Protect Your Privacy With An XMPP Tor Hidden Service (Prosody)

The world is changing fast.
Yesterday’s mistake becomes today’s data leak – and tomorrow’s compromise.

Privacy is not a default setting.
It’s constant configuration and calibration.

You know how to install an IRC server as a Tor hidden service.
You’ve seen the modern features and modularity of the XMPP protocol.

A Tor hidden service protects both the server and the user.
This setup is designed to reduce exposure of IP addresses and limit metadata leakage.
It does not protect against compromised endpoints or user mistakes.

Continue reading “Protect Your Privacy With An XMPP Tor Hidden Service (Prosody)”

Run IRC As A Tor Hidden Service (Inspircd + Anope)

IRC with InspIRCd and Anope works well as an internet-facing service.
Your domain name, the TLS certificates and SASL authentication make it secure.
Cloaking hides your address from other users.

But what about IRC Operators and Network Admins?
They can see the addresses/hosts the clients connect from.

As an IRC Operator you can increase the trust in your services.

You will learn now how to run InspIRCd as a Tor-only hidden service.

Continue reading “Run IRC As A Tor Hidden Service (Inspircd + Anope)”

XMPP – The Middle Ground Of Instant Messaging (Prosody)

XMPP or Extensible Messaging and Presence Protocol is an open communication protocol.
It has been actively developed since it was introduced in 1999.
Over time, a large part of its user base migrated to centralized cloud platforms.

IRC is a simple, reliable, text-based protocol.
Matrix is a robust but more complex protocol with higher resource requirements.
XMPP sits between them, closer to IRC in simplicity while offering more modern features.

In this article you will learn to install a private, non-federated XMPP server.

Continue reading “XMPP – The Middle Ground Of Instant Messaging (Prosody)”

Breadcrumbs In The Wire – Why OPSEC Is Important

OPSEC Is Not For The Military

Operational Security (OPSEC) isn’t a military secret – it’s a survival tool.
People think it’s for soldiers, spies, or hackers.
But it’s for civilians. For you.
Every day, you leave trails: where you go, who you talk to, what you buy.
Someone is watching. Someone is connecting the dots.
OPSEC is the discipline of controlling your own story before someone else writes it for you.

Continue reading “Breadcrumbs In The Wire – Why OPSEC Is Important”

Command and Control: The Whisper Net of Cyber Intruders

DeadSwitch Security // Hacking Mindset
“In the right hands, it’s a command center. In the wrong ones, a noise beacon.”

What is a C2?

C2 stands for Command and Control.

It’s the silent channel between an intruder and the compromised machine.
It’s how payloads receive instructions.
How stolen data gets exfiltrated.
How breaches stay active, coordinated, and lethal.

A C2 is not just a tool.
It’s a networked weapon.

Continue reading “Command and Control: The Whisper Net of Cyber Intruders”

DeadSwitch Toolset – Structured Shadows in Emacs

There’s no room for clutter in the command line of a ghost.

DeadSwitch doesn’t “manage time” – he enforces silence. Tasks, missions, and rituals are stored in plain text. The command center is Emacs. The engine is Org mode. The interface is custom Agenda views – all hardwired to reflect control, not chaos.

This is not productivity. It’s protocol.


Continue reading “DeadSwitch Toolset – Structured Shadows in Emacs”

DeadSwitch Hacking Mindset – The Art of Privilege

Escalation Paths Hackers Love
By DeadSwitch | The Cyber Ghost

“You thought you held the crown. I was already wearing it.”


Root is not hacked. It’s inherited.

Escalation is not noise. It’s craft.
From guest to ghost. From user to god.
A true intruder doesn’t ask for privilege. They reveal the system’s own betrayal.

This is not brute force.
This is alchemy in terminals.
This is where the hacker becomes the admin.


Continue reading “DeadSwitch Hacking Mindset – The Art of Privilege”

The Ciphered Mind – Encrypted Journaling with Org-mode

By DeadSwitch | The Cyber Ghost

“Your thoughts should never be anyone’s business. Encrypt the silence.”

In a world obsessed with sharing, I write to forget – not to be remembered by others. My journal isn’t a scrapbook for dopamine or a backup for someone else’s algorithm. It’s a log of operations, and operations require secrecy.

So I encrypt mine. With Emacs. In plain text.

This is how DeadSwitch keeps a daily log that even the digital gods can’t peek into.


Why Encrypt a Journal?

Because the mind is sacred.
Because ideas are weapons.
Because tomorrow’s threat often begins with yesterday’s leak.

Encrypted journaling isn’t about fear. It’s about respect – for your thoughts, your process, your silence.


The Setup – Emacs, Org-mode, and GPG

Here’s the toolbox:

  • Editor: Emacs
  • Format: Org-mode
  • Encryption: GnuPG
  • Extension: org-crypt
  • Storage: Offline, local, under your terms

Emacs Configuration

Drop this into your config:

(require 'org-crypt)
(setq org-tags-exclude-from-inheritance '("crypt"))
(setq org-crypt-key nil) ;; uses your default GPG key
(org-crypt-use-before-save-magic)

This tells Emacs to automatically encrypt any headline tagged with :crypt: before saving.
Decryption happens only when you open the file – and stays in RAM.

A Sample Entry

* May 2025 :crypt:

** [2025-05-04 Sun]
- 5k run - 22:18 [2025-05-04 Sun 09:06]
- Cold shower - difficulty: easy [2025-05-04 Sun 09:28]
- New idea: Emacs Lisp for internal ops [2025-05-04 Sun 14:24]

Your operations, encrypted. Your timestamps, precise. Your log, protected.


Timestamps and Logging Shortcuts

  • C-c . – insert date
  • C-u C-c . – insert date and time
  • C-c ! – inactive timestamp
  • C-u C-c ! – inactive date and time

You want traceability without noise. Emacs delivers.


Why Not Notion, Joplin, Obsidian, or Others?

Because I don’t trust clouds.
Because their encryption isn’t mine.
Because their sync means exposure.
Because when I type, I want code – not JavaScript trying to sell me my own thoughts.


Final Note

“Encryption is not paranoia. It is self-respect.”

  • DeadSwitch

Your mind is a fortress. Don’t leave the gate open.