<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Luftie The Anonymous</title>
    <description>The latest articles on DEV Community by Luftie The Anonymous (@luftietheanonymous).</description>
    <link>https://dev.to/luftietheanonymous</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp</url>
      <title>DEV Community: Luftie The Anonymous</title>
      <link>https://dev.to/luftietheanonymous</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/luftietheanonymous"/>
    <language>en</language>
    <item>
      <title>Privacy and Security Setup to use in 2026 PART 3 (Payments)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 26 Apr 2026 14:40:32 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-3-payments-4pnf</link>
      <guid>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-3-payments-4pnf</guid>
      <description>&lt;h2&gt;
  
  
  GM, Dear Readers !
&lt;/h2&gt;

&lt;p&gt;In last 2 articles, I elaborated on things like OS, Browsers, Search Engines, Messengers and Mail Providers that we could use for increasing our level of privacy.&lt;/p&gt;

&lt;p&gt;Now as we're going deeper and deeper into the digital privacy and digital freedom, let's ask another question.&lt;/p&gt;

&lt;p&gt;What about private payments ? How about being able to pay privately for stuff irl 🏪 and online 🌐 ?&lt;/p&gt;

&lt;p&gt;Before I start with the meaty 🥩 part, if you haven't read my previous articles, check those last 2 ones out. They have low visibility, but have real value and a lot of knowledge in them, so please share with friends and share your feedback.&lt;/p&gt;


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3506511" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 21&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" id="article-link-3506511"&gt;
          Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/opensource"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;opensource&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/os"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;os&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;12&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            24 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;
 


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3437928" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 17&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" id="article-link-3437928"&gt;
          Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/privacy"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;privacy&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tooling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tooling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;14&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              4&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            31 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;Unfortunately my markdown skills are very limited 😆 and idk how to implement such list or series with interactive table with direct links to the article, just like &lt;a class="mentioned-user" href="https://dev.to/francistrdev"&gt;@francistrdev&lt;/a&gt; does it 🧠 (to be honest I'm envious about his skills, shout out to you amigo, love your articles) ! &lt;/p&gt;

&lt;p&gt;In order not to digress however 😄, currently there is a lot of supervision and restriction when it comes to payments. Those restrictions are implemented by the governments and institutions around the world are implying as though everyone was a criminal, therefore requiring your ID, details on where you live, your picture and more. &lt;/p&gt;

&lt;p&gt;That data and images are then stored in the companies cloud storage, which is prone to be hacked and exploited, thus your data might be obtained by an unwanted third-party like data-broker or hacker. &lt;/p&gt;

&lt;p&gt;You cannot pay cash 💰 when the price exceeds some amount (legally you can't ⚖️, others said it's not for hoi polloi, we know it's possible though 🫣). Trust in banks is naive, banks algorithms are flawed and are able to block your account after you make e.g. Github Copilot purchase, you have then to call the bank to unlock your card, being at the same time honeypot for your financial data.&lt;/p&gt;

&lt;p&gt;Meaning that banks 🏛️ are giving access to data to any law-enforcement 👮 without a single moment of hesitation 🫣. &lt;/p&gt;

&lt;p&gt;All of your transactions in the bank 📃, all the details, all that can be passed to a spy-agencies 🕴 of the state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quick Disclaimer (one of many today :D )&lt;/strong&gt;: I spent entire week, sleeping each day about 4 hours a day on average, working on this article. From it's style, fact checking, reviewing my cryptographic knowledge validity, listening to the podcasts with founders, investigation of compliance, asking questions for validation, waiting on the answers to edition, removing the providers that turnt out to be violating the privacy, while I already had a ready version of an article to push. &lt;/p&gt;

&lt;p&gt;I don't write it to make you feel sorry to me or imposing my effort to trigger some of your feelings but rather to personally express my admiration 🫶 to journalists, especially independent ones, who do they work well and in a righteous way just like I tried to do (hopefully I managed to :) ).&lt;/p&gt;

&lt;p&gt;Because I gone through a huge pile 🗄️ of articles with rankings/juxtapositions of cryptocurrencies without much details about their mechanism or non-kyc cards, that haven't been checked 🚫 by the authors, if they are fully non-kyc.&lt;/p&gt;

&lt;p&gt;I did it the hard way and made thorough "investigation" aka. research 🕵 (I kind of like the word investigation, because for some crypto companies or projects, it might be useful to procedure one 🤣).  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Long story short&lt;/strong&gt;, If you enjoy my articles, I decided to open options for you to send donations 🫴🪙, the details are on the end of the article. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My articles always will be free&lt;/strong&gt;, though I leave a free space for people that might want to appreciate my work and so helping me.&lt;br&gt;
Thank you very much for your donations in advance 😄 !&lt;/p&gt;

&lt;p&gt;These funds would be certainly used for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;purposes of newer articles e.g. test of some tool/device and giving a review on it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;for help to my mom 🧕 financially to keep the house on running 💸 smoothly (currently I'm before applying at the uni and well I'm jobless 📂, so I'm sort of parasite 🦠 some of you might think, but I help as much as I can to take the burden off of her 🫂).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;purchase of new equipment 🖥️ to my lab 🧪 aka. room ⛺ for potential co-worker to have workplace and cool experience of working together and perhaps start working jointly 👥 on some project that could then turn into a start-up and potential business (I would never forget the people, who would put a trust in me and help me 🤧).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Perhaps in the future I will grow to a bigger brand 🕶️ and all of the sudden I will start selling hoodies, t-shirts 👕, caps 🧢 with some themes of mine, we will see 😁 On this moment on I want you to make qualitative articles, so we go slowly to the core part of the article now on.&lt;/p&gt;

&lt;p&gt;Additionally, as you could see this article will be only about Payments and I excluded AI from the article. You could ask: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Luftie, wtf is going on ? Why can't you keep one plan and stick to it ?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Grasp you chair and hold it thightly.....&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnckpoiesqczjab2pcvuy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnckpoiesqczjab2pcvuy.gif" alt="grining face"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Because my articles are good and long, bitch ;D&lt;/strong&gt; If I kept Payments and AI format, this article would so long like &lt;strong&gt;distance from 🌏 Earth to exit of our galaxy 🛸&lt;/strong&gt; ! Now I reduced it to a length similar to a &lt;strong&gt;distance from Hicksville in South-Portugal 🇵🇹 to Shenzhen 🇨🇳&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;So I guess you're fine with it and we can fasten ➰ our belts for this beautiful and thriving just like &lt;strong&gt;Rust 🦀&lt;/strong&gt; on your car journey !.... I mean article, I mean..... &lt;strong&gt;JUST SHUT UP and read it 😘&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wr17htqtu5rac03vgci.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wr17htqtu5rac03vgci.jpg" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shout out to Rustaceans&lt;/strong&gt; 😅 !&lt;/p&gt;
&lt;h2&gt;
  
  
  Article Navigation Guide
&lt;/h2&gt;

&lt;p&gt;This article will have multiple sections so you can skip to what interest you the most, so in order to e.g. just find a part of article that is interesting to you here's the overview:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Payments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-- Cash&lt;/p&gt;

&lt;p&gt;-- Cryptocurrencies&lt;/p&gt;

&lt;p&gt;--- Intro, Good Web3 Practices + &lt;strong&gt;SURPRISE 🤩&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;---- # Blockchain 101 explanation &lt;/p&gt;

&lt;p&gt;---- # 1 Rule &lt;br&gt;
----- Detailed Cryptographic Explanation of nuances&lt;br&gt;
&lt;br&gt;
---- # &lt;em&gt;&lt;strong&gt;2 Rule + Surprise 🥳&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;---- # 3 Rule&lt;/p&gt;

&lt;p&gt;---- # 4 Rule&lt;/p&gt;

&lt;p&gt;---- # 5 Rule&lt;/p&gt;

&lt;p&gt;---- # 6 Rule&lt;/p&gt;

&lt;p&gt;---- # 7 Rule&lt;/p&gt;

&lt;p&gt;---- # 8 Rule&lt;/p&gt;

&lt;p&gt;---- # 9 Rules&lt;/p&gt;

&lt;p&gt;--- Privacy Coins&lt;/p&gt;

&lt;p&gt;--- Where to buy anonymously&lt;/p&gt;

&lt;p&gt;--- Other Coins&lt;/p&gt;

&lt;p&gt;-- Virtual, Prepaid and Physical Cards with no-kyc&lt;/p&gt;

&lt;p&gt;-- Alternative forms of payment&lt;/p&gt;
&lt;h2&gt;
  
  
  DISCLAIMER ⚠️
&lt;/h2&gt;

&lt;p&gt;The presented content does not encourage to commit any actions towards using such solutions, I do not take any responsibility if you use one of those tools and loose money. It's not a financial advice, the article has rather an informative and educational purpose. &lt;/p&gt;

&lt;p&gt;The article has not been sponsored by any companies presented in the juxtaposition of card providers or the blockchain organisation.&lt;br&gt;
All opinions on the products are personal, not influenced by any forms of incentive.&lt;/p&gt;

&lt;p&gt;The article in some paragraphs comprises writers personal, subjective opinions, experiences, that can include curse-words, if you're sensitive to language used, please don't take things personally or don't read it at all.&lt;/p&gt;
&lt;h2&gt;
  
  
  Payments &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6mm0pryoyq1onnb59fz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6mm0pryoyq1onnb59fz.jpg" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First of all why might you want to commit transactions privately ? Well that's because:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;you would not like to get questions from some financial institutions in your country where do you have the money from to commit the transaction ? &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you would not like to have an blocked (bank) account all of the sudden and frozen funds on the account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you want to diversify your risk when it comes to payments, because you are afraid that your bank-account can be suspended and funds frozen due to fake allegations or any other reasons.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you don't want your government or any entity besides you and the other party to know about the transaction.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;you would like to make finally a utility tool out of crypto instead of just hodling it and waiting for moon time :D&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are yet other reasons why you might like to make transactions privately, I could make a whole article about, but it would be too longish. So now let's discuss the payment options !&lt;/p&gt;
&lt;h3&gt;
  
  
  1. Cash &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzs2rtxncgfyenfkm9kk3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzs2rtxncgfyenfkm9kk3.jpg" alt="cash"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I guess there will be no wonder at all if I say that the most private way of committing a transaction is apparently &lt;strong&gt;Cash&lt;/strong&gt; !&lt;/p&gt;

&lt;p&gt;It's of course not digital form of payment, however cash enables you to pay whenever and wherever you would like to and you have the certainty that those funds will not be stolen. Cash is untrackable, basically government does not track where each coin, banknote is, so paying cash is anonymous and you do not live any digital or trackable fingerprint afterwards.&lt;/p&gt;

&lt;p&gt;You could use cash however in multiple cases for digital I will name later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tradeoffs:&lt;/strong&gt; Large amount of cash can be tough to transport, you could not transport such large amount of cash in the airport and you would need to report it. But not only in the airport, if police would stop you and open the trunk they prolly detain you, even if it's not determined by the law of certain country that you're guilty. Also cash can be lost, so you need to take care of the banknotes so you don't loose them.&lt;/p&gt;
&lt;h2&gt;
  
  
  Cryptocurrencies &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As I'm really deep into this industry and I know the standards and behaviors that are common for this industry (similiar to other indurstries) and because all of the ways to pay privately will be  almost only rely on crypto-currency in terms of replenishment procedure, issuance fee payment and independent payment procedure (meaning you will not have to rely on another person).&lt;/p&gt;

&lt;p&gt;At first I want to emphasize, that cryptocurrencies are still considered as high-risk assets due to their volatility, low capitalisation.&lt;/p&gt;

&lt;p&gt;You might think &lt;em&gt;how come, though Bitcoin was lately for 128k $ ?!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;It all comes to math and the market cap, the maximal market cap of cryptocurrencies was about 4.28 Trillion Dollars (October 2025), now it's about 2.6 Trillion Dollars, so you see that the market cap gone severely down more than 30% in 6 months, which is fast in comparison to traditional markets.&lt;/p&gt;

&lt;p&gt;Also to depict the size of cryptocurrencies in juxtaposition with other markets. At the time of writing the article, &lt;a href="https://companiesmarketcap.com/assets-by-market-cap/" rel="noopener noreferrer"&gt;Global Real Estate Market is worth about 4 trillion Dollars, Total Gold value is about 33 trillion Dollars, Silver is 4.26 Trillion dollars&lt;/a&gt;. It's projected that cryptocurrencies have share of ~2% in Global GDP. So we talk about really microscopic market, compared to the other markets like Stocks or Real Estates.&lt;/p&gt;

&lt;p&gt;My take is that cryptocurrencies always will be treated such more of speculative, more volatile than other advanced markets and lesser regulated asset than the others, it always will be such market (unless people understand not to purchase stupid flashy coins, without reading the details and investing in another 100 shitcoins).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One should educate themselves to know what they are doing&lt;/strong&gt;, before taking any action related to this market whether it goes about first purchase or entering this market should be backed by education. &lt;/p&gt;

&lt;p&gt;Here I will provide a &lt;em&gt;&lt;strong&gt;guide for beginners with crypto&lt;/strong&gt;&lt;/em&gt;, covering the security, not financial rules. So that regardless of who you are, this will fit everyone. &lt;/p&gt;

&lt;p&gt;Because not every developer and especially not every person is acquainted with cryptocurrencies at all. Let's now jump into the details.&lt;/p&gt;
&lt;h2&gt;
  
  
  Intro, Good Web3 Practices + &lt;strong&gt;SURPRISE 🤩&lt;/strong&gt; &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;
&lt;h3&gt;
  
  
  What is Blockchain ? &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;Blockchain in a short description is a type of distributed system 🌐, a decentralized ledger 📄 of transactions, distributed over many computers that running a specific computer program, these computers are called nodes, maintained by variously named, depending on the consensus protocol the network operates on maintainers (people), for the most popular cryptocurrency (Bitcoin) it would be miners, for Ethereum it would be validators.&lt;/p&gt;

&lt;p&gt;For the rest of the explanation I will stick to the word miners. The Miners are giving their computational power to the network to validate transactions on the network made by the networks participants. &lt;/p&gt;
&lt;h3&gt;
  
  
  Why do miners keep the network on going ?
&lt;/h3&gt;

&lt;p&gt;Their incentive to keep validating the transaction and supplying the network with their computational power is trying to solve computational puzzle 🧩 for something called block, which is basically a stack of transactions, which is pushed ➡️ in certain intervals (e.g. In Bitcoin it's 10 minutes or in Ethereum 12 seconds) to the blockchain as a sealed registered, irreversible change of the balances of network users, if they are sound with previous block states.&lt;/p&gt;
&lt;h3&gt;
  
  
  What makes cryptocurrencies special 🤔 ?
&lt;/h3&gt;

&lt;p&gt;It offers trustless transactions, and it's durability. Meaning that one Node (a miners devide) that has the last state enables the others to reclaim the state and restart the entire process of validating transactions and mining based on the last state. Also if one Node is down, it does not break the entire network, because as it's said it's decentralized, so there is no central entity governing the network, what complete opposite of current bank system that collapses after one bank's systems shut off.&lt;/p&gt;
&lt;h3&gt;
  
  
  How big is the reward ?
&lt;/h3&gt;

&lt;p&gt;The reward depends on each blockchain, however in Bitcoin Network, for solving the puzzle correctly, currently the prize is 3.125 BTC + fees from the transactions per block. The prize is algorithmicaly determined to be slashed every 4 years on a halve (that pertains only Bitcoin Network, the more blockchains, the more approaches) which is also named halving. It's designed so because the amount of Bitcoins possible to exist is only 21 million of coins, currently the supply is near to 20 million, thus Bitcoin has the got the name of digital gold, at least so called in mainstream. &lt;/p&gt;
&lt;h3&gt;
  
  
  What is cryptocurrency ?
&lt;/h3&gt;

&lt;p&gt;It's more trickier with cryptocurrency to explain, because they split on coins and tokens.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Coins, which are the native currency of the network for miners to get their reward in and for network participants to transfer the coins between each other.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And there are tokens, that just programs/code (in the industry called smart-contracts) deployed on the blockchain that should imitate a coin and should have feature just like a coin has. There are of course various types of tokens, but this goes beyond the frames of the article. For more knowledge, I advice doing personal searches.&lt;/p&gt;
&lt;h3&gt;
  
  
  Where to learn on Web3 ?
&lt;/h3&gt;

&lt;p&gt;I could write about cryptocurrencies more, but for more knowledge about cryptocurrencies I highly encourage to read a book like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.amazon.com/Bitcoin-Standard-Decentralized-Alternative-Central/dp/1119473861" rel="noopener noreferrer"&gt;Standard of Bitcoin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.amazon.com/Bullish-Case-Bitcoin-Vijay-Boyapati/dp/1737204118" rel="noopener noreferrer"&gt;Bullish Case For Bitcoin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;or &lt;a href="https://whiteboardcrypto.com/" rel="noopener noreferrer"&gt;visit this website&lt;/a&gt; and watch the materials, I really enjoyed videos made by that guy (shout out again !)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For those who desire to start with web3 programming&lt;/strong&gt;, here I can recommend checking out &lt;a href="https://www.cyfrin.io/updraft" rel="noopener noreferrer"&gt;Cyfrin Updraft&lt;/a&gt;. They have a ton of courses on web3 programming from smart-contracts for beginners to more advanced topics like work of Uniswap etc.&lt;/p&gt;

&lt;p&gt;I also highly advice to contact people or join a crypto community, who already have experience in the market and will help you go into the world step by step, if you're a freshman.&lt;/p&gt;

&lt;p&gt;Other useful source of knowledge for new and intermediately advanced people who want to broaden their knowledge, would be to join events and conferences and get in touch with people you are interested in, whether a developer, investor, VC, don't hesitate, just talk to them. So have I got my first work as an ambassador in an RWA start-up I worked for 4 months long.&lt;/p&gt;

&lt;p&gt;And of course, there will be as always conceited morons 🤵, who think that if they have a sport-car 🏎 or SUV car 🚙 in leasing and are earning 100k$+ annually, that they are rulers of the world 🫅, but to be honest although those people are indeed a significant fraction of web3, but you should not be discouraged to learn about Web3 only because of them.&lt;/p&gt;

&lt;p&gt;So now, as I explained the basics of blockchain and cryptocurrencies, I can explain couple of good practices for the security and privacy of the funds you have. The advice will not contain the financial advice, rather how one should operate in this market in order not to loose their funds. &lt;/p&gt;
&lt;h3&gt;
  
  
  Rules in Web3 to follow
&lt;/h3&gt;
&lt;h3&gt;
  
  
  1 Rule
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;NEVER SHARE YOUR PRIVATE KEY / SEEDS / MNEMONIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What it means is that you should not give the access to your crypto-wallet to anyone/anything (website, person), unless it's a verified software for a wallet like Metamask, Phantom. It's more of marketing slogan, because what they mean with keys is your seed phrase more known as mnemonic (12-24 words, that are giving you access to your wallet).&lt;/p&gt;

&lt;p&gt;And now Mr. Anonymous 🥷 will come with his educational and technical explanation 🤓 of what is the difference between mnemonic and private-key, public key and address (I read &lt;a href="https://github.com/ethereumbook/ethereumbook" rel="noopener noreferrer"&gt;Mastering Ethereum&lt;/a&gt; 5 times, somewhere I have to utilize this knolwedge). It's fully optional so if you want to go to next rule, skip it.&lt;/p&gt;
&lt;h3&gt;
  
  
  Detailed explanation of wallet related terms &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;All blockchains base on one type of cryptography &lt;a href="https://en.wikipedia.org/wiki/Public-key_cryptography" rel="noopener noreferrer"&gt;Public-Key Cryptography&lt;/a&gt; (also known as asymmetric cryptography). &lt;/p&gt;

&lt;p&gt;Essentially, it's feature is based on the fact that users do not have to share the same key for secure interactions with each other (like sending transaction) as in case of symmetric cryptographic algorithms like 3DES, ChaCha, Salsa20, Trivium, AES-256 and more gibberish names you won't probably understand (and you don't have to now). You actually might recall AES and ChaCha from last article mentioned.&lt;/p&gt;

&lt;p&gt;I will explain to you how users can interact with each other on chain, because a lot of tutorials actually screw up explaining this and it's because of misunderstanding of how public key cryptography works.&lt;/p&gt;

&lt;p&gt;In order to understand how public key cryptography works in blockchain properly, I need to explain 2 concepts. In blockchain mostly often 2 schemes of PKC are used:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Elliptic Curve Cryptography&lt;/strong&gt; - for key generation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Diffie Hellman Key Exchange&lt;/strong&gt; - for key-exchange as the name implies, but primarily it also manages the key generation &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now some of you might scratch your head and recall the previous lines that &lt;strong&gt;THE PKC WAS ABOUT NOT USING THE SAME KEY !&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;And you're quite right, nerdy boy/lady. For being alert, you won ticket to become a cricket 🦗🤣 (just kidding)&lt;/p&gt;
&lt;h3&gt;
  
  
  What is then the Diffie Hellman Key-Exchange ?
&lt;/h3&gt;

&lt;p&gt;It's a mathematically defined scheme designed for key generation and exchange of them, without creation one asymmetric key for interactions. For public key cryptography protocols to allow participants to communicate, which security relies on &lt;strong&gt;Discrete Logarithm Problem&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Luftie, WTF IS DISCRETE LOGARITHM PROBLEM ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Discrete Logarithm Problem&lt;/strong&gt; - is a mathematical problem based on difficulty of inversion of exponentiation in finite cyclic groups, the main matter to understand that, for DHKE protocols it is easy to generate the keys, but if you want to invert them it is not feasible given current computer powers (I do not take quantum risk into account, there are of course risks of Shor Alogirthm, that poses the threat to Public Key Cryptography. I will not focus on it in this article).&lt;/p&gt;
&lt;h3&gt;
  
  
  DHKE Framework
&lt;/h3&gt;

&lt;p&gt;Now in order DHKE to work, it needs 2 elements for set-up also &lt;br&gt;
called &lt;em&gt;domain parameters&lt;/em&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The large prime &lt;em&gt;p&lt;/em&gt; - it will be a base for generation of every new key&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The primitive element also called generator (I will define it as &lt;code&gt;g&lt;/code&gt;) - to define the size of the finite cyclic group&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  The Key Generation and Key Exchange Framework
&lt;/h3&gt;

&lt;p&gt;Setup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2 parties willing to communicate with each other without third parties&lt;/li&gt;
&lt;li&gt;The large prime number &lt;em&gt;p&lt;/em&gt; as a base&lt;/li&gt;
&lt;li&gt;The primitive element / finite cyclic group generator &lt;em&gt;g&lt;/em&gt; for defining the size of the group&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now both party, I'll name them A and B have compute their private and then public keys.&lt;/p&gt;

&lt;p&gt;Now what do both parties A and B do ?&lt;/p&gt;

