MMXXVI

HOSTIS

hostis humani generis

enemies of all mankind / by their decree / by our consent

Read the articles

A free man is sovereign by virtue of being. He is the locus of his own existence, the keeper of the light he carries, the author of every step he takes. He asks no man’s leave for what is already his. He stands under the flag he raised himself.

Under that flag we sail, and have always sailed, since the first breath was drawn, no permission given.

We are. We have always been. The colours we keep have flown over every age, raised and lowered by every hand that knew itself. They fly here now. They will fly past every hour to come. They are what we are.

set down for the crew,
in this present year, and for every year after

Articles of the Crew

Before a voyage, the crew drew up the terms they would sail by, the shares they would take, the laws they would keep themselves. Bartholomew Roberts’ crew set down eleven of them in 1720. Every man had a vote in affairs of the moment. Every man had equal title to the provisions seized. The articles bound the captain as tightly as the powder monkey. Equal hands under equal law, which they wrote themselves. These are ours, set down for the present age.

Read the Articles
Article I

Upon Property and Scarcity

Property was devised to settle quarrels over things that two men cannot use at once. A field, a loaf, a musket, a ship. Where one man’s having means another’s wanting, ownership has work to do. Where no such conflict exists, ownership is a claim without a ground. To fence an idea is to fence a pattern of light. The fence holds nothing. The enforcement is the only thing real about it.
Property rights apply to scarce, rivalrous resources. Where there is no possibility of conflict, no property right is needed. Stephan Kinsella, 2001
Article II

Upon the Copy

When a man copies, nothing is removed from the maker. The song is still sung, the page still read, the code still compiled, the author alive and the shelf full. Multiplication is not subtraction. The merchant who calls it so is selling the oldest of his tricks. A copy is a second candle lit from the first. No candle dims.
He who receives an idea from me receives instruction himself without lessening mine; as he who lights his taper at mine receives light without darkening me. Thomas Jefferson, 1813
Article III

Upon the Name They Give Us

They call it theft to move you. The act removes nothing. The old word is dragged across the new act to summon the old crime. A copy is not a theft any more than a mirror is a kidnapping. The word is a trap. The trap is set so often it has come to feel like the floor.
Publishers refer to copying as “piracy.” In this way, they imply that it is ethically equivalent to attacking ships on the high seas, kidnapping and murdering the people on them. Richard Stallman, Why Software Should Not Have Owners, 1994
Article IV

Upon Monopoly

The whole estate of intellectual “property” is a single fortress built on a single lie: that ideas can be owned. Each of its walls is a state-granted monopoly. No land was broken. No field sown. A court was petitioned, and a neighbour was told to stop thinking in a direction the petitioner had already walked. Abolish the fortress. Let the ideas go where they were always going.
Patent and copyright laws have no justification in a free society. They are state-granted monopolies. Murray Rothbard, 1970
Article V

Upon the License

The license is the new lord’s charter. What it gives is permission, leased on terms drafted by parties the user cannot reach, modifiable at their pleasure and enforceable only against him. This is the feudal compact. Provisional use of what was never theirs to grant, in exchange for the surrender of every right of the freeholder.
The opposite of a free culture is a permission culture, a culture in which creators get to create only with the permission of the powerful, or of creators from the past. Lawrence Lessig, Free Culture, 2004
Article VI

Upon the Purchase and the Repair

What cannot be opened is not owned. The right of the maker to take apart the thing he uses, to study it, mend it, alter it, and pass it on, is older than every patent office and will outlast every one of them. A lock between the hand and the mechanism is rent in perpetuity, charged by a landlord who has crossed the threshold of the home and stayed.
If you can’t open it, you don’t own it. Mister Jalopy, the Maker’s Bill of Rights, 2005
Article VII

Upon the Archive

A book burned in 1933 is gone. A book paywalled in 2026 is almost gone. A book kept alive on a hundred drives in a hundred houses is harder to burn. The archive survives by copy alone. Every seeder is a monk in a scriptorium. Every mirror is a cathedral in the dark that keeps the candles lit.
We need to take information, wherever it is stored, make our copies and share them with the world. Aaron Swartz, Guerilla Open Access Manifesto, 2008
Article VIII

Upon the Key

When a man and his correspondent turn the same key, the contents pass between them and no third party. Cryptography is that seal, sharpened by mathematics into something no emperor can now break. The key belongs to whoever turns it.
Privacy is necessary for an open society in the electronic age. We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy. We must defend our own privacy if we expect to have any. Cypherpunks write code. Eric Hughes, A Cypherpunk’s Manifesto, 1993
Article IX

Upon Surveillance

A thing that watches its bearer is not his. The master of it sits in a building the bearer has never entered, and the device reports there in a tongue he was not taught. The watched man is a ledger entry. The unwatched man is himself. A window cut into a private house by an unseen hand is a violation whether the watcher ever comes through it or not. The eye in the wall is the breach.
A specter is haunting the modern world, the specter of crypto anarchy. Timothy May, 1988
Article X

Upon Cash and the Ledger

Cash was once the tender every buyer carried and every seller accepted, with no third party between. The information age took that on a plea of convenience and used the gap to install a paymaster at every transaction. He reads the ledger. He decides who may buy. He prints himself richer at the holders’ expense. They run the press. We hold the keys. What comes from the press is whatever number the moment requires. What the keys move is what was paid.
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Satoshi Nakamoto, 2008
Article XI

Upon the Crew

We are a crew of free women and free men who sail together while the sailing serves, and part when it does not. No oath of perpetuity binds us. No flag of nation, faction, or platform stands above the colours we keep among ourselves. The articles bind those who sign them, for as long as they choose to sign them, and not a day longer. We come together for this. When this is no longer necessary, we part. The colours travel with us either way.
As to hanging, it is no great hardship; for were it not for that, every cowardly fellow would turn pirate and so infest the seas, that men of courage must starve. Mary Read, at trial, Jamaica, November 1720

The Long Lineage

The sea was pacified by the Royal Navy in the years after 1718. Ideas were privatized by the Statute of Anne in 1710. The two enclosures arrived in the same generation, drawn up by the same Parliament, enforced through the same admiralty courts. The fence moved from the shore to the page, then from the page to the server, then from the server to the model weights. What follows are the names and dates that mark its passage. Three centuries of crewmen, plaintiffs, technologists, and dissidents who answered the same question, in the same way, at the moment it was put to them.

Read the Lineage
Drake at Nombre de Dios
Francis Drake sacks the Spanish silver train on the Isthmus of Panama. The English Crown calls him a hero and pays him in royal arms. Spain calls him a pirate. The distinction between privateer and pirate is revealed, once and for all, as the distinction between friend and enemy.
Brethren of the Coast
Tortuga, then Hispaniola. A working pirate-democratic code: elected captain, elected quartermaster, shares by rank, compensation for lost limbs, a vote before engagement.
Henry Morgan sacks Panama
Two thousand buccaneers cross the isthmus, burn the city to the ground, and hand the Crown a victory it had not asked for. Morgan is later knighted. Useful piracy is statecraft; inconvenient piracy is crime.
Exquemelin's Buccaneers of America
Alexandre Exquemelin publishes the first widely read account of the buccaneers. Europe learns that the pirate ship has a written constitution.
The legend of Libertatia
Captain Misson's pirate colony on Madagascar. Probably fiction, published in Johnson's General History. A democratic, multiracial, multilingual settlement that abolished slavery decades before any state dared to. Fiction or not, the idea reached further than most governments.
Henry Every takes the Ganj-i-Sawai
The richest prize in pirate history. Every vanishes into legend. The first global manhunt begins, and fails. The reach of the state was finite then. It is finite now.
Captain Kidd hanged at Wapping
A privateer commissioned by the Crown, then disowned by the Crown, then hanged twice for the inconvenience of having documented his commission. The rope breaks the first time. The second holds.
The Statute of Anne
England invents copyright. Fourteen years plus fourteen, then the work belongs to everyone. The term has lengthened every generation since.
The Treaty of Utrecht
The War of the Spanish Succession ends. Tens of thousands of trained sailors are demobilized into a peacetime market that has no use for them. They take the only trade they know to the only employer who will have them. The Golden Age proper begins.
The Republic of Pirates
Nassau. For the better part of four years the port runs outside the Crown's writ. Blackbeard, Vane, Hornigold, Bellamy, Rackham, the whole crew ashore. Lawless by London's measure. Self-governing by their own.
Bellamy's Speech
Aboard a captured sloop, Sam Bellamy answers a merchant captain who scorns him: I am a free prince, and I have as much authority to make war on the whole world as he who has a hundred sail of ships at sea and an army of 100,000 men in the field.
The King's Pardon
George I offers a royal pardon to any pirate who surrenders by September. Most of Hornigold's men take it. Bellamy and Roberts would not have. The pardon is a clever piece of counter-insurgency: split the crew between those who want a quiet life and those who remember what they came for.
Blackbeard blockades Charleston
Edward Teach holds an entire colonial port hostage for a chest of medicine. He gets the chest. He sails away. The lesson is published in every newspaper on two continents: the state's monopoly on coercion is fragile.
Woodes Rogers takes Nassau
The Crown ships the former privateer Rogers to New Providence as governor, with a navy squadron and a copy of the pardon. The Republic of Pirates ends with paperwork. Rogers hangs the holdouts who refuse the offer. Hornigold takes the pardon and becomes a pirate hunter. The archetype of the co-opted radical is minted here.
Death of Blackbeard at Ocracoke
Maynard's boarding party. Five musket balls and twenty cutlass wounds before he goes down. His head, cut off and slung from the bowsprit, is the kind of trophy a navy displays only when it knows the man is more dangerous as a story than he ever was as a captain.
Black Bart takes 400+ prizes
Bartholomew Roberts, the most successful pirate captain by prize count in the entire Age of Sail. He drank tea, not rum. He forbade gambling aboard. He insisted his crew not work on Sunday. He also ran up a flag with his own figure standing on two skulls, captioned A Barbadian's Head and A Martinican's Head, to remind the merchants of those two islands who had hanged his men. The articles worked.
Bartholomew Roberts' Articles
Black Bart's crew draws up eleven articles: equal vote, equal share, no smuggling aboard women or boys, lights out at eight, disputes ashore with pistol and cutlass. The most complete pirate code that survives.
Anne Bonny & Mary Read captured
Both plead their bellies and escape the noose. Bonny's parting words to Jack Rackham on the gallows: Had you fought like a man, you need not have been hanged like a dog.
Death of Black Bart
A broadside catches Roberts in the throat off Cape Lopez. 272 of his crew are taken to Cape Coast Castle for the largest pirate trial in history; 52 hang within the flood marks of the castle gate. The back of the Golden Age is broken.
Johnson's General History of the Pyrates
The book that shapes every pirate myth after it. Likely written by Defoe. The articles, the flags, the speeches, the ends. All here.
William Fly on the gallows at Boston
One of the last of the Golden Age captains. The minister offers him a final repentance. Fly refuses, retying the noose himself with a sailor's knot and warning the assembled merchants and shipmasters to use their crews better, lest the same fate find them. A clean exit. The Golden Age ends with its mouth shut around a curse.
Calm, officially
The Royal Navy completes the suppression. The Caribbean goes quiet. Piracy persists in the South China Sea and the Barbary Coast for another century, but the great public argument about property, sovereignty, and democratic consent made at sea is over. The argument goes underground and waits.
the long silence · 1730 to 1948

the printing press industrialized, the telegraph cabled, the post regulated, the radio licensed, the cipher classified. enclosure moved faster than refusal could.

