The Articles are being published gradually. Stay tuned!


BIOCTL/softraid0 Encryption on OpenBSD

How to encrypt an external device with BIOCTL on OpenBSD

Learn More
LibreSSL Cryptographic Suite & a FIPS-Validated Yubikey

Using LibreSSL and PKCS#11 via a PIV-II-Capable FIPS-Yubikey

Learn More
LUKS & Plausible-Deniability

Can plausible-deniability be achived through LUKS? Let's find out

Learn More
Network Isolation and Multihop Internet Connections

Nesting TCP connections through a VPN and TOR via effective Isolated Network/PCI Passthrough Proxy VMs on Qubes OS

Learn More
Type-1 Hypervisors vs Monolithic Kernels

Slim-lean-safe bare-metal type-1 hypervisors vs obese-bloated-monolithic kernels

Learn More
Cryptography Applied to Dignitary Protection Missions

Nested Crypto-Systems vs The Intrusion Triangle

Learn More

General Tips from Det. Max Martin (Not Legal Advice!)

  • #1 Always consult with a specialized attorney.
  • #2 Do not send txt messages via your regular app.
  • #3 Learn about situational awareness.
  • #4 Use Full Disk Encryption (FDE)
  • #5 Stop Using Social Media (It's used to conduct surveillance on you)



  • #6 Avoid using proprietary operating systems that spy on you: Windows, MacOS, Google Applications, etc.
  • #7 Use free and open-source operating systems: OpenBSD, Qubes-OS, Void, Tails and/or Whonix.
  • #8 Have your car inspected/debugged by a mechanic and investigator.
  • #9 Use RFID-blocker wallets and cases.
  • #10 Ditch all your iOS and/or Android devices. They spy on you. Alternatives are: Ubuntu touch, PinePhone, Librem5.



  • #11 Always invoke your right to remain silent.
  • #12 When in doubt consult with professionals and experts. (No Thinkology!)
  • #13 If you are a defendant, generate a personal chronological narrative.
  • #14 Sign up for a hands-on Digital Security Training (Unix/Linux-based Systems)
  • #15 Use Off-line Second-factor authentication (2FA)