)&lt;/strong&gt;&lt;br&gt;
Instead of:&lt;/p&gt;

&lt;p&gt;SMS OTP (SIM swap vulnerable)&lt;br&gt;
Recovery email (metadata leakage)&lt;br&gt;
Secret questions (brutalizable)&lt;br&gt;
Atomic Mail uses BIP39-compliant seed phrases – a 12-word mnemonic that only you hold. Even Atomic Mail's admins can't reset your password. This is inspired by blockchain wallet design (think MetaMask, hardware wallets).&lt;/p&gt;

&lt;p&gt;Why it matters: No phone carrier backdoor, no recovery email dependency, mathematically sound.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Multiple Encryption Options for External Recipients&lt;/strong&gt;&lt;br&gt;
Can't encrypt to Gmail users with ECIES (they're not on Atomic). &lt;/p&gt;

&lt;p&gt;Solutions:&lt;br&gt;
Password-Protected Email – Send encrypted message, recipient enters password&lt;br&gt;
Encrypted as File – Send encrypted .zip file via any channel&lt;br&gt;
TLS – Standard in-transit encryption (basic, but better than plaintext)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. AI Suite (Privacy-First)&lt;/strong&gt;&lt;br&gt;
The Plus plan includes AI tools:&lt;/p&gt;

&lt;p&gt;Writing assistant&lt;br&gt;
Grammar checker&lt;br&gt;
Summarizer&lt;br&gt;
Translator&lt;br&gt;
Security Helper (flags sensitive content in drafts, suggests encryption)&lt;br&gt;
Text-to-voice&lt;br&gt;
Critical: These AI tools can only process unencrypted drafts. They can't touch your encrypted emails. Zero training data on user messages.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Anonymous Email Aliases&lt;/strong&gt;&lt;br&gt;
Create up to 10 free unique email addresses from one account. Use them for:&lt;/p&gt;

&lt;p&gt;Newsletter signups (throwaway)&lt;br&gt;
Financial accounts (separate identity)&lt;br&gt;
Work vs. personal (compartmentalization)&lt;br&gt;
If one alias gets compromised in a data breach, you know exactly which service leaked it, and you can nuke that alias without affecting your main inbox.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Availability 📲&lt;/strong&gt;&lt;br&gt;
They have for now available apps for IOS, Android, MacOS and Windows. What actually surprised me that they do not have a linux version yet and I really would love to have one. What is yet disappointing to me is that they do not support PWA, so I can have an icon on my screen for quicker access.&lt;/p&gt;

&lt;p&gt;To be honest I have the account on 3 of the mails provided Tuta, Atomic Mail and Proton and atomic mail appears to become my favorite mail from them all. Their UI is slick, they have nice privacy policy. Surely it's yet quite young but I root for them to have even a billion users.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;This is 2/8 of our privacy journey, I hope you enjoyed it this time and I convinced you to switch over to any of either Messengers or Mail Providers. &lt;/p&gt;

&lt;p&gt;Let me know down in the comments. In the next post there will be more info on AI and payments. I rearranged the order with Firewalls and VPNs, because I'm almost done with full research on this part.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3b74vdlodsrgzx3mmu2m.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3b74vdlodsrgzx3mmu2m.gif" alt="surprise"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So stay tuned because things might get much more interesting in the future than before and &lt;strong&gt;I will have surprise for you&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdaoi90rir3ez6cuf3mh.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdaoi90rir3ez6cuf3mh.gif" alt="thx"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Don't forget to leave like 💜 and follow my account for more privacy-focused content. Also please share the article with your fellows (devs) or family to spread more awareness on privacy in the internet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzptp0515lnc4q67qgcdx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzptp0515lnc4q67qgcdx.png" alt="like and share"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's it for today, hope you'll have a great time and until next time.&lt;/p&gt;

&lt;p&gt;Cheerio !&lt;/p&gt;

</description>
      <category>programming</category>
      <category>opensource</category>
      <category>security</category>
      <category>os</category>
    </item>
    <item>
      <title>Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Fri, 17 Apr 2026 12:20:19 +0000</pubDate>
      <link>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc</link>
      <guid>https://forem.com/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;This time, I decided to write on tools/services/software etc. that have been designed and created to care about your privacy on the internet. I will present some tools that I use and/or can recommend and much more tools on which I made research on. &lt;/p&gt;

&lt;p&gt;I've dedicated a huge amount of time, therefore at the very beginning, I request you to share ⤵️ this article with your fellows or someone that you think, that it would be useful to share this article with :D&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwv8xrj8qj7wr5u9pa34e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwv8xrj8qj7wr5u9pa34e.jpg" alt="Please" width="339" height="287"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Thank you in advance 💜 ! &lt;/p&gt;




&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;I didn't want to make this just another brief article, that will list you down the tools to use, brief info on them and that's all, download, put your trust into a thing and fingers crossed. This article delved a bit deeper into internals of each tool presented.&lt;/p&gt;

&lt;p&gt;While writing the article I quickly realized that, writing a one long article with all of those tools/services is pointless, because I lost often my minds while checking the cohesion. Secondly, noone would like to direct through one hour+ long article, that could actually be a book (lol).&lt;/p&gt;

&lt;p&gt;I decided, I will split this into an article series posted one per week. The split will be looking as following:&lt;/p&gt;

&lt;p&gt;First Post (This one)&lt;/p&gt;

&lt;p&gt;Introduction&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Online Privacy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operating Systems (OS)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-- Dekstop OS&lt;/p&gt;

&lt;p&gt;-- Mobile OS&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Browsers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Search-engine&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Second Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Messengers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Email&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Third Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;VPN&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Firewalls&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fourth Post (In this one there will be a special announcement with surprise for you all):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Payments&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;AI&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fifth Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Location Privacy&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Productivity Apps&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Sixth Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DNS Privacy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Seventh Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Device-Level Security &amp;amp; Authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Eight Post:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Offline Privacy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Outfit&lt;/li&gt;
&lt;li&gt;Everyday Items&lt;/li&gt;
&lt;li&gt;Payment Methods&lt;/li&gt;
&lt;li&gt;Events&lt;/li&gt;
&lt;li&gt;Transport&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Youtube Creators&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Educational Resources&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;BUT&lt;/strong&gt; before I go into the main details, I want to start with an introduction on privacy and why it matters to everyone, regardless of who you are.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why actually bother with privacy ? &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;A lot of people, when they hear term &lt;em&gt;privacy&lt;/em&gt;, in front of their eyes emerges a chap in anonymous-mask, who likely commits cybercrimes and lives in a basement or some other shady place.... Probably something like this 🙍 is the match for what they see:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagogxoppx0u6eezlphow.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagogxoppx0u6eezlphow.png" alt="anon" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Candidly speaking, I do not wonder why people have such imagination about people who "obsessively" care about their privacy. On the other hand, for me as an crypto-anarchist, it's really harmful, because it generalizes every privacy-focused dude is like the guy on the image above.&lt;/p&gt;

&lt;p&gt;I guess it will never disappear as human-species likes very much to over-facilitate things instead of understanding the more complex puzzles behind one's decision.&lt;/p&gt;

&lt;p&gt;Moreover, the image of privacy preserving people in press or (social) media is rather prone to shift towards calling them some party's extremists or try to assign them to political fraction of the politics' scene, whereas it's not always the case when it comes to individuals.&lt;/p&gt;

&lt;p&gt;Important thing to understand on the very beginning is:&lt;br&gt;
&lt;em&gt;Not everyone will need the same level of privacy&lt;/em&gt; !&lt;/p&gt;

&lt;p&gt;And that should be the nr. 1 thing, you should take out from this article. &lt;/p&gt;

&lt;p&gt;There will be a different need of software-developer, who is politically repressed and hounded, and completely different need will be of an regular woman out there who just doesn't want the companies to know about her to many details.&lt;/p&gt;

&lt;h3&gt;
  
  
  Having said that, I can move straightly into examples of why privacy matters.
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Number 1.&lt;/strong&gt; &lt;em&gt;Advertisement and personal-data trade&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpvyq137y5u6cclzvy7k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpvyq137y5u6cclzvy7k.jpg" alt="zuck" width="800" height="650"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Have you ever wondered, where tha heck is your money gone ? &lt;br&gt;
Well...... Ads of some flashy product you talked about and decided to buy it without a real need could be the answer 😅&lt;/p&gt;

&lt;p&gt;I will tell you a story, recently I was by a family-gathering and one person had a talk about bike-roads, and what did they saw first ?  You guessed it ! The add of bike-road. I checked their permissions for facebook and everything was set to allowed. And this is a case where big techs ambush a lot of people, who are not aware enough.&lt;/p&gt;

&lt;p&gt;I like to recall words said in some video by &lt;em&gt;ThePrimeagen&lt;/em&gt; (shout out to you, Micheal :D). Those words were something like:&lt;br&gt;
&lt;em&gt;If you want to be a head of leading silicon-valley company, you have to sell either ads or hardware&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;And it's actually true, at least at some point, look at some of the big-techs and their revenue model:&lt;br&gt;
Facebook - Ads&lt;br&gt;
Nvidia - Hardware&lt;br&gt;
Tiktok - Ads&lt;br&gt;&lt;br&gt;
Google - Well they do everything, lol (Ads, hardware, software services etc.)&lt;br&gt;
Microsoft - software services + ads&lt;/p&gt;

&lt;p&gt;And in order to specifically profile you, the data is needed, &lt;strong&gt;Huge amount of data&lt;/strong&gt;. Which often is used by unethical methods e.g. wiretapping (as in my story).&lt;/p&gt;

&lt;p&gt;Thus, given you have issues that you lack money on some essentials, it might be that you purchase things that you actually don't need and only talked about with friend and under impulse, you bought those things. If you see you have issue with it, guess what privacy is for you ! &lt;/p&gt;

&lt;p&gt;There is not always about rigid self-control, but also a tooling to it. Sure you can pound a metal-bolt in a wall with your hand, but using hammer makes more sense though, especially as it would be less painful (Lol).&lt;/p&gt;