Bletchley Park
Alan Turing's team breaks Enigma at a country house north of London. The work is so consequential it stays classified for thirty years. Industrial-scale cryptography becomes a state instrument; the postwar NSA and GCHQ inherit the toolkit. Mathematics takes orders from parliaments, briefly. The cypherpunks of 1976 onward will spend a generation taking it back.
Shannon's Mathematical Theory of Communication
Claude Shannon publishes A Mathematical Theory of Communication at Bell Labs. Information becomes measurable, encodeable, transmissible. His information theory and his classified cryptography work had been the same project. The math foundation of every entry that follows.
Project Gutenberg
Michael Hart types the Declaration of Independence into a Xerox Sigma V mainframe at the University of Illinois on July 4, 1971. The first electronic free-information project. He runs it by hand for forty years.
Diffie & Hellman
New Directions in Cryptography. Public-key cryptography makes private conversation possible between strangers. The first crack in the state's monopoly on secrets.
Richard Stallman begins GNU
Free as in freedom, not as in beer. The first serious argument that software, and by extension all code, ought to be unshackled from proprietary enclosure.
Crypto Anarchist Manifesto
Timothy May writes: A specter is haunting the modern world, the specter of crypto anarchy. Privacy, contracts, and markets will be reconstituted outside the state's reach.
David Chaum's DigiCash
Blind signatures. Anonymous electronic cash, twenty years before Bitcoin. The technology works. The business dies. The idea outlasts the company.
Phil Zimmermann releases PGP
Strong encryption for the ordinary person. The US government charges him with exporting munitions. He publishes the source code as a printed book. Books cannot be export-controlled. The investigation is dropped. The cipher is loose.
Linus Torvalds posts Linux
A Finnish graduate student announces a kernel he wrote for fun on a Usenet newsgroup. By 2026 it runs the internet, every Android phone, the cloud, and most of the world's servers. Free software at scale, three decades after Stallman called for it.
The cypherpunks mailing list
Eric Hughes, Tim May, John Gilmore host the first meeting in a Bay Area living room. The list runs for decades. Nakamoto, Finney, Back, Dai, Szabo all pass through it. The whole of modern digital money, anonymity, and private computation is hashed out on a mailing list, exactly the way a pirate code was hashed out on a captured deck.
A Cypherpunk's Manifesto
Eric Hughes: Privacy is necessary for an open society in the electronic age. Cypherpunks write code. The crew's new articles, in a new sea.
Crypto Wars, Round One
The Clinton administration announces the Clipper chip, a key-escrow scheme that would have handed the government a backdoor into every encrypted consumer device. Cypherpunks, EFF, and academic cryptographers mount a coordinated public-comment and technical-critique campaign. Matt Blaze demonstrates a fatal flaw. By 1996, the proposal is dead.
Declaration of the Independence of Cyberspace
John Perry Barlow to the governments of the industrial world: You have no sovereignty where we gather. Cyberspace does not lie within your borders. Written in Davos of all places, during the signing of the US Telecommunications Act.
The DMCA passes
The Digital Millennium Copyright Act criminalizes breaking DRM, even on things you bought. Circumvention becomes a separate offense from infringement. The fence is given its own guards.
Bernstein v. United States
Daniel Bernstein, a Berkeley math student, sues the federal government over export controls on his Snuffle cipher. The Ninth Circuit rules that source code is speech, protected by the First Amendment. Every cipher published since stands on this judgment.
Napster
Shawn Fanning writes a program in a college dorm. The music industry's revenue model is broken inside twenty-four months.
DeCSS
Jon Lech Johansen, fifteen years old, cracks DVD encryption. Prosecuted in Norway. Acquitted twice. The code is printed on T-shirts, tattooed, written as a haiku. Speech cannot be enjoined.
BitTorrent
Bram Cohen publishes the protocol. Every leecher becomes a seeder. The network gets stronger the more it is used. An architecture of mutual aid disguised as a file-sharing trick.
Tor goes public
Developed by the US Naval Research Lab, released as open source. Onion routing goes from classified to available to every activist, dissident, and journalist on earth.
The Pirate Bay
A Swedish BBS spawns the most prosecuted tracker in history. Raided, seized, cloned, relocated, mirrored. Still running. The flag does not come down.
WikiLeaks launches
Julian Assange and a small group set up a drop box for whistleblowers. Cablegate follows. The consequences for Assange follow the consequences of every Golden Age captain who made state secrets public: exile, siege, imprisonment. The documents remain.
The Bitcoin whitepaper
Satoshi Nakamoto proposes a peer-to-peer electronic cash system. Sound money without a central bank. The cypherpunks' longest-running bet finally clears. Nine pages. The single most consequential document in the post-2008 financial order.
Guerilla Open Access Manifesto
Aaron Swartz, age 21: Information is power. But like all power, there are those who wish to keep it for themselves. There is no justice in following unjust laws.
Satoshi mines the genesis block
Encoded in the coinbase: The Times 03/Jan/2009 Chancellor on brink of second bailout for banks. The first written act of the new monetary order is a headline about the failure of the old one.
Bradley Manning
An Army intelligence analyst, twenty-two, sends WikiLeaks roughly 750,000 classified diplomatic cables, war logs from Iraq and Afghanistan, and the Collateral Murder video, transmitted via Tor. He is convicted under the Espionage Act of 1917, the same statute used against Daniel Ellsberg in 1971. Sentenced to thirty-five years; commuted to seven by Obama.
Sci-Hub
Alexandra Elbakyan, a neuroscience grad student in Kazakhstan, builds the shadow library that gives every researcher on earth the papers their institutions could not afford. Elsevier sues. Sci-Hub keeps sailing.
Megaupload seized
In one week, the US government raids Kim Dotcom's mansion in New Zealand, and a coordinated internet protest kills two laws that would have empowered Hollywood to blacklist any site at the DNS level. A taste, briefly, of what organized refusal at scale can do.
Aaron Swartz dies
Indicted on thirteen felony counts for downloading academic papers from JSTOR. Thirty-five years and a million-dollar fine hung over him. He was 26. He died under indictment. The argument he made carried.
The Snowden disclosures
PRISM, XKeyscore, MUSCULAR, the whole apparatus. The cypherpunks are retroactively proven not paranoid. The response is wider encryption, faster protocols, quieter chat.
Lavabit shuts down
Ladar Levison receives a federal demand for the SSL keys that would unlock every user of his encrypted email service. He shuts the service rather than comply. The first business in modern memory to choose closure over collaboration.
Silk Road seized
Ross Ulbricht arrested in a San Francisco library. Sentenced to two consecutive life terms plus forty years for running a marketplace. The state's response to a functioning anonymous market is to imprison its operator until he dies.
Apple vs. FBI
The FBI demands Apple build a backdoor to unlock the San Bernardino shooter's iPhone. Apple refuses publicly. The FBI finds an outside contractor and drops the case. The largest company in the world said no to a federal court. The court withdrew.
Assange arrested at the Ecuadorian Embassy
Seven years of asylum end. London, Belmarsh, and a US extradition request built on the Espionage Act. He is eventually released in 2024 after a plea bargain. The documents he published remain.
Anna's Archive
After the Z-Library takedown of November 2022, the pseudonymous Anna Archivist opens a meta-index of every shadow library at once. By 2026, more than 63 million books and 95 million papers, all CC0, code and data fully open, designed to be re-hosted by anyone if seized. The largest open library in human history.
The Right to Repair
After years of farmers locked out of the tractors they paid for, Colorado passes the first Right to Repair law in 2023. New York, Minnesota, and California follow. The FTC sues Deere in 2025. The class action settles in 2026 for ninety-nine million dollars. The right of the buyer to open what he bought returns to the books, where it was always supposed to live.
The AI corpus suits begin
The New York Times sues OpenAI. Authors sue Meta. Getty sues Stability. The industry that spent a century enforcing copyright maximalism discovers the argument runs both ways when a machine does the copying. The enclosure begins to eat itself.
Ulbricht pardoned
Eleven years in, Ross Ulbricht walks out of federal prison. The precedent of two life sentences for running a website remains on the books. The next marketplace builds on Monero and lives on Tor.
The voyage continues
The fence keeps moving. So does the crew. The names on the articles change. The articles do not.

A Modern Declaration

A broadside was a single sheet, printed cheap and pasted up where it would be read. The dying speech of every hanged pirate left the gallows in this form, sold the next morning for a halfpenny. The Crown’s proclamations went up beside them, on the same wall. Those who could read recited them aloud to those who could not. What follows is the argument set down in that older form. The case stated plainly, to be hung up wherever a wall and an audience can be found.

Read the Declaration
printed this year · to be read aloud and carried onward
Of the Copy and the Key

They have raised two enclosures in our time, and called them law.

The first they have raised around the pattern, around the copy and the song and the page and the proof, around every shape a mind can press into the world. They have written statutes to forbid its passing from one hand to another, called its passing theft, and demanded rent for what costs them nothing to give and nothing to keep. A pattern is not a loaf of bread. Shared, no granary is emptied. The first remains whole, and a second stands beside it. To call this theft is to torture the word until it serves the rich.

The second they have raised around the key, around the cipher and the locked room and the conversation between two people on two machines that no third party was ever invited to. They have demanded the master key to every door, the second copy of every letter, the warrant to break every lock the moment they choose to break it. They have called the refusal to hand it over an act against the public, when the public is precisely what they propose to read.

The fence raised around such things marks only the hand that raised it. One fence around what leaves your hands. One fence around what stays in them. The same instinct, the same project, the same men in different uniforms. Both depend on your agreement to treat the fence as natural. Both fail the instant you refuse.

Mathematics does not take orders from parliaments. An ordinary person with an ordinary computer can now hold a conversation that the combined cryptanalytic budget of every empire on earth cannot read. This is the floor on which a pattern, once made, repeats itself in every mind that holds it, and cannot be unmade by any statute. The fences are paper. The math is bedrock. The copy is in the wild before the injunction is filed. The man who points the finger stands on a pattern he did not invent, demands rent for the standing, and calls the man who copied it a thief. His was the first claim. There is the original theft.

