Matrix Homeserver As Hidden Service Over Tor (Synapse)

Matrix as a hidden service over Tor can increase privacy.
You already learned during our “hidden service” series:

that Tor is not an invisible cape. It’s not full-anonymity.
Using Tor you can maintain better privacy and OPSEC.
It’s a better protection against metadata leaks if you use it carefully.

Continue reading “Matrix Homeserver As Hidden Service Over Tor (Synapse)”

Protect Your Privacy With An XMPP Tor Hidden Service (Prosody)

The world is changing fast.
Yesterday’s mistake becomes today’s data leak – and tomorrow’s compromise.

Privacy is not a default setting.
It’s constant configuration and calibration.

You know how to install an IRC server as a Tor hidden service.
You’ve seen the modern features and modularity of the XMPP protocol.

A Tor hidden service protects both the server and the user.
This setup is designed to reduce exposure of IP addresses and limit metadata leakage.
It does not protect against compromised endpoints or user mistakes.

Continue reading “Protect Your Privacy With An XMPP Tor Hidden Service (Prosody)”

Run IRC As A Tor Hidden Service (Inspircd + Anope)

IRC with InspIRCd and Anope works well as an internet-facing service.
Your domain name, the TLS certificates and SASL authentication make it secure.
Cloaking hides your address from other users.

But what about IRC Operators and Network Admins?
They can see the addresses/hosts the clients connect from.

As an IRC Operator you can increase the trust in your services.

You will learn now how to run InspIRCd as a Tor-only hidden service.

Continue reading “Run IRC As A Tor Hidden Service (Inspircd + Anope)”

GPG Basics: Simple, Safe Encryption for Everyday IT Work

When you hear the word encryption, it often sounds like something only security researchers and intelligence agencies deal with. But in reality, every IT professional – even small teams, freelancers, or home users – should understand the basics of protecting sensitive files.

GnuPG (or GPG) is one of the most trusted tools for this. It’s free, open-source, built into every Linux distribution, and works perfectly for encrypting files, verifying downloads, or signing work-related documents.

This guide walks you through a clean, beginner-friendly setup – no advanced OPSEC, no air-gapped machines, no master-key rituals. Just the essentials that anyone at home or at work can start using today.

Continue reading “GPG Basics: Simple, Safe Encryption for Everyday IT Work”