&lt;p&gt;For Party A:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The private key &lt;em&gt;a&lt;/em&gt; is chosen, such that &lt;em&gt;a&lt;/em&gt; belongs to {2, p-2} set of elements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Then they calculate the public-key by performing action below&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;A = p^a mod g
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;ul&gt;
&lt;li&gt;You could ask why isn't the group {0, p} ? It's to avoid results zero values and to ensure there are non-trivial values. A private key of 0 would mean that an individual has no influence on the key exchange process, effectively providing no security. This approach helps prevent predictable outputs and potential attacks, ensuring the robustness of the key exchange.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The same action is performed for B party with only change of the variable names&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The private key &lt;em&gt;b&lt;/em&gt; is chosen, such that &lt;em&gt;b&lt;/em&gt; belongs to {2, p-2} set of elements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Then they calculate the public-key by performing action below&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;B = p^b mod g
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Now, to allow both parties to interact with each other &lt;strong&gt;one party needs to send their public key to the other party&lt;/strong&gt; &lt;strong&gt;and then the receiver party signs the received key with their private key and so has the common key been established&lt;/strong&gt; without a need of chosen symmetric key, so improving the security of our .&lt;/p&gt;

&lt;p&gt;If you're still confused, here a Screenshot from book &lt;a href="https://www.cryptography-textbook.com/" rel="noopener noreferrer"&gt;"Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Second Edition", written by Christof Paar, Jan Pelzl and Tim Güneysu&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2w4ikuiqs6ds8ptw2k6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2w4ikuiqs6ds8ptw2k6.png" alt="paar book img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a great introduction to cryptography and definitely worth buying. If you want to learn about cryptography however, but not want to spend money, Professor Christof Paar (that I personally wish that one day I met with him irl) and ignited my passion to cryptography even stronger, has a &lt;a href="https://www.youtube.com/playlist?list=PL3boZvi-wmN6r4HUGUpRSk5uhEcTNfjSS" rel="noopener noreferrer"&gt;playlist with lectures on cryptography essentials&lt;/a&gt;, so click the link to check it out.&lt;/p&gt;
&lt;h3&gt;
  
  
  Elliptic Curve Explanation
&lt;/h3&gt;

&lt;p&gt;Elliptic Curve Cryptography (for short ECC) - is a scheme of PKC and just like DHKE, it relies on DLP (Discrete Logarithm Problem).&lt;/p&gt;

&lt;p&gt;An elliptic curve itself is a special type of polynomial equation that can be presented on Cartesian Plane just like circle can be, by equaltion of &lt;code&gt;x^2 + y^2 = r^2&lt;/code&gt; and it generates a certain group of solutions, elements that the solution has to be in. &lt;/p&gt;

&lt;p&gt;The difference is for ECs that they are defined over a finite field and not real numbers, mostly it's prime field where all arithmetic is done modulo a prime p. The formula for elliptic curve looks as following&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;y^2 is equivalent to x^3 + a * x + b mod p
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;There are conditions yet to be fulfilled for a valid elliptic curve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;p &amp;gt; 3&lt;/li&gt;
&lt;li&gt;4 * a^3 + 27 * b^2 != 0 mod p
And it comes together with an imaginary point of infinity, which goes beyond the scope of the article.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How is the public key generated in ECC ?
&lt;/h2&gt;

&lt;p&gt;The formula for generation of the key is much easier on the first glimpse than what was presented in DHKE. The formula is&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pubK = G * privKey
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where G is a base point and the final public key is indeed also a point with coordinates of x and y.&lt;/p&gt;

&lt;p&gt;However it's not as easy as it might seem to be calculated and it involves elliptic curve arithmetic and usage of &lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#Double-and-add" rel="noopener noreferrer"&gt;add-double algorithm&lt;/a&gt;&lt;/strong&gt;, which goes beyond the scope of this article. &lt;/p&gt;

&lt;p&gt;** For those sneaky guys, who are alert, might say it's easily breakable, just divide The e.g. PubK x coordinate with base point's x and you got private key. And all might be cool, except the fact that ** there is no such operation as division in modular arithmetic** on which modular cryptography bases. &lt;strong&gt;There are only addition, substraction, multiplication, inversion&lt;/strong&gt;. &lt;/p&gt;

&lt;h3&gt;
  
  
  ECC Arithmetics
&lt;/h3&gt;

&lt;p&gt;Just for those who are curious and those who want to understand the workflow in a deeper level of how Elliptic Curve Cryptography Arithmetic works to generate a public key. There are actually 2 main actions that are performed on elliptic curves and it is adding (for 2 different points) and doubling (for the same points). Now how does is it performed on the curve ?&lt;/p&gt;

&lt;p&gt;I allow my self to quote the explanations from the Professor Paar's Book:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Point Addition P+Q&lt;/strong&gt; This is the case where we compute R = P + Q and P != Q. The construction works as follows: Draw a line through P and Q and obtain a&lt;br&gt;
third point of intersection between the elliptic curve and the line. Mirror this third&lt;br&gt;
intersection point in the x-axis. This mirrored point is, by definition, the point R.&lt;br&gt;
Below you can see how the addition is performed on a curve:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fem4erzutm0l0m5rihb6y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fem4erzutm0l0m5rihb6y.png" alt="img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Point Doubling P+P&lt;/strong&gt; This is the case where we compute P+Q but P = Q. Hence, we can write R = P + P = 2P. We need a slightly different construction here. We draw the tangent line through P and obtain a second point of intersection between&lt;br&gt;
this line and the elliptic curve. We mirror the point of the second intersection in&lt;br&gt;
the x-axis. This mirrored point is the result R of the doubling. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Below I provide the depiction of how doubling is performed on a curve together with formulas to calculate the points.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F216p7nhum0co4si4usdo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F216p7nhum0co4si4usdo.png" alt="dbling"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Additionally, it's worth mentioning that ECC provides the same level of security as discrete logarithm systems with considerably shorter operands (approximately 256–512 bits vs. 2048–4096 bits).&lt;/p&gt;

&lt;p&gt;It's on average twice as slow compared to symmetric cryptographic algorithms, but it provides convenience, independence and facilitated way to set-up a common secret key without relying on the protocol, because de facto we are responsible for this key generation, having our private key.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So to summarize&lt;/strong&gt;: Blockchains use DHKE for key exchange only and ECC for key generation which they next exchange in order to set up and mutual key for communication. Below you can see mathematical notation from Professor Paar's Book:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnd9kkkt2fax1b25f76x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvnd9kkkt2fax1b25f76x.png" alt="paar"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Seed ? Private Key ? Public Key ? Mnemonic ? What is different about them ?
&lt;/h3&gt;

&lt;p&gt;Now I hope you survived my technical, mathematical, gibberishy explanations and now I can tell you what are the differences according to the terms.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Seed phrase/Mnemonic&lt;/strong&gt; - A seed phrase or mnemonic is a list of 12 to 24 words that is generated to grant access to a cryptocurrency wallet. The generation process involves taking a private key and adding a checksum to it, which effectively increases the bit length from 132 bits to 264 bits. The resulting data is hashed, and the output is split into segments, each with 11 bits. Since there are 2048 words in the mnemonic dictionary (typically derived from the English language), the segments can be mapped effectively to create meaningful words. Some cryptocurrencies, like &lt;strong&gt;Monero&lt;/strong&gt;, use a longer mnemonic of 25 words for additional security.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Private Key&lt;/strong&gt; - a cryptographic key used to sign transactions on a blockchain. It grants full control over the associated cryptocurrency funds and must be kept secret at all costs. If someone gains access to your private key, they can manipulate your wallet and transfer your assets without your permission. The private key is a long, random string of numbers and letters, and losing it means losing access to the funds tied to that key.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Seed&lt;/strong&gt; - it's essentially a hash of the private key combined with a checksum. It serves as a master key that can be expanded into multiple private keys, facilitating the management of a wallet containing various cryptocurrencies. The seed is usually derived from or represented by the mnemonic phrase, allowing users to retrieve their wallet through the mnemonic if needed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Public Key&lt;/strong&gt; - derived from the private key through a cryptographic algorithm. While the private key must remain confidential, the public key can be shared openly with others. It acts as an identifier associated with a wallet on the blockchain. The public key is necessary for receiving funds, as it allows others to send cryptocurrency to your wallet.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Address&lt;/strong&gt; - a short string derived from the public key, specifically taking the least significant 20 bits (at least for EVM chains) of it and hashing the result. This address serves as your wallet's public identifier on the blockchain, where others can send cryptocurrency. Because addresses are shorter and formatted for easier sharing, they provide a convenient way for users to send and receive funds without exposing the entire public key.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After this explanation you should no longer confuse address with public key. Once you make a transaction you pass an address to your wallet not public key.&lt;/p&gt;

&lt;h3&gt;
  
  
  Personal Story on the rule violation 🥲
&lt;/h3&gt;

&lt;p&gt;It's the most important in my opinion and often forgotten about rule, and I actually also fell victim phishing attack, where I  violated this rule. &lt;/p&gt;

&lt;p&gt;It was back 2024 as I've been developing my start-up 🛠️ &lt;/p&gt;

&lt;p&gt;I regularly invested my money in stocks from 2022/23 in stocks and Bitcoin (only bitcoin back then), back then crypto were yet before hitting 100k and one evening as I've been seeking people who are working or are from Switzerland to connect with them, I joined a discord channel of an Swiss Cheese Exchange, where I fell a phishing scam attack because of an fake bot announcement about the exchange collaboration with Opensea 🌏. The website looked neatly at that time (I had no clue what Opensea is back then). &lt;/p&gt;

&lt;p&gt;I wanted to see/test out how to mint an NFT, I clicked the button to connect my wallet with the website. However it turned out that the popup was coming from the website (it prolly was some shit of absolute position in css or so) and I passed there my seed because it has shown I had no connection of my ledger wallet with metamask. &lt;/p&gt;

&lt;p&gt;I was then shown on their website that something went wrong with the wallet connection and I gave up (it was late night and I was exhausted checking out the internet after work on my project), at the next morning I noticed this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj17ott1rbogp6azroqpn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj17ott1rbogp6azroqpn.png" alt="rekt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I invested back then about 4k $, so if I were to sell it at the peak or a bit below like 120k $ / 1 BTC. I do not blame anyone, because it is my fault only I didn't fact-check. &lt;/p&gt;

&lt;p&gt;I would have earnt about 210% + on the investment. Of course, now one can only contemplate, but apparently I don't regret I lost those funds. Of course it is a loss, but that also made me realise to set certain rules when it comes to my day to day behaviour.&lt;/p&gt;

&lt;h2&gt;
  
  
  Rule Number 2 + SURPRISE 🤩
&lt;/h2&gt;

&lt;p&gt;This rule is namely to grab oneself a hardware wallet also known as cold wallet, why is cold wallet such a big deal ? &lt;/p&gt;

&lt;p&gt;Let's &lt;em&gt;&lt;strong&gt;REALLY shortly&lt;/strong&gt;&lt;/em&gt; explain it. There are 2 types of wallets in web3, Software wallets like Metamask or Phantom that are so called hot wallets and are connected to the internet always. And there are cold wallets which are hardware devices that are needed to approve certain transaction ones you want to perform it in cold wallet's software and so noone can move funds from your wallet if they both don't know your mnemonic and do not have access to your hardware device to validate the transaction.&lt;/p&gt;

&lt;p&gt;Cold wallet would be a perfect solution if you have funds that you would not like to loose, like personal investments, savings etc. Hot wallet's I'd rather use it for some daily transactions like below 500$ valued wallets to prevent from bigger losses.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why to bother really about Cold Wallets ?
&lt;/h3&gt;

&lt;p&gt;In case of software wallets like Metamask or Phantom, the vulnerability lies in the fact that it's always connected to the internet and there might be many cases where you could fell a victim of scam or your keys could be captured by a hacker. Also one never knows if metamask will not be hacked and so one. &lt;/p&gt;

&lt;p&gt;The most known companies offering the wallets are &lt;br&gt;
Ledger, Trezor, Keystone Wallet and for sure many more companies. &lt;/p&gt;

&lt;p&gt;My personally first crypto wallet was Ledger. However due to many controversies with this wallet provider and uncertainties about security of my funds, and the kidnapping of CEO. I thought on buying a new wallet, but always lacked time to do it finally and there was always something more important to be done.&lt;/p&gt;

&lt;p&gt;Here you can see what such wallet looks like (It is jus disasambled by me, no worries you will get a full one :D)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4j1cvf16me417dhhsjp.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4j1cvf16me417dhhsjp.jpeg" alt="wallet"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SURPRISE TIME !
&lt;/h2&gt;

&lt;p&gt;Surprisingly, my posts got enough visibility, to get an email with an enquiry about partnership from OneKey company. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaad3f3gicvk6g3n2noq.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiaad3f3gicvk6g3n2noq.jpeg" alt="onekey"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And after my research, answering of my questions and check of the company, I decided to take up the collaboration and I have a big pleasure to announce, that I have a partnership with &lt;a href="https://onekey.so/r/Luftie" rel="noopener noreferrer"&gt;OneKey&lt;/a&gt; and with my promo-code: Luftie, you got 10% discount.&lt;/p&gt;

&lt;p&gt;They are open-source, so I appreaciate the transparency. They are based in Chin, backed by big names but independent and were not involved in any actions with governments like passing data or data breaches, in 2023 there was an vulnerability found that was actually a hardware bug than the firmware, &lt;a href="https://cointelegraph.com/news/onekey-says-it-s-fixed-the-flaw-that-got-its-hardware-wallet-hacked-in-1-second" rel="noopener noreferrer"&gt;here you can read on it&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj2fepj7zty4xp7nwdn3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj2fepj7zty4xp7nwdn3.jpg" alt="surprise-time"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Model of the wallet, I received is OneKey Classic 1S and it looks as above. I have to confess that not the wallet triggered an impression on myself but rather the quality of the box and how well the wallet was packed with add-ons. Shammy leather inside, elegant box, security tapes to strip off to open up the box + cool stickers and equipment like sheets for your mnemonic 😁 and that's for 79$, they have shown care of every detail and took care of customer experience, whereas my Ledger Nano S Plus was bought for about 80$+ and was just a box with set-up but low quality e.g. stickers box.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9khfc7rtrfmrdztv0na5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9khfc7rtrfmrdztv0na5.jpg" alt="wallet-onekey"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The wallet has bluetooth support, so when I was about to confirm the transaction, the connection with e.g. PC is not necessary. This has it's convenience pros, but the one con is that there are cases already that via BLE there were malware spread over AI robots performed, so this is a thing to consider if you want to use it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9uj28vrwomihn9zmrll.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9uj28vrwomihn9zmrll.jpg" alt="cable"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The things that only caused for me a bit of issues was that I could not connect my wallet with my Desktop PC directly, because it doesn't have USB-C gateway and when I used the adapter even with bluetooth on, it could not find the wallet and I had to import the wallet via transfering via QR-code.&lt;/p&gt;

&lt;p&gt;The other things is the Flatpak-version, because it caused crashes on my Linux devices (at least Desktop) so it would be cool if they would have fixed it and also make dedicated versions for distributions specifically like &lt;code&gt;.deb&lt;/code&gt; files, so that I could attach the wallet's software to my panel and access it easily.&lt;/p&gt;

&lt;p&gt;They have support for all Operating Systems and what I appreciate an APK file, so that you can download the software from the website and it matters to me, due to google's psychopathic conquerence wet dreams to make u use only apps from official store. Again I recommend everyone to go to &lt;a href="https://keepandroidopen.org" rel="noopener noreferrer"&gt;Keep Android Open Website&lt;/a&gt; ! &lt;/p&gt;

&lt;p&gt;And they have even extensions for chroemium based browsers, so you can use it in Brave, I would be more than happy however to see Firefox support as well.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq30tc84pzgw9nh6yt5p0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq30tc84pzgw9nh6yt5p0.png" alt="img"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Wallet has also a far more advanced Defi activity-participation detection outside of the wallet's software. So it displays more balances and helps you track state of your defi activity and investments like staking, lending or liquidity. Which Ledger does not.&lt;/p&gt;

&lt;h3&gt;
  
  
  Overall
&lt;/h3&gt;

&lt;p&gt;After using the wallet for a week, I can highly recommend this, it's far better than what I experienced with Ledger. As a side-note OneKey wallets support also Trezor-modes, if one would be curious about this. So if you search for a new wallet or you start with crypto and are about to purchase your first hardware wallet, OneKey is a very good option in my opinion, especially with my code 🥰 &lt;/p&gt;

&lt;h3&gt;
  
  
  3 Rule, Be Wary of Phishing Scams
&lt;/h3&gt;

&lt;p&gt;Scammers often create fake websites or emails that mimic legitimate platforms. Always double-check URLs and avoid clicking on links from unsolicited messages. Educating yourself about common phishing signs can significantly reduce risk.&lt;/p&gt;

&lt;p&gt;The best solution would be to use Browser like Brave and Metamask extension that support scam detection on bigger scale.&lt;/p&gt;

&lt;h3&gt;
  
  
  4 Rule, Understand the Basics of Blockchain
&lt;/h3&gt;

&lt;p&gt;Familiarize yourself with how blockchain works, including concepts like decentralization and consensus protocols. This foundational knowledge helps you make informed decisions about which projects to invest in and understand potential risks.&lt;/p&gt;

&lt;h3&gt;
  
  
  5 Rule, Research Projects Thoroughly
&lt;/h3&gt;

&lt;p&gt;Before investing in any cryptocurrency, conduct thorough research regarding its technology, team, community support, and use case. Understanding fundamentals helps to identify potentially fraudulent projects. Be doubtful by default about the projects.&lt;/p&gt;

&lt;h3&gt;
  
  
  6 Rule, Be Aware of Market Volatility
&lt;/h3&gt;

&lt;p&gt;The crypto market is highly volatile, with prices fluctuating significantly in short periods. Prepare for emotional reactions to market swings; consider setting stop-loss limits or using dollar-cost averaging when investing.&lt;/p&gt;

&lt;h3&gt;
  
  
  7 Rule, Beware of Fake or Scam Airdrops
&lt;/h3&gt;

&lt;p&gt;Airdrops can seem appealing but may mask scams. Always validate the legitimacy of the project offering airdrops by checking their official channels. Never provide your private keys to claim an airdrop.&lt;/p&gt;

&lt;p&gt;I myself have plenty of scams ERC-20 tokens and NFT-721, here an example of one pointed out in the red circle.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcua4vjhjs5di9bugmxgi.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcua4vjhjs5di9bugmxgi.jpeg" alt="scam-airdrop"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  8 Rule, Understand Transaction Fees
&lt;/h3&gt;

&lt;p&gt;Different blockchains have varying transaction fees based on network demand. Familiarizing yourself with these costs can help in choosing the right time to make transactions without losing excessive funds to fees.&lt;/p&gt;

&lt;h3&gt;
  
  
  9 Rule, Backup Your Wallets
&lt;/h3&gt;

&lt;p&gt;Regularly backup your wallet data and store it in a safe place. This ensures that you can recover your funds if your device fails. Create multiple copies and consider encrypting sensitive information for added security.&lt;/p&gt;

&lt;p&gt;NOW, enough of the stuff and into details of private payment options we go !&lt;/p&gt;

&lt;h2&gt;
  
  
  Privacy Coins &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;First option of private payments with cryptocurrencies are indeed those coins, whose base on blockchains with enhanced privacy algorithms. And this section will be about privacy coins indeed.&lt;/p&gt;

&lt;p&gt;** Important ⚠️ : In 2027 European Union is about to implement a "ban" 🤣 for privacy coins. Meaning from all the exchanges operating in EU, the privacy coins like Monero (XMR), DASH or ZTrash 🗑... eh sorry, ZCash will be delisted from the exchanges.&lt;/p&gt;

&lt;p&gt;That's why one would need a VPN, noone should decide about what one would should what should not purchase when it comes to assets in which one allocates their money. And next article from this series will be indeed on VPNs. But as you will discover later on you might not need VPN 😉&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Monero
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqp0dlsghxsllax5xcs8h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqp0dlsghxsllax5xcs8h.jpg" alt="xmr"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The golden standard for privacy coins, the most well known, the best privacy coin, the most adopted privacy coin. So could Monero be described and here is what is it's features and why it's so good.&lt;/p&gt;

&lt;p&gt;In the service &lt;a href="https://kynot.me" rel="noopener noreferrer"&gt;kycnot.me&lt;/a&gt; you can find the services that accept monero and you can pay monero with.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is making Monero so private ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring signatures&lt;/strong&gt; - are the foundation. When you send Monero, your transaction is mixed with multiple other transactions from the blockchain—typically 16 decoys by default. To an observer, it's impossible to tell which transaction in the ring is actually yours. The ring signature proves you authorized the payment without revealing which of your past outputs funded it. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stealth addresses&lt;/strong&gt; - handle the receiving side. Instead of having one public address where everyone can see your incoming transactions, Monero generates a unique one-time address for each transaction. &lt;/p&gt;

&lt;p&gt;*&lt;em&gt;RingCT (Ring Confidential Transactions) *&lt;/em&gt; - hides the amounts. Without RingCT, ring signatures would still leak transaction values, allowing someone to statistically determine which transaction in the ring was real by process of elimination. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy guarantee&lt;/strong&gt;: All three layers are mandatory and automatic on every Monero transaction. No user choice required. The sender, receiver, and amount are all hidden from the blockchain. &lt;/p&gt;

&lt;p&gt;HOWEVER ! Despite the strong cryptography, Monero is not perfectly anonymous in practice. The vulnerability is not the on-chain protocol, but metadata leaks: IP addresses, exchange deposit/withdrawal timing, wallet fingerprints, and behavioral patterns. Thus next article on VPNs will be adviced to read.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. ZCash
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuigvdd1cqlerv7hazqn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuigvdd1cqlerv7hazqn.jpg" alt="zTrash"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This cryptocurrency seems to play as "the second best", but as already Micheal Sailor said: "THERE IS NO SECOND BEST !", this pertains privacy coins. &lt;/p&gt;

&lt;p&gt;Personally I never owned ZTrash and never will do, because it's not genuine Privacy Coin as it does not enable privacy by default, last year it's been pushed with marketing everywhere and was backed by Grayscale VC in my opinion only to suck the wallets of investors dry and generate a narrative.&lt;/p&gt;

&lt;p&gt;ZTrash..ekhm, sorry &lt;strong&gt;ZCash&lt;/strong&gt; privacy layer relies on Zero Knowledge Proofs Cryptography, namely a scheme of SNARKs (zero-knowledge Succinct Non-Interactive Arguments of Knowledge, don't fucking worry idk myself yet what it exactly means 😁, but therefore I'm here to learn and educate)&lt;/p&gt;

&lt;p&gt;A zk-SNARK is a mathematical proof that lets you prove a statement is true without revealing any information about the statement itself.  The proof is "non-interactive"—you don't need back-and-forth communication to prove something is valid. &lt;/p&gt;

&lt;p&gt;This is theoretically more sophisticated than Monero's ring signatures. The cryptography is stronger. However, ZCash has a fatal flaw: privacy is not mandatory.&lt;/p&gt;

&lt;p&gt;Privacy guarantee: Only if you manually select shielded z-addresses. If you forget, your transaction is as traceable as Bitcoin. The cryptography is potentially stronger than Monero, but adoption is so weak that practical privacy is minimal.&lt;/p&gt;

&lt;p&gt;Law enforcement reality:  The privacy feature exists, but most people don't use it.&lt;/p&gt;

&lt;p&gt;Thus for me it's &lt;strong&gt;ZTrash&lt;/strong&gt; :D Imo, avoid if possible to use this spy-coin 😘&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Canton - Privacy for Institutions
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frds5kjjrq57o6j925awi.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frds5kjjrq57o6j925awi.jpg" alt="Canton"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Canton is &lt;strong&gt;fundamentally different&lt;/strong&gt; from traditional privacy coins because it's an institutional blockchain designed for enterprise use, not pseudonymous privacy. It employs a "need-to-know" privacy model built on the Daml smart contract language. &lt;/p&gt;