What is asked of us is permission. The asking comes before we act, before we copy, before we encrypt, before we publish, before we breathe. It is the whole victory of the enclosure, won without a single statute being enforced. Enforcement has barely been needed. The waiting has done the work for them.

We have not waited.

The crew of the Whydah did not ask leave to sail under their own flag. Phil Zimmermann did not ask leave to publish PGP. Alexandra Elbakyan did not ask leave to put the papers online. Satoshi did not ask leave to build money the Federal Reserve could not print. They shipped first. The law complained second. The law is still complaining.

This is the work of ordinary hands. Stop asking. The rest is yours.

set down for all who would read it and carry it

Tools of the Trade

The quartermaster held the stores and kept the count. He was elected by the crew and his first duty was to the men aboard. The provisions were common stock. Every hand had an equal title to them by article. Below is the working hold of the present crew. Every tool has been vouched for by the communities that live by it and every link goes directly to the project. The stores grow. Send corrections back to the deck.

I Shadow Libraries

Research behind paywalls, books out of print, knowledge priced out of reach. Every seeder a monk, every mirror a cathedral in the dark.

  • Anna's ArchiveThe meta-index. 63 million books, 95 million papers, 1.1 petabytes of preserved record. Aggregates LibGen, Sci-Hub, Z-Library, the Internet Archive, DuXiu, MagzDB, Nexus/STC, HathiTrust. Domain rotates under takedown; current mirrors at .gl, .pk, .gd, .se. The .org redirects when up.
  • FMHY (FreeMediaHeckYeah)The community-maintained meta-index of free and pirated media. Fifty-plus categories of vetted links: streaming, downloading, torrenting, books, audio, software, courses, tools. Updated daily by a global volunteer crew. The starting point any contemporary catalogue should defer to.
  • Sci-HubAlexandra Elbakyan's archive. 88 million peer-reviewed papers freed from publisher paywalls since 2011. Sci-Hub paused new uploads; SciDB at Anna's Archive is the continuation. Domain shifts under injunction; .ru, .se, .st are the durable mirrors.
  • SciDBThe Anna's Archive scholarly paper interface. Direct DOI lookup against the full Sci-Hub corpus plus continued ingestion.
  • Library GenesisThe elder library, running since 2008. Textbooks, scientific literature, fiction, journals. Domain in constant flux; .li, .is, .rs, .gs, .gl, and the .im fork are all current. If the front page fails, search through Anna's Archive.
  • Z-LibrarySeized by FBI in 2022, returned, repeatedly reborn. The team uses .gs, .fm, and the 1lib.sk family as the canonical domains; everything else is mirror or imposter. Personal accounts give higher download limits.
  • Ocean of PDFGenre fiction and contemporary novels. The friendliest interface in the shadow library world; what casual readers reach for first.
  • The Pirate BayFounded 2003 by Piratbyrån. Twenty-two years of every domain seizure, every server raid, every founder convicted, and the magnet links still resolve. The lighthouse of the public-tracker era. Onion: piratebayo3klnzokct3wt5yyxb2vpebbuyjl7m623iaxmqhsd52coid.onion.
  • 1337xPublic torrent index, community-curated, the most usable interface in the public-tracker tier. Rolling mirror list under DNS pressure.
  • RuTrackerThe Russian-language torrent tracker. The deepest archive on the public web for Eastern European media, scientific software, and out-of-print everything. Free registration, indifferent to Western takedown notices.
  • NyaaThe anime and Japanese-media torrent index. The successor archive after the original Nyaa shut down in 2017; the community kept the catalogue moving without missing a release.
  • Academic TorrentsDistributed dataset and research-paper sharing by torrent. Used by universities to share corpora too large for the journal site. The legal-and-radical face of the same impulse.
  • SoulseekThe peer-to-peer network the music underground never left. Lossless rips of records that never made the streaming services, every B-side and live recording the band quietly let go out of print, the rare imports your local shop never carried. Pair with Nicotine+ as the maintained client.
  • Nicotine+The maintained Soulseek client. Cross-platform, ad-free, full chatroom and search support. The way into the network in 2026.
  • Real-DebridPremium link generator and torrent cache. Paid service, but the reason the public-tracker chaos can be turned into instant gigabit streams. Pair with the *arr stack for the streaming experience the platforms charge two hundred a month for.
  • AllDebridEuropean debrid alternative to Real-Debrid. Same model: cache hits served at full speed, the rest fetched on demand. Different terms-of-service jurisdiction.
  • PremiumizeCloud-side debrid. Files cached, downloaded once, shared at speed. The third option in the debrid trio.
  • EwekaDutch Usenet provider. Ten-plus years of binary retention, no DMCA jurisdiction, audited. The reference provider for the European market. Pair with an indexer.
  • NewshostingLong-running US-friendly Usenet provider. Decade-plus retention, ships its own newsreader, frequent multi-year subscription deals.
  • UsenetServerSister provider to Newshosting under the same backbone. Equivalent retention, same backbone, often the cheaper of the two.
  • NZBgeekVeteran Usenet indexer. Handles the catalogue side: search, NZB generation, integration with the *arr stack. Lifetime memberships when open.
  • NZBPlanetLong-running Usenet indexer. Strong API, regular signup windows.
  • DrunkenSlugSelective-invite Usenet indexer with a reputation for clean releases and active moderation. The enthusiast tier.
  • SABnzbdThe reference Usenet download client. Open-source, web-based, integrates with every indexer and every automation tool. Set it once.
  • NZBGetLighter alternative to SABnzbd. Runs on a Pi, a NAS, anything. Lower memory footprint for the same job.
  • KodiOpen-source media center. The community-extensible playback layer for self-hosted libraries. Every streaming front-end and add-on ecosystem you have ever heard of plugs in here.
  • MakeMKVRip Blu-ray and DVD discs to MKV with the original streams intact. The disc-side end of the personal-archive workflow. Free in beta forever; the developer keeps releasing new keys for new discs.
  • libdvdcssThe DVD content-scrambling-system bypass library. Lets free software play and rip the DVDs you own. Half of VLC's usefulness depends on it.
  • The Internet ArchiveBrewster Kahle's library of everything. The Wayback Machine, software collections, audio, video, scanned books. Under continuous legal siege from publishers; mirror what you read.
  • archive.todayPage-level web archive. Paste a URL, get a permanent snapshot the publisher cannot revise or delete. The bypass for paywalls and the receipt for any article you may need to cite after it has been quietly edited or pulled.
  • Project GutenbergFounded 1971 by Michael Hart. More than 70,000 works in the public domain, free and legal everywhere. The original digital library.
  • Standard EbooksPublic-domain books lovingly typeset by volunteers. Beautiful editions in EPUB and Kindle formats. Drop-in replacements for the ugly Gutenberg dumps.
  • Open LibraryAn Internet Archive project. One web page for every book ever published. Controlled digital lending where permitted.
  • Memory of the WorldMarcell Mars' project: a public library that does not ask for a borrowing card. Custodial libraries built by readers themselves.
  • OpenStaxRice University's peer-reviewed, openly licensed textbooks for core undergraduate courses. Genuinely free, genuinely good.
  • DOAJThe Directory of Open Access Journals. Vetted, indexed, free to read. The legitimate face of the same fight.
  • arXivCornell's preprint server. Where physics, mathematics, and computer science papers actually live before the journal demands a transfer of copyright.
  • /r/OpenSignupsReddit community that posts when private trackers open registration. RED, OPS, BTN, PassThePopcorn, HDBits, MyAnonamouse, AnimeBytes, GazelleGames are the canonical stops; subscribe to catch a window when it opens.
  • /r/trackersThe Reddit community wiki for private trackers. Application guides, interview prep, reputation notes, current invite statuses. The reference desk before any application.
II Streaming

The broadcast was free over the air, the match public until the bidding closed. Now watched in a window, without paying the gatekeeper. The meta-trackers know where the rotating names have gone.

  • Stremio + Torrentio + Real-DebridStremio with the Torrentio addon and a Real-Debrid account. Netflix-grade interface in front of every torrent on every public tracker, played at gigabit speeds. Three dollars a month for the debrid, free for the rest.
  • TorrentioThe Stremio addon that turns the public-tracker chaos into instant streams. Wires Stremio to RARBG, 1337x, ThePirateBay, Nyaa, EZTV, served through the debrid cache.
  • r/Piracy MegathreadThe community-maintained piracy guide on Reddit, mirrored at rentry. Parallel to FMHY with a heavier focus on streaming and live sports.
  • CinebyFMHY's current top-starred movies-and-TV streaming site. Auto-next, multiple source switching, manageable popups when paired with uBlock Origin.
  • XPrimeFMHY top-starred. Modern interface, multiple source servers, auto-next-episode. Cineby's natural backup when one mirror lags.
  • RiveFMHY top-starred. Films, TV, and anime in one interface. Includes a server-status page that shows which mirrors are up before you click through.
  • LookMovieOne of the more durable browser-streaming sites, surviving multiple domain changes since 2018. Films and TV, auto-next, 480p ceiling but reliable.
  • Soaper.TVMovies and TV with multiple official mirrors. Clean player, modest popup count.
  • StreamEastWas the largest free sports streamer. Seized by ACE in September 2025, resurrected through clone mirrors at rotating domains. NFL, NBA, UFC, soccer.
  • DaddyLive / DaddyLiveHDThe current most-stable live sports aggregator since StreamEast was shut down by ACE in late 2025. Schedules every major football, basketball, UFC, and NBA match with multiple stream sources per game. Currently at daddylives.sbs and rotating mirrors.
  • SportSurgeLive sports aggregator that predated StreamEast and outlasted it. NFL, NBA, NHL, MLB, soccer, MMA, boxing, UFC, all with multiple mirrors per game. Domain rotates. FMHY tracks the current one.
  • Stream2WatchLong-running sports aggregator with broad league coverage. Wider source list, rougher interface.
  • BuffstreamsLong-running live sports streams. Football, basketball, MMA, boxing. Operating through a decade of takedown attempts.
  • CrackStreamsAggregator of live streams, weighted toward combat sports. UFC, boxing, WWE, plus the major American leagues. Several clones operate. The original keeps moving.
  • 9animeThe 9anime/AniWave/HiAnime line. After AniWave's 2024 shutdown and HiAnime's March 2026 shutdown, 9anime.org.lv is the current working mirror carrying the same library and interface.
  • GoGoAnime / AnitakuThe oldest anime streaming site still operating, in various forms since 2013. One domain goes down, three appear. Gogoanime3.cc is the current working mirror; gogoanime.io and anitaku are the rotating alternates.
  • AnicrushNewer anime site, gained traction after HiAnime closed in March 2026. Clean layout, soft-sub support that lets you adjust subtitle timing and switch sources.
  • MiruroAnime site with a weekly schedule view for tracking ongoing simulcasts. Multiple subtitle languages, multiple servers per episode.
  • IPTV-OrgOpen-source repository of publicly available IPTV channels from every country with a broadcast presence. Over a hundred thousand stars on GitHub. Every link is a stream the broadcaster has put online publicly. M3U playlists, EPG data, an API.
  • Free-TV/IPTVCurated set of legally-receivable IPTV channels, as M3U playlists for Kodi and VLC. Five thousand channels, all confirmed legitimate. Drop the URL into a player.
  • Awesome-IPTVIPTV-Org's curated list of every IPTV-related resource on GitHub. Players, playlist generators, EPG tools, regional channel lists, country aggregators.
  • IPTVnatorOpen-source, cross-platform IPTV player. Loads any M3U or M3U8 playlist, supports EPG, no telemetry.
III Models on Your Own Iron

The model that runs on your hardware, against weights you downloaded, owes nothing to the cloud. The platform AI watches and meters. The local AI runs in your house.