&lt;p&gt;Having said that, I hope I managed to keep you engaged. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 2.&lt;/strong&gt; &lt;em&gt;Banking and Financial Operations&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc6uj0mhs8xagjhmr9b3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc6uj0mhs8xagjhmr9b3.jpg" alt="bank-acc ban" width="800" height="1732"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0364wzjuik5eosq5u5gw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0364wzjuik5eosq5u5gw.jpg" alt="bank-acc" width="640" height="1303"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This case pertains a lot of people, not only those who are repressed or alleged of some crime. &lt;/p&gt;

&lt;p&gt;I had almost every f*cking time I made a transaction online not even for big amount of money, it were transactions like 5$ or 100$, my account got temporarily frozen, because bank accessed it as suspicious activity, meanwhile it were just regular purchases like Copilot or Brilliant Subscription or even purchase of something from services like Temu or Ebay.&lt;/p&gt;

&lt;p&gt;And you really would not like to listen to words I spit out to the consultant and to the bank in emails 😅&lt;/p&gt;

&lt;p&gt;And in the times of growing surveillance (especially in sucky europe), I think it's real threat to most of us, than you think.&lt;/p&gt;

&lt;p&gt;Therefore, you might want to have more privacy when it comes to your financial affairs, but also not like to relinquish digital payments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 3.&lt;/strong&gt; &lt;em&gt;Location Tracking and Stalking&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt7fgyk0elm0s264mpr8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt7fgyk0elm0s264mpr8.jpg" alt="stalking" width="800" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;People who experience stalking or being bewilderingly frequently followed by some track while they go outside from somewhere, they also might want to have more privacy, when it comes to their actual location. Regardless if stalking pertains their kids or themselves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 4.&lt;/strong&gt; &lt;em&gt;Password/Data-leaks&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm0h7h60a8yn7p17tcxlh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm0h7h60a8yn7p17tcxlh.jpg" alt="breach" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's very common that in big/middle-sized companies occur breaches, and all of the sudden details about your life, might actually not be the same as the breach might have released a lot of sensitive private messages or data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 5.&lt;/strong&gt; &lt;em&gt;Remote work setups&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companies very often while video calls, require candidates to perform some task live or to perform some task at all e.g. Make some coding recruitment-task. I have again a perfect example of why you might want to prevent your PC's content private.&lt;/p&gt;

&lt;p&gt;To give you more context from December 2025 until Mid January 2026, I was actively looking for a job in IT, especially blockchain industry given my background. And all of the sudden I got a message. Here I will reveal some screen shots from the conversation and there is some pattern I noticed (likely they used AI for it) the account seemed to be legit (thus I hate linkedin 🤬, imo they should pivot their name to TornApart, describes perfectly the faith in not being scammed there)&lt;/p&gt;

&lt;p&gt;Here step 1, the message arrives to potential prey/victim:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8gym0qujhra1sewtxyb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8gym0qujhra1sewtxyb.png" alt="photo1" width="461" height="595"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here, I honestly answered that this position is beyond my skills and expertise, but they kept insisting&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn6sc3vp0k94a49hwbsl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn6sc3vp0k94a49hwbsl.png" alt="photo2" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzei7xg98s254dcgy17ut.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzei7xg98s254dcgy17ut.png" alt="photo3" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmvg5nvwn0297iysxn58.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmvg5nvwn0297iysxn58.png" alt="photo4" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I got offered that I can actually for practice purposes, I can try solving the task so I agreed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kiu4yes0ylobq8d375j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kiu4yes0ylobq8d375j.png" alt="photo5" width="469" height="475"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note, that the messages were poem-long to convince me to run their code on my machine, but when I agreed and wanted to chat a bit more and expected a bit longer answer, I just was ghosted with one word response. Meaning they achieved their goal, so I can piss off now.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwldw6rv3phcp3k1wdkcx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwldw6rv3phcp3k1wdkcx.png" alt="photo6" width="475" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then I was required to solve the task, which I did &lt;strong&gt;but I haven't run it purely on my machine, I used DOCKER !&lt;/strong&gt;, about which fact I informed the employer. Surprisingly the recruitment task was super easy, it was about to build a WETH-like token with accruing value for depositors and test it in hardhat (whereas my setup is foundry and never used it). It turned out that although my code was correct, the test was specially written wrongly in some places especially when it come to rounding-math for the values given as output. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4ppdzbflrf23bag0um4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4ppdzbflrf23bag0um4.png" alt="img" width="800" height="636"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the end I got no response back from the company, but from the service where the job offer was hoisted.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgymha4j2gfum5rgzj9zc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgymha4j2gfum5rgzj9zc.png" alt="remote work scam" width="800" height="263"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I cannot say what was their &lt;em&gt;irregular behaviour&lt;/em&gt;, but I can assume that there was indeed some malicious code to be run and potentially I could loose my all crypto-assets I have purchased for my money and I could get robbed from my &lt;strong&gt;PRIVATE&lt;/strong&gt; information on my PC.&lt;/p&gt;

&lt;p&gt;Thus people like this, could are also highly welcome to read this article.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Number 6.&lt;/em&gt; &lt;strong&gt;State Oppression&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyb86j809j5f5xvalc1dc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyb86j809j5f5xvalc1dc.jpg" alt="oppression" width="544" height="491"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are a lot of people, who are targeted by the state. You would not even have to commit a crime, being regular chap is enough for the state to have interest in you. But the most frequent targets are people with anti-government attitude (e.g. like me). There were a lot of journalists or other activists that were victims of state oppression and not even activists. But if being an journalist or activist is not enough for you, &lt;a href="https://en.wikipedia.org/wiki/Nigel_Farage_Coutts_bank_scandal" rel="noopener noreferrer"&gt;Nigel Farage could not open a bank account in England and was separated from his money !&lt;/a&gt;. All because the government decided to seperate him from the financial system.&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary of the section
&lt;/h3&gt;

&lt;p&gt;Privacy is not just for weirdos from basements, but considers every single person, because we never know, how the our data is used or how we ourselves are viewed by the company, government or other institution. If you're interested on what's more, let's finally go into the details !&lt;/p&gt;

&lt;h2&gt;
  
  
  Online Privacy &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As I emphasized in the introduction, in this section, I will do my best to present you the privacy tools I use on a daily basis, explain nuances related to each element from the list I mention. And why I recommend them specifically.&lt;/p&gt;

&lt;p&gt;I will start with the with the very core of our internet usage, namely &lt;strong&gt;Operating Systems&lt;/strong&gt; !&lt;/p&gt;




&lt;h2&gt;
  
  
  Operating Systems &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Here I have split it into 2 types&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Desktop OS&lt;/li&gt;
&lt;li&gt;Mobile OS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I'll present you first the Desktop Operating Systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Desktop Operating Systems 🖥️ &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feww4vs9fsblzrfsl8c59.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feww4vs9fsblzrfsl8c59.jpg" alt="linux" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There is no wonder that I will say I use &lt;strong&gt;LINUX&lt;/strong&gt; ! &lt;/p&gt;

&lt;p&gt;Yes, Linux is the operating system I use on daily basis. Why this operating system specifically is chosen by people with privacy concerns ? &lt;/p&gt;

&lt;p&gt;There are many reasons, but I will name most important of them:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Linux is open-source&lt;/strong&gt;: This provides transparency and more certainty that the OS is not malware or spyware, due to contributors and people who are interested in technical details and further Linux development.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;No telemetry&lt;/strong&gt;: Linux does not have a built-in telemetry, thus the operating system does not send the information about your activity to third party. The core of Linux is that you are the lord of your OS. If you want more analytics or tracking, you install tools specifically for it :D&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;No Forced Updates&lt;/strong&gt;: In Linux you decide if you want to update your operating system or not and you are not forced to do it under circumstance of not being able to use some features or something like that as it happened often to Windows or MacOS users.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Selective Permission Management&lt;/strong&gt;: In Windows everyone is an admin, which makes it one of reasons why Windows is often a target for hackers. In Linux there is a split between what you can run as a regular user and what you can run as an administrator. Which averts from some successful hacks on your machine.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Customizability&lt;/strong&gt;: In Linux unlike Windows, you can customize your operating system however you want. You want to compile custom Kernel ? You can do it. You can rebuild the whole OS. Whereas in Windows, Microsoft decides what goes in, what stays out.   &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Distributions I use
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffpu6qyr5wczqbtt72vrs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffpu6qyr5wczqbtt72vrs.jpg" alt="debian" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Personally, I'm yet a freshman into Linux (8 months passed since I started using Linux). I use(d) until now Debian as a distribution, so I have no clue about other distributions. And I can recommend Debian for start with Linux as Operating System, it has slick design, and is very intuitive Operating System. Also I noticed a significant increase of free space on how my PC works in comparison to what I experienced with Windows.&lt;/p&gt;

&lt;p&gt;However as I mentioned in my latest From Zero to Crypto-Hero post, I said I started playing around with QuebesOS on Virtual Machine, however I did not have enough time to test it out properly. I would say the learning curve is quite steep and basic browser usage like firefox was quite of not understandable for me.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5rk62xwepwcy2941ndyl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5rk62xwepwcy2941ndyl.jpg" alt="cachyos" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For now on my laptop, I wanted to try out something different than debian, so currently I'm playing around with CachyOS on my laptop. If you ever would like to hear a review on the operating system, feel free to mention it in a comment.&lt;/p&gt;