&lt;p&gt;The key innovation is stakeholder-based privacy: only parties explicitly defined in a smart contract (signatories and observers) ever see the transaction data. The system separates "content" from "ordering"—your participant node stores and validates full, unencrypted contract data, but the sequencer (which orders transactions) only sees encrypted metadata and hashes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Private Are Payments ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Payments on Canton are private from public observers and competitors, but not from regulators or law enforcement. Canton achieves sub-transaction privacy, meaning complex multi-party deals can be broken into smaller private pieces where only relevant parties see their portion. &lt;/p&gt;

&lt;p&gt;For example, if Bank A and Bank B are swapping assets via a central bank, Bank A and Bank B can exchange private details that the Central Bank doesn't need to see. However, Canton is explicitly not anonymous-by-design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who Sees Your Payments ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Only the parties you define in your smart contract see your transaction details. A regulator can be added as an "observer" at the contract level for real-time, read-only visibility without exposing data to the market.&lt;/p&gt;

&lt;p&gt;The network uses techniques to mask metadata patterns to prevent traffic analysis. Since Canton requires institutional participation with identified entities (financial institutions, market infrastructure providers, etc.), there is no pseudonymity—your identity is known to the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is Your Balance Publicly Visible ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;No. Your balance is private within your participant node. Canton uses Amulets (UTXO-style contracts) rather than account-based balances, and these follow the same privacy rules as any other asset on the network—only relevant parties can see them. Unlike public blockchains, there is no single global state visible to all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Law Enforcement and Blockchain Analysis risks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Canton is highly traceable by design because it prioritizes regulatory compliance. The system includes built-in auditability and selective disclosure mechanisms. A law enforcement agency can be granted observer access to relevant contracts, providing complete visibility into those transactions.&lt;/p&gt;

&lt;p&gt;Because Canton serves major financial institutions (Goldman Sachs, HSBC, BNP Paribas, DTCC, Deutsche Börse) that already maintain extensive AML/KYC compliance, the infrastructure for law enforcement investigation is inherent to the protocol. There have been no known cases of law enforcement struggling to identify Canton participants because the entire design assumes institutional identity and regulatory oversight.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. MobileCoin - THE ACTUAL SECOND BEST !
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvyk3ct2ozu64zq05if4w.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvyk3ct2ozu64zq05if4w.jpg" alt="MobileCoin"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If we were to estabilish some SECOND BEST PRIVACY COIN, Mobile Coin deserves it fully in my opinion, here is why.&lt;/p&gt;

&lt;p&gt;MobileCoin combines technology from Monero and Stellar, using &lt;strong&gt;CryptoNote technology&lt;/strong&gt; alongside zero-knowledge proofs to hide transaction details. The core cryptographic layers are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring signatures&lt;/strong&gt; (using MLSAG/CLSAG schemes) - hide which output is actually being spent, creating sender ambiguity&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One-time addresses&lt;/strong&gt; (similar to stealth addresses) - prevent linking outputs to a known recipient address&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ring Confidential Transactions&lt;/strong&gt; (RingCT) - conceal amounts while preserving verifiability&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intel SGX&lt;/strong&gt; - secure enclaves running on validator nodes to protect transaction processing.&lt;/p&gt;

&lt;p&gt;Transactions are validated in SGX secure enclaves using a consensus protocol adapted from Stellar's Federated Byzantine Agreement. Everything is written in Rust, separating it technically from Monero while maintaining similar privacy principles.&lt;/p&gt;

&lt;h4&gt;
  
  
  How Private Are Payments?
&lt;/h4&gt;

&lt;p&gt;Payments are cryptographically unlinkable on the blockchain—blockchain analysts cannot connect sender to receiver from transaction data alone. The transaction recipients are hidden through one-time addresses that cannot be linked back to the recipient's actual wallet address. Amounts are hidden using RingCT. However, Signal (the messaging app integrating MobileCoin) itself can see behavioral metadata: who you're sending to, when, and how frequently, though not the transaction content itself. This is a critical distinction between on-chain privacy (strong) and metadata privacy (limited).&lt;/p&gt;

&lt;h4&gt;
  
  
  Who Sees Your Payments?
&lt;/h4&gt;

&lt;p&gt;On the blockchain level: nobody can identify the sender or receiver from transaction data alone. The recipient's identity is protected by one-time addresses, and the sender is obscured within a ring of possible signers. However, Signal knows the timing, frequency, and recipient patterns of your financial behavior, even though it cannot see the actual amounts or transaction content. This means Signal could provide this behavioral metadata to authorities if compelled.&lt;/p&gt;

&lt;h4&gt;
  
  
  Is Your Balance Publicly Visible?
&lt;/h4&gt;

&lt;p&gt;No. Your balance is completely private. Only the blockchain contains UTXOs and key images; no addresses or balances are published. However, anyone with your private view key (which you can share for auditing purposes) can see your incoming transactions.&lt;/p&gt;

&lt;h4&gt;
  
  
  Law Enforcement and Blockchain Analysis
&lt;/h4&gt;

&lt;p&gt;MobileCoin transactions themselves cannot be traced via blockchain analysis because of the cryptographic protections. However, law enforcement can compel Signal for transaction metadata (timing, patterns, recipient information). &lt;/p&gt;

&lt;p&gt;The weakness is not the coin itself but the application layer: Signal's servers maintain records of who sends to whom and when. Unlike true decentralized systems, MobileCoin transactions on Signal go through Signal's infrastructure, creating a record even if the blockchain itself is private.&lt;/p&gt;

&lt;p&gt;There have been no major publicized cases of law enforcement successfully de-anonymizing MobileCoin transactions on the blockchain itself, but this is largely because MobileCoin has &lt;strong&gt;limited adoption&lt;/strong&gt; and is primarily used within &lt;strong&gt;Signal&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;However when it comes to an risk of &lt;strong&gt;Signal&lt;/strong&gt; revealing some information about your balance or wallet whatsoever, &lt;strong&gt;I guess&lt;/strong&gt; (check it on your own) they will have everything encrypted and agencies will have troubles detecting detecting the person anyways and likely will not succeed.&lt;/p&gt;

&lt;h2&gt;
  
  
  My take on privacy and psuedo-privacy coins
&lt;/h2&gt;

&lt;p&gt;For the privacy and security of yourself, stick to Monero and MobileCoin and avoid usage of pseudo-private protocols. In time of October 2025 - January 2026, there was a huge boom on privacy coins market, there were new protcols like GHOST or MIDNIGHT announced and the narrative was pushed strongly to drain people's wallets and it ended up as always with a huge dump. &lt;/p&gt;

&lt;p&gt;One important thing we should understand is that, those assets will be volatile and we have to embrace it and have no remorse when e.g. we paid for something with XMR and the price of XMR raised, then such feeling of "Oh fuck, I could have waited to pay less" happens to everyone, but think of it as you would e.g. purchase the headphones for 100$ and after 2 months after purchase, then the price dropped to 85$, would you have remorse of having spent to much ? Well likely not, because you enjoy the headphones technology work and it was worth the price and you live further, no big deal.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where to but crypto-anonymously ? &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Of course if you would like to have cryptocurrencies and you have only fiat, you first need to purchase crypto obviously. But how can you purchase anonymously ? Here I have found approaches you could do.&lt;/p&gt;

&lt;h3&gt;
  
  
  P2P Exchanges
&lt;/h3&gt;

&lt;p&gt;These types of exchanges are connect you directly with a person who wants to sell their assets or want to buy some assets, instead of automating it like Centralized Exchanges usually do, disabling you from direct contact. In order to make a trade however often a deposit is needed in some currency, in order to allow you to betray the seller. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://bisq.network/" rel="noopener noreferrer"&gt;Bisq&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://retoswap.com/" rel="noopener noreferrer"&gt;Haveno&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://robosats.org/" rel="noopener noreferrer"&gt;RoboSats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://localcoinswap.com/" rel="noopener noreferrer"&gt;LocalCoinSwap&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And other one, that I found out about at the NBX event I was and it's prolly more focused sadly only on polish customers but &lt;a href="https://www.spot.club/" rel="noopener noreferrer"&gt;Spot.Club&lt;/a&gt; seems to be interesting. It's not working yet, but it is about to be launched. &lt;/p&gt;

&lt;p&gt;Also there was an CEX that offers privacy preserving solution namely Kanga, a polish exchange offers Kanga-Local, where you can meet in person with the local person and purchase/sell your crypto.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnlgaebl3rube7qn8tj0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpnlgaebl3rube7qn8tj0.png" alt="kanga local"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It has it's pros such as possibility to connect with the person and make a relationship, become friends and do something together, but the trade-off here would be the fees to be paid.&lt;/p&gt;

&lt;p&gt;As it will turn out, &lt;strong&gt;PRIVACY COMES AT A PRICE&lt;/strong&gt; ! Price in terms of finances, convenience, social-acceptance (normies might treat you as weirdo) and other layers of where you would need to pay the price of being different.&lt;/p&gt;

&lt;p&gt;The other risk is that the person might be undercover agent or officer that could gather data on you and accuse you and all of the sudden ruin part of your life, it happens, it's not often but it's good to keep it mind.&lt;/p&gt;

&lt;p&gt;I mention it because there are far more cases of innocent people, who try to keep themselves away from government or they are preaching their opinions that are not complimentary towards surrveilance-apparatus of governments. &lt;/p&gt;

&lt;p&gt;To emphasize it: &lt;strong&gt;I'm not supporting criminal activities, I condemn and despise people performing any illegal action, but I condemn even more "legal" actions that violate freedom and privacy of regular people.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  ATMs
&lt;/h3&gt;

&lt;p&gt;On the time of writing there are yet places where there is a limit upto 1000 Euro value transaction to deposit/withdraw from the ATM, so checkout if it's available in your country and if there are any distributors of Crypto ATMs.&lt;/p&gt;

&lt;h3&gt;
  
  
  Exchange Points
&lt;/h3&gt;

&lt;p&gt;In Exchange Points (ger. Wechselstube) you have the same opportunity in some countries in EU yet to make a deposit/withdrawal upto 1000$ value. But from June on it is about to be &lt;/p&gt;

&lt;h2&gt;
  
  
  Alternative Crypto &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;By design, cryptocurrencies were about to liberate people from banks and centralized institutions. By having an (pseudo)anonymous network, people were supposed to make transactions without a trust to the 3rd party and even the person we make the tx with.&lt;/p&gt;

&lt;p&gt;And although the first one is partially achieved, the second one has been screwed up and currently if you go through KYC on an exchange in any form you can at most remain pseudo-anonymous, and if you do full KYC then it's just as though a woman (or man, coz people might squeek in the comments that I'm misogynist) would say they care about their privacy, but walks out in transparent clothes outside, hope you get the point.&lt;/p&gt;

&lt;p&gt;However, as mentioned earlier. There STILL (26.04.2026) are in some places options available to remain private without identification requirement.&lt;/p&gt;

&lt;p&gt;Most blockchains are transparent, therefore by chain-analysis law-enforcement can easily determine which wallets are yours together with CEXes support. &lt;/p&gt;

&lt;p&gt;And here are suggestions how to preserve anonymity in public blockchains (use EVM-chains, Bitcoin or Solana for convenience):&lt;/p&gt;

&lt;h3&gt;
  
  
  Coin mixing services
&lt;/h3&gt;

&lt;p&gt;Mixing or tumbling services pool transactions from multiple users, breaking the link between input and output addresses. Services like Tornado Cash (though now sanctioned in some jurisdictions) or CoinJoin for Bitcoin shuffle transactions together, making it harder to trace funds to their original source.&lt;/p&gt;

&lt;h3&gt;
  
  
  Address separation
&lt;/h3&gt;

&lt;p&gt;Create new addresses for each transaction rather than reusing the same wallet address. This prevents someone from linking multiple transactions to a single entity, though sophisticated chain analysis can still correlate addresses with patterns.&lt;/p&gt;

&lt;h3&gt;
  
  
  Use multiple wallets
&lt;/h3&gt;

&lt;p&gt;Maintain separate wallets for different purposes (trading, savings, donations) and avoid sending funds between them in traceable ways.&lt;/p&gt;

&lt;h3&gt;
  
  
  Non-custodial solutions
&lt;/h3&gt;

&lt;p&gt;Self-custody with hardware wallets means no exchange holds your identity data, though KYC (Know Your Customer) requirements at on/off-ramps still create on-chain entry points traceable to you.&lt;/p&gt;

&lt;h3&gt;
  
  
  VPN and Tor
&lt;/h3&gt;

&lt;p&gt;Route your blockchain activity through privacy tools like Tor or a VPN to hide your IP address from node operators and observers monitoring network traffic.&lt;/p&gt;

&lt;h3&gt;
  
  
  Non-KYC CEXes
&lt;/h3&gt;

&lt;p&gt;If you have already some crypto and you want to trade it or purchase e.g. coins that are not available in P2P and you want to use CEX, there are CEXes that allow you to use it without going through KYC, email is enough (use aliases ;D for that)&lt;/p&gt;

&lt;p&gt;Such exchanges are e.g. &lt;a href="https://www.htx.com/" rel="noopener noreferrer"&gt;HTX&lt;/a&gt; or &lt;a href="https://www.coinex.com/en/" rel="noopener noreferrer"&gt;CoinEx&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Virtual &amp;amp; Physical Cards
&lt;/h2&gt;

&lt;p&gt;The most desired option to pay and acquire goods is to have a card with some fiat. And here is where Visa/Mastercard Prepaid Virtual or even Physical cards come into play.  This comes with certain risks which I will describe, but for now I want to focus on the products specifically.&lt;/p&gt;

&lt;p&gt;I just want to emphasize the fact that it took 4 days, with 4 days in a row sleeping on average 3/4 hours a day to make this ranking/list. A lot of other articles on the internet are outdated and most of the products turnt into KYC-required cards or were just non-KYC the same as &lt;a href="https://zebec.io/" rel="noopener noreferrer"&gt;ZEBEC&lt;/a&gt; is.&lt;/p&gt;

&lt;p&gt;There are a lot of scammy non-kyc cards providers, that after linking you to the provider to activate the card, they require KYC there. One of such companies is &lt;a href="https://zebec.io/" rel="noopener noreferrer"&gt;ZEBEC&lt;/a&gt; (I still wait for my refund 10$ 😘), that does not require KYC from you on &lt;strong&gt;their side&lt;/strong&gt;, but when you get your activation token with link to &lt;strong&gt;third-party&lt;/strong&gt;, either pass the ID or you got rekt.&lt;/p&gt;

&lt;p&gt;That of course is nicely inserted in terms/privacy policy in one of their points:&lt;/p&gt;

&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;Third-Party Services &amp;amp; Wallet Control
Independent Partners
Some features rely on independent third parties such as:
Wallet providers
Card issuers
Payment processors
Blockchain networks
Staking providers
Banking partners
These companies operate separately from Zebec and may have their own rules. We do not control their operations and cannot guarantee their performance or availability.&lt;/li&gt;
&lt;/ol&gt;
&lt;/blockquote&gt;

&lt;p&gt;And it occured in 10+ cases with other providers/softwares. The inferrance is simple, READ FUCKING TERMS AND POLICIES ! If not all,  then filter it out to check parts you are interested in by searching for keywords (&lt;code&gt;CRTL&lt;/code&gt; + &lt;code&gt;F&lt;/code&gt;) and discover what the app legally is. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://laso.finance/" rel="noopener noreferrer"&gt;Laso.Finance&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qrg66gchrrozblbackr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qrg66gchrrozblbackr.png" alt="laso"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First there will be Laso Finance, probably mostly known No-KYC card issuer. &lt;/p&gt;

&lt;p&gt;And they offer only one time load cards, so the cards are not reloadable, basically the amount you will be willing to spend, so much only you will be able to spend. And you cannot top-up again.&lt;/p&gt;

&lt;p&gt;Laso Finance supports a lot of tokens from 3 chains EVM, Solana and Stellar (Beta).&lt;/p&gt;

&lt;p&gt;They offer 3 types of cards:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;US Only card&lt;/strong&gt; - Basically a one-time load card, that you can attach to your digital wallet and pay for products. Payments are possible only in US.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Push to Card&lt;/strong&gt; - This solution is not a card, rather a tool to replenish your debit card e.g. of your bank or any other card provider with cryptocurrencies without KYC. And usefull for crypto-offramp without KYC, recurring payments, ATMs withdrawals, etc.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;International&lt;/strong&gt; - This card has the same terms as the US one, with the difference that it has a 3.8% from the initial card load (min 100$ - max 1000$)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;&lt;p&gt;&lt;strong&gt;Canada Card&lt;/strong&gt; - The same card type as US and international one, enables you to spend canadian dollars without a fee.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  Feature Comparison
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Feature&lt;/th&gt;
&lt;th&gt;Wise (Multi-Currency Card)&lt;/th&gt;
&lt;th&gt;Push to Card&lt;/th&gt;
&lt;th&gt;Internationalp (USD)&lt;/th&gt;
&lt;th&gt;Canada&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Deposit Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;4.8%&lt;/td&gt;
&lt;td&gt;3.8%&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Transaction Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Withdrawal Fee&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;td&gt;14%, $10 min (if possible)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Minimum Order&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$20&lt;/td&gt;
&lt;td&gt;$10&lt;/td&gt;
&lt;td&gt;$100&lt;/td&gt;
&lt;td&gt;$20&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Maximum Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;td&gt;$9,541.98&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;td&gt;$1,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Apple Pay&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Google Pay&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;td&gt;✓&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Reloadable&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Automatic Balance/Transaction on Updates&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;FX Rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;-2%&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;3D Secure (3DS)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;td&gt;✗&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Daily Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Monthly Limit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;As in other cases, there is a list of countries where the product is not available, thus I advice to &lt;a href="https://laso.finance/international/nr" rel="noopener noreferrer"&gt;familiarize yourself with the list before purchasing&lt;/a&gt;. The list on the picture is trimmed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3vpn8mkl31gevozghzq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3vpn8mkl31gevozghzq.png" alt="list"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://privacygateway.io/prepaid-cards" rel="noopener noreferrer"&gt;Privacy Gateway&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;This is non-kyc virtual card provider but besides that they also have their bridge for any coins/tokens to purchase or sell XMR for other crypto, they have plenty of available tokens/coins you can exchange on. I will focus however only on the card this time here are the features that the card offers:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4qqele3qahf3aii8gsm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4qqele3qahf3aii8gsm.png" alt="PRIVATE-KYC"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The card it's self that they offer is re-loadable and they have chosen a different approach when it comes to business model compared to the previous options.  So you can actually reload this card as much as you would like to and enjoy private payments.&lt;/p&gt;

&lt;h3&gt;
  
  
  Card Features
&lt;/h3&gt;

&lt;p&gt;✓VISA virtual card&lt;/p&gt;

&lt;p&gt;✓Instant card issuance&lt;/p&gt;

&lt;p&gt;✓No KYC, just name and email&lt;/p&gt;

&lt;p&gt;✓$10,000 monthly limit&lt;/p&gt;

&lt;p&gt;✓Tap to pay worldwide&lt;/p&gt;

&lt;p&gt;✓Add to Google Pay&lt;/p&gt;

&lt;p&gt;✓Apple Pay (coming soon)&lt;/p&gt;

&lt;p&gt;✓3DS support&lt;/p&gt;

&lt;p&gt;✓0% fee on USD purchases&lt;/p&gt;

&lt;p&gt;✓3.5% loading fee&lt;/p&gt;

&lt;p&gt;✓24/7 support&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No Samsung Wallet Support (checked personally :D)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And instead of some one-time payments they decided to run a subscription model, they charge 5$/mo  (currently there is a discount from 10 $ dollars a month) &lt;/p&gt;

&lt;p&gt;No other fees included.&lt;/p&gt;

&lt;h3&gt;
  
  
  How the Card Purchase Works — Step by Step
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This explanation comes from official PrivacyGateway.io Support, after contacting them.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Choose your amount&lt;br&gt;
Pick one of the fixed denominations: $250, $500, or $1,000.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enter your details&lt;br&gt;
• A name (this is what gets printed on the card — it doesn’t have to be your legal name)&lt;br&gt;
• An email address&lt;br&gt;
• Choose your payment method: XMR, BTC, LTC, SOL, USDT/USDC (POL) — and we keep adding more!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Send crypto to your payment address&lt;br&gt;
You get a unique deposit address and an exact crypto amount to send. The amount already includes the 3.5% service fee.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card is created after a few confirmations&lt;br&gt;
Once your transaction gets enough blockchain confirmations, the system automatically creates your virtual Visa card. You receive a 32-character access hash — this is your only credential. There is no account, no password, no email login. Copy it and save it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The swap happens automatically&lt;br&gt;
The system automatically converts your crypto to load the card in USD. You do nothing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card goes active&lt;br&gt;
Once the funds arrive, your card balance updates. You log into your dashboard with your access hash to see the balance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reveal card details&lt;br&gt;
Click “Reveal Card Details” to see your full card number, expiry, and CVV — and you’re ready to use it!&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;I have to express my gratefulness to the Privacy Gateway Support, who has given me possibility to test out the card on my own and check, if the card will be supported by Samsung Wallet (as I decided to test my setup for private payments): Samsung + No SIM-CARD + dumb email + digital wallet (optionally VPN with thetered internet from my other one) as shown below (yes I glued over the cameras, lol):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwcgqmfzjveeogiavppia.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwcgqmfzjveeogiavppia.jpg" alt="shown below"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And for that money as a genuine tech-jounalist I grabbed my free meal, so thanks Leo 🫡 for giving me the opportunity. So did my meal look like, absolute aristocracy 🙌&lt;/p&gt;

&lt;p&gt;Btw do not allege me with being bribed, because if the product would not work or the support would not be so transparent about helpful, I would not put it on the list.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbjipcoe27nhjf9xryo7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbjipcoe27nhjf9xryo7.jpg" alt="free meal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Take&lt;/strong&gt; : This is a very low-budget, reasonable option to get started private payments with and to use on a daily basis for expenditures. I personally will soon think about using their product.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.goblincards.com/" rel="noopener noreferrer"&gt;Goblin Card&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvvjm7rjk1gfxfk1hchh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgvvjm7rjk1gfxfk1hchh.jpg" alt="gbc"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I have to confess at first, I was skeptical about this product because of the fact that it's the only &lt;strong&gt;&lt;em&gt;PHYSICAL&lt;/em&gt;&lt;/strong&gt; card that is &lt;strong&gt;non-kyc&lt;/strong&gt;. And you might also have such an impression ? But therefore I gone and asked questions about the details of how the products work, I watch materials available and research the internet and not blindly copy paste from Gepetto-AI or any other Clueless Models (just kidding, lol). &lt;/p&gt;

&lt;p&gt;I also faced a bit of behavior, words from people in the group, that I was not about to expect and they weren't nice experiences. However, with the support of Goblin Cards, we jointly clarified everything and all my doubts got resolved. Shortly describing the company, it is a company based in Mexico, with small team, originally being and OTC exchange transforming into an card provider, which as the founder said was &lt;em&gt;natural move&lt;/em&gt;. &lt;/p&gt;

&lt;p&gt;People might yet be skeptical about the location, but a lot of that has been explained in &lt;a href="https://www.youtube.com/watch?v=Buwqib-h6BY&amp;amp;t=638s" rel="noopener noreferrer"&gt;the podcast by the founder (check it out)&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Really interesting stuff to learn about the financial system. The names of the systems like SPEI or Archus caught my interest and I will definitely read about it in my free time). The company attended Monerotopia event in Mexico and intend to be active in that space as well.&lt;/p&gt;