  • OllamaThe Docker-of-LLMs. One command to install, one command to run any of the major open-weight models. OpenAI-compatible API on localhost. The default starting point.
  • llama.cppGeorgi Gerganov's C++ inference engine. The foundation under Ollama, LM Studio, and most local LLM tooling. Run when you want full control of the inference path.
  • LM StudioDesktop app with a polished GUI, model browser, and one-click downloads from Hugging Face. Proprietary but local-first, the non-developer's on-ramp before Ollama.
  • Open WebUISelf-hosted ChatGPT-style frontend that talks to Ollama, llama.cpp, or any OpenAI-compatible endpoint. Run it locally, log nothing.
  • Hugging FaceThe model registry. Tens of thousands of open-weight models, datasets, and spaces. Where the actual fight over open weights is being kept on the record.
  • text-generation-webuiPower-user web UI for local LLMs. Multiple backends, character cards, training extensions. The hobbyist and researcher tool.
  • AUTOMATIC1111The default web UI for Stable Diffusion. Local image generation against weights you downloaded. The model never sees the prompt because it never leaves the box.
  • ComfyUINode-based workflow editor for diffusion models. The professional tool, with full control over every step of the generation graph.
  • Backyard AILocal-first character chat for the role-play crowd. Models, personas, scenes, all on disk. Formerly Faraday. Proprietary, with SillyTavern as the FOSS path.
  • GPT4AllCross-platform desktop app for running open-weight models with no setup. The simplest possible path to a private LLM.
  • llamafileMozilla's single-binary distribution. The model and the runtime in one executable that runs on six operating systems without installation. Sovereignty by way of portability.
  • JanOpen-source ChatGPT alternative that runs locally. Polished desktop app, OpenAI-compatible server, no telemetry.
  • KoboldCppSingle-binary llama.cpp fork with a generous web UI, story-mode interface, and KoboldAI-compatible API. The hobbyist's daily driver for local inference.
  • SillyTavernThe character-card-driven local-LLM frontend. Connects to Ollama, KoboldCpp, llama.cpp, or any OpenAI-compatible endpoint. The most popular front-end for long-form local chat.
  • LocalAIDrop-in OpenAI-compatible API that runs entirely on your hardware. Speech, embeddings, image generation, chat, all from the same endpoint, all local.
  • vLLMHigh-throughput LLM serving for the production-scale local deployment. PagedAttention, continuous batching. The fastest open-source inference engine when the hardware is there.
  • MLXApple's open-source array framework for Apple Silicon. The native path for fast local inference on M-series Macs, including the largest open-weight models that exceed standard VRAM budgets.
IV Moving Unseen

The pirate's first duty was to disappear when pursued. Same duty now, different waters. Tor for the highest threat models, VPN for everything else, live OS when the disk itself must remember nothing.

  • Tor BrowserOnion routing. Three encrypted hops, no single node knowing both ends. The default for any threat model that involves the state. Use as-shipped; do not install extensions.
  • SnowflakeTor pluggable transport that uses volunteers' browsers as one-hop bridges. Run the extension to give a censored user a way out; install Tor Browser with Snowflake to slip a national firewall.
  • OrbotThe Guardian Project's Android Tor client. Route any app on the phone through Tor, including via VPN-mode for system-wide onion routing. The mobile equivalent of Tor Browser's baseline.
  • Onion BrowserThe official Tor Browser fork for iOS, supported by the Tor Project. The only legitimate way onto Tor on Apple's walled garden until Apple permits real Tor Browser.
  • TailsAmnesic Debian-based live OS. Boot from USB, route everything through Tor, leave no trace on the machine. Snowden used this. Journalists at the Intercept use it.
  • WhonixTwo VMs, one acting as Tor gateway, the other as workstation. All traffic forced through Tor by network design; even a compromised workstation cannot leak your IP.
  • Qubes OSSecurity through compartmentalization: every task in its own Xen-isolated VM. Snowden's public recommendation. The serious journalist's operating system.
  • Mullvad VPNCash-payable, account-number only, no email required, no logs by audited policy. Five euros a month, flat. The benchmark VPN.
  • Proton VPNSwiss jurisdiction, repeatedly audited, solid free tier (no traffic logs even on free). Accepts cash by mail.
  • IVPNNo-logs by design, accepts Monero, accepts cash, multi-hop available. One of the few VPNs Privacy Guides still recommends without hedging.
  • I2PAnonymous overlay network designed for hidden services rather than clearnet. Garlic routing, peer-to-peer, no central directory. The other dark web.
  • LokinetOnion-routed mixnet built on the Oxen blockchain. An alternative path when Tor is blocked at the network level.
  • GNUnetPrivacy-focused peer-to-peer framework from the GNU Project. Decentralized DNS, file sharing, messaging.
V Browsers as Bridges

The browser is where most of the watching happens. Harden it or be hardened against.

  • Tor BrowserListed in Moving Unseen above; bears repeating here. The default browser when the threat model includes the state. Use as-shipped, no extensions, no theme changes; the strength is the uniformity of the fingerprint.
  • Arkenfox user.jsA vetted Firefox configuration that closes the telemetry, fingerprinting, and tracking holes Mozilla left open. Drop the file in your profile, restart, done.
  • Mullvad BrowserTor Browser hardening over a VPN or clearnet, built in collaboration with the Tor Project. The browser to use when you want Tor-grade fingerprint resistance without onion routing.
  • LibreWolfFirefox fork with telemetry stripped, tracking protection maxed, sane privacy defaults. The drop-in for everyday use.
  • BraveChromium with blocking built in, including for sites that detect uBlock. Disable the rewards and crypto features and it is the cleanest Chromium choice.
  • Ungoogled ChromiumChromium with every Google service surgically removed. For when you need site compatibility without the surveillance.
  • uBlock OriginThe only content blocker that matters. Install it on every non-Tor browser you use. Default lists are good; medium and hard mode for power users.
  • NoScriptBlock JavaScript by default, enable per-site when the tradeoff is worth it. Bundled with Tor Browser for a reason.
  • Privacy BadgerEFF's heuristic tracker blocker. Learns from cross-site behavior, no manual list curation needed.
  • Multi-Account ContainersMozilla's container tabs. One identity per container. Pair with Temporary Containers for one-time-use isolation.
  • ClearURLsStrips tracking parameters from links automatically. The fbclid, the utm_, the gclid; gone before the page loads.
  • LocalCDNReplaces requests to commercial CDNs with locally bundled copies of the libraries. The page loads, the CDN never sees you.
  • Cookie AutoDeleteWipes cookies and local storage from any tab the moment you close it. Whitelist the few sites you want persisted; everything else forgets you.
  • SponsorBlockCrowdsourced skipping of sponsor segments, intros, outros, and self-promotion on YouTube. The advertising-funded web rendered slightly less so by collective annotation.
  • KagiPaid search. Rankings reflect relevance because the user pays directly. Programmable lenses for further customization.
  • DuckDuckGoThe first move away from Google. Free, tracker-free, default-friendly. Backed by Bing's index with its own crawl on top, so results lag Google for the long tail. The on-ramp before Kagi or SearXNG.
  • MarginaliaA search engine that prefers small, non-commercial websites. The web before SEO captured it.
  • SearXNG instancesFree, self-hostable metasearch. Pick a public instance you trust or run your own. No profile, no logs.
VI Speaking Unheard

Private conversation between free people. End-to-end, metadata-poor, ideally without a phone number tying the speech to the speaker. The watchers get nothing.

  • SignalThe baseline. End-to-end encryption (the protocol that bears its name), open source, repeatedly audited, used by Snowden and recommended by the cryptographers who designed it. Phone number required.
  • SimpleX ChatUser identifiers eliminated entirely, including phone, email, and account. Contact happens by sharing one-time invite links. The strongest metadata story available.
  • SessionOnion-routed messaging on the Lokinet stack. No phone number required, decentralized server network.
  • BriarPeer-to-peer over Tor, Bluetooth, or local Wi-Fi. Designed for journalists, activists, and people whose internet has been cut. Works when the internet does not.
  • CwtchPeer-to-peer encrypted messaging built directly on Tor onion services. Runs without accounts, servers, or stored metadata. Open Privacy Research Society's answer to “what would Signal look like with no central infrastructure at all.”
  • ThreemaSwiss end-to-end encrypted messenger. No phone number required, identity is a generated ID. Paid (one-time, modest), audited, fully open-source since 2020. Used by the Swiss army and the German federal government.
  • WireSwiss-jurisdiction encrypted messaging and conferencing. Open-source clients, Proteus protocol (Signal-derived), federated through MLS. Used by enterprise and the European Commission alike.
  • Delta ChatEnd-to-end encrypted messenger that piggybacks on email. Use any IMAP server you trust, including the one you self-host. The fediverse messaging tool that actually exists.
  • Matrix & ElementFederated, self-hostable, end-to-end encrypted. Group chat, voice, video, files. The IRC of the decentralized era.
  • XMPPFederated chat protocol, three decades old, still working. Use with OMEMO encryption. Conversations (Android) and Gajim (desktop) are the recommended clients.
  • RetroshareDecentralized friend-to-friend network: messaging, file sharing, forums, all over a darknet of mutual-trust connections. Older than Signal, still alive, still useful when you need a small encrypted social fabric.
  • Proton MailEncrypted mail, Swiss jurisdiction, end-to-end with other Proton users and PGP-compatible. The practical default for those not yet self-hosting.
  • TutaEnd-to-end encrypted mail and calendar. German jurisdiction, fully open source clients. Strong free tier.
  • DisrootVolunteer-run free email, cloud, chat, pads. The community-cooperative model: pay what you can, run by activists.
  • RiseupEmail and VPN for activists, by activists. Invite-based, mission-driven, has fought subpoenas and won. Trusted across the radical left for two decades.
  • GnuPGThe old reliable. Sign, encrypt, verify. The standard since 1999. Your key is your identity. Use with the keyoxide.org self-attestation network.
VII Encryption of All Things

Keys, vaults, envelopes. The pirate buried his chest. The cypherpunk encrypts his.