&lt;p&gt;I will only list down here some alternatives, if you don't want to use debian specifically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommnded by experts for beginners&lt;/strong&gt;: Ubuntu, Mint OS, Zorin &lt;br&gt;
&lt;strong&gt;Specified distros for privacy&lt;/strong&gt;: QuebesOS, Whonix OS, Tails OS&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BEAR IN MIND !&lt;/strong&gt; &lt;br&gt;
&lt;em&gt;That distros like Quebes come up with tradeoffs when it comes to UX, so people that are comming directly from microslop OS aka. Windows or Apple, might not want to choose those particular distros as they require more knowledge on Linux&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Mobile Operating System 📱 &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;We all know how pure-android and AppleOS phones are filled with spyware. Eavesdropping is one of the most privacy violating action those phones do. However there is a solution for it, name use AOSP (Android Open Source Project) Operating systems that are privacy focused. My phone for daily usage is Pixel 6a with GrapheneOS on board.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffuv95ll1f17zwo0dnszu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffuv95ll1f17zwo0dnszu.jpg" alt="GrapheneOS" width="800" height="1067"&gt;&lt;/a&gt;   &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why GrapheneOS ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are multiple reasons, why I decided to use GrapheneOS instead of Samsung. But instead of more technical explanations let's start from the user POV.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;No Google by default&lt;/em&gt; - This is the first principle of GrapheneOS. Liberation of an operating system from google by default. Currently every android phone is merged/synchronized together with google by default, using google services. &lt;br&gt;
Your images are handled by google images, every service you use is basically bloated with google spyware (aka. personalization daemon-softwares). &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For me also one of the most important features, that GrapheneOS offers is blocking phone-calls from unknown unsaved numbers avoiding phishing or scam calls to your phone. You have first save the number of someone, to be able to receive calls from them.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;However you can use your google play in GrapheneOS and are not exposed on mass surveillance over your entire phone. That's because GrapheneOS sandboxes the app usage and does not grant permission to access anything on your device.&lt;/p&gt;

&lt;p&gt;Though if you really want to liberate your self from big tech, you probably would like to use open-source app-stores like F-droid, Aurora Store or APK Pure.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhhqir2kvm5gxgmka0rp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhhqir2kvm5gxgmka0rp.png" alt="fdroid" width="512" height="512"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6smrkvrihk304009z4m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6smrkvrihk304009z4m.png" alt="aurora" width="384" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9j8kjo3h2zmepgd2kdru.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9j8kjo3h2zmepgd2kdru.jpg" alt="apk" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Heavy protection against unknown (0 day) vulnerabilities&lt;/em&gt; - GrapheneOS uses measurements to prevent from security flaws in software or hardware that are unknown to the vendor and the public.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The measurements that used are following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Attack surface reduction - Removing unnecessary code or exposed attack surface eliminates many vulnerabilities completely. GrapheneOS avoids removing any useful functionality for end users, but we can still disable lots of functionality by default and require that users opt-in to using it to eliminate it for most of them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Containment through sandboxing at various levels - Fine-grained sandboxes around a specific context like per site browser renderers, sandboxes around a specific component like Android's media codec sandbox and app/workspace sandboxes like the Android app sandbox used to sandbox each app which is also the basis for user/work profiles. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;GrapheneOS improves all of these sandboxes through fortifying the kernel and other base OS components along with improving the sandboxing policies.&lt;/p&gt;

&lt;p&gt;What sandboxing really means is that e.g. if there is an app compromised, then because it's in sandbox, meaning isolated, no other app is compromised. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Preventing an attacker from persisting their control of a component or the OS/firmware through verified boot and avoiding trust in persistent state also helps to mitigate the damage after a compromise has occurred.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Attack surface reduction
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Greatly reduced remote, local and proximity-based attack surface by stripping out unnecessary code.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Making more features optional and disabling optional features by default (NFC, Bluetooth, UWB, etc.), when the screen is locked (USB, USB-C, pogo pins, camera access)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Optionally after a timeout (Bluetooth, Wi-Fi) &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  USB-C port and pogo pins control
&lt;/h4&gt;

&lt;p&gt;USB-C port and pogo pins setting protects against attacks through USB-C or pogo pins while the OS is booted. For the majority of devices without pogo pins, the setting is labelled USB-C port.&lt;/p&gt;

&lt;p&gt;The default is Charging-only when locked, which significantly reduces attack surface when the device is locked. &lt;/p&gt;

&lt;p&gt;After locking, it blocks any new USB connections immediately through either USB-C and pogo pins at both the hardware level via configuring the USB controller and also at the OS level in the kernel to provide a second layer of defense. &lt;/p&gt;

&lt;p&gt;The highest security however is when our charging is set to &lt;strong&gt;Off mode&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;Other privacy protections are following, about GrapheneOS there could be really created separate posts series:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hardened kernel&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hardened app runtime&lt;/strong&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Sensors permission toggle&lt;/strong&gt;: disallow access to all other sensors not covered by existing Android permissions. Or even there is a feature, that can send you alerts whenever an app will request for sensors.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;LTE-only mode&lt;/strong&gt; to reduce cellular radio attack surface by disabling enormous amounts of both legacy code (2G, 3G) and bleeding edge code (5G).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Wi-Fi privacy
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MAC randomization per each connection&lt;/strong&gt; unlike in standard android it's done per network. So regardless whether I've been connected to the network or not, if I reconnect, my device is treated as completely different one.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is a whole much more when it comes to GrapheneOS and what they do, when it comes to privacy protection. If you're more tech savvy than me and you know the infrastructure of the internet from the ground up, you can &lt;a href="https://grapheneos.org/features" rel="noopener noreferrer"&gt;check out the GrapheneOS website&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Unfortunately, GrapheneOS is limited only to Pixel 6 and newer phones, however there was announced that &lt;a href="https://www.digitaltrends.com/phones/motorola-plans-to-put-grapheneos-on-phones-so-why-is-it-a-big-deal/" rel="noopener noreferrer"&gt;arguably Motorola will have partnership with GrapheneOS&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Now you might wonder, &lt;strong&gt;why tha heck is a private OS available only on Google's phones ?&lt;/strong&gt; Let me explain.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Technical Constraint
&lt;/h4&gt;

&lt;p&gt;GrapheneOS needs direct control over the Titan M2 security chip, which only Pixels expose at the required level. This isn't arbitrary gatekeeping; it's a hardware reality. Other devices either don't provide the necessary low-level access or have weaker security foundations. You're not choosing Google—you're choosing the only viable hardware that can run proper security hardening.&lt;/p&gt;

&lt;h4&gt;
  
  
  Stripping Google Down
&lt;/h4&gt;

&lt;p&gt;Here's what actually happens: &lt;strong&gt;GrapheneOS removes Google Play Services, GMS, and proprietary Google binaries by default&lt;/strong&gt;. Your bootloader locks with &lt;em&gt;your&lt;/em&gt; key, not Google's. No persistent telemetry pipeline. The OS doesn't phone home unless you explicitly enable Sandboxed Google Play for specific apps.&lt;/p&gt;

&lt;p&gt;So yeah, you bought from Google. But the software surface they can exploit is drastically smaller than stock Android.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Trust Question
&lt;/h4&gt;

&lt;p&gt;Can Google backdoor you through the Titan chip? Technically yes. But realistically? It'd destroy their business model (which runs on &lt;em&gt;advertising data&lt;/em&gt;, not targeted espionage) and burn every ounce of credibility they have.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What you can actually verify:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Audit the open-source code yourself&lt;/li&gt;
&lt;li&gt;Run tcpdump to inspect network traffic&lt;/li&gt;
&lt;li&gt;Enable reproducible builds to verify the binary matches the source&lt;/li&gt;
&lt;li&gt;Confirm zero Google domains in your traffic&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Real Answer
&lt;/h3&gt;

&lt;p&gt;You're not achieving perfect de-googling. You're reducing Google's attack surface from massive to moderate. &lt;strong&gt;It's not self-denial—it's accepting that perfect security doesn't exist and choosing the best available option given the constraints.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The alternative isn't "truly de-googled." It's either stock Android (guaranteed surveillance) or building your own phone from discrete components (impractical). GrapheneOS + Pixel is the pragmatic best-in-class solution for commodity mobile privacy.&lt;/p&gt;

&lt;p&gt;Alternative Privacy Operating Systems: CalyxOS, IodeOS, LineageOS&lt;/p&gt;

&lt;h2&gt;
  
  
  Browsers &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr25owknb2gc4qjasafw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr25owknb2gc4qjasafw.jpg" alt="browsers" width="800" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We've got private OS, private messengers, now it's time to talk about private browsers so that you're not screwed and spied by simply browsing through the internet.&lt;/p&gt;

&lt;p&gt;There are couple of privacy options that are worth switching to. The Browsers are following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tor Browser&lt;/li&gt;
&lt;li&gt;Brave&lt;/li&gt;
&lt;li&gt;Firefox&lt;/li&gt;
&lt;li&gt;LibreWolf&lt;/li&gt;
&lt;li&gt;Mullvad Browser&lt;/li&gt;
&lt;li&gt;DuckDuckGo&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Tor Browser — The Gold Standard
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fof3l2kisxabie02jnuvr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fof3l2kisxabie02jnuvr.jpg" alt="tor" width="474" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Tor's the closest you get to truly untraceable. Here's what makes it beast-level:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Onion routing&lt;/strong&gt;: Your traffic bounces through minimum 3 encrypted nodes. Even if someone sniffs the exit node, they can't connect it back to you because the previous relay is encrypted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Letterboxing&lt;/strong&gt;: Rounds your screen resolution to standard buckets (1000x1000, 1400x900, etc.) so sites can't fingerprint you via screen dimensions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First-Party Isolation (FPI)&lt;/strong&gt;: Cookies are isolated per-domain. A tracker pixel from Facebook can't see what you did on Amazon because they're treated as completely separate contexts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standardized everything&lt;/strong&gt;: User agent, fonts, extensions—everyone looks identical on the network, so statistically you're hidden in a crowd of thousands.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tradeoff&lt;/strong&gt;: Slower (routing overhead), some site breakage from hardened CSP/XSS protections.&lt;/p&gt;

&lt;h3&gt;
  
  
  Brave
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5xhz49o3ybf12vgg6xg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5xhz49o3ybf12vgg6xg.jpg" alt="Brave" width="474" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Brave is the pragmatic choice for daily use. You get strong protections without sacrificing UX:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shields&lt;/strong&gt;: Built-in tracker blocking (uses multiple blocklists) + ad blocking at the rendering level. No extensions needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Script sandboxing&lt;/strong&gt;: Third-party scripts execute in isolated contexts, limiting their ability to communicate across sites.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cookie isolation&lt;/strong&gt;: Tracks HTTPS/HTTP + domain separation so cross-site tracking is harder.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fingerprint randomization&lt;/strong&gt;: Changes some fingerprinting vectors (Canvas, WebGL) on reload.&lt;/p&gt;