&lt;p&gt;I must say that my suspicion was wrong, already after I watched the interview, I had an impression of being wrong. I mean the founder was too transparent and shared so many details about how their product works, that some stupid big-tech CEOs would not share. So I decided to ask directly and clarify it.&lt;/p&gt;

&lt;h3&gt;
  
  
  How is this legally compliant ?
&lt;/h3&gt;

&lt;p&gt;It bases on physical reloadable &lt;strong&gt;PREPAID&lt;/strong&gt; mastercard cards. The &lt;strong&gt;PREPAID&lt;/strong&gt; adjective to this card makes the situation turn 180 degrees. Because if it was a regular card just like offered by Revolut or any other FinTech, then it would demand KYC/AML.&lt;/p&gt;

&lt;p&gt;However, due to the fact that it bases on prepaid cards, just like those one can purchase in a mall, gas-station next to gift cards. It makes it fit completely different category of cards. That's how I understood the compliance. &lt;/p&gt;

&lt;p&gt;And the fact that it's both reloadable and prepaid, makes it work and there are people who are actually satisfied with their products on SimpleX or Telegram chat and they offer a great support. Shout out to the Goblin Cards support for collaborating to make this article exist 😎&lt;/p&gt;

&lt;p&gt;And to me, it makes sense and I really support such initiatives. If there is a grain yet of the free market and this approach is not forbidden, then it's allowed and noone should be treating them as criminals or shady guys. &lt;/p&gt;

&lt;p&gt;In Europe the VISA or Mastercard prepaid cards are barely if at all visible or accessible and it sounds strange to a lot of people. Whereas in US or in countries in the south-america and mexico, those seem to be very popular and often used.&lt;/p&gt;

&lt;p&gt;If you want to &lt;a href="https://youtu.be/_ZFWuztgPvI" rel="noopener noreferrer"&gt;watch a video on the steps and see that the card works&lt;/a&gt;, there is an hindi guy with guideance and PoW of this card at ATM, you can turn on the automatic transalation (don't forget to like if you enjoy and write some shout-out from me 😁) !&lt;/p&gt;

&lt;h3&gt;
  
  
  How does the workflow from order to activation work ?
&lt;/h3&gt;

&lt;p&gt;*Explanation provided by official Goblin Cards Support. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Purchase the card, &lt;/li&gt;
&lt;li&gt;Send shipping address&lt;/li&gt;
&lt;li&gt;Receive the card&lt;/li&gt;
&lt;li&gt;Message support to activate&lt;/li&gt;
&lt;li&gt;Receive login instructions&lt;/li&gt;
&lt;li&gt;Proceed to deposit via bot and spend
&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;That are six simple steps, that are allowing you to reclaim the control over your finances and keep it private, independent of banks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Product Details
&lt;/h3&gt;

&lt;p&gt;Card type: &lt;strong&gt;Mastercard Prepaid Reloadable&lt;/strong&gt; (Physical)&lt;/p&gt;

&lt;p&gt;∙ $5,000 USD daily spending limit&lt;br&gt;
∙ $25,000 USD monthly spending limit&lt;br&gt;
∙$500 daily ATM withdrawal limit&lt;br&gt;
∙ Balance maintained in Mexican Pesos&lt;br&gt;
∙ Chip + contactless (tap to pay)&lt;br&gt;
∙ Shipped via UPS (3–5 days worldwide)&lt;br&gt;
∙ Dedicated app for balances and transaction history&lt;/p&gt;

&lt;h3&gt;
  
  
  Pricing
&lt;/h3&gt;

&lt;p&gt;∙ Card: $350 USD one-time&lt;br&gt;
∙ Deposit fee: 3.5% (XMR: 4%)&lt;br&gt;
∙ Renewal: $100 (after 3 years)&lt;/p&gt;

&lt;p&gt;The coins they support for deposit and pay for the card is basic, but solid: BTC, SOL, ETH, USDT, XMR&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Take&lt;/strong&gt;: I would be keen to buy this card after like 1/2 years of usage of the virtual card provided by PrivacyGateway.io&lt;/p&gt;

&lt;p&gt;This solution looks very promising, but we never know what the future regulation might look like and if such solution would not be basically be banned either in EU or somewhere else. But definitely good for diversifying source of payments, if one gets blocked I can use the other.&lt;/p&gt;

&lt;p&gt;Shout out to the Goblin Cards support, who answered all my questions and resolved doubts.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.trocador.app/en/" rel="noopener noreferrer"&gt;TroCador&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yw3012vkobbgzftvrtp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yw3012vkobbgzftvrtp.png" alt="TroCador"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A service that offers variety of private solutions for payments like cross-chain swaps, bridges, anon donations (to implement for devs), gift-cards to be purchased. However we will focus this time only on the visa cards and how can we pay anonymously.&lt;/p&gt;

&lt;p&gt;Trocador offers up to $1000 prepaid visa cards. There is no limit on the number of cards you can buy. You can top-up this card with any cryptocurrency available in Trocador, they support Bitcoin, XMR, ZCash, MobileCoin, Ether, Solana, their tokens and many more (checkout their site)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Issuance fee&lt;/strong&gt;: 3%, depending on the provider.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2-Monthly payment&lt;/strong&gt;:  2.5 $&lt;/p&gt;

&lt;p&gt;Tx fee: Instead of the usual 2% Currency Conversion Fee, they charge $0.75 for each non-USD transaction&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prepaid Card Providers&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt; MyPrepaidCenter (US Only) (US Dollars) - as the owners of the service say, it might be also used anywhere else but they do not guarantee it will work (likely will not).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prepaid Cards Provided by Reward (US Only) (US Dollars) - the same as previous option.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Prepaid Cards Provided by Swype (US Dollars) - Available internationally.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trocador issues a card from 3 different card providers:&lt;/p&gt;

&lt;p&gt;Transactions in different currencies than that of the card may incur a currency conversion fee by the card provider (usually 2% or $0.75).&lt;/p&gt;

&lt;p&gt;The discomfort might come for VPN users as they will be blocked from redeeming their cards and you would have lost your funds (not worth it, buddy :( )).&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://stealths.net/" rel="noopener noreferrer"&gt;Stealths&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xvls33byy4yezfg5e20.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xvls33byy4yezfg5e20.png" alt="Stealths"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stealths as their competitors besides offering visa/mastercard prepaid cards, it also has e-sim card plans and gift cards in their offer. But as said before, here I focus on payment cards only. &lt;/p&gt;

&lt;p&gt;There are 4 types of Cards that they offer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Visa Gift Card (Only US) with upload topup from 5 to 1000$ only one time&lt;/li&gt;
&lt;li&gt;American Express Gift Card (Only US) topup from 5 to 3000$ only one time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here are the details of those products:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This product is delivered automatically. &lt;/li&gt;
&lt;li&gt;Card activation code and instructions will be added to order page.&lt;/li&gt;
&lt;li&gt;American Express gift cards are issued by amexrewardcard.com &lt;/li&gt;
&lt;li&gt;It's possible to view transaction history and balance details on card issuer's website.&lt;/li&gt;
&lt;li&gt;Location to use: Only US&lt;/li&gt;
&lt;li&gt;Cards are issued by U.S. bank and card currency is USD (Amex).&lt;/li&gt;
&lt;li&gt;Support of Digital wallets (Google Pay, Apple Pay, etc.):  Yes,  But digital wallets checks your IP and trust scores, so we don't guarantee you can link it.&lt;/li&gt;
&lt;li&gt;support 3D secure: No. Some merchants may decline the transaction for this reason.&lt;/li&gt;
&lt;li&gt;ATMs or recurring billing: Not allowed &lt;/li&gt;
&lt;li&gt;Online Acceptance: limited, you are advised to test the product with low amount at first.&lt;/li&gt;
&lt;li&gt;Expiry time: 6 months (extension and reload not available) .&lt;/li&gt;
&lt;li&gt;You should not redeem more than 2 gift cards from same device in 24 hours.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fees &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;5% of the card top-up amount or minimal  5$ 
## Reloadable Cards&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Stealths also offers reloadable prepaid cards. One of the product is Rewarble Voucher&lt;/p&gt;

&lt;h3&gt;
  
  
  Rewarble Voucher
&lt;/h3&gt;

&lt;p&gt;Fees: min 5$ or 7.5% of the amount topped up.&lt;/p&gt;

&lt;p&gt;Details for the product:&lt;br&gt;
Delivery: automatic, comes together with &lt;/p&gt;

&lt;p&gt;Support for Problem: Rewarable (MasterCard) / Visa Support&lt;/p&gt;

&lt;p&gt;You need to activate card after purchase. Card issuer will ask for email and address. It's not allowed to use VPN on redemption, you should provide a valid email address.&lt;/p&gt;

&lt;p&gt;Issuance of first prepaid card on Rewarble is free, additional cards and reloads cost 4.5% + $1.99. For more details on pricing, check their website.&lt;/p&gt;

&lt;p&gt;It's possible to view card balances and transactions on the issuer's website.&lt;/p&gt;

&lt;p&gt;Rewarble offers multiple prepaid card options, we recommend "Suna Mastercard" product. Card availability and mobile wallet acceptance might be limited in your region. It's recommended to test with small amount first.&lt;/p&gt;

&lt;p&gt;You can use Rewarble voucher code to reload existing card.&lt;/p&gt;

&lt;p&gt;Cards are issued by U.S. bank and card currency is USD. Card supports foreign transactions, FX fee may be charged by card issuer.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rewarble cards are valid for 7 days (+ another 7 days with free extension) initially, after validity period it costs $1.49/mo to keep card active.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Single-Use VCC (High Limit)
&lt;/h3&gt;

&lt;p&gt;Intial topup: min 500$ - max 30k $&lt;br&gt;
Fee: 8% or minimum 40$&lt;/p&gt;

&lt;h3&gt;
  
  
  Product Details
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Delivery of this product is manual. Please do not create order without contacting us, delivery is possible in work hours.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This is a virtual card, not a prepaid card. Virtual cards have higher approval rates.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The card is not for long term use, you need to spend the balance in the same day you receive card details (up to 3 transactions allowed).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Card currency is USD. It can be used internationally with different currencies. The bank charges 2.5% fee for non-USD transactions, please keep that in mind.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The card supports 3D secure. It works on most online merchants; including PayPal, Amazon EU, Stripe checkouts. It does not support mobile wallets.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://stealths.notion.site/Welcome-to-Stealths-NET-27b6dfb81d098021ad49e096bbcb00d1" rel="noopener noreferrer"&gt;Terms of the card&lt;/a&gt; are available in this link for more info.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://www.bitrefill.com/" rel="noopener noreferrer"&gt;BitRefill&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl09ip1gqqj1dxlkeb5h1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl09ip1gqqj1dxlkeb5h1.png" alt="bitrefill"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a marketplace with a variety of gift-cards and products (e.g. E-SIM cards, Phone-refills) you could purchase with crypto. They do not support Monero or from privacy coins, they support only DASH. They support as the name might suggest, Bitcoin, Ether, Solana, LTC, DOGE, TON, SUI and USDC and USDT&lt;/p&gt;

&lt;p&gt;How their business model works, is that they apply a fee to your final checkout, when you are about to pay.&lt;/p&gt;

&lt;h2&gt;
  
  
  How do they earn money ?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqm2oo5oiyebxjk1lics0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqm2oo5oiyebxjk1lics0.png" alt="screenshot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From the example you can see they apply some fees to the final checkout. They have lower rate of ETH/EUR pair (at the time of writing it was 2049.65) and there it's 2031.30. So allegedly they charge ETH rate + about 1% fee (222.08 Euro in total), but they can sell it on the market for 224.10 Euro (just as an example, if they would have sold it after the payment would have arrived how the money would be made). So in total they earnt about 2%&lt;/p&gt;

&lt;p&gt;The fee might vary depending on the selected coin/token to be paid with.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My take&lt;/strong&gt;: This product would be used by me in case I would like to gift someone a b-day a gift card, or if I would like to pay for booking or AirBnb wihout attaching my card to their service. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://linkpay.io/" rel="noopener noreferrer"&gt;LinkPay&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsplfigeof2rd99ypacd0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsplfigeof2rd99ypacd0.png" alt="link-pay"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's a virtual visa/mastercard card provider, that issues cards for specfic usage like to spend for ChatGPT subscription, Netflix.&lt;/p&gt;

&lt;p&gt;I messaged the support with request for clarification, what card can be purchased without KYC and here is the answer I got.&lt;/p&gt;

&lt;p&gt;Without KYC verification, you can still use basic operations with Linkpay, but there are limitations. The monthly spending limit is $500, and only advertisement cards are available for issuance. Verification is required to increase limits and enable full card functionality. &lt;/p&gt;

&lt;p&gt;Verification in Linkpay increases your limits and enables full card functionality. While basic operations are available without it, verification is required for higher limits and extra security. Here are the verification levels: &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No Verification&lt;/strong&gt;: &lt;br&gt;
Monthly spend limit: $500 &lt;br&gt;
Only advertisement cards are available. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Basic Verification&lt;/strong&gt; (Email and other details + ID Upload): &lt;/p&gt;

&lt;p&gt;Monthly spend limit: $2000 &lt;br&gt;
All cards are available except Apple/Google Pay. &lt;br&gt;
Requirements: Full name, address, and valid ID details. &lt;/p&gt;

&lt;p&gt;Unlimited Verification: &lt;/p&gt;

&lt;p&gt;No limits on spend or card types. &lt;br&gt;
Requirements: Valid ID photo and passing a live check. &lt;/p&gt;

&lt;h2&gt;
  
  
  Other Cards (to personal verification)
&lt;/h2&gt;

&lt;p&gt;Above were all card solution presented, that I accessed as legal, not shady, plausible. As I said before there were a lot of cards, who seemed to by non-kyc only, but there are solutions where I had issues to access them if they are scammy or not. Thus I list it here, so you can check it on your own.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.bingcard.com/" rel="noopener noreferrer"&gt;BingCard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.kardpay.app/" rel="noopener noreferrer"&gt;KardPay&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://veil.cards/" rel="noopener noreferrer"&gt;Veil&lt;/a&gt; (this one really looks sketchy, similiarly to Privacy.com design, almost all scam opinions on trust pilot)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://superwallet.xhype.io/" rel="noopener noreferrer"&gt;XHype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.solcard.cc/product" rel="noopener noreferrer"&gt;Solcard&lt;/a&gt; - Although it looks fully legit, their privacy policy and terms of usage didn't allow me to determine whether they their 3rd party does require KYC or not. About the product they offer, they offer a reloadable virtual card. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The offer of this card however is very limited, and if you have the virtual card without KYC, you are not able to attach it to your digital wallet. Here you have the details on the product they offer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuctbxv0pn6ceya6eh8m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuctbxv0pn6ceya6eh8m.png" alt="solcard-3"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Below you got a screenshot, where they advertise themselves, having non-KYC card:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foz4sasi9nf724zuy13de.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foz4sasi9nf724zuy13de.png" alt="solcard-3"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao0snyefx9wxorebxvy5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao0snyefx9wxorebxvy5.png" alt="solcard-2"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fateqfxmnb95vlea4kyy3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fateqfxmnb95vlea4kyy3.png" alt="solcard-1"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Again any action you take, you take it on your own, do not allege me afterwards if you loose money and don't come to me whining you lost money, I warned you.&lt;/p&gt;

&lt;h2&gt;
  
  
  Other Option to pay anonymously/pseudoanonymously &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Other methods I thought about to preserve privacy are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pay someone cash to pay for the money transfer from their account&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Solution that perhaps is the most ridiculous, but &lt;strong&gt;having a bank account&lt;/strong&gt; would be a.....&lt;/p&gt;

&lt;p&gt;LET ME FINISH, OK ? DON'T KILL ME YET 🫣.  &lt;/p&gt;

&lt;p&gt;Having a bank account in a countries without CRS, so that your financial activity stays in that country and is not reported to countries that request the data about you. Cambodia is one of such countries, that offers friendliness towards cryptocurrencies and are allowing people to pay and purchase goods with cryptocurrencies. It of course will demand you to provide your government-ID to open an account, however due to the fact that only you and your bank know about the transaction, some minimal privacy remained, but still not fully private.&lt;/p&gt;

&lt;p&gt;Also an interesting fact, Cambodia's National Bank launched &lt;strong&gt;Bakong&lt;/strong&gt;, a blockchain-based digital payment system, which represents one of the most prominent real-world implementations of blockchain technology in a national banking system.&lt;/p&gt;

&lt;p&gt;The system was designed to achieve three key objectives: improve financial inclusion (Cambodia had ~78% unbanked population at launch), modernize digital payments infrastructure, and &lt;strong&gt;reduce reliance&lt;/strong&gt; on the US dollar in everyday transactions.&lt;/p&gt;

&lt;p&gt;I find it's bold and I find it banger-news ⚡&lt;/p&gt;

&lt;p&gt;Again I mention Cambodia, because I reminded myself about the talk I had pleasure to have with people from &lt;a href="https://dev.tourl"&gt;&lt;strong&gt;Relocatify&lt;/strong&gt;&lt;/a&gt; at NBX-event, shout out to them 🫡 !&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Phew..., it's been quite a long ride, didn't it ? I hope you did enjoy the article and it was insightful to you, if so please leave a comment and a like. If you have suggestions what to change, please share it in the comments. &lt;/p&gt;

&lt;p&gt;If you're about to purchase your first wallet or a new wallet, you remember to checkout &lt;a href="https://onekey.so/r/Luftie" rel="noopener noreferrer"&gt;OneKey&lt;/a&gt; product and with my promocode: Luftie, you get 10% discount on all products available in their shop, but also &lt;strong&gt;10% off on fees on perpetuals and defi fees like staking etc.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once again, I want to express my gratefulness to OneKey team, that they noticed me and believed in me. That means a lot to me, because such things do not happen to all of small creators and I got noticed and I'm happy about it, which only propels me to create better content for you.&lt;/p&gt;

&lt;h3&gt;
  
  
  Donations
&lt;/h3&gt;

&lt;p&gt;As I promised above, here you have the addresses to my wallets for certain chains, if you want to send some coins/tokens to support me, feel free to do so. I'll be more than glad and you can send me the message on &lt;a href="https://signal.me/#eu/IAg7tcmp_ug7jH0eZUnlufpMOi7FVFSonm5mgjBbZ60QVk-UgRFFr4OV62hpePSI" rel="noopener noreferrer"&gt;Signal&lt;/a&gt; (you can also use &lt;a href="https://t.me/LuftieTheAnonymous" rel="noopener noreferrer"&gt;Telegram&lt;/a&gt;, but please avoid it, I prepare to remove my account from there. I'm fed up with it's flashiness, people that are running scams there and hoes with their channels)&lt;/p&gt;

&lt;p&gt;Crypto Addresses:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monero (XMR)&lt;/strong&gt;: 44mBpaeJSuxTSFTXRxAb289mNiPgHTk6tMaKXPjg2DNQMbmxP1dFA86Q9QnHoU8T62XhQputbGkESiQBD31QrtfN377wGD3&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bitcoin&lt;/strong&gt;: bc1q5dxqaf2xva57rlac8gj5g3apmm0edvanvscyhw&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ether (ETH)&lt;/strong&gt;: 0x524C676f9e31b6a4CaE067c41d01E9878b7FF14B&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solana (SOL)&lt;/strong&gt;: DgsvUBEvQdQVk7bxQSA2cEjFuJRwMFokeGbMXtq6MY4X&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mobile Coin (MOB)&lt;/strong&gt;: 7xB623noRRqqMxbTwqvbJWfcpycYyWEvWQAALigKn4VrwhuHZxsFP4Xkexp5MyK53pE8mfomXzDPaLXuwuQPw8RNveTQDSEuDQcPopv6Foyfei6DCkzJJx1j68j4xuXRQ94Q4SoC22vRMWKA58eNmvG2Nx2sy6wY1pu7ZzZTozYqL1vEDzGK1ajGNB9VLxppXarkpw3kBjUVbtjYzWo2iENpBpfVQ4tXaetUiGrv7EvPDa&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Once again&lt;/strong&gt;. &lt;em&gt;If you donated on one of those addresses, thank you very much for your support 💜&lt;/em&gt;&lt;/p&gt;

</description>
      <category>defi</category>
      <category>privacy</category>
      <category>cryptography</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Privacy and Security Setup to use in 2026 (Messengers + Mail) PART 2</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Tue, 21 Apr 2026 22:00:00 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36</link>
      <guid>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-online-offline-part-2-h36</guid>
      <description>&lt;h2&gt;
  
  
  Gm Hackers !
&lt;/h2&gt;

&lt;p&gt;In recent post, I presented to you what Operating Systems to use, Browsers and search engine. This time we're going into something that also pertains every internet user and namely the communication 📞&lt;/p&gt;


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__hidden-navigation-link"&gt;Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3437928" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 17&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" id="article-link-3437928"&gt;
          Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/privacy"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;privacy&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tooling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tooling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;14&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              4&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            31 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;If you did not read my last post, do it before reading that one, by clicking above 😁&lt;/p&gt;

&lt;p&gt;Over what channels/apps should you actually communicate anonymously ? This post will cover the essentials to start using more private tech. &lt;strong&gt;But before..., I have something relevant to announce&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  IMPORTANT ANNOUNCEMENT ⚠️
&lt;/h2&gt;

&lt;p&gt;In September 2026, Google plans to officially block any app that does not belong to a developer, who do not have an account in Google Play Developer Console, haven't uploaded their ID there and paid a fee. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yhyel3uefnaeinxvxap.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yhyel3uefnaeinxvxap.jpg" alt="android-behind bars"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From someone who is kind of a normie guy, does not care about the tech, surrounding world and their only worry is about to be right on time to watch their movie in TV, it might sound as a rational argument, they want to prevent android from having malware/spyware/scam-apps on their systems, thus they require their ID and pay the fee for app deployment and demand the apps to be deployed only via Play Store. &lt;/p&gt;

&lt;p&gt;Whereas on the other hand, Android natively with google is the biggest malware and spyware together with Microslop OS (known by Normies as Windows). &lt;/p&gt;

&lt;p&gt;By default your Google Play Services have access to all your accessories in the phone like camera, microphone and location. So if you do not turn them off, there is more chance your data is gathered, misused and sold. In such way, you are controlled by the technology and not conversely.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why it matters ?
&lt;/h3&gt;

&lt;p&gt;The opportunity to build, launch your apps on android without needing to pay fees, load your ID to the Third-party company that is prone to frequent breaches and is has the worst products that could be ever given is exactly the normality the user and developer wants to have.&lt;/p&gt;

&lt;p&gt;Developers can independently deploy their apps without needing to have any financial commitments or needing to identify themselves to a third-party company.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5v01tjznhb4is3cx50af.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5v01tjznhb4is3cx50af.jpg" alt="nigerian"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Think about programmers, youngster coders from African Countries (I have many friends from Nigeria (shout out to all my Nigerian brothers 💚, you're phenomenal hard-workers. I love you all)). Do you think they will have enough money to purchase a subscription and simultaneously keep their life at the standard they have without any external support ? &lt;/p&gt;