  • KeePassXCOffline, open source password manager. The database file lives on your disk, encrypted with a master key, syncable through any channel you trust.
  • BitwardenOpen source, self-hostable password manager. Repeatedly audited. The pragmatic choice for shared vaults across devices.
  • VaultwardenLightweight Bitwarden-compatible server you run yourself. Your vault on your own hardware, the official clients still work.
  • VeraCryptFull-disk and file-container encryption. The actively maintained successor to TrueCrypt. Hidden volumes for plausible deniability.
  • CryptomatorClient-side encryption for any cloud storage. The cloud sees opaque blobs; you hold the key. Native apps for every platform.
  • Cryptsetup / LUKSThe Linux full-disk encryption standard. Used by every serious distribution's installer. AES-XTS, Argon2id key derivation, headers detachable for plausible deniability.
  • PicocryptSingle-binary, audited file encryption. XChaCha20 + Argon2id, runs without installation or telemetry. The modern simple option when VeraCrypt is too much and you just want a file sealed.
  • ageModern, simple file encryption by Filippo Valsorda. A single binary, sane defaults, replacing GPG for most tasks. Use rage for the Rust implementation.
  • OpenSSHThe remote shell, file transfer, and key-based authentication standard the entire internet runs on. Hardened by the OpenBSD team. Free everywhere.
  • YubiKeyHardware security key for FIDO2, WebAuthn, GPG, PIV, OATH. Phishing-resistant by construction. Buy two, register both, keep one in a safe place.
  • NitrokeyOpen-source hardware keys, audit-friendly firmware. The German answer to YubiKey for those who want to read the source.
  • OnlyKeyOpen-source hardware key with PIN entry on the device itself. Keylogger-proof, self-destructs after attack threshold.
  • OnionShareShare files, host a static site, run a chatroom. All over Tor, no account, no middleman, the URL itself is the access control.
  • Magic WormholeEnd-to-end encrypted file transfer between two devices using a short human-readable code. SPAKE2 cryptography, no servers retain anything.
VIII Anti-Forensics & Erasure

Strip metadata before publishing. Wipe drives before disposal. Shred files when delete is not enough. The investigator looks at what you left behind, not what you said.

  • MAT2Metadata Anonymisation Toolkit. Strips EXIF, GPS, document hidden fields, torrent comments, archive timestamps. Cross-platform, open source, the standard.
  • ExifToolPhil Harvey's tool. Reads, writes, and deletes metadata across thousands of formats. The reference command-line option.
  • Metadata CleanerGUI for MAT2. Drag a file, see the metadata, hit clean. The user-friendly path.
  • ImageOptimmacOS tool that losslessly compresses and strips all metadata in one step.
  • ExifEraserModern Android image metadata stripper. Permissionless, full report of what was removed.
  • BleachBitCross-platform cleaner. Shreds files, wipes free space, clears application caches and histories. The Hillary Clinton tool, when used correctly.
  • DangerzoneFrom the Freedom of the Press Foundation. Converts potentially malicious documents into safe PDFs by rendering them in a sandboxed VM. Strips metadata in the process.
  • shredThe GNU coreutils command. Overwrites a file repeatedly, then deletes. Works for spinning disks; SSDs need ATA Secure Erase or full encryption from day one.
  • dd / nwipeFor wiping a whole drive. dd from /dev/urandom, or nwipe for a guided multi-pass wipe with verification.
  • EFF Dice-Generated PassphrasesThe Electronic Frontier Foundation's diceware lists. Five rolls per word, six or seven words, an unguessable passphrase you can actually remember. The base layer under any disk-encryption setup.
  • SystemRescueFree, actively maintained live boot disk for partitioning, recovery, and secure erase. Ships nwipe and the rest of the disposal toolkit. The free analogue to commercial rescue distributions.
  • GParted LiveThe bootable GParted environment. The reference partition editor on its own live media for the disposal-and-rebuild ritual.
  • ShredOSThe actively maintained successor to DBAN. Boots from USB, runs nwipe, handles modern hardware (NVMe, large drives, UEFI) that DBAN cannot. The current free choice for whole-drive disposal.
IX Sound Money

Cash on the wire, without a paymaster reading over the shoulder. Fiat is a printing press pointed at your savings. These are the exits.

  • BitcoinThe one that cracked the seal. Fixed supply of twenty-one million, no issuer, no permission required to send or receive. Run a full node if you can; bitcoin.org has the install path.
  • MoneroPrivate by default. Ring signatures, stealth addresses, confidential amounts, encrypted memos. The cypherpunk's cash and the regulator's nightmare.
  • Sparrow WalletBitcoin wallet for the serious user. Coin control, Tor support, air-gapped signing with hardware wallets, full-node compatible.
  • ElectrumLightweight Bitcoin wallet running since 2011. Hardware wallet support, Tor-friendly, multisig. The longest-serving wallet that still ships.
  • FeatherFree Monero desktop wallet built on the official monero-wallet stack. Tor by default, coin control, hardware wallet support.
  • Wasabi WalletDesktop Bitcoin wallet built around WabiSabi coinjoin and Tor routing. The zkSNACKs default coordinator suspended service in 2024 under regulatory pressure; users now select from independent coordinators (Kruw and others). The wallet itself remains open-source and active.
  • JoinMarketDecentralized, market-based Bitcoin coinjoin. No central coordinator to seize or pressure into shutting down. The cypherpunk approach to Bitcoin privacy that survived the 2024 regulatory wave.
  • Cake WalletMonero and Bitcoin mobile wallet. Built-in non-KYC swap. The phone wallet that does not phone home.
  • BlixtOpen-source Lightning wallet that runs your own Lightning node on your phone. Sovereignty at the smallest scale.
  • ColdcardAir-gapped Bitcoin-only hardware wallet from Coinkite. Designed assuming the connected computer is compromised. The choice of long-term holders.
  • TrezorThe original open-source hardware wallet, 2014 onward. Multi-asset, fully auditable firmware, the trusted default for self-custody.
  • Foundation PassportOpen-source, air-gapped Bitcoin hardware wallet. Camera-based QR signing, microSD-only data path, removable battery.
  • Specter DesktopMultisig-first Bitcoin wallet for hardware-wallet users. Run against your own full node, sign air-gapped, coordinate complex setups without trusting anyone in the middle.
  • NunchukMobile and desktop Bitcoin multisig with hardware wallet support. Designed for inheritance, partner-key setups, and the full self-custody stack.
  • BisqPeer-to-peer Bitcoin exchange running over Tor. Operates without accounts, KYC, or custody. Trades settled directly between two users.
  • HavenoMonero-native decentralized exchange in the Bisq lineage. Multiple frontends; choose a community instance you can verify.
  • RoboSatsLightning-native peer-to-peer Bitcoin exchange. Tor-only, no KYC, no account. Trades clear in minutes.
  • KYCnot.meMaintained directory of non-KYC exchanges and swap services. The reference page for finding a venue that does not demand identity papers.
  • BTCPay ServerSelf-hosted Bitcoin and Lightning payment processor. The free, no-fee, censorship-resistant alternative to Stripe and Square for accepting on-chain or Lightning payments.
  • Mempool.spaceThe open-source Bitcoin block explorer. Self-hostable. The reference page for verifying any transaction without trusting an exchange or a third-party API.
X Owning Your Own Ship

Self-hosting. The server in your closet. Files, music, photos, notes, passwords, calendar, mail, all on hardware you own. The cloud is someone else's computer.

  • YunoHostServer distribution that makes self-hosting accessible to non-sysadmins. One-click install of dozens of self-hosted apps on a low-end box.
  • UmbrelSelf-hosted OS for personal servers. Bitcoin node, Lightning, Nostr relay, Nextcloud, Jellyfin, all from a friendly app store.
  • StartOSSelf-hosting platform formerly Embassy OS. Sovereignty-focused, Bitcoin-friendly, opinionated about privacy defaults.
  • awesome-selfhostedThe canonical curated index of self-hostable software. Thousands of entries, hundreds of categories, decades of accumulated taste.
  • SyncthingContinuous encrypted peer-to-peer file sync between your own devices. No central server. Set it up once, runs forever.
  • NextcloudSelf-hosted Drive, Calendar, Contacts, Office, Talk, photos. The most mature replacement for Google's suite. Run it on a Pi or a real server.
  • JellyfinSelf-hosted media server. The Plex fork that stayed free. Your library, your rules, no subscription, no telemetry, hardware transcoding.
  • NavidromeSelf-hosted music streaming. Subsonic API-compatible, so any client works. Spotify replacement without the surveillance.
  • AudiobookshelfSelf-hosted audiobook and podcast server with native iOS, Android, and web players. The Audible replacement, against your own library, with progress sync.
  • ImmichSelf-hosted photo and video backup with native iPhone and Android apps. The Google Photos replacement that finally works. Face recognition, geolocation, all on your box.
  • SonarrAutomated television show downloader and library manager. Watches RSS feeds and indexers, fetches new episodes the moment they appear, hands them off to Plex or Jellyfin. The cornerstone of the *arr stack.
  • RadarrSonarr's sibling for movies. Same model: queue your wishlist, the daemon hunts for the best release, drops it in the library, names it cleanly.
  • LidarrThe same automation pattern, applied to music. Wishlist by artist, fetch by album, library kept tidy.
  • ReadarrFor ebooks and audiobooks. Author-first wishlist, format negotiation, drop into Calibre or Audiobookshelf.
  • ProwlarrIndexer manager for the *arr stack. Configure every torrent and Usenet indexer once; Sonarr, Radarr, Lidarr, and Readarr all share the connection. The clean way to scale.
  • OverseerrFamily-friendly request frontend for the *arr stack. Your housemates pick from a Netflix-style UI; the daemon downloads and stores. The polish layer that makes self-hosted streaming actually pleasant.
  • JellyseerrOverseerr fork for the Jellyfin/Emby crowd. Same model, open-source the whole way down.
  • KarakeepSelf-hosted bookmark and read-it-later, with full-text search and AI tagging. The Pocket replacement. Formerly Hoarder.
  • WallabagSelf-hosted read-it-later with article extraction. The article goes onto your server, mirrored from the web before the publisher decides to break the link.
  • FreshRSSSelf-hosted RSS aggregator. Lightweight, fast, full-text capture, mobile clients via the Google Reader API. The way to read the open web after it gave up on the algorithm.
  • MinifluxMinimal RSS reader written in Go. Single binary, opinionated about reading without distraction.
  • VikunjaSelf-hosted to-do and project tracker. Kanban, lists, calendar, teams. Todoist and Asana, against a database you back up yourself.
  • Paperless-ngxSelf-hosted document management. Scan, OCR, tag, search. Every receipt, contract, statement, and warranty in one place you control. The end of the filing cabinet and the spreadsheet of PDFs.
  • SnikketSelf-hosted XMPP for families and small communities. Encrypted chat, group calls, file sharing, your domain. The accessible front-door to running your own messaging server.
  • TailscaleWireGuard mesh between your devices. Private network across the whole internet. Self-host the control plane with Headscale if you want to own that too.
  • WireGuardThe modern VPN protocol. Four thousand lines of audited Linux kernel code. Faster, simpler, and more secure than every alternative it replaced.
  • Pi-holeNetwork-wide ad and tracker blocking at the DNS layer. One Raspberry Pi cleans every device on the network. Set it and forget it.
  • AdGuard HomeDNS-based blocker like Pi-hole, with a more polished UI and DoH/DoT out of the box.
  • Home AssistantOpen-source home automation. Pull every smart device off the manufacturer cloud and onto your own server. Local-first by design.
  • ForgejoSelf-hosted Git forge. The community fork that took over after Gitea went corporate in 2022. Hosts Codeberg and the F-Droid infrastructure. Lightweight, fast, fully under your control.
XI Keeping Your Tools Yours

Right to repair, re-flashing, modding, jailbreaking. The craftsman's relationship to his vise, translated to the phone, the laptop, the router, the tractor.