&lt;p&gt;Additionally when it comes to features that some people might search for, is actually ads-blocking so you can enjoy watching youtube without any ads and I think it's awesome, I remember how much I suffered because of stupid ads that were kind of targeted at me by youtube. &lt;/p&gt;

&lt;p&gt;Brave supports extensions as it's based on chromium engine. &lt;/p&gt;

&lt;p&gt;It supports also in-background running by default so you don't have to spend monthly on spotify subscription or something else. You can run youtube music on brave and you have the same effect.&lt;/p&gt;

&lt;h3&gt;
  
  
  Firefox
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff8uixyv0w1wv8rbms639.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff8uixyv0w1wv8rbms639.png" alt="firefox" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I was honestly shocked it is privacy browser, because as I was younger I always associated it with spyware. However Firefox turns out to be privacy respecting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Firefox lets you actually own your privacy config&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Total Cookie Protection (ETP)&lt;/strong&gt;: Isolates cookies in a "cookie jar" per website. Cross-site tracking via cookies is blocked by default.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container tabs&lt;/strong&gt;: Firefox Multi-Account Containers segregate cookies/data per container, so different "identities" don't bleed together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Advanced hardening via about:config&lt;/strong&gt;: You can disable WebGL, limit canvas fingerprinting, disable plugins, tweak timing attacks, etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Catch&lt;/strong&gt;: Requires manual tuning for maximum security. Stock Firefox is good, but paranoid Firefox requires config knowledge.&lt;/p&gt;

&lt;p&gt;Furthermore, they added 50GB Free VPN recently for every user. And firefox is one of the only browsers that support extensions/add-ons in mobile browsers, so if you have something like blocking keywords or you basically want to add nsfw extensions to your phone it's a good solution to use firefox, while keeping you private.&lt;/p&gt;

&lt;h3&gt;
  
  
  Mullvad Browser
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fle4n344a3m5s4co8ie3i.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fle4n344a3m5s4co8ie3i.webp" alt="mullvad" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is the Tor Project + Mullvad VPN collab. Basically:&lt;/p&gt;

&lt;p&gt;Takes Tor's hardening tech (letterboxing, FPI, standardized fingerprints).&lt;/p&gt;

&lt;p&gt;Removes the onion routing overhead.&lt;/p&gt;

&lt;p&gt;Assumes you'll pair it with a external VPN for network-level privacy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key quirk&lt;/strong&gt;: Zero persistent state. You log out when you close the browser. No bookmarks saved, no history. That's intentional—harder to track habits.&lt;/p&gt;

&lt;h3&gt;
  
  
  LibreWolf
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqns7fn1xxuo15qhsi45w.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqns7fn1xxuo15qhsi45w.jpg" alt="Librewolf" width="474" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LibreWolf's Firefox with Mozilla's telemetry ripped out + pre-baked security config:&lt;/p&gt;

&lt;p&gt;No telemetry, no studies, no data sharing with Mozilla.&lt;/p&gt;

&lt;p&gt;Ships with hardened about:config by default.&lt;/p&gt;

&lt;p&gt;uBlock Origin pre-installed.&lt;/p&gt;

&lt;p&gt;Minimal network calls back to Mozilla servers.&lt;/p&gt;

&lt;p&gt;Perfect if: You like Firefox's ecosystem but want Mozilla's data collection gone.&lt;/p&gt;

&lt;h3&gt;
  
  
  DuckDuckGo Browser
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" alt="ddg" width="474" height="231"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I actually used to use Duckduckgo as a browser, but because it was annoying that they had no extensions support for mobile apps. I would rather treat it as quick-search browser and nothing else. However I do use DuckDuckgo products and I really appreciate them. Also they do not support the in-background running by default just as firefox, so you're prolly need an extension for it. &lt;/p&gt;

&lt;h4&gt;
  
  
  Core Privacy Tech Stack
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Search Layer (No Tracking)&lt;/strong&gt;&lt;br&gt;
Zero search history storage: DuckDuckGo doesn't save or tie your searches to you. Compare that to Google storing everything linked to your account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No user profiles&lt;/strong&gt;: Unlike Google's ad-targeting, they literally can't build a profile because they don't collect the data in the first place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business model is honest&lt;/strong&gt;: Makes money from context-based ads (ads based on what you're currently searching, not your history), not behavioral targeting. This is key—it removes the incentive to spy on you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Tracker Blocking (The Heavy Hitter)&lt;/strong&gt;&lt;br&gt;
This is where DDG flexes. They've built multiple overlapping protections:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3rd-Party Tracker Loading Protection&lt;/strong&gt; — Blocks trackers before they even load&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Uses Tracker Radar&lt;/strong&gt; (their own open-source web crawler) to identify tracking domains&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prevents requests to known trackers&lt;/strong&gt; (Google Analytics, Facebook pixels, etc.) from being sent at all&lt;br&gt;
This is crucial: Stops your IP + other identifiers from being sent &lt;br&gt;
to tracker endpoints&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3rd-Party Cookie Protection&lt;/strong&gt; — Isolates cookies per domain&lt;br&gt;
A Facebook tracker pixel on Amazon can't see what you did there&lt;br&gt;
1st-Party Cookie Protection — Protects against persistent cookies on individual sites&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CNAME Cloaking Protection&lt;/strong&gt; — Blocks sneaky tracker domains hidden under first-party CNAME records&lt;br&gt;
Tech companies sometimes mask tracker domains to look like the site's own domain to bypass cookie protections&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fingerprinting Protection&lt;/strong&gt;&lt;br&gt;
Randomizes canvas/WebGL fingerprinting vectors&lt;br&gt;
Limits what scripts can detect about your device&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google-Specific Protections (Because Google is Everywhere)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They literally have dedicated protections for Google's tracking schemes:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google AMP Protection&lt;/strong&gt; — Strips Google AMP wrappers that let Google track your clicks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Topics Protection&lt;/strong&gt; — Blocks Google's Topics API (their creepy replacement for third-party cookies)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Protected Audience API Protection&lt;/strong&gt; — Blocks FLEDGE (their new ad auction system that still tracks you)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Sign-In Pop-Up Protection&lt;/strong&gt; — Removes those annoying "Sign in with Google" nags&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Link Tracking Protection&lt;/strong&gt;&lt;br&gt;
Strips tracking parameters from URLs before you click&lt;br&gt;
Example: amazon.com?utm_source=facebook&amp;amp;utm_medium=ad gets cleaned to just amazon.com&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Referrer Tracking Protection&lt;/strong&gt;&lt;br&gt;
Blocks the HTTP Referer header from leaking where you came from&lt;br&gt;
Encrypted Connections (Smarter HTTPS). Automatically upgrades to HTTPS when available. Prevents ISP/network-level snooping.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Email Protection&lt;/strong&gt;&lt;br&gt;
Generates unique &lt;a class="mentioned-user" href="https://dev.to/duck"&gt;@duck&lt;/a&gt;.com email aliases when signing up for services. Aliases forward to your real email but mask your identity&lt;br&gt;
Strips email tracker pixels before forwarding&lt;br&gt;
Example: You get &lt;a href="mailto:unique-alias@duck.com"&gt;unique-alias@duck.com&lt;/a&gt;, give it to a sketchy site, it forwards to your real inbox but without the tracking pixel&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Duck Player (YouTube)&lt;/strong&gt;&lt;br&gt;
Strips YouTube's tracking and disables personalized recommendations&lt;br&gt;
Reduces invasive ads. Your video views don't pollute your YouTube history.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cookie Pop-Up Protection&lt;/strong&gt;&lt;br&gt;
Automatically clicks the most privacy-friendly option on GDPR/CCPA pop-ups. Then hides the pop-up so you don't see it again.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Fire Button&lt;/strong&gt;&lt;br&gt;
One-click nuke of recent browsing data. Clears locally stored data instantly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Global Privacy Control (GPC)&lt;/strong&gt;&lt;br&gt;
Sends a standard signal to websites telling them not to sell/share your data.Works via HTTP header + JavaScript signal (platform-dependent). On Windows, it sends both header + JS. On Mac, JS only for compatibility reasons.&lt;/p&gt;

&lt;h2&gt;
  
  
  Search Engines
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8evckt28i0g1p053mh9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8evckt28i0g1p053mh9.png" alt="Search Engines" width="601" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ok, now as we took care of the Operating System, Browser it's time for Search Engines. And in advance I say, no there will be no google in this list (lol). &lt;/p&gt;

&lt;p&gt;That's because we would not like to be targeted for ads and having collected our data by company or companies that appear to be friendly to your privacy and data and apparently they see and store all our movements, conversations and more. We would do it for many reasons, either to prevent ourselves from unnecessary expenditures, prevent from trackers e.g. location trackers, profiling us etc.&lt;/p&gt;

&lt;p&gt;Before we start yet, I have to mention that &lt;strong&gt;there are a ton more search engines, than I thought there are&lt;/strong&gt;. Therefore I will not discuss each one but will discuss only 6 and for more knowledge I highly encourage to &lt;a href="https://privacysavvy.com/security/safe-browsing/private-search-engines" rel="noopener noreferrer"&gt;read this article&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let's first understand the fundamentals of how these systems operate before we list the details on each search-engine. This knowledge is crucial for appreciating the technical differences between privacy-focused and traditional engines.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Web Crawler: Your Digital Librarian
&lt;/h3&gt;

&lt;p&gt;A &lt;strong&gt;web crawler&lt;/strong&gt; (also called a bot or spider) is an autonomous software agent that systematically browses the web to discover and index content. Think of it like a tireless librarian that never sleeps. Here's how it works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Discovery&lt;/strong&gt;: The crawler starts with a list of known URLs, then follows hyperlinks to discover new pages&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fetching&lt;/strong&gt;: It downloads the HTML, CSS, and other content from each page&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Indexing&lt;/strong&gt;: The content is analyzed and stored in a massive database (the search index)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Processing&lt;/strong&gt;: Text is extracted, links are catalogued, and metadata is recorded&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Updates&lt;/strong&gt;: Crawlers continuously revisit pages to detect changes&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The crawled data is stored in an &lt;strong&gt;inverted index&lt;/strong&gt; — a data structure that maps every word on the web to the pages containing that word. This allows lightning-fast lookups when you search for a query.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Search Algorithm &amp;amp; Ranking System
&lt;/h3&gt;