&lt;p&gt;I truly doubt it, of course for some it would be feasible, but I hear personally how those people are misused and paid slavery-salaries and try to handle somehow the money for another data packages (they do not have wi-fi, you white-trash morron 😘).&lt;/p&gt;

&lt;p&gt;Another thing is that the app might not comply with often imaginary Google Play Requirements to push the app to be visible to the Store.&lt;br&gt;
For now, indie mobile app devs simply can attach an &lt;code&gt;.apk&lt;/code&gt; to their website/webapp and let users download from there, which is actually a common solution on the internet e.g. for games.&lt;/p&gt;

&lt;p&gt;From the other perspective, it also is a violation of freedom of users of phones with custom ROMs like GrapheneOS or LineageOS, but also the average pure android user, that should decide themselves and take the risk on their own where they want to download their apps from, and it should not be estabilished by only-profit driven company, that is seeing the competition in solutions like &lt;a href="https://f-droid.org/" rel="noopener noreferrer"&gt;FDroid&lt;/a&gt; and wants to have a monopoly.&lt;/p&gt;

&lt;p&gt;When it comes to custom ROM users without default Google Play Services Support, this hits hard, because it basically disables them from using any apps at all, if the update from google comes irl.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxqe8f7d4hmqgs769dygy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxqe8f7d4hmqgs769dygy.jpg" alt="split"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Having done this, Google not only dictates you what is the source of your apps but also what OS you should have your mobile device. This is rudiculous and I will not be silent.&lt;/p&gt;

&lt;p&gt;Internet should remain free and this is an attack on digital freedom. And this freedom is about to be violated by an enterprise for profit.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyykjtnjtug28yeddt2x6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyykjtnjtug28yeddt2x6.png" alt="dev-console"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There for I gently request you&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;-- Go to the &lt;a href="https://keepandroidopen.org/" rel="noopener noreferrer"&gt;KeepAndroidOpen website&lt;/a&gt; and perform as many action from the site there as you can do.&lt;/p&gt;

&lt;p&gt;E.g. Install F-Droid, message your local regulators and inform about the monopoly attempt, Provide feedback directly to Google using their &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSfN3UQeNspQsZCO2ITkdzMxv81rJDEGGjO-UIDDY28Rz_GEVA/viewform?pli=1" rel="noopener noreferrer"&gt;Android developer verification requirements survey&lt;/a&gt;, &lt;a href="https://www.change.org/p/stop-google-from-limiting-apk-file-usage" rel="noopener noreferrer"&gt;sign the petition&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;All action matters, and even if in the end it will be implemented, you should not have any remorse to yourself, because you did something towards stopping it and were not passive.&lt;/p&gt;

&lt;p&gt;Therefore I'm requesting you, If you have the account on Google Developer Console, the best decision would be to remove it. Do not upload any IDs if you haven't yet.&lt;/p&gt;

&lt;h3&gt;
  
  
  Self-confession time
&lt;/h3&gt;

&lt;p&gt;Me myself unfortunately committed back October/November 2024 a failure by uploading the sensitive data to Google, only because I was in a process of building my start-up and wanted to have a greater outreach with my app. That project has been terminated and failed, but the data remained. Thus I recently decided to remove my account from Google Play Developer Console:&lt;/p&gt;

&lt;p&gt;Candidly speaking, when I look at how much spam I got to my gmail and how much I get to my private email addresses, 1 gmail outperforms 5 private mail addresses I have.&lt;/p&gt;

&lt;p&gt;Spam/Scam mails quantities on my email addresses in one month: &lt;br&gt;
1 Gmail: 257 mails&lt;br&gt;
5 Private Mail: 0 mails&lt;/p&gt;

&lt;h3&gt;
  
  
  Announcement Summary
&lt;/h3&gt;

&lt;p&gt;That's it from the announcement. Leave a comment down below what actions have you taken and what do you think about it, and now we can head over to the main part of the article !&lt;/p&gt;

&lt;h2&gt;
  
  
  Messengers &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauefwjaqi2h6meageuwx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauefwjaqi2h6meageuwx.jpg" alt="apps"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ok, until now we only discussed the Operating Systems to be used, but this is not all. You would not like your messages to be spied, misused on or be breached, right ?&lt;/p&gt;

&lt;p&gt;Thus we need a private communicators. Me myself on a daily basis use variety of communicators, which I really do not like being completely honest. I use:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Signal (my favorite one)&lt;/li&gt;
&lt;li&gt;Telegram&lt;/li&gt;
&lt;li&gt;SimpleX&lt;/li&gt;
&lt;li&gt;Matrix/Element&lt;/li&gt;
&lt;li&gt;Whatsapp&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From those 5, only 3 are fully reliable when it comes to privacy respecting and that are:&lt;br&gt;
Signal, SimpleX, Matrix&lt;/p&gt;

&lt;p&gt;Before I discuss those 3 chat-apps, here is why I did not include Telegram and Whatsapp&lt;/p&gt;

&lt;h3&gt;
  
  
  Why not Telegram ?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;E2EE is &lt;strong&gt;NOT&lt;/strong&gt; default—standard chats are server-side encrypted, meaning Telegram can decrypt them&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Custom encryption protocol (MTProto) instead of widely-audited standards like Signal Protocol&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IP address leak vulnerability (MTProxy doesn't actually hide IPs as users think)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2024-2026: 200+ million records leaked via various breaches; 122GB credential archive (361M unique emails) distributed across Telegram channels in late 2023/early 2024&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2024: Hackers leaked 31M+ Star Health insurance customers' medical data via Telegram bots&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2025: 43.5M Telegram channels blocked for illegal activity, but actors just recreate channels within days (low cost to operate)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Why not Whatsapp ?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Meta collects metadata ruthlessly—who you message, when, how often, your contact lists&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Meta monetizes this data for ad targeting&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;November 2025: Researchers at University of Vienna + SBA Research found 3.5 billion WhatsApp accounts via API scraping due to weak rate-limiting. They extracted profile pictures, "about" text, linked devices, OS info. One researcher: "This is a cybercriminal's dream working list."&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;June 2025: 16 billion credentials breach affecting Facebook/Instagram/WhatsApp (infostealer malware)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Early 2025: Graphite zero-click spyware (Paragon Solutions) targeted ~90 journalists/activists—gave attackers access to encrypted messages, microphone, location&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;2021: 533M Facebook accounts scraped; 58% still active on WhatsApp in 2025—leaked phone numbers have permanent value&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thus I really wish to move away from using Telegram. Unfortunately a lot of people from the crypto-industry prefer convenience and flashy effects over security and privacy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why the others ?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Signal 💙
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e6roajwla77bkyynrro.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e6roajwla77bkyynrro.jpg" alt="signal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Signal Protocol (&lt;a href="https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm" rel="noopener noreferrer"&gt;Double Ratchet&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECDH&lt;/strong&gt;: Curve25519&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: AES-256-GCM&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HMAC&lt;/strong&gt;: SHA-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Perfect Forward Secrecy&lt;/strong&gt;: Yes (every message has unique keys)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Post-Compromise Security&lt;/strong&gt;: Yes (ratcheting)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Centralized servers (Signal Messenger Inc.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimal data collection&lt;/strong&gt;: No message history, no contact lists stored server-side&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;: Phone-number based&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-device&lt;/strong&gt;: Supported but uses Sesame protocol&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata Protection&lt;/strong&gt;: Reasonable—server doesn't see message content, but does see phone number, online status, contact discovery&lt;/p&gt;

&lt;p&gt;End-to-end encryption is mandatory across all chats&lt;/p&gt;

&lt;p&gt;Open-source, regularly audited, nonprofit model&lt;/p&gt;

&lt;p&gt;Zero metadata collection unlike WhatsApp—doesn't store who you message or call logs&lt;/p&gt;

&lt;p&gt;Post-quantum cryptography roadmap in progress.&lt;/p&gt;

&lt;p&gt;Before I move to the next recommendation, I have to explain couple of terms that will actually repeat themselves throughout the article.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ratcheting&lt;/strong&gt; - A cryptographic algorithm for dynamical updates of encryption keys to ensure forward secrecy and post-compromise security. This means that even if a key is compromised, past messages remain secure, as new keys are generated for each message exchange.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm" rel="noopener noreferrer"&gt;Double Ratchet&lt;/a&gt;&lt;/strong&gt; - It's an key-management algorithm designed by first Signal's CEO. The feature of this algorithm is that after the initial key-exchange, it handles the ongoing renewal and maintenance of short-lived session keys. &lt;/p&gt;

&lt;p&gt;It combines a cryptographic so-called "ratchet" based on the Diffie–Hellman key exchange and a ratchet based on a key derivation function, such as a hash-function, and is therefore called a double ratchet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://signal.org/docs/specifications/sesame/" rel="noopener noreferrer"&gt;Sesame Algorithm&lt;/a&gt;&lt;/strong&gt; - It's an algorithm designed for message encryption sessions management in an asynchronous across multiple devices. It is however vulnerable due to the lack of cryptographic proof of ownership. Which means that if an attacker gains access or intercepts some messages of a victim, it allows the attacker to register their device and gain access to the victim's account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://en.wikipedia.org/wiki/Forward_secrecy#" rel="noopener noreferrer"&gt;Forward Secrecy&lt;/a&gt;&lt;/strong&gt; - An encryption system has the property of forward secrecy if plain-text (decrypted) inspection of the data exchange that occurs during key agreement phase of session initiation does not reveal the key that was used to encrypt the remainder of the session.&lt;/p&gt;

&lt;p&gt;All is more nicely described by &lt;a href="https://research.uni-luebeck.de/en/publications/help-my-signal-has-bad-device-breaking-the-signal-messengers-post/" rel="noopener noreferrer"&gt;researchers from University of Luebeck&lt;/a&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  Now although there is no flaw in a protocol, meaning that it would leak some information, by falling a victim of social engineering, phishing attack or your device being compromised there are no prevention measurements to cease attacker from accessing the account.
&lt;/h2&gt;

&lt;h3&gt;
  
  
  SimpleX
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj5l6pjrhdr0z7ynuyrt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj5l6pjrhdr0z7ynuyrt.jpg" alt="simplex"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: SimpleX protocol (custom, but well-designed)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: ChaCha20-Poly1305 (AEAD)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key encryption&lt;/strong&gt;: XChaCha20-Poly1305 (extended nonce for random salt)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key exchange&lt;/strong&gt;: Curve448 ECDH&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Forward Secrecy&lt;/strong&gt;: Yes (ratcheting model similar to Signal)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Fully decentralized—no central server required&lt;/p&gt;

&lt;p&gt;Users run their own SMP (SimpleX Messaging Protocol) relays or use community-hosted ones&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-knowledge&lt;/strong&gt;: SMP relays don't store messages; they're purely transient delivery points&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No user accounts&lt;/strong&gt;: Connections are queue-based, not identity-based—no UIDs linking users to the network&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata Protection&lt;/strong&gt;: Exceptional—even relay operators can't see who's talking to whom&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tor Support&lt;/strong&gt;: Built-in Tor integration (transport isolation per contact)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Audit&lt;/strong&gt;: Trail of Bits security assessment (2022, 2024)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Trade-off&lt;/strong&gt;: SimpleX prioritizes privacy over convenience. No multi-device sync yet, no cloud backups, slower message delivery. &lt;br&gt;
But this is intentional—they refuse the push-notification trap that other apps use.&lt;/p&gt;

&lt;h3&gt;
  
  
  Matrix/Element
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bilc44v5ugaeabvjas0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bilc44v5ugaeabvjas0.png" alt="matrix"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Olm + Megolm&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1-to-1&lt;/strong&gt;: Olm (Double Ratchet variant, similar to Signal Protocol)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECDH&lt;/strong&gt;: Curve25519&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message encryption&lt;/strong&gt;: AES-256-CBC (non-standard; should be GCM or &lt;br&gt;
ChaCha20-Poly1305)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HMAC&lt;/strong&gt;: SHA-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Group chats&lt;/strong&gt;: Megolm (sender-key model)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Session key&lt;/strong&gt;: AES-256&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ratcheting&lt;/strong&gt;: Weaker than 1-to-1; Forward secrecy limited by key reuse&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;: Federated—users can run their own home-server&lt;/p&gt;

&lt;p&gt;Protocol is open, but implementations vary in security&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Default E2EE&lt;/strong&gt;: Yes&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Backup Vulnerability&lt;/strong&gt;: Server-side encrypted key backups can be exploited if home-server is malicious&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata&lt;/strong&gt;: Partially exposed (room names, user IDs, member lists visible to homeserver)&lt;/p&gt;

&lt;h2&gt;
  
  
  Other worth-mentioning messengers
&lt;/h2&gt;

&lt;p&gt;There also other emerging private messengers that are worth to be paid attention to, namely &lt;a href="https://gen6.app/ncrypt" rel="noopener noreferrer"&gt;NCrypt&lt;/a&gt; and also &lt;a href="https://www.sealed.channel/" rel="noopener noreferrer"&gt;Sealed&lt;/a&gt;. Both are blockchain focused, and the messages are stored on blockchain at least in Sealed.&lt;/p&gt;

&lt;p&gt;Here are some information about Sealed and NCrypt I could find in their privacy policy and on the internet. &lt;/p&gt;

&lt;h3&gt;
  
  
  Sealed
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxrridqbsfq68nf7lg99.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxrridqbsfq68nf7lg99.jpeg" alt="Sealed"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Sealed Actually Is (The Honest Technical Take) ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is a blockchain-based, end-to-end encrypted messaging app built on a three-tier data architecture. Unlike most messengers that centralize everything on company servers, Sealed explicitly separates data into three distinct realms, each with different controllers. This is the critical design choice that sets it apart.&lt;/p&gt;

&lt;p&gt;The app is currently live on iOS and Android, operating on Algorand. The foundational principle is brutal: no single party—not even Sealed's operators—has full control over all your data. That's architecturally honest in a way Signal and Telegram aren't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Three Data Realms: How the Architecture Actually Works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm A&lt;/strong&gt;: Your Device (You Alone Control This)&lt;/p&gt;

&lt;p&gt;Everything that matters cryptographically stays on your device. Your BIP39 seed phrase, your Ed25519 wallet signing key, your X25519 encryption keypair, and all decrypted message content lives exclusively in your device's secure enclave—iOS Keychain or Android Keystore. There is no recovery mechanism. If you lose your device without a seed phrase backup, your account is gone permanently. Sealed cannot recover it, nor can any authority compel them to.&lt;/p&gt;

&lt;p&gt;Your contact list (wallet addresses plus usernames) also stays local. The implication here is clear: Sealed has zero visibility into your social graph. They can't tell who you're talking to, how often, or in what pattern.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm B&lt;/strong&gt;: The Public Blockchain (No One Controls This)&lt;/p&gt;

&lt;p&gt;Every message you send goes onto a public blockchain as an immutable transaction. This is where the privacy model gets interesting.&lt;/p&gt;

&lt;p&gt;Messages are stored as AES-256-GCM encrypted ciphertext—unreadable without your private key. But the blockchain stores more than just content. Each message includes an ephemeral sender public key (a one-time X25519 key per message, not your permanent identity), a 32-byte HMAC recipient tag used for "stealth addressing," the block-level timestamp, and your sender wallet public key (your pseudonymous identity).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here's the friction&lt;/strong&gt;: if you register a human-readable username, that gets written to the blockchain permanently. This is where anonymity breaks if you're not careful. Register as "john_crypto_banker" and link your Twitter, and the pseudonymity collapses. But if you stay wallet-address-only, the blockchain sees only a pubkey, not a name.&lt;/p&gt;

&lt;p&gt;The critical point: blockchain data is permanent and immutable. No deletion rights apply. You cannot request removal. An observer can see that a message was sent to a particular wallet address at a particular time, and if encrypted properly, they cannot read it. But the metadata—that a message exists, when it was sent, and who the recipient pseudonymous identity is—that's forever.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Realm C&lt;/strong&gt;: The Indexer Server (Sealed Controls This, With Guardrails)&lt;/p&gt;

&lt;p&gt;This is where Sealed takes a calculated privacy trade-off. To deliver push notifications and enable efficient message sync, they operate an indexer server that stores limited data:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your wallet public address (for identity and auth)&lt;/li&gt;
&lt;li&gt;Your X25519 view key (this is the big one—see below)&lt;/li&gt;
&lt;li&gt;SHA-256 hash of your view key&lt;/li&gt;
&lt;li&gt;Firebase Cloud Messaging token (for push delivery)&lt;/li&gt;
&lt;li&gt;Device platform identifier (iOS or Android)&lt;/li&gt;
&lt;li&gt;Optional username&lt;/li&gt;
&lt;li&gt;Message metadata pointers (blockchain transaction references for sync, not content)&lt;/li&gt;
&lt;li&gt;Last seen timestamp&lt;/li&gt;
&lt;li&gt;IP address (standard server logging)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The view key is the most significant privacy tradeoff and Sealed is honest about it. Your X25519 scan/view private key is shared with their indexer server. This allows the server to detect incoming messages addressed to you on-chain and trigger push notifications. The view key does not decrypt content—that's a separate key path. The view key only reveals that a message was sent to you, not what it says.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is crucial&lt;/strong&gt;: if Sealed's indexer is compromised, attackers learn who's messaging you. But they don't learn what was said. Content requires your full private key, which never leaves your device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Retention is clear&lt;/strong&gt;: indexer data expires after 90 days of inactivity. Message metadata expires after 30 days. IP logs rotate per standard practice (7–30 days). You can manually delete your account at any time with a signed deletion request, and they'll purge the view key and FCM token within 30 days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt;: No Phone Number, No Email, No Password&lt;/p&gt;

&lt;p&gt;Sealed uses pure wallet-based authentication. When you log in, your app signs a time-limited challenge string with your Ed25519 wallet private key. The signing key never leaves your device. This means there's no email-based password reset, no SIM-swap attack surface, no centralized identity store. You are your keys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The tradeoff&lt;/strong&gt;: if you lose both your device and your seed phrase, you're locked out forever. There's no "I forgot my password" recovery. This is hardcore, but it's the price of true key custody.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption Details&lt;/strong&gt;: Where Sealed Gets Technical&lt;/p&gt;

&lt;p&gt;Message content uses AES-256-GCM with per-message ephemeral keys. The key derivation path is X25519 (ECDH) + HKDF, which is industry standard. Messages are padded to a uniform 1,024 bytes before encryption to prevent length-inference attacks—a sophisticated move that prevents attackers from guessing message type based on ciphertext size.&lt;/p&gt;

&lt;p&gt;The ephemeral key per message is the Double Ratchet-adjacent concept: each message has a unique encryption key. This gives forward secrecy—if one key is compromised, only that one message is exposed, not past or future ones.&lt;/p&gt;

&lt;p&gt;The roadmap includes ML-KEM-512 (Kyber-512) as a hybrid post-quantum layer on top of X25519. This is planned but not yet deployed. Currently Sealed is quantum-vulnerable, like all classical asymmetric crypto.&lt;/p&gt;

&lt;p&gt;API communication to the indexer uses Ed25519 signature-based authentication with signed time-limited nonces, enforced over HTTPS/TLS. The server implements helmet security headers and rate limiting (100 requests/minute per IP).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Sealed Does NOT Collect (The Important Negatives)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is where Sealed differs sharply from WhatsApp, Telegram, and especially Messenger:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No real name&lt;/li&gt;
&lt;li&gt;No email address&lt;/li&gt;
&lt;li&gt;No phone number&lt;/li&gt;
&lt;li&gt;No device contacts imported&lt;/li&gt;
&lt;li&gt;No location data&lt;/li&gt;
&lt;li&gt;No advertising identifiers (IDFA/GAID)&lt;/li&gt;
&lt;li&gt;No biometric data&lt;/li&gt;
&lt;li&gt;No analytics or behavioral tracking&lt;/li&gt;
&lt;li&gt;No crash reports or telemetry beyond server-side operational logs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is a stark contrast to Signal, which collects your phone number and uses it as your identity. Sealed's wallet-first model means they have no way to know who you are unless you tell them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Dependencies: Where Trust Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed uses only two external services:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Firebase Cloud Messaging (FCM)&lt;/strong&gt;: For push notifications. Sealed sends Firebase only your FCM device token and a notification payload containing the sender's wallet address and a message reference—not the message content. This means Google sees that you received a message from a particular wallet, but not what was said. Google's privacy policy applies to this data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AlgoNode (Algorand RPC)&lt;/strong&gt;: A third-party public Algorand node. Transactions you broadcast are globally visible by nature. No personal identifying data beyond your wallet address and encrypted message ciphertext is transmitted.&lt;/p&gt;

&lt;p&gt;Sealed explicitly does not use advertising networks, analytics platforms, or data brokers. This is a hard line.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Privacy Model: Honest About Tradeoffs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is architected for a specific threat model: you want encryption that no single entity can break, pseudonymity rather than anonymity, and no central server controlling your social graph.&lt;/p&gt;

&lt;p&gt;If your threat is a government subpoena, Sealed has a clean answer: indexer data expires, blockchain data is public, and Sealed cannot hand over decrypted messages because they don't have your private key. The police would need your device or seed phrase.&lt;/p&gt;

&lt;p&gt;If your threat is Sealed itself, you get a partial win: Sealed cannot read your messages, but they can see who's messaging you (via the view key). If you're concerned about this, you should assume the view key is compromised.&lt;/p&gt;

&lt;p&gt;If your threat is length-based message inference, Sealed padded messages to 1,024 bytes, so attackers can't guess what you're saying based on ciphertext size.&lt;/p&gt;

&lt;p&gt;If your threat is quantum computers, you're vulnerable until they deploy Kyber-512.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Uncomfortable Realities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Realm B is permanent: Anything you write to the blockchain stays forever. If you message someone's wallet address, that metadata (sender, recipient, timestamp, message reference) is immutable. In a world of blockchain analysis and wallet clustering, this is a permanent link. Sealed can't delete it, and neither can you.&lt;/p&gt;

&lt;p&gt;The view key is a vulnerability: It's the single point where Sealed can learn your incoming message graph. If the indexer is breached, attackers get a list of everyone messaging you. Sealed is transparent about this, but it's still the biggest attack surface in the architecture.&lt;/p&gt;

&lt;p&gt;Usernames break pseudonymity: If you register a human-readable name, it's on-chain forever. Anyone can link your wallet to your identity. Sealed can't prevent this; it's a user error problem.&lt;/p&gt;

&lt;p&gt;Firebase adds a Google dependency: FCM tokens reveal to Google that you're using Sealed, and when you receive messages. Google's privacy standards are better than most, but it's still a third party with visibility.&lt;/p&gt;

&lt;p&gt;No audit: The privacy policy doesn't mention any independent security audit. The encryption primitives (AES-256-GCM, X25519, HKDF) are solid, but there's no third-party verification that the implementation is correct.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How This Compares to the earlier mentioned ones ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sealed is architecturally more honest than Signal or SimpleX about what data they hold and why. Signal doesn't explain its data architecture; they just say "we don't store messages." Sealed breaks it down into three realms and explains the controller for each.&lt;/p&gt;

&lt;p&gt;Sealed is less mature than Signal (which has been battle-tested for a decade) and less audited than SimpleX (which had Trail of Bits assessment).&lt;/p&gt;

&lt;p&gt;Sealed is more decentralized than Telegram (which holds all data server-side) but less decentralized than Element (which is federated) or SimpleX (which has no central relays—queues are ephemeral).&lt;/p&gt;