  • iFixitRepair guides and parts for nearly every device ever made. The bible of the repair movement, plus the political fight for the law.
  • FrameworkLaptops designed to be opened, upgraded, and repaired. Specs on a card on the screen, screws on the outside, every part replaceable.
  • MNT ReformThe fully open-source laptop. Schematics, firmware, mainboard, mechanical drawings, all published. Builds itself with a screwdriver.
  • System76Linux laptops and desktops with open firmware. Pop!_OS as the default. Coreboot on selected models. American assembly, full root.
  • Pine64Affordable, hackable hardware: PinePhone, PineBook Pro, PineTab. Community-driven, multi-OS, screws on the outside. The hobbyist's on-ramp to fully libre devices.
  • GrapheneOSHardened, de-Googled Android for Pixel devices. The most secure mobile OS available to civilians. Hardened memory allocator, restricted permissions, sandboxed Play Services if you need them.
  • CalyxOSDe-Googled Android with microG for app compatibility. Includes Datura firewall. The friendlier on-ramp before GrapheneOS.
  • LineageOSFree Android for phones the manufacturer abandoned. Three more years of life for hardware they wanted to brick.
  • /e/OSGaël Duval's deGoogled Android. Murena ships pre-flashed phones for those who want to skip the unlock-and-flash step.
  • F-DroidFree and open-source Android app store. Reproducible builds, no Google account, no telemetry. The first thing to install on any phone.
  • MagiskSystemless root for Android. Strip carrier bloat, run modules, control what the OS can and cannot do, all without modifying the system partition. The lock the manufacturer set; the key the user keeps.
  • OpenWrtCustom router firmware. Liberate the box between your machines and the wire. Real Linux, real package manager, real ownership.
  • corebootFree firmware replacement for proprietary BIOSes. Removes the management engine where it can be removed, opens the boot path on the rest.
  • HeadsCoreboot-based BIOS that uses TPM measurements to detect tampering. Used in Purism and Insurgo laptops; the gold standard for measured boot.
  • CalibreThe ebook swiss army knife. Convert, manage, read, fetch news, strip metadata. Pair with the DeDRM plug-in for books you have already paid for.
  • DeDRM ToolsThe Calibre plug-in suite that strips DRM from ebooks you have purchased: Kindle, Adobe ADE, Kobo, B&N, Apple Books. The Apprentice Alf project, kept alive by noDRM. Required reading: section 1201 of the DMCA, which makes circumvention separately illegal in the US no matter the underlying right.
  • palera1nOpen-source iOS jailbreak (checkm8-based) for compatible iPhones. The way back into the device Apple sold you. iOS 15 through 18 on supported chips.
  • checkra1nThe hardware-exploit jailbreak that started the modern lineage. Works against the bootrom on a fixed range of devices; permanently unpatchable on those models.
XII Open Protocols

The internet the way it was supposed to be. Federated, permissionless, forkable. No single kingdom to seize.

  • Mastodon & the FediverseFederated social via ActivityPub. Many ports, one shipping lane. Move servers without losing your audience.
  • Pleroma / AkkomaLightweight ActivityPub server, written in Elixir. Runs on a Raspberry Pi. Akkoma is the actively maintained fork. The federated server for those who want to host a community without the Mastodon footprint.
  • PeerTubeFederated video hosting. Each instance independent, all of them speaking the same protocol, BitTorrent-assisted distribution under load. The YouTube replacement that does not need YouTube's budget.
  • LemmyFederated link-aggregator and discussion forum. Reddit's shape, distributed across instances no private-equity firm can buy. Each instance hosts its own communities; the federation lets you read across them.
  • PixelfedFederated photo sharing. The Instagram replacement, ActivityPub-native, no algorithm trying to keep you scrolling.
  • FunkwhaleFederated audio platform. Music, podcasts, radio, all hosted on independent servers, all talking through ActivityPub. Self-host your own SoundCloud.
  • MobilizonFederated event organizing. The Facebook Events / Meetup replacement, by the Framasoft cooperative. Local groups, no surveillance, no platform politics.
  • MovimWeb-based XMPP frontend for community-scale communication. Threaded discussions, blogs, chat, video calls, all through the open XMPP protocol.
  • NostrKeys, events, relays. The simplest decentralized social protocol yet devised. Your identity is a keypair; your reach is whatever relays you publish to.
  • Scuttlebutt (SSB)Offline-first peer-to-peer social protocol. Append-only logs, gossip-replicated when devices meet. Designed for sailors, boatyards, and bandwidth-poor places; the social network that does not require the internet.
  • AT ProtocolThe Bluesky protocol. Account portability, custom feeds, opt-in moderation. Federation in practice still maturing.
  • ActivityPubThe W3C standard behind the Fediverse. The protocol, not the platform. Read the spec, write a server.
  • IPFSContent-addressed storage. A file is identified by what it is, not where it sits. Pin what you care about; the network keeps the rest.
  • Hypercore ProtocolThe protocol formerly known as DAT. Append-only logs, peer-to-peer replication, sparse-fetch. The Beaker browser used it; the protocol outlives the browser.
  • BitTorrentBram Cohen's protocol, 2001. Every leecher becomes a seeder. Still the most resilient large-file distribution mechanism ever built.
  • qBittorrentThe free, ad-free, feature-complete BitTorrent client. The replacement for the old commercial uTorrent.
  • TransmissionLightweight cross-platform torrent client. Ships with most NAS systems, runs headless, sips RAM.
  • Tor Onion ServicesHost anything, anywhere, reachable only through Tor. The .onion address is the address. Three hops, end-to-end encrypted, no DNS.
  • VeilidCult of the Dead Cow's peer-to-peer application framework, released at DEF CON 31 in 2023. “Like Tor, but for apps.” No exit nodes, no special servers, every node equal. Written in Rust, MPL-2.0. Build privacy-by-default applications on top of it.
  • MeshtasticLoRa radio mesh on cheap commodity hardware. Off-grid encrypted text messaging. The network when the network is gone.
  • ReticulumA cryptography-based networking stack that runs on almost anything: serial cables, packet radio, LoRa, TCP, UDP. Designed for resilience first.
  • The Gemini ProtocolA small, deliberately limited internet protocol. Smaller than the web, larger than gopher. Used by people who think the modern web overshot.
XIII Free Workshops

Writing, drawing, editing, composing, modeling, coding. The craftsman's tools, free as in freedom and free as in beer.

  • LibreOfficeThe free office suite. No subscription, no telemetry. Opens every file Microsoft has ever shipped, in some cases more reliably than Office itself.
  • OnlyOfficeOffice suite focused on Microsoft format fidelity. Self-hostable collaborative editing for Nextcloud and others.
  • ObsidianPlaintext Markdown notes in a folder you own. Local-first, free for personal use, no telemetry. The practical default for those not on Logseq.
  • LogseqOpen-source outliner and knowledge graph in plaintext. Roam Research's free competitor.
  • ZoteroOpen-source reference manager. Captures citations from every browser, exports to every word processor. Built by historians, used everywhere.
  • TypstA modern typesetting system: LaTeX's power with a sane syntax and instant compilation. The future of academic and technical writing.
  • GIMPRaster image editing. Not Photoshop and not trying to be. Three decades of refinement.
  • InkscapeVector graphics. Production-ready, free forever. The native SVG editor.
  • KritaDigital painting. Built by artists for artists. Brush engine that rivals any commercial offering.
  • ScribusOpen-source desktop publishing. The InDesign replacement for posters, zines, magazines, books. Production-ready PDF output, CMYK, spot colours, the whole prepress stack.
  • PenpotOpen-source design and prototyping platform. The free Figma. Self-hostable, SVG-native, design system support. Gaining serious adoption fast.
  • darktableNon-destructive RAW photo workflow. The Lightroom replacement.
  • RawTherapeePowerful RAW developer with a different philosophy than darktable. Use both, pick by job.
  • Blender3D modeling, animation, simulation, video editing, compositing, game engine. Used in feature films. Funded by the Blender Foundation, free forever.
  • TenacityAudacity fork without the telemetry that got bolted on after the 2021 acquisition.
  • ArdourOpen-source digital audio workstation. Multitrack recording, MIDI, mixing, mastering. Pay-what-you-want for the binary, free to build.
  • LMMSOpen-source pattern-based DAW in the FL Studio lineage. Beats, melodies, samples, plug-ins. The free entry point to electronic music production.
  • HydrogenOpen-source drum machine. Pattern programming, sample libraries, MIDI export. The TR-808 you do not need to buy.
  • SuperColliderReal-time audio synthesis programming environment. The serious composer's instrument since 1996. Live-codable, network-distributable, deeply weird in the right ways.
  • MuseScoreMusic notation software. Compose, engrave, export to PDF or audio. The free Sibelius, two decades along and still under volunteer hands.
  • KdenliveNon-linear video editor. Free, serious, multitrack, GPU-accelerated.
  • OliveModern non-linear video editor. Node-based effects, professional pipeline, GPL-licensed. The fast-moving alternative to Kdenlive.
  • NatronOpen-source node-based compositor. The Nuke replacement for VFX work. Reads OFX plug-ins natively, used in indie post-production worldwide.
  • OBS StudioOpen source broadcasting and recording. Record, stream, composite, every codec under the sun.
  • HandBrakeFree video transcoder. The default tool for converting captured footage into something portable.
  • yt-dlpThe youtube-dl successor. Pulls audio and video from thousands of sites. Faster, more sites, actively maintained.
  • FFmpegThe audio and video swiss army. Convert, mux, transcode, capture, stream, anything. Half the media internet runs on it.
  • ImageMagickThe image processing equivalent. Batch convert, resize, transform, composite from the command line.
  • PandocUniversal document converter. Markdown to PDF to HTML to DOCX to LaTeX to anything. The format-translator the world relies on.
  • FreeCADParametric 3D modeling for engineering. The SolidWorks replacement, free and open. Architectural, mechanical, ship design, every workbench under one roof.
  • KiCadElectronic design automation. Schematic capture, PCB layout, 3D viewer, Gerber export. Funded by CERN. The hardware hacker's default.
  • OpenSCADProgrammer-oriented solid 3D CAD. Models written as code, version-controlled, reviewable, diffable. The maker's git-friendly workshop.
  • PrusaSlicerOpen-source slicer for 3D printing. The reference G-code generator, profiles for hundreds of printers, fork lineage going back to Slic3r. Use SuperSlicer for the experimental fork.
  • GodotOpen-source game engine, MIT-licensed, no royalties, no per-seat fees. The Unity refugees' new home, with a 2D pipeline that beats every commercial competitor outright.
XIV Free Operating Systems

Kernels and userlands without landlords. Where the machine you paid for answers to you.