&lt;p&gt;When you submit a query, the search engine doesn't re-crawl the web — it queries its pre-built index. The ranking algorithm determines which results appear first. Traditional engines like Google use factors like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Relevance&lt;/strong&gt;: How well the page matches your query keywords&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authority&lt;/strong&gt;: Link count and quality (PageRank)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Personalization&lt;/strong&gt;: Your search history, location, device, and browsing behavior (the privacy killer)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Click-through rates&lt;/strong&gt;: Which results users click on&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Freshness&lt;/strong&gt;: How recently the page was updated&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Privacy Problem in Search
&lt;/h3&gt;

&lt;p&gt;Here's where traditional search becomes invasive. When you search Google:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Your IP address is logged&lt;/li&gt;
&lt;li&gt;Your search query is stored and linked to your account/device&lt;/li&gt;
&lt;li&gt;Cookies track you across the web&lt;/li&gt;
&lt;li&gt;Your behavior is profiled to personalize ads&lt;/li&gt;
&lt;li&gt;This data is cross-referenced with your other Google services (Gmail, YouTube, Android)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This creates a detailed profile of your interests, location, health concerns, financial status, political beliefs, and more. That's the data economy that funds free search.&lt;/p&gt;

&lt;p&gt;And in order to prevent companies or even governments from taking advantage of your searches, you should use private search engines. &lt;/p&gt;




&lt;h3&gt;
  
  
  1. DuckDuckGo
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" alt="ddg" width="474" height="231"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Paoli, Pennsylvania, United States&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: September 25, 2008&lt;br&gt;&lt;br&gt;
&lt;strong&gt;CEO/Founder&lt;/strong&gt;: Gabriel Weinberg&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~2% (highest among privacy engines)&lt;/p&gt;

&lt;p&gt;DuckDuckGo is the heavyweight of private search — and for good reason. It's been my personal choice because the entire ecosystem they've built goes beyond just search.&lt;/p&gt;

&lt;p&gt;I personally use DDG as my search-engine together with other products offered by DDG, but more on that in next posts.&lt;/p&gt;

&lt;h4&gt;
  
  
  How DuckDuckGo Works
&lt;/h4&gt;

&lt;p&gt;Unlike many competitors, &lt;strong&gt;DuckDuckGo doesn't rely on a single source&lt;/strong&gt;. Its search results come from a hybrid of over &lt;strong&gt;400+ sources&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Bing API&lt;/strong&gt;: Primary source for general web results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DuckDuckBot&lt;/strong&gt;: DDG's own web crawler that supplements Bing results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wolfram Alpha&lt;/strong&gt;: For computational queries&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Yahoo! Search BOSS&lt;/strong&gt;: Historical data&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Yandex&lt;/strong&gt;: International coverage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wikipedia&lt;/strong&gt;: Knowledge panels&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is crucial because it means DDG isn't fully dependent on Microsoft's infrastructure. They've invested in building their own crawler (DuckDuckBot) to create partial independence.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Architecture
&lt;/h4&gt;

&lt;p&gt;DDG's privacy model is straightforward:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Zero Tracking&lt;/strong&gt;: No IP address logging, no search history storage, no user profiling&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Search Leakage&lt;/strong&gt;: Your search query isn't passed to the websites you click on (this alone is huge)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Encryption&lt;/strong&gt;: All connections use HTTPS, preventing ISP snooping&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Cookies for Tracking&lt;/strong&gt;: Only essential cookies for functionality&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Global Privacy Control (GPC)&lt;/strong&gt;: Auto-signals opt-out preferences to websites&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Largest privacy search community&lt;/strong&gt; — best network effects&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Actual independence&lt;/strong&gt; — uses own crawler + multiple sources&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Clean interface&lt;/strong&gt; — no bloated UI&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Respectable search quality&lt;/strong&gt; — Bing's index is solid&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Full ecosystem&lt;/strong&gt; — everything integrates&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Open source contributions&lt;/strong&gt; — DuckDuckHack community&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparency&lt;/strong&gt; — clear about what they don't collect  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Depends on Microsoft Bing&lt;/strong&gt; — During 2024 Bing outages, DDG stopped working&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Less personalized results&lt;/strong&gt; — No history means generic suggestions&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited independent index&lt;/strong&gt; — DuckDuckBot is supplementary, not primary&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Ad-supported model&lt;/strong&gt; — Non-personalized ads still shown&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Search quality inconsistency&lt;/strong&gt; — Sometimes results lag behind Google&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Premium required for full privacy&lt;/strong&gt; — Basic version still has limitations  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Real Talk
&lt;/h4&gt;

&lt;p&gt;DDG is solid if you want the path of least resistance. The ecosystem approach means you get privacy across multiple touchpoints. But here's the thing — it's still fundamentally dependent on Bing's infrastructure. That 2024 outage proved it.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. StartPage
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fegpd5xi5vgmvgnlfp522.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fegpd5xi5vgmvgnlfp522.jpg" alt="startpage" width="474" height="228"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: The Hague (Den Haag), Netherlands&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: 2006&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Ownership&lt;/strong&gt;: Dutch company, part of System1 (US-listed)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.06%&lt;/p&gt;

&lt;p&gt;StartPage is the proxy-based privacy champion. If you want to understand sophisticated privacy architecture, this one's worth studying.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Architecture: Proxy-Based Anonymization
&lt;/h4&gt;

&lt;p&gt;Here's what makes StartPage different from DDG — it uses a &lt;strong&gt;middleman approach&lt;/strong&gt;:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Your Query&lt;/strong&gt;: You search on startpage.com&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Premise Servers&lt;/strong&gt;: Locked cabinets with non-US administrators&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Your IP Removed&lt;/strong&gt;: All identifying info stripped (full IP, not just last octet)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Query to Google&lt;/strong&gt;: Startpage's servers ask Google for results (no user info attached)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Results Returned&lt;/strong&gt;: Google sees Startpage, not you&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;You Get Results&lt;/strong&gt;: Back to your browser without tracking&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is clean. Google literally doesn't know who's searching. The encryption uses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SSL/TLS&lt;/strong&gt;: Secure socket layer between you and Startpage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Perfect Forward Secrecy (PFS)&lt;/strong&gt;: Each session gets unique encryption keys&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;HTTPS Everywhere&lt;/strong&gt;: All connections encrypted&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Why Google Results Matter
&lt;/h4&gt;

&lt;p&gt;StartPage literally serves &lt;strong&gt;Google's search results&lt;/strong&gt; but anonymizes your query. This is a trade-off:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pro&lt;/strong&gt;: You get Google-quality results (often considered the best)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Con&lt;/strong&gt;: You're still dependent on Google's index, just with privacy wrapping&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Google-quality results&lt;/strong&gt; — Best-in-class search&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;True anonymity&lt;/strong&gt; — Full IP removal, not partial&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;EU jurisdiction&lt;/strong&gt; — GDPR protections, privacy-first legislation&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparent operations&lt;/strong&gt; — Explains technical flow clearly&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Anonymous View feature&lt;/strong&gt; — Proxy browsing for extra privacy&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No account required&lt;/strong&gt; — Works anonymously out of the box&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Endorsed by privacy experts&lt;/strong&gt; — Edward Snowden recommends it  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Completely dependent on Google&lt;/strong&gt; — No independence if Google changes&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — Niche product, limited resources&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Slower than direct Google&lt;/strong&gt; — Added proxy layer = latency&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited feature set&lt;/strong&gt; — Minimal instant answers compared to DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Less aggressive crawler&lt;/strong&gt; — Supplementary indexing only&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Owned by System1&lt;/strong&gt; — US company owns the parent (though Dutch HQ adds protection)  &lt;/p&gt;

&lt;h4&gt;
  
  
  Technical Depth
&lt;/h4&gt;

&lt;p&gt;The premise server setup is where the magic happens. Unlike traditional architectures, the servers are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Physically locked in cabinets&lt;/li&gt;
&lt;li&gt;Managed only by non-US staff (avoiding US legal jurisdiction)&lt;/li&gt;
&lt;li&gt;Isolated from cloud providers (avoids Patriot Act issues)&lt;/li&gt;
&lt;li&gt;Running their own anonymization pipeline&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is more robust than DDG's approach because there's no direct connection between your query and Google's servers.&lt;/p&gt;




&lt;h4&gt;
  
  
  3. Brave Search
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9jj87vxzdazj5e70l175.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9jj87vxzdazj5e70l175.jpg" alt="brave" width="474" height="252"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: San Francisco, California, USA&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: June 2022 (beta), fully released&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Parent Company&lt;/strong&gt;: Brave Software, Inc.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Current Status&lt;/strong&gt;: Growing, recently hit 100% independence&lt;/p&gt;

&lt;p&gt;Brave Search is the young gun with serious ambitions. This is what a &lt;strong&gt;true independent index&lt;/strong&gt; looks like.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Independence Factor
&lt;/h4&gt;

&lt;p&gt;Here's what makes Brave radical: &lt;strong&gt;it's building its own web index from scratch&lt;/strong&gt;.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Aspect&lt;/th&gt;
&lt;th&gt;Brave&lt;/th&gt;
&lt;th&gt;DuckDuckGo&lt;/th&gt;
&lt;th&gt;StartPage&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Search Index&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Own independent index&lt;/td&gt;
&lt;td&gt;Bing (80%+) + own crawler&lt;/td&gt;
&lt;td&gt;Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Dependence&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Minimal Big Tech&lt;/td&gt;
&lt;td&gt;High (Microsoft)&lt;/td&gt;
&lt;td&gt;High (Google)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Index Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;93% of results from own index&lt;/td&gt;
&lt;td&gt;Supplementary&lt;/td&gt;
&lt;td&gt;0%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Crawling&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Brave owns the crawler&lt;/td&gt;
&lt;td&gt;DuckDuckBot supplement&lt;/td&gt;
&lt;td&gt;No crawling&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This is huge. Brave doesn't have to negotiate with Microsoft or Google. They built their own.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Web Crawling&lt;/strong&gt;: Brave's crawler indexes the entire web&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Independent Storage&lt;/strong&gt;: Results stored in Brave's servers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Community Feedback&lt;/strong&gt;: Users can upvote/downvote to improve results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Goggles&lt;/strong&gt;: Custom ranking filters users create&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Bing/Google&lt;/strong&gt;: Zero reliance on Big Tech indexes&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Privacy By Design
&lt;/h4&gt;