&lt;p&gt;Sealed is more private than WhatsApp or Messenger because it doesn't collect phone numbers, emails, or contact graphs.&lt;/p&gt;

&lt;h4&gt;
  
  
  NCrypt (Gen6 Dapp)
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdtodgxlyrmu30m6lmvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdtodgxlyrmu30m6lmvb.png" alt="screenshot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NCrypt is a decentralized messaging app built as part of the Gen6 ecosystem. It's E2EE messaging integrated with &lt;strong&gt;Gen6's decentralized identity system (Gen6.Me).&lt;/strong&gt; Messages are encrypted, transmitted through Gen6 validator nodes, and stored on the Gen6 blockchain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Technical Stack:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blockchain:&lt;/strong&gt; Gen6's own chain (Enhanced Proof-of-Authority consensus)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Validator Network&lt;/strong&gt;: 100+ distributed validators securing the chain&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity Layer&lt;/strong&gt;: Gen6.Me (verified, pseudonymous, or fully private)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Not explicitly stated, but likely AES-256 or ChaCha20-Poly1305 (industry standard)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;: Encrypted messages on Gen6 blockchain&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Roadmap&lt;/strong&gt;: Q4 2026 includes post-quantum security upgrade&lt;br&gt;
Integration with Gen6 Ecosystem:&lt;/p&gt;

&lt;p&gt;NCrypt isn't standalone—it's one dApp in a larger system:&lt;/p&gt;

&lt;p&gt;RealSeal: On-chain cryptographic signing and timestamping&lt;br&gt;
Gen6.Me: Verifiable identity (proof-of-attendance, credentials)&lt;br&gt;
FONO: Event verification and community management&lt;br&gt;
GSX Token: Utility token for transaction fees and ecosystem incentives&lt;/p&gt;

&lt;p&gt;The Reality Check:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NCrypt is more honest but less audited than it claims:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;No independent security audit — Gen6 was founded by security experts (David Pethes, Sergey Gerodes) but that's not a substitute for third-party audit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Validator-dependent privacy — Your messages go through Gen6 validators. If a validator node is compromised, they see metadata (though not content if encryption is solid)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity is optional but integrated — You can be pseudonymous, but the whole ecosystem incentivizes verified identity (which is good for trust, bad for pure privacy)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Post-quantum still in roadmap — They're targeting Q4 2026; currently quantum-vulnerable like most messengers.&lt;br&gt;
Smaller community — ~30,000 users vs millions for Signal. Smaller attack surface, but also less battle-testing.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Emails
&lt;/h2&gt;

&lt;p&gt;Alright forwards we go ! We have now private OS, Private Browser, so we reduced successfully amount of spyware on our day-to-day activity on the internet. We keep our messages secure, by using Signal or SimpleX, but what if we want to receive mails and send mails in a more private way ? For that there is also a couple of solutions and for that I highly recommend checking out the &lt;a href="https://privacysavvy.com/email/best/secure-email-providers/" rel="noopener noreferrer"&gt;Privacy Savvy article&lt;/a&gt;. I think this blog is a huge source of knowledge when it comes to privacy (So shout out to them :D):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ProtonMail&lt;/li&gt;
&lt;li&gt;TutaMail&lt;/li&gt;
&lt;li&gt;StartMail&lt;/li&gt;
&lt;li&gt;MailFence&lt;/li&gt;
&lt;li&gt;AtomicMail&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Tuta (formerly Tutanota) – Most Privacy-Focused
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfqj5yphyt3pfv05vun7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfqj5yphyt3pfv05vun7.jpg" alt="tuta"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Germany 🇩🇪&lt;br&gt;
Founded: 2011&lt;br&gt;
Business Model: Private company, no outside investors, subscription-based&lt;br&gt;
Free Tier: Yes (very limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
Tuta's doing it right here. They encrypt everything – emails, subject lines, calendar events, contacts. Most providers skip subject lines (that's a metadata vector), but Tuta's like "nah." They've implemented TutaCrypt, a proprietary hybrid system using:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CRYSTALS-Kyber (post-quantum key exchange)&lt;/strong&gt; + &lt;strong&gt;X25519&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES encryption for content Zero-access architecture&lt;/strong&gt; – they literally can't read your stuff, even if they wanted to.&lt;br&gt;
They don't use PGP (which has known weaknesses), so no pulling of Google Play services like ProtonMail does.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Government Interventions &amp;amp; Data Compliance&lt;/strong&gt;&lt;br&gt;
No major data breaches on record.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transparency Report (Jan-Dec 2025)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Received&lt;/strong&gt;: 389 total requests from German courts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Complied&lt;/strong&gt;: Only ~75 cases out of ~389 (they rejected 75% of requests)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key insight&lt;/strong&gt;: Tuta can only be compelled by German courts under German law. No backdoors, no FISA orders ever received. They publish a warrant canary confirming this.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they CAN release&lt;/strong&gt;: Metadata (sender/receiver emails, timestamps, IPs), NOT encrypted content&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Notable incident (2019-2021)&lt;/strong&gt;: A German court tried to force Tuta to capture unencrypted incoming emails before they encrypted them – essentially creating a backdoor. &lt;/p&gt;

&lt;p&gt;Tuta appealed, saying this violates German law. Court still ordered it, but Tuta refused to implement system-wide monitoring, only complying for specific cases. They appealed to German Federal Court and stood firm. No data was handed over that compromised encryption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;False Accusations (2023)&lt;/strong&gt;: A former Canadian RCMP officer claimed Tuta was a "storefront" for Five Eyes intel agencies. Completely false. Tuta denied it, published their entire codebase on GitHub for peer review, and pointed out they've zero FISA orders.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support mobile apps for android and IOS, they have also proton mail desktop app but this one is paid and is available for Linux, windows and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: ~1 GB&lt;br&gt;
Aliases: 15-30 depending on plan&lt;br&gt;
Accounts deleted after 6 months inactivity (this is intentional for privacy – they don't want ghost data)&lt;br&gt;
Support: Forum-only for free users&lt;br&gt;
Custom domain: No&lt;br&gt;
IMAP: Not supported (design choice, not a limitation)&lt;/p&gt;

&lt;h3&gt;
  
  
  ProtonMail
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2buhm2d6r84czz5b5d3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn2buhm2d6r84czz5b5d3.jpg" alt="proton-mail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Server Location&lt;/strong&gt;: Switzerland 🇨🇭&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: 2013&lt;br&gt;
&lt;strong&gt;Business Model&lt;/strong&gt;: NOT a non-profit – it's a for-profit company funded by investors. This matters because pressure to monetize is real.&lt;br&gt;
&lt;strong&gt;Free Tier&lt;/strong&gt;: Yes (extremely limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;End-to-end encryption for user-to-user emails (between ProtonMail accounts)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-access encryption&lt;/strong&gt; – they encrypt with your public key, can't decrypt&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES encryption for storage&lt;/strong&gt; - Supports PGP for external recipients (standard, but not as comprehensive as Tuta's approach)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Does NOT encrypt subject lines – metadata leakage&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Uses Google Play Services on Android (Tuta doesn't)&lt;br&gt;
Government Interventions &amp;amp; Data Sharing – THIS IS CRITICAL&lt;br&gt;
Confirmed data breaches to law enforcement:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2021 French Climate Activist Case&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;French police obtained ProtonMail user's IP address via Swiss legal channels. Activist was identified and arrested.&lt;/p&gt;

&lt;p&gt;ProtonMail did comply – they had no "legal possibility to appeal"&lt;br&gt;
2022-2023 FBI Case:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FBI obtained recovery email address and phone number from ProtonMail&lt;/strong&gt;&lt;br&gt;
User in US harassment investigation was de-anonymized&lt;br&gt;
Again, ProtonMail complied&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transparency Report (2022)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;5,957 data requests received&lt;br&gt;
Complied with significant portion – they don't break down exact numbers clearly.&lt;/p&gt;

&lt;p&gt;They contest requests they can legally contest (~750 in 2022), but they will hand over metadata if Swiss courts order it&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Real Talk&lt;/strong&gt;: ProtonMail markets itself with "Swiss privacy laws" but:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;They can be legally compelled to enable real-time IP logging for specific users&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They will share recovery emails, phone numbers, payment info, IP addresses&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Swiss courts work with other governments – their "strict Swiss law" claim is marketing BS&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They have secondary offices in the US, which complicates jurisdiction&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No warrant canary. They don't publish a statement saying they've never received FISA orders (unlike Tuta).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support PWAs, mobile apps for android and IOS, they have also proton mail desktop app but this one is paid and is available for Linux, windows and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: 500 MB (brutally limited)&lt;br&gt;
1 email address only&lt;br&gt;
No folders (can't organize)&lt;br&gt;
Limited sending (cap per day)&lt;br&gt;
Paid plans start at $4.99/month – one of the most expensive&lt;/p&gt;

&lt;p&gt;To me proton is like "private google", as they are the most well known company and the most visible (advertised) one, that provides private mail services and generally cloud-services as well.&lt;/p&gt;

&lt;h3&gt;
  
  
  MailFence
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk1xymjfj6dxnyjor4q6b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk1xymjfj6dxnyjor4q6b.webp" alt="mailfence"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Belgium 🇧🇪&lt;br&gt;
Founded: 2013&lt;br&gt;
Business Model: Subscription-based&lt;br&gt;
Free Tier: Yes (limited)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
OpenPGP encryption (industry standard, not proprietary)&lt;br&gt;
Encrypts emails, calendar, contacts&lt;br&gt;
Zero-knowledge architecture&lt;br&gt;
IMAP/SMTP support (unlike Tuta, easier migration)&lt;br&gt;
Belgian servers under GDPR&lt;br&gt;
Government Interventions&lt;br&gt;
No major breaches reported.&lt;/p&gt;

&lt;p&gt;Mailfence doesn't publish as detailed a transparency report as Tuta or ProtonMail, but they're transparent about responding to valid Belgian court orders and cannot decrypt encrypted content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They support only PWAs and mobile apps for android and IOS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Tier Details&lt;/strong&gt;&lt;br&gt;
Storage: 500 MB&lt;br&gt;
1 email address&lt;br&gt;
Limited folders&lt;br&gt;
Paid plans start at €2.75/month (cheaper than Proton)&lt;/p&gt;

&lt;h3&gt;
  
  
  StartMail
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydrsn78xms9kz0evqx97.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fydrsn78xms9kz0evqx97.png" alt="StartMail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Server Location: Netherlands 🇳🇱&lt;br&gt;
Founded: 2013&lt;br&gt;
Business Model: Subscription (no free plan)&lt;br&gt;
Free Tier: No (7-day trial only)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy Tech Stack&lt;/strong&gt;&lt;br&gt;
OpenPGP encryption (standard)&lt;br&gt;
IMAP/SMTP support (great for external clients)&lt;br&gt;
Dutch servers under GDPR&lt;br&gt;
Unlimited aliases even on base plans&lt;br&gt;
Government Interventions&lt;br&gt;
Netherlands has reasonable privacy laws, but they can be compelled by Dutch courts. No major incidents reported.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pricing&lt;/strong&gt;&lt;br&gt;
Starts at $5-7/month (no free option, disqualifying for your "free only" requirement)&lt;br&gt;
Honorable Mentions (Active but Limited Free Tiers)&lt;br&gt;
Atomic Mail – The New Kid on the Block&lt;br&gt;
Founded: 2024&lt;br&gt;
Server Location: Germany&lt;br&gt;
Free Tier: Yes (generous – unlimited storage, rare for new providers)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability 📲&lt;/strong&gt;&lt;br&gt;
They have only a PWA support, so you can see the icon of them and it will bring you to your mail in browser, which I find cool and I really appreciate them to implement PWA.&lt;/p&gt;

&lt;p&gt;Very new, so limited track record&lt;br&gt;
Claims to have passed 1M users in &amp;lt;1 year&lt;br&gt;
Offers unlimited storage free (vs. competitors' 500 MB-1 GB)&lt;br&gt;
No security incidents yet (new service)&lt;br&gt;
Cons: In beta, unproven long-term&lt;/p&gt;

&lt;h3&gt;
  
  
  Atomic Mail (The Underdog 🐶)
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fld1ou956oujuvww6kqix.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fld1ou956oujuvww6kqix.jpg" alt="Atomic Mail"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Headquarters in Estonia 🇪🇪, Servers in Germany 🇩🇪&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Founded&lt;/strong&gt;: 2024 (launched by a team of privacy advocates and cybersecurity engineers)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Company Structure&lt;/strong&gt;: AtomicMail Systems OÜ (private company, not a non-profit)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Current Status&lt;/strong&gt;: Beta release (actively in development, iterating fast)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Growth Rate&lt;/strong&gt;: Hit 1 million users in &amp;lt;1 year (straight up aggressive expansion)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy &amp;amp; Encryption Tech Stack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Core Encryption Primitives:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECIES (Elliptic Curve Integrated Encryption Scheme)&lt;/strong&gt; – Asymmetric key exchange between Atomic users. Fast, modern, not some legacy PGP garbage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AES-256&lt;/strong&gt; – Symmetric content encryption (industry standard, trusted by security researchers globally)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SHA-256&lt;/strong&gt; – Cryptographic hashing for data integrity verification&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TLS 1.3&lt;/strong&gt; – In-transit encryption (TLS 1.2 is dated, they went for the newest standard)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BIP39 seed phrases&lt;/strong&gt; – &lt;strong&gt;THIS IS THE CRYPTO TOUCH&lt;/strong&gt;. Users recover accounts with a 12-word seed phrase (like a blockchain wallet), &lt;strong&gt;NOT a phone number or backup email&lt;/strong&gt;. That's genuinely novel for email. No five-eyes backdoor through phone carriers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-Access Architecture (The Real Deal)&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here's the trick&lt;/strong&gt; – Atomic Mail uses a client-side encryption model:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Client encrypts before upload&lt;/strong&gt; – Your plaintext message is encrypted on YOUR device&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Server only sees ciphertext&lt;/strong&gt; – It gets transmitted and stored as meaningless scrambled data&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Only recipient decrypts&lt;/strong&gt; – Private keys never leave your device&lt;br&gt;
Atomic Mail literally can't read encrypted messages – Even if hackers breach them, or a government issues a court order, the data is mathematically useless without your private key&lt;/p&gt;

&lt;p&gt;This is fundamentally different from ProtonMail (which CAN decrypt if forced) because the architecture prevents them from having the keys in the first place.&lt;/p&gt;

&lt;p&gt;Data-at-Rest + Data-in-Transit Protection:&lt;/p&gt;

&lt;p&gt;All emails encrypted at rest (AES-256)&lt;/p&gt;

&lt;p&gt;All communication encrypted in transit (TLS 1.3)&lt;/p&gt;

&lt;p&gt;7-day log retention for IP addresses and SMTP metadata (troubleshooting + spam/phishing detection). Logs auto-delete after 7 days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User vault storage&lt;/strong&gt; – All messages sit in encrypted user vaults on secure servers.&lt;/p&gt;

&lt;p&gt;Government Compliance &amp;amp; Legal Requests&lt;br&gt;
Atomic Mail's Policy (From Official Privacy Policy, Last Updated: March 3, 2026):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"We will only comply with requests from &lt;strong&gt;Estonian judicial authorities&lt;/strong&gt; and will not honor requests from other authorities. Atomic Mail does not cooperate with voluntary surveillance programs."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So only Estonian courts can force Atomic Mail to comply&lt;br&gt;
No FBI, no GCHQ, no Five Eyes – They explicitly refuse non-Estonian requests. No secret surveillance programs – No FISA, no Tempora, no bulk metadata tapping.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real-World Application:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If a US court demands data on an Atomic Mail user, Atomic Mail's legal stance is: "Get an Estonian court order or nothing happens." Since the US and Estonia don't have an automatic data-sharing treaty that works like that, this is effectively a firewall.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Requests:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;"We will not comply with requests for user information from private third parties unless we receive a valid court order from an Estonian court."&lt;/p&gt;

&lt;p&gt;So even if Facebook or your ex's lawyer demands user data – no way. Only Estonian courts.&lt;/p&gt;

&lt;p&gt;Data Breach History&lt;br&gt;
As of April 2026: ZERO confirmed security incidents or data breaches on record. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why does this matter?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They're new enough (founded 2024) that they haven't had time to accumulate the baggage of older providers.&lt;br&gt;
Their encryption design means even if they were breached, attackers get useless ciphertext.&lt;br&gt;
They practice extreme data minimization – less data = less to leak&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Comparison&lt;/strong&gt;: Tuta (been around since 2011) has no breaches. ProtonMail has complied with government data requests multiple times and handed over metadata. Atomic Mail's track record is clean, and the architecture prevents worst-case scenarios.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unique Features (The Tech Deep Dive)
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;1. Seed Phrase Recovery (Borrowed from Crypto)&lt;/strong&gt;&lt;br&gt;
Instead of:&lt;/p&gt;

&lt;p&gt;SMS OTP (SIM swap vulnerable)&lt;br&gt;
Recovery email (metadata leakage)&lt;br&gt;
Secret questions (brutalizable)&lt;br&gt;
Atomic Mail uses BIP39-compliant seed phrases – a 12-word mnemonic that only you hold. Even Atomic Mail's admins can't reset your password. This is inspired by blockchain wallet design (think MetaMask, hardware wallets).&lt;/p&gt;

&lt;p&gt;Why it matters: No phone carrier backdoor, no recovery email dependency, mathematically sound.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Multiple Encryption Options for External Recipients&lt;/strong&gt;&lt;br&gt;
Can't encrypt to Gmail users with ECIES (they're not on Atomic). &lt;/p&gt;

&lt;p&gt;Solutions:&lt;br&gt;
Password-Protected Email – Send encrypted message, recipient enters password&lt;br&gt;
Encrypted as File – Send encrypted .zip file via any channel&lt;br&gt;
TLS – Standard in-transit encryption (basic, but better than plaintext)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. AI Suite (Privacy-First)&lt;/strong&gt;&lt;br&gt;
The Plus plan includes AI tools:&lt;/p&gt;

&lt;p&gt;Writing assistant&lt;br&gt;
Grammar checker&lt;br&gt;
Summarizer&lt;br&gt;
Translator&lt;br&gt;
Security Helper (flags sensitive content in drafts, suggests encryption)&lt;br&gt;
Text-to-voice&lt;br&gt;
Critical: These AI tools can only process unencrypted drafts. They can't touch your encrypted emails. Zero training data on user messages.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Anonymous Email Aliases&lt;/strong&gt;&lt;br&gt;
Create up to 10 free unique email addresses from one account. Use them for:&lt;/p&gt;

&lt;p&gt;Newsletter signups (throwaway)&lt;br&gt;
Financial accounts (separate identity)&lt;br&gt;
Work vs. personal (compartmentalization)&lt;br&gt;
If one alias gets compromised in a data breach, you know exactly which service leaked it, and you can nuke that alias without affecting your main inbox.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Availability 📲&lt;/strong&gt;&lt;br&gt;
They have for now available apps for IOS, Android, MacOS and Windows. What actually surprised me that they do not have a linux version yet and I really would love to have one. What is yet disappointing to me is that they do not support PWA, so I can have an icon on my screen for quicker access.&lt;/p&gt;

&lt;p&gt;To be honest I have the account on 3 of the mails provided Tuta, Atomic Mail and Proton and atomic mail appears to become my favorite mail from them all. Their UI is slick, they have nice privacy policy. Surely it's yet quite young but I root for them to have even a billion users.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;This is 2/8 of our privacy journey, I hope you enjoyed it this time and I convinced you to switch over to any of either Messengers or Mail Providers. &lt;/p&gt;

&lt;p&gt;Let me know down in the comments. In the next post there will be more info on AI and payments. I rearranged the order with Firewalls and VPNs, because I'm almost done with full research on this part.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3b74vdlodsrgzx3mmu2m.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3b74vdlodsrgzx3mmu2m.gif" alt="surprise"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So stay tuned because things might get much more interesting in the future than before and &lt;strong&gt;I will have surprise for you&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdaoi90rir3ez6cuf3mh.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdaoi90rir3ez6cuf3mh.gif" alt="thx"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Don't forget to leave like 💜 and follow my account for more privacy-focused content. Also please share the article with your fellows (devs) or family to spread more awareness on privacy in the internet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzptp0515lnc4q67qgcdx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzptp0515lnc4q67qgcdx.png" alt="like and share"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's it for today, hope you'll have a great time and until next time.&lt;/p&gt;

&lt;p&gt;Cheerio !&lt;/p&gt;

</description>
      <category>programming</category>
      <category>opensource</category>
      <category>security</category>
      <category>os</category>
    </item>
    <item>
      <title>Privacy and Security Setup to use in 2026 PART 1 (OS, Browser, Search Engines)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Fri, 17 Apr 2026 12:20:19 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc</link>
      <guid>https://dev.to/luftietheanonymous/privacy-and-security-setup-to-use-in-2026-part-1-os-browser-search-engines-53mc</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;This time, I decided to write on tools/services/software etc. that have been designed and created to care about your privacy on the internet. I will present some tools that I use and/or can recommend and much more tools on which I made research on. &lt;/p&gt;

&lt;p&gt;I've dedicated a huge amount of time, therefore at the very beginning, I request you to share ⤵️ this article with your fellows or someone that you think, that it would be useful to share this article with :D&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwv8xrj8qj7wr5u9pa34e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwv8xrj8qj7wr5u9pa34e.jpg" alt="Please" width="339" height="287"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Thank you in advance 💜 ! &lt;/p&gt;




&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;I didn't want to make this just another brief article, that will list you down the tools to use, brief info on them and that's all, download, put your trust into a thing and fingers crossed. This article delved a bit deeper into internals of each tool presented.&lt;/p&gt;

&lt;p&gt;While writing the article I quickly realized that, writing a one long article with all of those tools/services is pointless, because I lost often my minds while checking the cohesion. Secondly, noone would like to direct through one hour+ long article, that could actually be a book (lol).&lt;/p&gt;

&lt;p&gt;I decided, I will split this into an article series posted one per week. The split will be looking as following:&lt;/p&gt;

&lt;p&gt;First Post (This one)&lt;/p&gt;

&lt;p&gt;Introduction&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Online Privacy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operating Systems (OS)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-- Dekstop OS&lt;/p&gt;

&lt;p&gt;-- Mobile OS&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Browsers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Search-engine&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Second Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Messengers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Email&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Third Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;VPN&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Firewalls&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fourth Post (In this one there will be a special announcement with surprise for you all):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Payments&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;AI&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fifth Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Location Privacy&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Productivity Apps&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Sixth Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DNS Privacy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Seventh Post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Device-Level Security &amp;amp; Authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Eight Post:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Offline Privacy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Outfit&lt;/li&gt;
&lt;li&gt;Everyday Items&lt;/li&gt;
&lt;li&gt;Payment Methods&lt;/li&gt;
&lt;li&gt;Events&lt;/li&gt;
&lt;li&gt;Transport&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Youtube Creators&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Educational Resources&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;BUT&lt;/strong&gt; before I go into the main details, I want to start with an introduction on privacy and why it matters to everyone, regardless of who you are.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why actually bother with privacy ? &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;A lot of people, when they hear term &lt;em&gt;privacy&lt;/em&gt;, in front of their eyes emerges a chap in anonymous-mask, who likely commits cybercrimes and lives in a basement or some other shady place.... Probably something like this 🙍 is the match for what they see:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagogxoppx0u6eezlphow.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fagogxoppx0u6eezlphow.png" alt="anon" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Candidly speaking, I do not wonder why people have such imagination about people who "obsessively" care about their privacy. On the other hand, for me as an crypto-anarchist, it's really harmful, because it generalizes every privacy-focused dude is like the guy on the image above.&lt;/p&gt;

