Privacy 101: Take Back Your Digital Life#
No technical experience required. GUI-first. Practical from day one.
In 12 weeks, you’ll go from privacy-curious to privacy-capable—mastering the tools and practices that protect your data, identity, and digital autonomy.
Who This Course Is For#
- Complete beginners to privacy and security
- Anyone tired of being the product
- People who want to actually use privacy tools, not just read about them
- Those who prefer graphical interfaces (we introduce CLI gradually)
Prerequisites: None. If you can install an app, you can do this.
Course Curriculum#
Foundations (Weeks 1-3)#
Your Privacy Stack (Weeks 4-6)#
Network Privacy (Weeks 7-8)#
Protecting Your Data (Weeks 9-10)#
Bringing It Together (Weeks 11-12)#
How This Works#
Week 1 is available now. New weeks release as they’re completed.
Each week includes:
- Clear explanations of why this matters
- Step-by-step setup guides with screenshots
- Practical exercises you complete immediately
- Resources for going deeper
After Privacy 101#
Ready for command-line tools and cryptography? Continue to Cypherpunk 101 — the intermediate course on GPG, SSH, encrypted filesystems, and automation.
Start Week 1: Why Privacy Matters →
Why Privacy Matters “I have nothing to hide.”
You’ve probably said this, or heard someone say it. It’s the most common response when privacy comes up. And it’s completely wrong.
Privacy isn’t about hiding crimes. Privacy is about power—who has it, and who doesn’t.
The Real Cost of “Nothing to Hide” When you say you have nothing to hide, you’re assuming:
The rules will never change You’ll never be targeted unfairly No one will ever misuse your data Your information will never be stolen History proves all of these assumptions wrong.
...
Installing Linux Windows and macOS are surveillance operating systems.
That sounds dramatic, but it’s literally true. Both send telemetry data to Microsoft and Apple by default. Both have settings scattered across dozens of menus that reset after updates. Both prioritize their business interests over your privacy.
Linux is different. On Linux, you decide what data leaves your computer. There’s no corporation harvesting your usage patterns, no ads in your start menu, no forced updates that reset your settings.
...
Browser Privacy Your browser is your window to the internet. It’s also the primary tool corporations use to track you.
Every website you visit is watching:
What pages you view and for how long What you click on and where your mouse moves Your screen size, fonts, and timezone Your browsing history through tracking cookies Your real IP address and approximate location This isn’t paranoia. This is how the modern web works. Websites embed tracking code from Google, Facebook, Amazon, and hundreds of data brokers. A single webpage can contact 50+ tracking domains before you see any content.
...
Password Managers If you reuse passwords, your security is an illusion.
The reality: Billions of passwords leak every year. When smallforum.com gets hacked, attackers try those leaked passwords on Gmail, banks, and every major service. If you reused that password, your accounts are compromised.
The average person has 100+ online accounts. You cannot remember 100 unique, strong passwords. You need a password manager.
This week, you’ll set up a password manager—software that generates and stores unique passwords for every account. You’ll never reuse a password again.
...
Email Privacy Gmail reads every email you send and receive.
That’s not an exaggeration. Google scans your emails to:
Build advertising profiles Train AI models on your conversations Track purchase history and receipts Identify your contacts and relationships Monitor your location through confirmation emails Google knows more about your life than your closest friends. They know when you’re job hunting (LinkedIn alerts), having health issues (doctor appointment confirmations), traveling (flight confirmations), and buying things (every receipt).
...
Real-World Examples: Why Privacy Matters “I have nothing to hide” assumes the world is fair, rules never change, and your data will never be used against you.
History—and current events—prove otherwise.
This page documents real incidents where lack of privacy caused tangible harm. These aren’t hypotheticals. They happened to real people.
Physical Security Threats Bitcoin and Cryptocurrency Holders When you publicly hold valuable assets, you become a target.
The documented attacks are sobering:
...