&lt;p&gt;Brave Search doesn't track because it wasn't built to track:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;No User Profiles&lt;/strong&gt;: Engine designed from ground-up for privacy&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Cookies&lt;/strong&gt;: Zero tracking cookies by default&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Browsing Data&lt;/strong&gt;: Device info not collected&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No IP Logging&lt;/strong&gt;: IP addresses not stored&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Optional Web Discovery Project&lt;/strong&gt;: Users can opt-in to help improve results (anonymously)&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Innovative Features
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Goggles&lt;/strong&gt;: This is brilliant. You create custom ranking rules:&lt;br&gt;
Example Goggle:&lt;/p&gt;

&lt;p&gt;Boost scientific papers&lt;br&gt;
Hide social media&lt;br&gt;
Prioritize academic sources&lt;br&gt;
Downrank clickbait&lt;/p&gt;

&lt;p&gt;Others share their Goggles, creating community-curated search experiences.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Discussions&lt;/strong&gt;: See real discussions about topics (Reddit threads, forums) integrated into results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Summarizer&lt;/strong&gt;: Generates concise answers with cited sources (not hallucination-prone like competitors).&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;True independence&lt;/strong&gt; — Own index, no Big Tech dependencies&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Private by architecture&lt;/strong&gt; — Not bolted on as afterthought&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Goggles feature&lt;/strong&gt; — Community-driven ranking customization&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Growing rapidly&lt;/strong&gt; — 100M+ monthly active users (Brave browser)&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Excellent privacy defaults&lt;/strong&gt; — Zero tracking, zero profiling&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Web Discovery Project optional&lt;/strong&gt; — Can contribute anonymously&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;US-based but transparent&lt;/strong&gt; — Open about design principles&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Premium option&lt;/strong&gt; — Ad-free for supporters  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Young search engine&lt;/strong&gt; — Still refining result quality&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Different results than Google&lt;/strong&gt; — Learning curve for power users&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Smaller index&lt;/strong&gt; — 93% own index still maturing&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Brave browser required for best integration&lt;/strong&gt; — Works standalone but better with ecosystem&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;US jurisdiction&lt;/strong&gt; — No GDPR-level protection (though privacy-first design) &lt;/p&gt;

&lt;h4&gt;
  
  
  The Blockchain Angle
&lt;/h4&gt;

&lt;p&gt;Brave is built by people who understand decentralization. Their philosophy of "no Big Tech dependency" aligns with blockchain thinking. They're even working on integrating Web3 concepts into search (cryptocurrency tipping, decentralized indexing discussions).&lt;/p&gt;




&lt;h3&gt;
  
  
  4. Swisscows
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ajjwq78yde57dhrtm6k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ajjwq78yde57dhrtm6k.jpg" alt="sc" width="474" height="249"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Egnach, Switzerland&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: Originally as web directory in 2002, evolved to search engine&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Data Center&lt;/strong&gt;: Swiss Alps&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Unique Selling Point&lt;/strong&gt;: Family-friendly + Swiss data protection&lt;/p&gt;

&lt;p&gt;Swisscows is the extreme privacy option. They don't mess around.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Switzerland Advantage
&lt;/h3&gt;

&lt;p&gt;Switzerland has:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Federal Data Protection Act&lt;/strong&gt; — Stricter than GDPR in some ways&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;"Bunker" Data Center&lt;/strong&gt; — Swiss Alps location, highest security&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No US Jurisdiction&lt;/strong&gt; — Patriot Act doesn't apply&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Strong banking privacy traditions&lt;/strong&gt; — Culture of secrecy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Swisscows headquarters is in Egnach, serving this exact jurisdiction.&lt;/p&gt;

&lt;h4&gt;
  
  
  Technical Stack
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Own Servers&lt;/strong&gt;: Swisscows has its own infrastructure (unlike most competitors):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Located in Switzerland only&lt;/li&gt;
&lt;li&gt;Not using cloud providers (avoids Patriot Act)&lt;/li&gt;
&lt;li&gt;Only Swiss staff can access servers&lt;/li&gt;
&lt;li&gt;Queries anonymized after 7 days&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Search Index&lt;/strong&gt;: Originally powered by Bing, but recently partnered with &lt;strong&gt;Brave&lt;/strong&gt; to develop independent European index. This is strategic.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Features (Standard)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;No data collection on free version&lt;/li&gt;
&lt;li&gt;IP address removal&lt;/li&gt;
&lt;li&gt;No user profiling&lt;/li&gt;
&lt;li&gt;No cookies for tracking&lt;/li&gt;
&lt;li&gt;Semantic search (intelligent understanding)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Swisscows Pro (Premium)
&lt;/h3&gt;

&lt;p&gt;For absolute paranoia (in the good way):&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Feature&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Zero Data Storage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Literally no data saved about you, ever&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;100% Anonymous&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Complete anonymity, even from Swisscows&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ad-Free&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No advertising revenue model needed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Custom Results&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;You curate which sources appear&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Swiss Servers Only&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No data leaves Switzerland&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Family-Friendly Feature
&lt;/h3&gt;

&lt;p&gt;Swisscows filters pornographic and violent content by default:&lt;br&gt;
This is useful for:&lt;/p&gt;

&lt;p&gt;Schools wanting safe search&lt;br&gt;
Parents protecting kids&lt;br&gt;
Organizations with content policies&lt;/p&gt;

&lt;p&gt;Some see this as censorship, others appreciate it.&lt;/p&gt;

&lt;h3&gt;
  
  
  Pros
&lt;/h3&gt;

&lt;p&gt;✅ &lt;strong&gt;Strictest privacy jurisdiction&lt;/strong&gt; — Swiss law is gold standard&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Own servers&lt;/strong&gt; — No cloud, no Patriot Act risk&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Bunker data center&lt;/strong&gt; — Physically secure infrastructure&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No US parent company&lt;/strong&gt; — Completely independent&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Partner with Brave&lt;/strong&gt; — Contributing to European index independence&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Family-friendly filtering&lt;/strong&gt; — Good for institutions&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Very transparent&lt;/strong&gt; — Clear about what they do/don't collect&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Semantic search&lt;/strong&gt; — Intelligent query understanding  &lt;/p&gt;

&lt;h3&gt;
  
  
  Cons
&lt;/h3&gt;

&lt;p&gt;❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — ~0.001% usage&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited result quality&lt;/strong&gt; — Smaller index means gaps&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Expensive premium&lt;/strong&gt; — Around €89/month or €899/year&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Content filtering controversial&lt;/strong&gt; — Some see it as censorship&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Newer to independence&lt;/strong&gt; — Recently partnered with Brave for index&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Language limitations&lt;/strong&gt; — Better for European languages&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Poor search features&lt;/strong&gt; — Minimal instant answers or tools  &lt;/p&gt;




&lt;h3&gt;
  
  
  5. Qwant
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkz44vvwokdqpbgujwe23.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkz44vvwokdqpbgujwe23.jpg" alt="Qwant" width="474" height="207"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Paris, France&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: February 2013&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founders&lt;/strong&gt;: Jean-Manuel Rozan, Éric Léandri, Patrick Constant&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Government Support&lt;/strong&gt;: Backed by French state investment&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.5% (mostly in Europe)&lt;/p&gt;

&lt;p&gt;Qwant is France's answer to Google dominance — and it's complicated.&lt;/p&gt;

&lt;h4&gt;
  
  
  The French National Project
&lt;/h4&gt;

&lt;p&gt;Qwant received backing from French government and Caisse des dépôts (French investment bank) because of geopolitical concerns about US tech dominance. This is interesting from a sovereignty perspective.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works
&lt;/h4&gt;

&lt;p&gt;Qwant uses &lt;strong&gt;Microsoft Bing as primary index&lt;/strong&gt; with its own improvements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fetches Google results for some queries&lt;/li&gt;
&lt;li&gt;Has own index but it's supplementary&lt;/li&gt;
&lt;li&gt;Uses Wikipedia for knowledge panels&lt;/li&gt;
&lt;li&gt;Integrates APIs from TripAdvisor, DeepL, YouTube, Twitter, Facebook&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The results are &lt;strong&gt;similar to Bing&lt;/strong&gt; because that's the underlying technology.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Model (Mostly)
&lt;/h4&gt;