&lt;p&gt;I guess it will never disappear as human-species likes very much to over-facilitate things instead of understanding the more complex puzzles behind one's decision.&lt;/p&gt;

&lt;p&gt;Moreover, the image of privacy preserving people in press or (social) media is rather prone to shift towards calling them some party's extremists or try to assign them to political fraction of the politics' scene, whereas it's not always the case when it comes to individuals.&lt;/p&gt;

&lt;p&gt;Important thing to understand on the very beginning is:&lt;br&gt;
&lt;em&gt;Not everyone will need the same level of privacy&lt;/em&gt; !&lt;/p&gt;

&lt;p&gt;And that should be the nr. 1 thing, you should take out from this article. &lt;/p&gt;

&lt;p&gt;There will be a different need of software-developer, who is politically repressed and hounded, and completely different need will be of an regular woman out there who just doesn't want the companies to know about her to many details.&lt;/p&gt;

&lt;h3&gt;
  
  
  Having said that, I can move straightly into examples of why privacy matters.
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Number 1.&lt;/strong&gt; &lt;em&gt;Advertisement and personal-data trade&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpvyq137y5u6cclzvy7k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpvyq137y5u6cclzvy7k.jpg" alt="zuck" width="800" height="650"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Have you ever wondered, where tha heck is your money gone ? &lt;br&gt;
Well...... Ads of some flashy product you talked about and decided to buy it without a real need could be the answer 😅&lt;/p&gt;

&lt;p&gt;I will tell you a story, recently I was by a family-gathering and one person had a talk about bike-roads, and what did they saw first ?  You guessed it ! The add of bike-road. I checked their permissions for facebook and everything was set to allowed. And this is a case where big techs ambush a lot of people, who are not aware enough.&lt;/p&gt;

&lt;p&gt;I like to recall words said in some video by &lt;em&gt;ThePrimeagen&lt;/em&gt; (shout out to you, Micheal :D). Those words were something like:&lt;br&gt;
&lt;em&gt;If you want to be a head of leading silicon-valley company, you have to sell either ads or hardware&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;And it's actually true, at least at some point, look at some of the big-techs and their revenue model:&lt;br&gt;
Facebook - Ads&lt;br&gt;
Nvidia - Hardware&lt;br&gt;
Tiktok - Ads&lt;br&gt;&lt;br&gt;
Google - Well they do everything, lol (Ads, hardware, software services etc.)&lt;br&gt;
Microsoft - software services + ads&lt;/p&gt;

&lt;p&gt;And in order to specifically profile you, the data is needed, &lt;strong&gt;Huge amount of data&lt;/strong&gt;. Which often is used by unethical methods e.g. wiretapping (as in my story).&lt;/p&gt;

&lt;p&gt;Thus, given you have issues that you lack money on some essentials, it might be that you purchase things that you actually don't need and only talked about with friend and under impulse, you bought those things. If you see you have issue with it, guess what privacy is for you ! &lt;/p&gt;

&lt;p&gt;There is not always about rigid self-control, but also a tooling to it. Sure you can pound a metal-bolt in a wall with your hand, but using hammer makes more sense though, especially as it would be less painful (Lol).&lt;/p&gt;

&lt;p&gt;Having said that, I hope I managed to keep you engaged. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 2.&lt;/strong&gt; &lt;em&gt;Banking and Financial Operations&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc6uj0mhs8xagjhmr9b3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc6uj0mhs8xagjhmr9b3.jpg" alt="bank-acc ban" width="800" height="1732"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0364wzjuik5eosq5u5gw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0364wzjuik5eosq5u5gw.jpg" alt="bank-acc" width="640" height="1303"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This case pertains a lot of people, not only those who are repressed or alleged of some crime. &lt;/p&gt;

&lt;p&gt;I had almost every f*cking time I made a transaction online not even for big amount of money, it were transactions like 5$ or 100$, my account got temporarily frozen, because bank accessed it as suspicious activity, meanwhile it were just regular purchases like Copilot or Brilliant Subscription or even purchase of something from services like Temu or Ebay.&lt;/p&gt;

&lt;p&gt;And you really would not like to listen to words I spit out to the consultant and to the bank in emails 😅&lt;/p&gt;

&lt;p&gt;And in the times of growing surveillance (especially in sucky europe), I think it's real threat to most of us, than you think.&lt;/p&gt;

&lt;p&gt;Therefore, you might want to have more privacy when it comes to your financial affairs, but also not like to relinquish digital payments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 3.&lt;/strong&gt; &lt;em&gt;Location Tracking and Stalking&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt7fgyk0elm0s264mpr8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnt7fgyk0elm0s264mpr8.jpg" alt="stalking" width="800" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;People who experience stalking or being bewilderingly frequently followed by some track while they go outside from somewhere, they also might want to have more privacy, when it comes to their actual location. Regardless if stalking pertains their kids or themselves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 4.&lt;/strong&gt; &lt;em&gt;Password/Data-leaks&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm0h7h60a8yn7p17tcxlh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm0h7h60a8yn7p17tcxlh.jpg" alt="breach" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's very common that in big/middle-sized companies occur breaches, and all of the sudden details about your life, might actually not be the same as the breach might have released a lot of sensitive private messages or data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number 5.&lt;/strong&gt; &lt;em&gt;Remote work setups&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companies very often while video calls, require candidates to perform some task live or to perform some task at all e.g. Make some coding recruitment-task. I have again a perfect example of why you might want to prevent your PC's content private.&lt;/p&gt;

&lt;p&gt;To give you more context from December 2025 until Mid January 2026, I was actively looking for a job in IT, especially blockchain industry given my background. And all of the sudden I got a message. Here I will reveal some screen shots from the conversation and there is some pattern I noticed (likely they used AI for it) the account seemed to be legit (thus I hate linkedin 🤬, imo they should pivot their name to TornApart, describes perfectly the faith in not being scammed there)&lt;/p&gt;

&lt;p&gt;Here step 1, the message arrives to potential prey/victim:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8gym0qujhra1sewtxyb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8gym0qujhra1sewtxyb.png" alt="photo1" width="461" height="595"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here, I honestly answered that this position is beyond my skills and expertise, but they kept insisting&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn6sc3vp0k94a49hwbsl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn6sc3vp0k94a49hwbsl.png" alt="photo2" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzei7xg98s254dcgy17ut.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzei7xg98s254dcgy17ut.png" alt="photo3" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmvg5nvwn0297iysxn58.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmvg5nvwn0297iysxn58.png" alt="photo4" width="468" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I got offered that I can actually for practice purposes, I can try solving the task so I agreed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kiu4yes0ylobq8d375j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9kiu4yes0ylobq8d375j.png" alt="photo5" width="469" height="475"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note, that the messages were poem-long to convince me to run their code on my machine, but when I agreed and wanted to chat a bit more and expected a bit longer answer, I just was ghosted with one word response. Meaning they achieved their goal, so I can piss off now.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwldw6rv3phcp3k1wdkcx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwldw6rv3phcp3k1wdkcx.png" alt="photo6" width="475" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then I was required to solve the task, which I did &lt;strong&gt;but I haven't run it purely on my machine, I used DOCKER !&lt;/strong&gt;, about which fact I informed the employer. Surprisingly the recruitment task was super easy, it was about to build a WETH-like token with accruing value for depositors and test it in hardhat (whereas my setup is foundry and never used it). It turned out that although my code was correct, the test was specially written wrongly in some places especially when it come to rounding-math for the values given as output. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4ppdzbflrf23bag0um4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4ppdzbflrf23bag0um4.png" alt="img" width="800" height="636"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the end I got no response back from the company, but from the service where the job offer was hoisted.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgymha4j2gfum5rgzj9zc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgymha4j2gfum5rgzj9zc.png" alt="remote work scam" width="800" height="263"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I cannot say what was their &lt;em&gt;irregular behaviour&lt;/em&gt;, but I can assume that there was indeed some malicious code to be run and potentially I could loose my all crypto-assets I have purchased for my money and I could get robbed from my &lt;strong&gt;PRIVATE&lt;/strong&gt; information on my PC.&lt;/p&gt;

&lt;p&gt;Thus people like this, could are also highly welcome to read this article.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Number 6.&lt;/em&gt; &lt;strong&gt;State Oppression&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyb86j809j5f5xvalc1dc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyb86j809j5f5xvalc1dc.jpg" alt="oppression" width="544" height="491"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are a lot of people, who are targeted by the state. You would not even have to commit a crime, being regular chap is enough for the state to have interest in you. But the most frequent targets are people with anti-government attitude (e.g. like me). There were a lot of journalists or other activists that were victims of state oppression and not even activists. But if being an journalist or activist is not enough for you, &lt;a href="https://en.wikipedia.org/wiki/Nigel_Farage_Coutts_bank_scandal" rel="noopener noreferrer"&gt;Nigel Farage could not open a bank account in England and was separated from his money !&lt;/a&gt;. All because the government decided to seperate him from the financial system.&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary of the section
&lt;/h3&gt;

&lt;p&gt;Privacy is not just for weirdos from basements, but considers every single person, because we never know, how the our data is used or how we ourselves are viewed by the company, government or other institution. If you're interested on what's more, let's finally go into the details !&lt;/p&gt;

&lt;h2&gt;
  
  
  Online Privacy &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As I emphasized in the introduction, in this section, I will do my best to present you the privacy tools I use on a daily basis, explain nuances related to each element from the list I mention. And why I recommend them specifically.&lt;/p&gt;

&lt;p&gt;I will start with the with the very core of our internet usage, namely &lt;strong&gt;Operating Systems&lt;/strong&gt; !&lt;/p&gt;




&lt;h2&gt;
  
  
  Operating Systems &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Here I have split it into 2 types&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Desktop OS&lt;/li&gt;
&lt;li&gt;Mobile OS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I'll present you first the Desktop Operating Systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Desktop Operating Systems 🖥️ &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feww4vs9fsblzrfsl8c59.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feww4vs9fsblzrfsl8c59.jpg" alt="linux" width="800" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There is no wonder that I will say I use &lt;strong&gt;LINUX&lt;/strong&gt; ! &lt;/p&gt;

&lt;p&gt;Yes, Linux is the operating system I use on daily basis. Why this operating system specifically is chosen by people with privacy concerns ? &lt;/p&gt;

&lt;p&gt;There are many reasons, but I will name most important of them:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Linux is open-source&lt;/strong&gt;: This provides transparency and more certainty that the OS is not malware or spyware, due to contributors and people who are interested in technical details and further Linux development.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;No telemetry&lt;/strong&gt;: Linux does not have a built-in telemetry, thus the operating system does not send the information about your activity to third party. The core of Linux is that you are the lord of your OS. If you want more analytics or tracking, you install tools specifically for it :D&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;No Forced Updates&lt;/strong&gt;: In Linux you decide if you want to update your operating system or not and you are not forced to do it under circumstance of not being able to use some features or something like that as it happened often to Windows or MacOS users.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Selective Permission Management&lt;/strong&gt;: In Windows everyone is an admin, which makes it one of reasons why Windows is often a target for hackers. In Linux there is a split between what you can run as a regular user and what you can run as an administrator. Which averts from some successful hacks on your machine.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Customizability&lt;/strong&gt;: In Linux unlike Windows, you can customize your operating system however you want. You want to compile custom Kernel ? You can do it. You can rebuild the whole OS. Whereas in Windows, Microsoft decides what goes in, what stays out.   &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Distributions I use
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffpu6qyr5wczqbtt72vrs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffpu6qyr5wczqbtt72vrs.jpg" alt="debian" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Personally, I'm yet a freshman into Linux (8 months passed since I started using Linux). I use(d) until now Debian as a distribution, so I have no clue about other distributions. And I can recommend Debian for start with Linux as Operating System, it has slick design, and is very intuitive Operating System. Also I noticed a significant increase of free space on how my PC works in comparison to what I experienced with Windows.&lt;/p&gt;

&lt;p&gt;However as I mentioned in my latest From Zero to Crypto-Hero post, I said I started playing around with QuebesOS on Virtual Machine, however I did not have enough time to test it out properly. I would say the learning curve is quite steep and basic browser usage like firefox was quite of not understandable for me.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5rk62xwepwcy2941ndyl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5rk62xwepwcy2941ndyl.jpg" alt="cachyos" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For now on my laptop, I wanted to try out something different than debian, so currently I'm playing around with CachyOS on my laptop. If you ever would like to hear a review on the operating system, feel free to mention it in a comment.&lt;/p&gt;

&lt;p&gt;I will only list down here some alternatives, if you don't want to use debian specifically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommnded by experts for beginners&lt;/strong&gt;: Ubuntu, Mint OS, Zorin &lt;br&gt;
&lt;strong&gt;Specified distros for privacy&lt;/strong&gt;: QuebesOS, Whonix OS, Tails OS&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BEAR IN MIND !&lt;/strong&gt; &lt;br&gt;
&lt;em&gt;That distros like Quebes come up with tradeoffs when it comes to UX, so people that are comming directly from microslop OS aka. Windows or Apple, might not want to choose those particular distros as they require more knowledge on Linux&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Mobile Operating System 📱 &lt;a&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;We all know how pure-android and AppleOS phones are filled with spyware. Eavesdropping is one of the most privacy violating action those phones do. However there is a solution for it, name use AOSP (Android Open Source Project) Operating systems that are privacy focused. My phone for daily usage is Pixel 6a with GrapheneOS on board.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffuv95ll1f17zwo0dnszu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffuv95ll1f17zwo0dnszu.jpg" alt="GrapheneOS" width="800" height="1067"&gt;&lt;/a&gt;   &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why GrapheneOS ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are multiple reasons, why I decided to use GrapheneOS instead of Samsung. But instead of more technical explanations let's start from the user POV.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;No Google by default&lt;/em&gt; - This is the first principle of GrapheneOS. Liberation of an operating system from google by default. Currently every android phone is merged/synchronized together with google by default, using google services. &lt;br&gt;
Your images are handled by google images, every service you use is basically bloated with google spyware (aka. personalization daemon-softwares). &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For me also one of the most important features, that GrapheneOS offers is blocking phone-calls from unknown unsaved numbers avoiding phishing or scam calls to your phone. You have first save the number of someone, to be able to receive calls from them.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;However you can use your google play in GrapheneOS and are not exposed on mass surveillance over your entire phone. That's because GrapheneOS sandboxes the app usage and does not grant permission to access anything on your device.&lt;/p&gt;

&lt;p&gt;Though if you really want to liberate your self from big tech, you probably would like to use open-source app-stores like F-droid, Aurora Store or APK Pure.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhhqir2kvm5gxgmka0rp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhhqir2kvm5gxgmka0rp.png" alt="fdroid" width="512" height="512"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6smrkvrihk304009z4m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6smrkvrihk304009z4m.png" alt="aurora" width="384" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9j8kjo3h2zmepgd2kdru.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9j8kjo3h2zmepgd2kdru.jpg" alt="apk" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Heavy protection against unknown (0 day) vulnerabilities&lt;/em&gt; - GrapheneOS uses measurements to prevent from security flaws in software or hardware that are unknown to the vendor and the public.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The measurements that used are following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Attack surface reduction - Removing unnecessary code or exposed attack surface eliminates many vulnerabilities completely. GrapheneOS avoids removing any useful functionality for end users, but we can still disable lots of functionality by default and require that users opt-in to using it to eliminate it for most of them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Containment through sandboxing at various levels - Fine-grained sandboxes around a specific context like per site browser renderers, sandboxes around a specific component like Android's media codec sandbox and app/workspace sandboxes like the Android app sandbox used to sandbox each app which is also the basis for user/work profiles. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;GrapheneOS improves all of these sandboxes through fortifying the kernel and other base OS components along with improving the sandboxing policies.&lt;/p&gt;

&lt;p&gt;What sandboxing really means is that e.g. if there is an app compromised, then because it's in sandbox, meaning isolated, no other app is compromised. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Preventing an attacker from persisting their control of a component or the OS/firmware through verified boot and avoiding trust in persistent state also helps to mitigate the damage after a compromise has occurred.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Attack surface reduction
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Greatly reduced remote, local and proximity-based attack surface by stripping out unnecessary code.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Making more features optional and disabling optional features by default (NFC, Bluetooth, UWB, etc.), when the screen is locked (USB, USB-C, pogo pins, camera access)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Optionally after a timeout (Bluetooth, Wi-Fi) &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  USB-C port and pogo pins control
&lt;/h4&gt;

&lt;p&gt;USB-C port and pogo pins setting protects against attacks through USB-C or pogo pins while the OS is booted. For the majority of devices without pogo pins, the setting is labelled USB-C port.&lt;/p&gt;

&lt;p&gt;The default is Charging-only when locked, which significantly reduces attack surface when the device is locked. &lt;/p&gt;

&lt;p&gt;After locking, it blocks any new USB connections immediately through either USB-C and pogo pins at both the hardware level via configuring the USB controller and also at the OS level in the kernel to provide a second layer of defense. &lt;/p&gt;

&lt;p&gt;The highest security however is when our charging is set to &lt;strong&gt;Off mode&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;Other privacy protections are following, about GrapheneOS there could be really created separate posts series:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hardened kernel&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hardened app runtime&lt;/strong&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Sensors permission toggle&lt;/strong&gt;: disallow access to all other sensors not covered by existing Android permissions. Or even there is a feature, that can send you alerts whenever an app will request for sensors.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;LTE-only mode&lt;/strong&gt; to reduce cellular radio attack surface by disabling enormous amounts of both legacy code (2G, 3G) and bleeding edge code (5G).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Wi-Fi privacy
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MAC randomization per each connection&lt;/strong&gt; unlike in standard android it's done per network. So regardless whether I've been connected to the network or not, if I reconnect, my device is treated as completely different one.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is a whole much more when it comes to GrapheneOS and what they do, when it comes to privacy protection. If you're more tech savvy than me and you know the infrastructure of the internet from the ground up, you can &lt;a href="https://grapheneos.org/features" rel="noopener noreferrer"&gt;check out the GrapheneOS website&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Unfortunately, GrapheneOS is limited only to Pixel 6 and newer phones, however there was announced that &lt;a href="https://www.digitaltrends.com/phones/motorola-plans-to-put-grapheneos-on-phones-so-why-is-it-a-big-deal/" rel="noopener noreferrer"&gt;arguably Motorola will have partnership with GrapheneOS&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Now you might wonder, &lt;strong&gt;why tha heck is a private OS available only on Google's phones ?&lt;/strong&gt; Let me explain.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Technical Constraint
&lt;/h4&gt;

&lt;p&gt;GrapheneOS needs direct control over the Titan M2 security chip, which only Pixels expose at the required level. This isn't arbitrary gatekeeping; it's a hardware reality. Other devices either don't provide the necessary low-level access or have weaker security foundations. You're not choosing Google—you're choosing the only viable hardware that can run proper security hardening.&lt;/p&gt;

&lt;h4&gt;
  
  
  Stripping Google Down
&lt;/h4&gt;

&lt;p&gt;Here's what actually happens: &lt;strong&gt;GrapheneOS removes Google Play Services, GMS, and proprietary Google binaries by default&lt;/strong&gt;. Your bootloader locks with &lt;em&gt;your&lt;/em&gt; key, not Google's. No persistent telemetry pipeline. The OS doesn't phone home unless you explicitly enable Sandboxed Google Play for specific apps.&lt;/p&gt;

&lt;p&gt;So yeah, you bought from Google. But the software surface they can exploit is drastically smaller than stock Android.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Trust Question
&lt;/h4&gt;

&lt;p&gt;Can Google backdoor you through the Titan chip? Technically yes. But realistically? It'd destroy their business model (which runs on &lt;em&gt;advertising data&lt;/em&gt;, not targeted espionage) and burn every ounce of credibility they have.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What you can actually verify:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Audit the open-source code yourself&lt;/li&gt;
&lt;li&gt;Run tcpdump to inspect network traffic&lt;/li&gt;
&lt;li&gt;Enable reproducible builds to verify the binary matches the source&lt;/li&gt;
&lt;li&gt;Confirm zero Google domains in your traffic&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Real Answer
&lt;/h3&gt;

&lt;p&gt;You're not achieving perfect de-googling. You're reducing Google's attack surface from massive to moderate. &lt;strong&gt;It's not self-denial—it's accepting that perfect security doesn't exist and choosing the best available option given the constraints.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The alternative isn't "truly de-googled." It's either stock Android (guaranteed surveillance) or building your own phone from discrete components (impractical). GrapheneOS + Pixel is the pragmatic best-in-class solution for commodity mobile privacy.&lt;/p&gt;

&lt;p&gt;Alternative Privacy Operating Systems: CalyxOS, IodeOS, LineageOS&lt;/p&gt;

&lt;h2&gt;
  
  
  Browsers &lt;a&gt;&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr25owknb2gc4qjasafw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmr25owknb2gc4qjasafw.jpg" alt="browsers" width="800" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We've got private OS, private messengers, now it's time to talk about private browsers so that you're not screwed and spied by simply browsing through the internet.&lt;/p&gt;

&lt;p&gt;There are couple of privacy options that are worth switching to. The Browsers are following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tor Browser&lt;/li&gt;
&lt;li&gt;Brave&lt;/li&gt;
&lt;li&gt;Firefox&lt;/li&gt;
&lt;li&gt;LibreWolf&lt;/li&gt;
&lt;li&gt;Mullvad Browser&lt;/li&gt;
&lt;li&gt;DuckDuckGo&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Tor Browser — The Gold Standard
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fof3l2kisxabie02jnuvr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fof3l2kisxabie02jnuvr.jpg" alt="tor" width="474" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Tor's the closest you get to truly untraceable. Here's what makes it beast-level:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Onion routing&lt;/strong&gt;: Your traffic bounces through minimum 3 encrypted nodes. Even if someone sniffs the exit node, they can't connect it back to you because the previous relay is encrypted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Letterboxing&lt;/strong&gt;: Rounds your screen resolution to standard buckets (1000x1000, 1400x900, etc.) so sites can't fingerprint you via screen dimensions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First-Party Isolation (FPI)&lt;/strong&gt;: Cookies are isolated per-domain. A tracker pixel from Facebook can't see what you did on Amazon because they're treated as completely separate contexts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standardized everything&lt;/strong&gt;: User agent, fonts, extensions—everyone looks identical on the network, so statistically you're hidden in a crowd of thousands.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tradeoff&lt;/strong&gt;: Slower (routing overhead), some site breakage from hardened CSP/XSS protections.&lt;/p&gt;

&lt;h3&gt;
  
  
  Brave
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5xhz49o3ybf12vgg6xg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5xhz49o3ybf12vgg6xg.jpg" alt="Brave" width="474" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Brave is the pragmatic choice for daily use. You get strong protections without sacrificing UX:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shields&lt;/strong&gt;: Built-in tracker blocking (uses multiple blocklists) + ad blocking at the rendering level. No extensions needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Script sandboxing&lt;/strong&gt;: Third-party scripts execute in isolated contexts, limiting their ability to communicate across sites.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cookie isolation&lt;/strong&gt;: Tracks HTTPS/HTTP + domain separation so cross-site tracking is harder.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fingerprint randomization&lt;/strong&gt;: Changes some fingerprinting vectors (Canvas, WebGL) on reload.&lt;/p&gt;

