Take Back Your Digital Privacy

Stop trusting Big Tech with your data. Start protecting it yourself.
In 12 weeks, you’ll go from privacy-curious to crypto-capable—mastering the same tools cypherpunks use to resist surveillance, protect communications, and maintain digital sovereignty.
Zero fluff. All terminal. Completely free.
You Don’t Need a Computer Science Degree
You just need:
- A Linux terminal (or WSL on Windows)
- Basic command-line comfort
- 4-6 hours per week
- A desire to own your digital life
Everything else? We’ll teach you.
What You’ll Actually Build
This isn’t theory. Every week, you’ll master practical tools:
Weeks 1-3: Foundations
- Build your personal threat model
- Master GPG encryption and digital signatures
- Understand crypto primitives (not crypto-currency—cryptography)
Weeks 4-5: Secure Everything
- Encrypt your communications (email, messaging, metadata)
- Build encrypted filesystems and backups
- Actually use PGP in real life
Weeks 6-8: Network Like a Ghost
- Route traffic through Tor properly
- Set up SSH tunnels and jump boxes
- Compartmentalize your digital identities
Weeks 9-10: Automate Your Security
- Script encrypted workflows
- Build real-world privacy projects
- Combine everything you’ve learned
Weeks 11-12: Advanced Topics
- Distributed systems and decentralization
- Cryptographic protocols in practice
How This Works (Iterative Release)
Week 1 is available now. You can start today.
New weeks release as they’re completed—battle-tested through personal walkthroughs, refined with real screenshots, polished for clarity.
Why? Because delivering value now beats perfecting everything later. You start learning immediately. We improve iteratively based on real feedback.
Who This Is For
✅ You’re perfect for this if you:
- Want to actually use encryption, not just read about it
- Are tired of privacy theater and want real skills
- Prefer terminal > GUI
- Believe privacy is a right, not a privilege
- Want to build things, not just study them
❌ This probably isn’t for you if:
- You want a passive video course (this is hands-on labs)
- You’re looking for cryptocurrency trading advice (wrong crypto)
- You need hand-holding on basic Linux concepts
- You expect enterprise certifications (this is practical skills)
The Cypherpunk Philosophy
“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy… Privacy is the power to selectively reveal oneself to the world.” — Eric Hughes, A Cypherpunk’s Manifesto (1993)
Cypherpunks write code. We believe:
- Privacy is a human right, not a product to buy
- Cryptography liberates, surveillance oppresses
- Open source enables trust, closed source demands it
- Math protects better than laws ever will
This course teaches you to be a cypherpunk—not just read about them.
Start Now (It’s Free)
Week 1 is live. Week 2 is coming soon. All 12 weeks will be free forever.
No signup required. No email list. No paywall. Just start.
→ Begin Week 1: Cypherpunk Ideals & Threat Modeling
Questions?
“Is this really free?” Yes. Core courses (Cypherpunk 101, Privacy 101) are always free. We may offer advanced courses or guided cohorts later, but foundational skills stay free.
“Do I need to know programming?”
Basic terminal comfort helps, but we’re not writing code. We’re using powerful tools via command line. If you can cd, ls, and grep, you’re ready.
“How long until I can actually use this stuff?” Week 1 gives you a threat model framework you’ll use immediately. Week 3 teaches GPG—you’ll encrypt your first message that day. Every week has practical output.
“What if I get stuck?” Report issues here or email us. As the community grows, we’ll add discussion forums.
Additional Courses:
- Privacy 101 — Week 1 live now! (beginner-friendly, GUI-first privacy fundamentals)
- Advanced Cypherpunk — Coming later (post-quantum crypto, zero-knowledge proofs, advanced protocols)