&lt;p&gt;Here's where it gets murky:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Qwant Claims&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No tracking cookies&lt;/li&gt;
&lt;li&gt;No personalized ads&lt;/li&gt;
&lt;li&gt;No user profiling&lt;/li&gt;
&lt;li&gt;Queries anonymized&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What Actually Happens&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sends data to Microsoft Bing Ads&lt;/strong&gt; for ad targeting&lt;/li&gt;
&lt;li&gt;IP address is masked (last octet removed) but not fully anonymized&lt;/li&gt;
&lt;li&gt;User-Agent and search keywords sent to Microsoft&lt;/li&gt;
&lt;li&gt;Data retained up to &lt;strong&gt;18 months&lt;/strong&gt; (not "never stored")&lt;/li&gt;
&lt;li&gt;This wasn't disclosed until mid-2021, causing privacy backlash&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is the fundamental weakness. They claim privacy but still feed Microsoft your behavioral data for ad targeting. It's better than Google, but not actually private.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unique Features
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Junior Mode&lt;/strong&gt;: Filtered version for kids (similar to Swisscows)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Collections&lt;/strong&gt;: Save and organize search results like Pinterest&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Qwant News&lt;/strong&gt;: Aggregated news with diverse sources (actually good feature)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Translation Integration&lt;/strong&gt;: Built-in DeepL translator for results&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;EU/France jurisdiction&lt;/strong&gt; — GDPR protected&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Government investment&lt;/strong&gt; — Funding stability&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No personalized ads&lt;/strong&gt; — Ad model isn't behavior-targeted&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Decent search quality&lt;/strong&gt; — Bing is solid index&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;News aggregation&lt;/strong&gt; — Good for current events&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Junior mode&lt;/strong&gt; — Family-friendly filtering&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Fast interface&lt;/strong&gt; — Minimalist design  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Misleading privacy claims&lt;/strong&gt; — Says "private" but feeds Microsoft data&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Bing dependent&lt;/strong&gt; — No independence from Microsoft&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Data retention&lt;/strong&gt; — 18 months storage contradicts privacy narrative&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited features&lt;/strong&gt; — Fewer tools than Google/DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — Limited resources for improvement&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;French government ties&lt;/strong&gt; — Some see as political tool&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;IP masking not anonymization&lt;/strong&gt; — Last octet removed ≠ private&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Unreliable history&lt;/strong&gt; — Financial struggles, multiple pivots  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Real Problem
&lt;/h4&gt;

&lt;p&gt;Qwant markets itself as private but fundamentally isn't. The Bing Ads data sharing was buried in their privacy policy. For crypto people doing sensitive research, this is a no-go. You're still being profiled, just not visibly personalized.&lt;/p&gt;




&lt;h3&gt;
  
  
  6. Ecosia
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6qqt6ws6xk3m4f84jcl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6qqt6ws6xk3m4f84jcl.jpg" alt="Ecosia" width="474" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Berlin, Germany&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: December 2009&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founders&lt;/strong&gt;: Christian Kroll, Achim Steiner (UN figure)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Business Model&lt;/strong&gt;: Non-profit, B Corp certified&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.04%&lt;/p&gt;

&lt;p&gt;Ecosia is unique because &lt;strong&gt;it's not primarily about privacy&lt;/strong&gt; — it's about environmental impact. But it's worth understanding because the trade-offs are interesting.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Mission
&lt;/h4&gt;

&lt;p&gt;Ecosia uses search revenue to plant trees. &lt;strong&gt;50% of profit goes to reforestation projects&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;45+ million trees planted (as of 2024)&lt;/li&gt;
&lt;li&gt;Partnerships with The Nature Conservancy, IUCN&lt;/li&gt;
&lt;li&gt;Multiple continents: Brazil, Indonesia, Ethiopia, Peru, India&lt;/li&gt;
&lt;li&gt;Verified impact tracking&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is legitimate environmental work, not greenwashing.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works (Technically)
&lt;/h4&gt;

&lt;p&gt;Ecosia uses &lt;strong&gt;Bing index&lt;/strong&gt; (like DuckDuckGo and Qwant):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Powered by Microsoft Bing results&lt;/li&gt;
&lt;li&gt;Own supplementary crawler (Ecosiabot)&lt;/li&gt;
&lt;li&gt;Generates revenue through Bing partner ads&lt;/li&gt;
&lt;li&gt;Takes ~€0.50 per search to tree planting&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The economics: You search → Bing shows ads → Ecosia gets commission → ~50% goes to trees&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Features
&lt;/h4&gt;

&lt;p&gt;Here's the reality check:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Ecosia Does Right&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No persistent user tracking&lt;/li&gt;
&lt;li&gt;No search history storage&lt;/li&gt;
&lt;li&gt;HTTPS encryption&lt;/li&gt;
&lt;li&gt;No third-party profiling cookies&lt;/li&gt;
&lt;li&gt;GDPR compliant (EU based)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Where Privacy Falls Short&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IP address logging&lt;/strong&gt; — Stored for debugging, cleared after 7 days&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bing data sharing&lt;/strong&gt; — Microsoft sees your searches (anonymized but still shared)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Analytics cookies&lt;/strong&gt; — Matomo analytics (privacy-focused but still collects)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limited anonymization&lt;/strong&gt; — Not like StartPage's full proxy approach&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ecosia is &lt;strong&gt;more private than Google but less private than DuckDuckGo/StartPage&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Environmental Breakdown
&lt;/h4&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Initiative&lt;/th&gt;
&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tree Planting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;45M+ trees in 70+ countries&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Carbon Negative&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Offsets more CO2 than servers emit&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;B Corp Certified&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Independent third-party verified&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Transparent Reporting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Monthly impact dashboard public&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Partnership Model&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Works with local organizations&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The tree count is audited. They show exact locations, coordinates, photos. This is serious environmental work.&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Environmental impact verified&lt;/strong&gt; — Real trees, real numbers&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Decent privacy&lt;/strong&gt; — Better than Google, not as strict as DDG&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;B Corp certified&lt;/strong&gt; — Independent auditing of social mission&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Reasonable search quality&lt;/strong&gt; — Bing index is solid&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparent financials&lt;/strong&gt; — Public impact reports&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;EU jurisdiction&lt;/strong&gt; — GDPR protection&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Growing adoption&lt;/strong&gt; — ~15M monthly active users&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Mission-driven team&lt;/strong&gt; — Passionate about environment  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Privacy not primary focus&lt;/strong&gt; — IP logging, Bing data sharing&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Bing dependent&lt;/strong&gt; — No search independence&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Effectiveness questioned&lt;/strong&gt; — Tree planting ROI debated&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited instant answers&lt;/strong&gt; — Fewer tools than Google/DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Smaller index&lt;/strong&gt; — Result quality gaps on niche queries&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Free version slower&lt;/strong&gt; — Premium for faster results (weird model)&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Can't verify tree quality&lt;/strong&gt; — Planting numbers public, survival rates less so&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Ad-supported&lt;/strong&gt; — Still needs advertising revenue  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Trade-Off Philosophy
&lt;/h4&gt;

&lt;p&gt;Ecosia explicitly says: &lt;strong&gt;"Choose environmental impact over maximum privacy"&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is honest. If your primary concern is privacy, use DuckDuckGo or StartPage. If you want to offset carbon while searching reasonably privately, Ecosia makes sense.&lt;/p&gt;




&lt;h2&gt;
  
  
  Comparison Matrix
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Engine&lt;/th&gt;
&lt;th&gt;Privacy Tier&lt;/th&gt;
&lt;th&gt;Independence&lt;/th&gt;
&lt;th&gt;Speed&lt;/th&gt;
&lt;th&gt;Search Quality&lt;/th&gt;
&lt;th&gt;Jurisdiction&lt;/th&gt;
&lt;th&gt;Best For&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;DuckDuckGo&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;Medium (Bing+own)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Very Good&lt;/td&gt;
&lt;td&gt;USA&lt;/td&gt;
&lt;td&gt;General use, ecosystem&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;StartPage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Extreme&lt;/td&gt;
&lt;td&gt;Low (Google proxy)&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;Netherlands&lt;/td&gt;
&lt;td&gt;Google quality + privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Brave&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;High (own index)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Good/Improving&lt;/td&gt;
&lt;td&gt;USA&lt;/td&gt;
&lt;td&gt;Independence-focused&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Swisscows&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Extreme&lt;/td&gt;
&lt;td&gt;High (own infra)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Fair&lt;/td&gt;
&lt;td&gt;Switzerland&lt;/td&gt;
&lt;td&gt;Absolute privacy, bunker&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Qwant&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Fair (misleading)&lt;/td&gt;
&lt;td&gt;Low (Bing)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;EU users, news&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ecosia&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Low (Bing)&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;Environmental impact&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Online Privacy is not like a road from Point A to B. It's a rather a multi-layer process, that if taken seriously and applied correctly, can benefit you and your environment by liberating you from big-tech, government surveillance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F080pyq6531jxi3wof7tc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F080pyq6531jxi3wof7tc.png" alt="Ice berg" width="800" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a way I would envision privacy. Btw, the Penguin is probably the Linux one :D&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I hope you enjoyed this article and you learnt something from it. I honestly have spent hours on reading, fact checking, researching, comprehending and editing the text so that not only me but also you could understand it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqgbt8pfdn5z0f7ay8o6h.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqgbt8pfdn5z0f7ay8o6h.gif" alt="bye" width="498" height="371"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be ready for Part 2 ! Where I will present couple of alternatives for Mail Providers and Messengers for you, so that you can switch from the big-tech ones to more private ones.&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>discuss</category>
      <category>tooling</category>
      <category>security</category>
    </item>
    <item>
      <title>My Take On AI and Technology (Besides the Pure Developer PoV)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Fri, 27 Feb 2026 09:55:50 +0000</pubDate>
      <link>https://forem.com/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce</link>
      <guid>https://forem.com/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce</guid>
      <description>&lt;p&gt;Hello Dev.to community !&lt;/p&gt;

&lt;p&gt;I hope you're all doing well, today I decided for a little bit more controversial topic this time and namely to present my point of view on AI besides just a tool for code-analysis, vibe-coding, generating images or other cuty activity people use AI for. Are you're interested ? &lt;/p&gt;

&lt;p&gt;Buckle up and let's go ! &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WARNING ⚠️&lt;/strong&gt;: &lt;em&gt;This article contains personal views on the modern technology of Artificial Intelligence and current world's geopolitical situation and actions of certain governments. This article has in no condition been written with intent to trigger fear or be taken as an oracle.&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;But before I start, some entry information for a reader, so that they would know who is writing that to make the things clear.&lt;/p&gt;

&lt;h3&gt;
  
  
  Introduction Information
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;I define my views in case of world-views as an crypto-anarchist. I do not support any political side, I think out of the box.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I do not belong to any associatations (like idk what you guys would think of me, that I'm foil-cap gang member or whatever, lol), every statement I make is my personal view.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I'm an Web3 Developer with 3 years of experience in full-stack web-dev, with many interests on IT, so I also grasped some take on how AI neuro-networks are actually working. My knowledge on AI bases on youtube videos from experts on it, Brilliant lessons (on AI)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;My opinions are based on previous historic events and history of human species evolution.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  General take on AI
&lt;/h3&gt;

