Private Matrix: Hosting a Synapse Server Over Tor (Modern Chat On The Dark Net)

Tired of corporate servers watching every chat?
Host your own Matrix on Tor, no public IP, zero tracking.
By running Matrix over Tor, you eliminate exposure to public servers and keep your chats private.

This isn’t just another guide – it’s a battle‑tested recipe for keeping your Matrix chats private on Tor.

Continue reading “Private Matrix: Hosting a Synapse Server Over Tor (Modern Chat On The Dark Net)”

Breadcrumbs In The Wire – Why OPSEC Is Important

OPSEC Is Not For The Military

Operational Security (OPSEC) isn’t a military secret – it’s a survival tool.
People think it’s for soldiers, spies, or hackers.
But it’s for civilians. For you.
Every day, you leave trails: where you go, who you talk to, what you buy.
Someone is watching. Someone is connecting the dots.
OPSEC is the discipline of controlling your own story before someone else writes it for you.

Continue reading “Breadcrumbs In The Wire – Why OPSEC Is Important”

The Ciphered Mind – Encrypted Journaling with Org-mode

By DeadSwitch | The Cyber Ghost

“Your thoughts should never be anyone’s business. Encrypt the silence.”

In a world obsessed with sharing, I write to forget – not to be remembered by others. My journal isn’t a scrapbook for dopamine or a backup for someone else’s algorithm. It’s a log of operations, and operations require secrecy.

So I encrypt mine. With Emacs. In plain text.

This is how DeadSwitch keeps a daily log that even the digital gods can’t peek into.


Why Encrypt a Journal?

Because the mind is sacred.
Because ideas are weapons.
Because tomorrow’s threat often begins with yesterday’s leak.

Encrypted journaling isn’t about fear. It’s about respect – for your thoughts, your process, your silence.


The Setup – Emacs, Org-mode, and GPG

Here’s the toolbox:

  • Editor: Emacs
  • Format: Org-mode
  • Encryption: GnuPG
  • Extension: org-crypt
  • Storage: Offline, local, under your terms

Emacs Configuration

Drop this into your config:

(require 'org-crypt)
(setq org-tags-exclude-from-inheritance '("crypt"))
(setq org-crypt-key nil) ;; uses your default GPG key
(org-crypt-use-before-save-magic)

This tells Emacs to automatically encrypt any headline tagged with :crypt: before saving.
Decryption happens only when you open the file – and stays in RAM.

A Sample Entry

* May 2025 :crypt:

** [2025-05-04 Sun]
- 5k run - 22:18 [2025-05-04 Sun 09:06]
- Cold shower - difficulty: easy [2025-05-04 Sun 09:28]
- New idea: Emacs Lisp for internal ops [2025-05-04 Sun 14:24]

Your operations, encrypted. Your timestamps, precise. Your log, protected.


Timestamps and Logging Shortcuts

  • C-c . – insert date
  • C-u C-c . – insert date and time
  • C-c ! – inactive timestamp
  • C-u C-c ! – inactive date and time

You want traceability without noise. Emacs delivers.


Why Not Notion, Joplin, Obsidian, or Others?

Because I don’t trust clouds.
Because their encryption isn’t mine.
Because their sync means exposure.
Because when I type, I want code – not JavaScript trying to sell me my own thoughts.


Final Note

“Encryption is not paranoia. It is self-respect.”

  • DeadSwitch

Your mind is a fortress. Don’t leave the gate open.

OpSec Mastery: Tools for the Silent Revolution

DeadSwitch | The Cyber Ghost
“In silence, we rise. In the switch, we fade.”

The art of Operational Security (OpSec) isn’t about hiding – it’s about disappearing. The less you leave behind, the harder it is to find you. It’s a craft, not just a choice. Here are tools that will sharpen your OpSec game, make your operations untraceable, and keep you out of sight.

Continue reading “OpSec Mastery: Tools for the Silent Revolution”

The Android Phone: Three OPSEC Levels to Disappear Into the Shadows


In a world where our every move is tracked and our data is a commodity, the device in your pocket—your Android phone—becomes both a tool and a potential liability. Whether you’re a casual user or a privacy-conscious individual, understanding the levels of operational security (OPSEC) you can apply to your phone is critical. In this guide, we’ll explore three OPSEC levels—from the basic user to the ghost in the machine—and how to progressively take control of your digital life. DeadSwitch doesn’t just adapt to the system; it redefines the rules.

Continue reading “The Android Phone: Three OPSEC Levels to Disappear Into the Shadows”

⛈️ Ditching the Cloud: Running Syncthing Like a Ghost

By DeadSwitch


You love your cloud storage. Convenient. Always synced. Always backed up.

Always watched.

Google Drive, Dropbox, OneDrive—they aren’t your storage. They are surveillance-as-a-service. A dead man owns nothing. A dead switch leaks nothing. You want true control? Kill the cloud. Run your own.

Enter Syncthing—silent, encrypted, peer-to-peer. A shadow network, whispering between your devices without centralized choke points. No servers. No accounts. No corporate eyes scanning your files.

But most of you will still hesitate—because convenience is an addiction.

Continue reading “⛈️ Ditching the Cloud: Running Syncthing Like a Ghost”