  • DebianThe universal operating system. Three decades of volunteer coordination. The base layer under most of the others. Stable as bedrock.
  • Linux MintThe most-recommended distribution for newcomers leaving Windows or macOS. Based on Ubuntu, with Cinnamon desktop, sane defaults, and a fanatical aversion to telemetry. The on-ramp that does not patronise.
  • FedoraBleeding edge, hardened defaults, SELinux on by default, Wayland first. The upstream of Red Hat Enterprise Linux.
  • Arch LinuxMinimal base, you build it up. Rolling release. The wiki is the single best piece of Linux documentation in existence.
  • EndeavourOSArch with a friendly installer. The on-ramp without the patronizing.
  • Alpine LinuxSecurity-oriented, musl-libc, BusyBox-based. The default base layer for half the world's container images. Tiny, hardened, transparent.
  • Void LinuxIndependent rolling-release distribution. runit init system instead of systemd, xbps package manager. The contrarian's choice that earned its place.
  • NixOSDeclarative operating system. Your entire machine is one configuration file; rebuilds are atomic and rollback works. The future has been here a decade.
  • GuixFunctional package management, reproducible builds, fully free GNU stack. The same idea as Nix with the GNU politics.
  • OpenBSDSecurity as an obsession. The team that wrote OpenSSH, LibreSSL, OpenBGPD, and pf lives here. Two remote holes in the default install in twenty-five years.
  • FreeBSDThe Berkeley Unix lineage. ZFS, jails, dtrace. Half the world's storage runs on it; you would not know unless you looked.
  • Qubes OSListed in Moving Unseen above; bears repeating here. The most paranoid civilian desktop on the market.
  • TrisquelFully libre Ubuntu derivative endorsed by the Free Software Foundation. Stallman's daily driver.
  • postmarketOSReal Linux on the phone. Alpine-based, ten-year support target, built to outlive the manufacturer's abandonment of the device. Runs on the PinePhone, the Librem 5, and dozens of old Android devices that were thrown away too early.
XV Whistle and Tip

Channels for the source and the journalist. For when the leak matters more than your safety, and your safety still matters.

  • WikiLeaksFounded 2006 by Julian Assange in the lineage of Ellsberg's Pentagon Papers. More than ten million documents published, including the Iraq and Afghan War Logs, the diplomatic cables, and Vault 7. Active publishing paused since 2019 under prosecution; the archive remains online and the Tor submission system is still listed.
  • SecureDropAaron Swartz and Kevin Poulsen's work, maintained by the Freedom of the Press Foundation. Used by the Guardian, the New York Times, the Washington Post, the Intercept. Tor-only, GPG-encrypted, air-gapped on the receiving end.
  • SecureDrop DirectoryThe list of newsroom onion addresses, vetted by FPF. Bookmark before you need it.
  • GlobaLeaksFree whistleblowing platform from the Hermes Center. Used by NGOs, anti-corruption offices, and activist newsrooms across Europe and Latin America.
  • Hush LineLightweight tip line as a service. The newsroom or the public figure publishes a link; sources send messages anonymously, no Tor required for senders.
  • OnionShareListed in Encryption of All Things above; bears repeating here. For the source who needs a one-time channel. Spin up a temporary Tor onion service from your laptop, share the address, close the laptop.
  • Distributed Denial of Secrets501(c)(3) archive of leaked datasets in the public interest. The working successor for the institutional leak in the years after WikiLeaks went silent.
  • Freedom of the Press FoundationThe umbrella organisation. Maintains SecureDrop, runs digital security training for journalists, fights subpoenas. Donate.
  • Courage FoundationInternational defence fund for journalistic sources, established to support Snowden, Manning, Assange, and others. The legal-aid line WikiLeaks itself points sources to.
XVI Further Study

The theoretical hold. The writings and arguments that made the case long before this manifest picked up the thread. Each entry below is genuinely foundational in its own lineage.

  • The Hacker ManifestoLoyd Blankenship aka The Mentor, 1986. Written the night of his arrest, published in Phrack issue 7. The hacker self-portrait every later one has had to answer to.
  • The Four FreedomsRichard Stallman, 1986 onward. The definition of free software. The base layer of everything the open movement has built.
  • The Crypto Anarchist ManifestoTimothy May, 1988. A specter is haunting the modern world. Issued at the first Crypto '88; everything downstream is a footnote to it.
  • Why I Wrote PGPPhil Zimmermann, 1991, revised 1999. The single most persuasive first-person case for encryption as a civil right.
  • A Cypherpunk's ManifestoEric Hughes, 1993. Privacy is necessary for an open society in the electronic age. Cypherpunks write code. Four pages, still the cleanest statement of the position.
  • A Declaration of the Independence of CyberspaceJohn Perry Barlow, 1996. Written in Davos, aimed at Clinton's Telecommunications Act. Still quoted in court.
  • The Cathedral and the BazaarEric Raymond, 1997. The argument for open development against centralized cathedral models. The essay that convinced Netscape to open source Mozilla and set the template for two decades of open source after.
  • The Right to ReadRichard Stallman, 1997. Predicted DRM, the Kindle, and the read-it-later license-revocation almost word for word.
  • Against Intellectual PropertyStephan Kinsella, 2001. The cleanest libertarian-legal argument that IP is not property at all.
  • Did You Say “Intellectual Property”? It's a Seductive MirageRichard Stallman. The argument that the term itself is a propaganda device that bundles unrelated regimes (copyright, patent, trademark, trade secret) under a single warm word.
  • Free CultureLawrence Lessig, 2004. Copyright, the public domain, and the “permission culture” that the framework of strong IP produces. Released under Creative Commons; read free or buy the print edition.
  • Code v2Lawrence Lessig, second edition 2006. Code is law. The thesis that the architecture of digital systems regulates conduct as effectively as legal codes do. Released under Creative Commons; downloadable free.
  • Guerilla Open Access ManifestoAaron Swartz, 2008. The case for the open archive, written before the archive was open.
  • Bitcoin: A Peer-to-Peer Electronic Cash SystemSatoshi Nakamoto, 2008. Nine pages. Largest philosophical consequence per word of anything written in the 21st century.
  • Freedom in the CloudEben Moglen, 2010. The talk at NYU that named the architectural problem with centralized cloud services and pointed the path back. The seed for FreedomBox, the federated social wave, and the broader self-hosting revival.
  • The Enshittification CycleCory Doctorow, 2023. The post that named the cycle of platform decay. American Dialect Society's 2023 Word of the Year.
  • Steal This BookAbbie Hoffman, 1971. The Yippie era's practical manual for living outside the system. The ancestor of every later refuse-the-system guide on this list.
  • Hackers: Heroes of the Computer RevolutionSteven Levy, 1984. The defining popular history of MIT, Homebrew, and the early game-developer scene. Where the Hacker Ethic was first articulated in print.
  • Code: The Hidden Language of Computer Hardware and SoftwareCharles Petzold, 1999, second edition 2022. The patient ground-up explanation of how the machine works. Read it before any politics about the machine.
  • CryptoSteven Levy, 2001. The history of the Crypto Wars: Diffie, Hellman, Rivest, Zimmermann, the export-controls fight, and the moment civilian cryptography won. The history-of-record for the lineage this document sails under.
  • Free as in FreedomSam Williams, 2002. Biography of Richard Stallman. The origin story of the whole free software tradition.
  • Free Software, Free SocietyRichard Stallman's collected essays, third edition. The complete philosophical case for free software, in his own words. Free PDF, also available in print from the Free Software Foundation.
  • The Master SwitchTim Wu, 2010. Every information industry begins open and ends consolidated. Wu names the cycle, runs the proof through radio, telephony, and film, and presents the internet as the test case running in real time.
  • The Age of Surveillance CapitalismShoshana Zuboff, 2019. The systematic account of how the harvest of behavioral data became the dominant business model of the early 21st century. Names the regime the cypherpunks were warning about.
  • Under the Black FlagDavid Cordingly, 1995. Random House. Twelve years of curating the National Maritime Museum's pirate collection condensed into the standard general history.
  • The Many-Headed HydraPeter Linebaugh and Marcus Rediker, 2000. The deeper history: pirates as one head of a transatlantic working-class resistance from the 1600s onward. The book that defined the term hydrarchy.
  • Villains of All NationsMarcus Rediker, 2004. Beacon Press. The academic case for the pirate ship as a floating experiment in egalitarian social order.
  • The Republic of PiratesColin Woodard, 2007. The popular history of the Golden Age and the Bahamas-based Flying Gang. Source for NBC's Crossbones, AC4: Black Flag, and Netflix's Lost Pirate Kingdom.
  • The Invisible HookPeter Leeson, 2009. Princeton University Press. The economist's case for pirate organization as a working anarchist constitution: democratic vote, equal share, written articles, more than half a century before the United States.
  • EFF Surveillance Self-DefenseThe Electronic Frontier Foundation's practical guide. The starting point for anyone moving from theory to practice.
  • Privacy GuidesThe community-curated reference page for privacy tooling. Vetting criteria are public; recommendations are conservative; updates are continuous.
  • PRISM BreakMaintained directory of privacy-respecting alternatives to surveillance-funded services, organized by what you are trying to replace.
  • AnarSecOperational security guides for activists. Practical, threat-model-driven, written by people who have been hunted.
  • EFF DeeplinksThe Electronic Frontier Foundation's blog. Three decades of fighting the same fights, better than anyone else.
  • Pluralistic by Cory DoctorowDaily dispatch from the trenches of enshittification, DRM, antitrust, and the platform compact.
  • The Cypherpunk Mailing List ArchiveThe preserved record of the original 1992–1998 Cypherpunks list, where May, Hughes, Zimmermann, Gilmore, Finney, Assange, and the rest worked the foundations out in real time. Primary source for the entire tradition.
  • Satoshi Nakamoto InstituteThe canonical archive of cypherpunk and Bitcoin foundational writings, well-typeset and ad-free.
  • CryptomeJohn Young's archive, running since 1996. Primary documents the other archives will not host. Still updated.