&lt;p&gt;First of all, to make clear I treat AI as an statistical/probabilistic model that predicts the next word sequence, based on the appearance-ratios to certain word given. Which means every time it generates an output, I know that it's just pure statistics and probability based on the data that it posesses. And I state that we should not let AI just automate everything, without human-intervention on the entire workflow.&lt;/p&gt;

&lt;p&gt;Whenever it generates an output for generating a list of elements in React:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="nx"&gt;React&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nx"&gt;useEffect&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;useState&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;react&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nx"&gt;getData&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;../some/directory/utils.ts&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;DataList&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;T&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;databaseTable&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="kr"&gt;string&lt;/span&gt;&lt;span class="p"&gt;){&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;data&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;setData&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;useState&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;T&lt;/span&gt;&lt;span class="p"&gt;[]&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;

&lt;span class="k"&gt;async&lt;/span&gt; &lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;fetchData&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
      &lt;span class="nf"&gt;setBio&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kc"&gt;null&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
      &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;result&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nf"&gt;getData&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;databaseTable&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="k"&gt;if&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;results&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;length&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;){&lt;/span&gt;
&lt;span class="nf"&gt;setData&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;result&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="nf"&gt;useEffect&lt;/span&gt;&lt;span class="p"&gt;(()&lt;/span&gt;&lt;span class="o"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="nf"&gt;fetchData&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
&lt;span class="p"&gt;},[]);&lt;/span&gt;


&lt;span class="k"&gt;return &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;div&lt;/span&gt; &lt;span class="nx"&gt;className&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;some-style&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nx"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;map&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="nx"&gt;element&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;Element&lt;/span&gt; &lt;span class="nx"&gt;data&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nx"&gt;element&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="sr"&gt;/&amp;gt;&lt;/span&gt;&lt;span class="se"&gt;))&lt;/span&gt;&lt;span class="err"&gt;}
&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="sr"&gt;/div&amp;gt;&lt;/span&gt;&lt;span class="err"&gt;)
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="k"&gt;export&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt; &lt;span class="nx"&gt;DataList&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I can infer 2 things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The model I'm working on has been trained only on junior code &lt;/li&gt;
&lt;li&gt;My prompt was not specific enough&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;For those who do not know what the heck am I talking about is that, this component presents very poor understanding of &lt;code&gt;useEffect&lt;/code&gt; hook in React, because it will get executed only once and the array content will not be trigged on any changes to parameter databaseTable.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;But AI-code generation known also as vibe-coding and generally these all accessible AI-models, is just a top of the iceberg. As you could see on the thumbnail, I linked a video which informs that Antrophic has announced due to the US Department of War,...sorry ("Defense") the change of the guardrails, having as the author of the video said:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Abandoned the company's ethics rules for their AI-models&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Well, for someone that is not really into history or just operates in a deep in a bubble and is absorbed by their environment (which is understandable), it might sound just as another boring company statement, updating some policies etc.&lt;/p&gt;

&lt;p&gt;In fact however, it is for me a sign like:&lt;br&gt;
&lt;em&gt;Ok in 1940s there's been the necluar bomb created...&lt;strong&gt;BY SCIENTISTS&lt;/strong&gt; for government. This time &lt;strong&gt;perhaps&lt;/strong&gt; AI-companies will be used as those who will create an Skynet-like weapon.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;AI-companies are already involved in various dubious actions like transactions with NVIDIA --&amp;gt; OpenAI cycles etc. (sorry for that generalization) and OpenAI turning from non-profit to for-profit. Besides Scam Altman to state differently. Well as someone said:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Everything is temporary&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  AI Madness Time
&lt;/h2&gt;

&lt;p&gt;Social media and also media per se are flooded with articles on the AI spreading fear and announcing another AGIs, paralyzing newbies and repeatedly speaking of replacement by AI.&lt;/p&gt;

&lt;p&gt;I will mention only that for me it's absolutely not apprehensive, how and why someone would allow tools made by some company or by some dude, that came back with a milk after years like OpenClaw/Moltbot whatever to manage &lt;strong&gt;THEIR&lt;/strong&gt; private data and information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=YFjfBk8HI5o" rel="noopener noreferrer"&gt;Here the podcast episode with the main-character from OpenClaw&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I'm wondered because OpenClaw and AI automation is not flawless and it performs bugs as well, here an example.&lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=JiA4fvoeUfI" rel="noopener noreferrer"&gt;Openclaw deletes entire inbox&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  My AI-usage
&lt;/h3&gt;

&lt;p&gt;My personal AI-stack is actually quite peculiar, because I use actually only duck.ai wrapper for my daily usage (Privacy first).&lt;br&gt;
I contemplated about purchasing an subscription for github co-pilot, but for now I don't think it's necessary.&lt;/p&gt;

&lt;p&gt;I use AI quite often to handle errors if I can't find the bug on my own for a bit longer, but not like:&lt;br&gt;
"Hey Bobert, fix the code for me, &lt;strong&gt;no mistakes&lt;/strong&gt; !"-guy, but rather in a way.&lt;br&gt;
"I'm running into an issue: [The error message]. I tried [list down the steps] and I still could not resolve that error. Find the issue inside my code and provide the potential solution approach."&lt;/p&gt;

&lt;p&gt;Basically I let it check whether it spots some logic failure of mine whenever I get an error faster than I fix and then learn from it.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why I write about it ?
&lt;/h3&gt;

&lt;p&gt;I write this article in order to showcase the deceitful narrative served by social-media about AI, that should "make people more creative" etc. I want to showcase that conversely it turned out that creativity is almost gone and noone cares:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Almost every website is currently looking the same (they use shadcnx + next.js + tailwind) with basic template and design not so much customized, if that's called creativity, thus I'm done also with web-dev as it's so red ocean area, that it's not engaging to enter anymore.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The amount of shitty code increased.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The IQ level of an average person decreases instead of increasing&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scammers got a perfect tool to make their scams even more benefitial. I recently helped some person of my narrow-circle of contacts to investigate why there's been some amount of money taken from their bank-account. It turned out that they have used for some period of time a tool in free trial, but there was no mention about it's expiration or when they will get charged. Additionally the tool they used was so shit that OSINT tools like &lt;a href="https://haveibeenpwned.com/" rel="noopener noreferrer"&gt;https://haveibeenpwned.com/&lt;/a&gt; or such websites would give more comprehensive data than that tool.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;People are getting paralyzed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Social connections for people are tough to be bound&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And there are other much bigger social, financial and technological issues coming from AI.&lt;/p&gt;

&lt;p&gt;I do not state that we should stop using AI etc. &lt;strong&gt;I just assert the facts of different point of view on AI and it's impact.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And if you're fed up and want to stop reading, please read next few lines about primary purpose of Internet and you can go.&lt;/p&gt;

&lt;h3&gt;
  
  
  Primary Purpose of the Internet
&lt;/h3&gt;

&lt;p&gt;For a context of my conjecture on possible miss-use of AI companies by government. Let's head back to the ground-level of digital world, the Internet. If you have ever wondered why the internet has been created, who created it and why isn't the creator of internet a rich well known guy. The answer is quite simple. One of the leading scientists in building the internet were Vint Cerf and Paul Baran, who was building the internet for the Government's Commission to build a communication system that surrvives nucluar attack.&lt;/p&gt;

&lt;p&gt;No social-connection and building better world focused, not enhancement for good. It's been built for again: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Government to build a communication system that survives neclear attack&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=Dxcc6ycZ73M" rel="noopener noreferrer"&gt;Here is the link to the confirmation of what I say&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And this has been with any other invention or any other science-field. Cryptography (my main focus in my career) has not been invented to enable regular people securely communicate, it's been for the military purposes. Is that a reason why I should throw away cryptography otherwise should be named a spy ?&lt;/p&gt;

&lt;p&gt;Well for some people perhaps yes, but I comprehend their statement. I was and still am oppose to the governments and any globalists ideas, I think not using the ready to use tools and building something from scratch is pointless and irrational.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additionally one simple but broad fact, inferred by me from the human species history study
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Environment changes, possibilities changes, patterns stay the same&lt;/strong&gt;: Throughout many years the technology has evolved, live conditions enhanced, but patterns remained. What do I mean ? &lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Surveilance and Control was always the purpose on the first place. Because I studied for some time history of Britain, creation in 1086 of the Domesday Book is one of the example of rising surrveilance. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Media are basically the subordinaries of the government or the opposition, depending on who will be paid.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Human have actual not evolved much from monkey&lt;/strong&gt;: controversial, but unfortunately the truth is that any action in our life can be narrowed down to the monkey world. Which for me personally is sad, because the development of the new technologies is interesting and flabbergasting, but often flawed by monkey incentive, carved inside human brain.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Entities who pursued good for humanity were always mocked, taunted or were introverted&lt;/strong&gt;: People like Nikola Tesla, whose biography I also studied was an phenomenal inventor, but he was not an entrepreneur like Edison, whom I actually condemn for the Propaganda against AC (Alternative Current) using it on animals. But as I said:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Greedy Monkey will do everything for more bananas.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;And thus Tesla died feeding pigeons in a hotel room paid by the company as honorary for his work.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;My take away from all of this would be quite simple. As a species we're likely on the verge on existence, meaning it will be a miracle if human species survives until 2100. So:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Switch off the media, focus only on what you are passionate about.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don't let yourself absorb with stress and find your tribe (again monkey analogy XD) and contact with them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don't trust politicians and big companies in their incentives.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don't stress about being replaced by AI, today world is so screwed that entrepreneurs are people like Amodei from Antrophic who can't fit a single deadline of replacing human by AI.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Happy Weekend and and stay tuned for first report of progression on sunday ! I decided I will post the reports of my efforts in cryptography and blockchain architecture weekly on sunday.&lt;/p&gt;

&lt;p&gt;Stay safe, stay alert, stay curious ;D&lt;/p&gt;

</description>
      <category>ai</category>
      <category>future</category>
      <category>machinelearning</category>
      <category>discuss</category>
    </item>
  </channel>
</rss>