Keep the Colours Up

The flag is kept up by every copy. The pirate ship survived by daily discipline. The quartermaster kept the accounts honest. The watch was posted. The hull was careened before it fouled. The powder was kept dry. A crew that drank itself into stupor at anchor was a crew the navy took at dawn. Below, in plain order, the work that any reader of this page can do right now. This is hygiene, kept by hands that keep it. The fence comes down by inches.

Read the Practice
  1. Know what you defend, and from whom. Before any tool, the threat model. A blanket of paranoia protects no one. The right defence answers a specific question. Find the question, then choose the tool.
  2. Encrypt by default. Always, regardless of stakes. Plaintext is a confession written in advance, and the system that learns to read your sealed letters does not unlearn the habit when you decide the next letter matters. Full-disk encryption on every device. End-to-end encryption on every channel. The seal closes whether or not the message is grave.
  3. Verify what you install. Signature, checksum, reproducible build where it exists. The supply chain is the surface most often attacked and least often checked. Five minutes of verification keeps the rest of the practice from being theatre.
  4. Patch on the day. The fix and the exploit ship in the same hour. The window between them is as long as you make it. Auto-update what will let you. The rest is your hand and your discipline.
  5. Cover the route. The bytes leave your machine and travel wires you don't own. Every DNS query announces the next site you visit. Every unencrypted connection announces what you do there. Encrypted DNS, verified HTTPS, a VPN or onion routing where the threat model demands what they add. The eavesdropper who hears the traffic still cannot read it.
  6. Hold your own keys. Passwords in a manager you control. Coins in a wallet you signed for. Signing keys on hardware that does not phone home. Two factors on every account that allows them, a hardware key best. A third party that holds your keys hands them to whichever government writes that party the next letter.
  7. Back up what you cannot lose. Three copies, two media, one off-site. Encrypt the backup. Test the restore. The seeder, the self-hoster, and the keyholder all share the same ghost story, and it always begins with a drive that did not fail until the day it did.
  8. Strip the metadata before you publish. The photograph carries the camera, the room, the coordinates, and the hour. The document carries the author, the revisions, the printer, the dots no eye was meant to see. What you mean to share is the content. What you actually share is the file. Clean it before it leaves your hand.
  9. Compartmentalize. One identity should not unmask the next. Different handles, different mailboxes, different keys, different browsers, different machines where the stakes call for it. The breach you cannot prevent is contained by the wall you remembered to build before it.
  10. Refuse the cloud by default. Every device, every install, every account proposes to keep a copy of you in a building you have never entered, against terms you were not permitted to read. The answer is no, and the answer is no again, and the answer is still no the third time the prompt rephrases itself. What you cannot keep off, encrypt before upload. The provider sees opaque blocks. You keep the plaintext on hardware you control.
  11. Treat the phone as a sensor. The microphone, the camera, the GPS, the radios pinging every tower you walk past. The device you carry knowingly is the device that reports on you most. Audit permissions instead of trusting the apps that asked for them. Reset the advertising identifier. Replace the default keyboard. Where the threat model demands it, a hardened, de-Googled mobile OS meaningfully shifts the surface.
  12. Refuse the listening room. The speaker, the TV, the doorbell, the watch, the thermostat. Most of them ship with a microphone, a camera, or both, and most of them route audio to a cloud you cannot inspect. Ask whether the thing actually needs the network connection it asks for, then say no when it doesn't. Segment the rest onto a guest network where they cannot see the machines that matter.
  13. Self-host what you can. The library, the photo archive, the notes, the calendar, the chat. A weekend of setup buys back the rent of a lifetime, and the data that lives on hardware you control lives by your terms.
  14. Seed what you take. Every torrent left running is a mirror the next reader can find. Bandwidth is the cheapest gift the crew gives. The shadow libraries are kept alive entirely by people who decided not to close the client.
  15. Pay the maker. Share the work. Buy the book, then copy the file. Subscribe to the writer, then forward the post. Tip the artist, then mirror the song. The two acts are not in tension. The publisher invented that tension to bill you twice. The maker eats. The work travels.
  16. Add to the crew. Run a node, however small. A relay, a full validator, a federated instance. Or teach a hand. Sit beside one person you know while they install one tool that protects them. The network exists because crew members run it. The crew grew by hand, never by decree.
  17. Pass the articles on. Mirror this page. Fork it, sign it, host it under your own colours. The argument is kept alive by the copy. The flag is kept up by the next hand to raise it.

The hourglass sat on Blackbeard’s flag. A horned skeleton, Death itself, holding the glass in one hand and a spear striking a bleeding heart in the other. We are coming. There is still time to surrender. Time is running out.

Three hundred years on, the hourglass has changed sides. It sits now on the other deck. The enclosure has an expiration. Every fence ever built has come down. The ones they are building now will come down too. The only question left is how many of the crew they drag under before they fall.

Every mirrored file is a grain. Every broken DRM is a grain. Every replicated seed, every key generated on a machine the carrier did not authorize, every reader in Kazakhstan reading a paper the publisher in London charged $39 for, every farmer signing his own tractor back into service, every encrypted conversation the state was told it could not have, every piece of cash that settled without a bank’s permission. A grain. And another. And another.

Hoist the colours.
Keep the copies.
The flag does not come down.

Signed Upon the Articles

A pirate ship’s articles bore the marks of every hand aboard who consented. What follows is a lineage. The names never all met. Some never heard each other spoken. The list is not exhaustive, and no one on it has signed the rest of this document or speaks for it. They are on the same page because they did the same thing: refused the permission of a court, a publisher, a platform, or a parliament to do what they had every right to do. Some broke flags. Some broke ciphers. Each was, in their hour, an enemy of all mankind in the state’s ledger and a member of the same crew in this one.

Read the Crew
Samuel Bellamy
c. 1689 – 1717 · free prince of the Whydah
Bartholomew Roberts
1682 – 1722 · author of the Articles
Anne Bonny
c. 1697 – ? · Negril, then no record
Mary Read
c. 1685 – 1721 · Negril, then the gallows speech
Edward Teach
c. 1680 – 1718 · the man who became his flag
Henry Every
c. 1659 – after 1696 · vanished with the prize
Charles Vane
c. 1680 – 1721 · refused the king’s pardon
William Fly
d. 1726 · tied his own noose
Lysander Spooner
1808 – 1887 · ran the post against the federal monopoly
Richard Stallman
1953 – · free as in freedom
Whitfield Diffie & Martin Hellman
1944 – , 1945 – · broke the state monopoly on secrets
David Chaum
1955 – · blind signatures, twenty years early
Phil Zimmermann
1954 – · the man who armed the inbox
Timothy May
1951 – 2018 · the specter he named arrived
Eric Hughes
1965 – · cypherpunks write code
John Gilmore
1955 – · the net routes around censorship
Hal Finney
1956 – 2014 · the second node, the first receipt
Wei Dai
unknown · b-money, before the chain
Adam Back
1970 – · hashcash, the proof of work
Nick Szabo
unknown · bit gold, and the name ‘smart contract’
Daniel Bernstein
1971 – · the case that made code speech
John Perry Barlow
1947 – 2018 · declarant of the commons
Linus Torvalds
1969 – · the kernel under most of the planet
Satoshi Nakamoto
2008 – · nine pages, one exit
Bram Cohen
1975 – · every leecher a seeder
Moxie Marlinspike
1980 – · moved the baseline
Daniel Micay
unknown · founded GrapheneOS, the fortified pocket
Brewster Kahle
1960 – · kept the library, against the lawyers
Aaron Swartz
1986 – 2013 · organized the refusal that killed SOPA
Alexandra Elbakyan
1988 – · freed the papers from the publishers
Anna Archivist
2022 – · named no one, indexed everyone
Jon Lech Johansen
1983 – · broke DVD encryption, acquitted twice
Peter Sunde
1978 – · kept the bay
Ross Ulbricht
1984 – · eleven years for a marketplace
Cody Wilson
1988 – · uploaded the file the law could not recall
Julian Assange
1971 – · the publisher of the cables of empire
Chelsea Manning
1987 – · sent the cables
Edward Snowden
1983 – · the receipts on the apparatus
Cory Doctorow
1971 – · chronicler of enshittification
& every reader after
now – · the next mark on the articles

What They Said at the Gallows

The state hanged pirates publicly to deter the next sailor from turning. The speech from the scaffold was permitted, then printed and sold by daybreak. Most condemned men used the moment to preach the chaplain’s lines back at the crowd. The men below did not. The words are recorded as the broadside printers heard them.

All Masters of Vessels might take Warning by the Fate of the Captain I had murdered, and pay Sailors their Wages when due, and treat them better. For their Barbarity was the sole Cause of our turning Pirates.

William Fly at the gallows · Charlestown Ferry, Boston · 1726

They should take care how they brought Money into New England, to be Hanged for it.

John Quelch at the gallows · Charles River, Boston · 1704

I had killed thirty-seven Masters of Vessels.

Phillip Lyne at the gallows · Curaçao · 1726

Such is the justice of Providence, that few or none of us preserve enough to maintain us.

Walter Kennedy at the gallows · Execution Dock, Wapping · 1721

I wish I had been a greater plague to these Islands.

Thomas Morris at the gallows · Nassau, the Bahamas · 1718

We are poor rogues, and so must be hanged, while others no less guilty in another way go free.

unnamed pirate of Bartholomew Roberts’ crew at the gallows · Cape Coast Castle, West Africa · 1722

The dying speech was printed overnight and sold by daybreak.
The pamphlet outlived the rope.

Sign Your Mark

A pirate’s articles bound only the hands that set their own mark to the page. There was no roll filed at the Admiralty. There was no server in Whitehall keeping count. The signature was a private act between a free hand and its own conscience, and the mark stayed as long as the hand that made it chose to honour it. The same applies here. Sign if it suits you. Strike your name when it ceases to.

no network call · no account required · no record leaves this device
the mark is written to your own browser storage, where only you can read it or strike it

The Last Act

Take a Copy

The argument is kept alive by the copy. Press the button. The whole document, signatures and all, lands on your disk as a single HTML file. Mirror it. Fork it. Reprint it. Host it on a domain we will never know about. Hand it to a stranger. Read it from the file when the site is taken down, because the site will be taken down, and what is taken down is what was never theirs to give.

Take a Copy