&lt;p&gt;Additionally when it comes to features that some people might search for, is actually ads-blocking so you can enjoy watching youtube without any ads and I think it's awesome, I remember how much I suffered because of stupid ads that were kind of targeted at me by youtube. &lt;/p&gt;

&lt;p&gt;Brave supports extensions as it's based on chromium engine. &lt;/p&gt;

&lt;p&gt;It supports also in-background running by default so you don't have to spend monthly on spotify subscription or something else. You can run youtube music on brave and you have the same effect.&lt;/p&gt;

&lt;h3&gt;
  
  
  Firefox
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff8uixyv0w1wv8rbms639.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff8uixyv0w1wv8rbms639.png" alt="firefox" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I was honestly shocked it is privacy browser, because as I was younger I always associated it with spyware. However Firefox turns out to be privacy respecting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Firefox lets you actually own your privacy config&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Total Cookie Protection (ETP)&lt;/strong&gt;: Isolates cookies in a "cookie jar" per website. Cross-site tracking via cookies is blocked by default.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container tabs&lt;/strong&gt;: Firefox Multi-Account Containers segregate cookies/data per container, so different "identities" don't bleed together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Advanced hardening via about:config&lt;/strong&gt;: You can disable WebGL, limit canvas fingerprinting, disable plugins, tweak timing attacks, etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Catch&lt;/strong&gt;: Requires manual tuning for maximum security. Stock Firefox is good, but paranoid Firefox requires config knowledge.&lt;/p&gt;

&lt;p&gt;Furthermore, they added 50GB Free VPN recently for every user. And firefox is one of the only browsers that support extensions/add-ons in mobile browsers, so if you have something like blocking keywords or you basically want to add nsfw extensions to your phone it's a good solution to use firefox, while keeping you private.&lt;/p&gt;

&lt;h3&gt;
  
  
  Mullvad Browser
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fle4n344a3m5s4co8ie3i.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fle4n344a3m5s4co8ie3i.webp" alt="mullvad" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is the Tor Project + Mullvad VPN collab. Basically:&lt;/p&gt;

&lt;p&gt;Takes Tor's hardening tech (letterboxing, FPI, standardized fingerprints).&lt;/p&gt;

&lt;p&gt;Removes the onion routing overhead.&lt;/p&gt;

&lt;p&gt;Assumes you'll pair it with a external VPN for network-level privacy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key quirk&lt;/strong&gt;: Zero persistent state. You log out when you close the browser. No bookmarks saved, no history. That's intentional—harder to track habits.&lt;/p&gt;

&lt;h3&gt;
  
  
  LibreWolf
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqns7fn1xxuo15qhsi45w.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqns7fn1xxuo15qhsi45w.jpg" alt="Librewolf" width="474" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LibreWolf's Firefox with Mozilla's telemetry ripped out + pre-baked security config:&lt;/p&gt;

&lt;p&gt;No telemetry, no studies, no data sharing with Mozilla.&lt;/p&gt;

&lt;p&gt;Ships with hardened about:config by default.&lt;/p&gt;

&lt;p&gt;uBlock Origin pre-installed.&lt;/p&gt;

&lt;p&gt;Minimal network calls back to Mozilla servers.&lt;/p&gt;

&lt;p&gt;Perfect if: You like Firefox's ecosystem but want Mozilla's data collection gone.&lt;/p&gt;

&lt;h3&gt;
  
  
  DuckDuckGo Browser
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" alt="ddg" width="474" height="231"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I actually used to use Duckduckgo as a browser, but because it was annoying that they had no extensions support for mobile apps. I would rather treat it as quick-search browser and nothing else. However I do use DuckDuckgo products and I really appreciate them. Also they do not support the in-background running by default just as firefox, so you're prolly need an extension for it. &lt;/p&gt;

&lt;h4&gt;
  
  
  Core Privacy Tech Stack
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Search Layer (No Tracking)&lt;/strong&gt;&lt;br&gt;
Zero search history storage: DuckDuckGo doesn't save or tie your searches to you. Compare that to Google storing everything linked to your account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No user profiles&lt;/strong&gt;: Unlike Google's ad-targeting, they literally can't build a profile because they don't collect the data in the first place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business model is honest&lt;/strong&gt;: Makes money from context-based ads (ads based on what you're currently searching, not your history), not behavioral targeting. This is key—it removes the incentive to spy on you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Tracker Blocking (The Heavy Hitter)&lt;/strong&gt;&lt;br&gt;
This is where DDG flexes. They've built multiple overlapping protections:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3rd-Party Tracker Loading Protection&lt;/strong&gt; — Blocks trackers before they even load&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Uses Tracker Radar&lt;/strong&gt; (their own open-source web crawler) to identify tracking domains&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prevents requests to known trackers&lt;/strong&gt; (Google Analytics, Facebook pixels, etc.) from being sent at all&lt;br&gt;
This is crucial: Stops your IP + other identifiers from being sent &lt;br&gt;
to tracker endpoints&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3rd-Party Cookie Protection&lt;/strong&gt; — Isolates cookies per domain&lt;br&gt;
A Facebook tracker pixel on Amazon can't see what you did there&lt;br&gt;
1st-Party Cookie Protection — Protects against persistent cookies on individual sites&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CNAME Cloaking Protection&lt;/strong&gt; — Blocks sneaky tracker domains hidden under first-party CNAME records&lt;br&gt;
Tech companies sometimes mask tracker domains to look like the site's own domain to bypass cookie protections&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fingerprinting Protection&lt;/strong&gt;&lt;br&gt;
Randomizes canvas/WebGL fingerprinting vectors&lt;br&gt;
Limits what scripts can detect about your device&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google-Specific Protections (Because Google is Everywhere)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They literally have dedicated protections for Google's tracking schemes:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google AMP Protection&lt;/strong&gt; — Strips Google AMP wrappers that let Google track your clicks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Topics Protection&lt;/strong&gt; — Blocks Google's Topics API (their creepy replacement for third-party cookies)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Protected Audience API Protection&lt;/strong&gt; — Blocks FLEDGE (their new ad auction system that still tracks you)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Google Sign-In Pop-Up Protection&lt;/strong&gt; — Removes those annoying "Sign in with Google" nags&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Link Tracking Protection&lt;/strong&gt;&lt;br&gt;
Strips tracking parameters from URLs before you click&lt;br&gt;
Example: amazon.com?utm_source=facebook&amp;amp;utm_medium=ad gets cleaned to just amazon.com&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Referrer Tracking Protection&lt;/strong&gt;&lt;br&gt;
Blocks the HTTP Referer header from leaking where you came from&lt;br&gt;
Encrypted Connections (Smarter HTTPS). Automatically upgrades to HTTPS when available. Prevents ISP/network-level snooping.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Email Protection&lt;/strong&gt;&lt;br&gt;
Generates unique &lt;a class="mentioned-user" href="https://dev.to/duck"&gt;@duck&lt;/a&gt;.com email aliases when signing up for services. Aliases forward to your real email but mask your identity&lt;br&gt;
Strips email tracker pixels before forwarding&lt;br&gt;
Example: You get &lt;a href="mailto:unique-alias@duck.com"&gt;unique-alias@duck.com&lt;/a&gt;, give it to a sketchy site, it forwards to your real inbox but without the tracking pixel&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Duck Player (YouTube)&lt;/strong&gt;&lt;br&gt;
Strips YouTube's tracking and disables personalized recommendations&lt;br&gt;
Reduces invasive ads. Your video views don't pollute your YouTube history.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cookie Pop-Up Protection&lt;/strong&gt;&lt;br&gt;
Automatically clicks the most privacy-friendly option on GDPR/CCPA pop-ups. Then hides the pop-up so you don't see it again.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Fire Button&lt;/strong&gt;&lt;br&gt;
One-click nuke of recent browsing data. Clears locally stored data instantly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Global Privacy Control (GPC)&lt;/strong&gt;&lt;br&gt;
Sends a standard signal to websites telling them not to sell/share your data.Works via HTTP header + JavaScript signal (platform-dependent). On Windows, it sends both header + JS. On Mac, JS only for compatibility reasons.&lt;/p&gt;

&lt;h2&gt;
  
  
  Search Engines
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8evckt28i0g1p053mh9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8evckt28i0g1p053mh9.png" alt="Search Engines" width="601" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ok, now as we took care of the Operating System, Browser it's time for Search Engines. And in advance I say, no there will be no google in this list (lol). &lt;/p&gt;

&lt;p&gt;That's because we would not like to be targeted for ads and having collected our data by company or companies that appear to be friendly to your privacy and data and apparently they see and store all our movements, conversations and more. We would do it for many reasons, either to prevent ourselves from unnecessary expenditures, prevent from trackers e.g. location trackers, profiling us etc.&lt;/p&gt;

&lt;p&gt;Before we start yet, I have to mention that &lt;strong&gt;there are a ton more search engines, than I thought there are&lt;/strong&gt;. Therefore I will not discuss each one but will discuss only 6 and for more knowledge I highly encourage to &lt;a href="https://privacysavvy.com/security/safe-browsing/private-search-engines" rel="noopener noreferrer"&gt;read this article&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let's first understand the fundamentals of how these systems operate before we list the details on each search-engine. This knowledge is crucial for appreciating the technical differences between privacy-focused and traditional engines.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Web Crawler: Your Digital Librarian
&lt;/h3&gt;

&lt;p&gt;A &lt;strong&gt;web crawler&lt;/strong&gt; (also called a bot or spider) is an autonomous software agent that systematically browses the web to discover and index content. Think of it like a tireless librarian that never sleeps. Here's how it works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Discovery&lt;/strong&gt;: The crawler starts with a list of known URLs, then follows hyperlinks to discover new pages&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fetching&lt;/strong&gt;: It downloads the HTML, CSS, and other content from each page&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Indexing&lt;/strong&gt;: The content is analyzed and stored in a massive database (the search index)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Processing&lt;/strong&gt;: Text is extracted, links are catalogued, and metadata is recorded&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Updates&lt;/strong&gt;: Crawlers continuously revisit pages to detect changes&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The crawled data is stored in an &lt;strong&gt;inverted index&lt;/strong&gt; — a data structure that maps every word on the web to the pages containing that word. This allows lightning-fast lookups when you search for a query.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Search Algorithm &amp;amp; Ranking System
&lt;/h3&gt;

&lt;p&gt;When you submit a query, the search engine doesn't re-crawl the web — it queries its pre-built index. The ranking algorithm determines which results appear first. Traditional engines like Google use factors like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Relevance&lt;/strong&gt;: How well the page matches your query keywords&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authority&lt;/strong&gt;: Link count and quality (PageRank)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Personalization&lt;/strong&gt;: Your search history, location, device, and browsing behavior (the privacy killer)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Click-through rates&lt;/strong&gt;: Which results users click on&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Freshness&lt;/strong&gt;: How recently the page was updated&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Privacy Problem in Search
&lt;/h3&gt;

&lt;p&gt;Here's where traditional search becomes invasive. When you search Google:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Your IP address is logged&lt;/li&gt;
&lt;li&gt;Your search query is stored and linked to your account/device&lt;/li&gt;
&lt;li&gt;Cookies track you across the web&lt;/li&gt;
&lt;li&gt;Your behavior is profiled to personalize ads&lt;/li&gt;
&lt;li&gt;This data is cross-referenced with your other Google services (Gmail, YouTube, Android)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This creates a detailed profile of your interests, location, health concerns, financial status, political beliefs, and more. That's the data economy that funds free search.&lt;/p&gt;

&lt;p&gt;And in order to prevent companies or even governments from taking advantage of your searches, you should use private search engines. &lt;/p&gt;




&lt;h3&gt;
  
  
  1. DuckDuckGo
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gks6o55t31k4zxuv56z.jpg" alt="ddg" width="474" height="231"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Paoli, Pennsylvania, United States&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: September 25, 2008&lt;br&gt;&lt;br&gt;
&lt;strong&gt;CEO/Founder&lt;/strong&gt;: Gabriel Weinberg&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~2% (highest among privacy engines)&lt;/p&gt;

&lt;p&gt;DuckDuckGo is the heavyweight of private search — and for good reason. It's been my personal choice because the entire ecosystem they've built goes beyond just search.&lt;/p&gt;

&lt;p&gt;I personally use DDG as my search-engine together with other products offered by DDG, but more on that in next posts.&lt;/p&gt;

&lt;h4&gt;
  
  
  How DuckDuckGo Works
&lt;/h4&gt;

&lt;p&gt;Unlike many competitors, &lt;strong&gt;DuckDuckGo doesn't rely on a single source&lt;/strong&gt;. Its search results come from a hybrid of over &lt;strong&gt;400+ sources&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Bing API&lt;/strong&gt;: Primary source for general web results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DuckDuckBot&lt;/strong&gt;: DDG's own web crawler that supplements Bing results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wolfram Alpha&lt;/strong&gt;: For computational queries&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Yahoo! Search BOSS&lt;/strong&gt;: Historical data&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Yandex&lt;/strong&gt;: International coverage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wikipedia&lt;/strong&gt;: Knowledge panels&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is crucial because it means DDG isn't fully dependent on Microsoft's infrastructure. They've invested in building their own crawler (DuckDuckBot) to create partial independence.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Architecture
&lt;/h4&gt;

&lt;p&gt;DDG's privacy model is straightforward:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Zero Tracking&lt;/strong&gt;: No IP address logging, no search history storage, no user profiling&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Search Leakage&lt;/strong&gt;: Your search query isn't passed to the websites you click on (this alone is huge)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Encryption&lt;/strong&gt;: All connections use HTTPS, preventing ISP snooping&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Cookies for Tracking&lt;/strong&gt;: Only essential cookies for functionality&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Global Privacy Control (GPC)&lt;/strong&gt;: Auto-signals opt-out preferences to websites&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Largest privacy search community&lt;/strong&gt; — best network effects&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Actual independence&lt;/strong&gt; — uses own crawler + multiple sources&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Clean interface&lt;/strong&gt; — no bloated UI&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Respectable search quality&lt;/strong&gt; — Bing's index is solid&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Full ecosystem&lt;/strong&gt; — everything integrates&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Open source contributions&lt;/strong&gt; — DuckDuckHack community&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparency&lt;/strong&gt; — clear about what they don't collect  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Depends on Microsoft Bing&lt;/strong&gt; — During 2024 Bing outages, DDG stopped working&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Less personalized results&lt;/strong&gt; — No history means generic suggestions&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited independent index&lt;/strong&gt; — DuckDuckBot is supplementary, not primary&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Ad-supported model&lt;/strong&gt; — Non-personalized ads still shown&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Search quality inconsistency&lt;/strong&gt; — Sometimes results lag behind Google&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Premium required for full privacy&lt;/strong&gt; — Basic version still has limitations  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Real Talk
&lt;/h4&gt;

&lt;p&gt;DDG is solid if you want the path of least resistance. The ecosystem approach means you get privacy across multiple touchpoints. But here's the thing — it's still fundamentally dependent on Bing's infrastructure. That 2024 outage proved it.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. StartPage
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fegpd5xi5vgmvgnlfp522.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fegpd5xi5vgmvgnlfp522.jpg" alt="startpage" width="474" height="228"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: The Hague (Den Haag), Netherlands&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: 2006&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Ownership&lt;/strong&gt;: Dutch company, part of System1 (US-listed)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.06%&lt;/p&gt;

&lt;p&gt;StartPage is the proxy-based privacy champion. If you want to understand sophisticated privacy architecture, this one's worth studying.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Architecture: Proxy-Based Anonymization
&lt;/h4&gt;

&lt;p&gt;Here's what makes StartPage different from DDG — it uses a &lt;strong&gt;middleman approach&lt;/strong&gt;:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Your Query&lt;/strong&gt;: You search on startpage.com&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Premise Servers&lt;/strong&gt;: Locked cabinets with non-US administrators&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Your IP Removed&lt;/strong&gt;: All identifying info stripped (full IP, not just last octet)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Query to Google&lt;/strong&gt;: Startpage's servers ask Google for results (no user info attached)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Results Returned&lt;/strong&gt;: Google sees Startpage, not you&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;You Get Results&lt;/strong&gt;: Back to your browser without tracking&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is clean. Google literally doesn't know who's searching. The encryption uses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SSL/TLS&lt;/strong&gt;: Secure socket layer between you and Startpage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Perfect Forward Secrecy (PFS)&lt;/strong&gt;: Each session gets unique encryption keys&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;HTTPS Everywhere&lt;/strong&gt;: All connections encrypted&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Why Google Results Matter
&lt;/h4&gt;

&lt;p&gt;StartPage literally serves &lt;strong&gt;Google's search results&lt;/strong&gt; but anonymizes your query. This is a trade-off:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pro&lt;/strong&gt;: You get Google-quality results (often considered the best)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Con&lt;/strong&gt;: You're still dependent on Google's index, just with privacy wrapping&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Google-quality results&lt;/strong&gt; — Best-in-class search&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;True anonymity&lt;/strong&gt; — Full IP removal, not partial&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;EU jurisdiction&lt;/strong&gt; — GDPR protections, privacy-first legislation&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparent operations&lt;/strong&gt; — Explains technical flow clearly&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Anonymous View feature&lt;/strong&gt; — Proxy browsing for extra privacy&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No account required&lt;/strong&gt; — Works anonymously out of the box&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Endorsed by privacy experts&lt;/strong&gt; — Edward Snowden recommends it  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Completely dependent on Google&lt;/strong&gt; — No independence if Google changes&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — Niche product, limited resources&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Slower than direct Google&lt;/strong&gt; — Added proxy layer = latency&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited feature set&lt;/strong&gt; — Minimal instant answers compared to DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Less aggressive crawler&lt;/strong&gt; — Supplementary indexing only&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Owned by System1&lt;/strong&gt; — US company owns the parent (though Dutch HQ adds protection)  &lt;/p&gt;

&lt;h4&gt;
  
  
  Technical Depth
&lt;/h4&gt;

&lt;p&gt;The premise server setup is where the magic happens. Unlike traditional architectures, the servers are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Physically locked in cabinets&lt;/li&gt;
&lt;li&gt;Managed only by non-US staff (avoiding US legal jurisdiction)&lt;/li&gt;
&lt;li&gt;Isolated from cloud providers (avoids Patriot Act issues)&lt;/li&gt;
&lt;li&gt;Running their own anonymization pipeline&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is more robust than DDG's approach because there's no direct connection between your query and Google's servers.&lt;/p&gt;




&lt;h4&gt;
  
  
  3. Brave Search
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9jj87vxzdazj5e70l175.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9jj87vxzdazj5e70l175.jpg" alt="brave" width="474" height="252"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: San Francisco, California, USA&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: June 2022 (beta), fully released&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Parent Company&lt;/strong&gt;: Brave Software, Inc.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Current Status&lt;/strong&gt;: Growing, recently hit 100% independence&lt;/p&gt;

&lt;p&gt;Brave Search is the young gun with serious ambitions. This is what a &lt;strong&gt;true independent index&lt;/strong&gt; looks like.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Independence Factor
&lt;/h4&gt;

&lt;p&gt;Here's what makes Brave radical: &lt;strong&gt;it's building its own web index from scratch&lt;/strong&gt;.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Aspect&lt;/th&gt;
&lt;th&gt;Brave&lt;/th&gt;
&lt;th&gt;DuckDuckGo&lt;/th&gt;
&lt;th&gt;StartPage&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Search Index&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Own independent index&lt;/td&gt;
&lt;td&gt;Bing (80%+) + own crawler&lt;/td&gt;
&lt;td&gt;Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Dependence&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Minimal Big Tech&lt;/td&gt;
&lt;td&gt;High (Microsoft)&lt;/td&gt;
&lt;td&gt;High (Google)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Index Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;93% of results from own index&lt;/td&gt;
&lt;td&gt;Supplementary&lt;/td&gt;
&lt;td&gt;0%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Crawling&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Brave owns the crawler&lt;/td&gt;
&lt;td&gt;DuckDuckBot supplement&lt;/td&gt;
&lt;td&gt;No crawling&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This is huge. Brave doesn't have to negotiate with Microsoft or Google. They built their own.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Web Crawling&lt;/strong&gt;: Brave's crawler indexes the entire web&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Independent Storage&lt;/strong&gt;: Results stored in Brave's servers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Community Feedback&lt;/strong&gt;: Users can upvote/downvote to improve results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Goggles&lt;/strong&gt;: Custom ranking filters users create&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Bing/Google&lt;/strong&gt;: Zero reliance on Big Tech indexes&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Privacy By Design
&lt;/h4&gt;

&lt;p&gt;Brave Search doesn't track because it wasn't built to track:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;No User Profiles&lt;/strong&gt;: Engine designed from ground-up for privacy&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Cookies&lt;/strong&gt;: Zero tracking cookies by default&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Browsing Data&lt;/strong&gt;: Device info not collected&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No IP Logging&lt;/strong&gt;: IP addresses not stored&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Optional Web Discovery Project&lt;/strong&gt;: Users can opt-in to help improve results (anonymously)&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Innovative Features
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Goggles&lt;/strong&gt;: This is brilliant. You create custom ranking rules:&lt;br&gt;
Example Goggle:&lt;/p&gt;

&lt;p&gt;Boost scientific papers&lt;br&gt;
Hide social media&lt;br&gt;
Prioritize academic sources&lt;br&gt;
Downrank clickbait&lt;/p&gt;

&lt;p&gt;Others share their Goggles, creating community-curated search experiences.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Discussions&lt;/strong&gt;: See real discussions about topics (Reddit threads, forums) integrated into results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Summarizer&lt;/strong&gt;: Generates concise answers with cited sources (not hallucination-prone like competitors).&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;True independence&lt;/strong&gt; — Own index, no Big Tech dependencies&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Private by architecture&lt;/strong&gt; — Not bolted on as afterthought&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Goggles feature&lt;/strong&gt; — Community-driven ranking customization&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Growing rapidly&lt;/strong&gt; — 100M+ monthly active users (Brave browser)&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Excellent privacy defaults&lt;/strong&gt; — Zero tracking, zero profiling&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Web Discovery Project optional&lt;/strong&gt; — Can contribute anonymously&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;US-based but transparent&lt;/strong&gt; — Open about design principles&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Premium option&lt;/strong&gt; — Ad-free for supporters  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Young search engine&lt;/strong&gt; — Still refining result quality&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Different results than Google&lt;/strong&gt; — Learning curve for power users&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Smaller index&lt;/strong&gt; — 93% own index still maturing&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Brave browser required for best integration&lt;/strong&gt; — Works standalone but better with ecosystem&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;US jurisdiction&lt;/strong&gt; — No GDPR-level protection (though privacy-first design) &lt;/p&gt;

&lt;h4&gt;
  
  
  The Blockchain Angle
&lt;/h4&gt;

&lt;p&gt;Brave is built by people who understand decentralization. Their philosophy of "no Big Tech dependency" aligns with blockchain thinking. They're even working on integrating Web3 concepts into search (cryptocurrency tipping, decentralized indexing discussions).&lt;/p&gt;




&lt;h3&gt;
  
  
  4. Swisscows
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ajjwq78yde57dhrtm6k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ajjwq78yde57dhrtm6k.jpg" alt="sc" width="474" height="249"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Egnach, Switzerland&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: Originally as web directory in 2002, evolved to search engine&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Data Center&lt;/strong&gt;: Swiss Alps&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Unique Selling Point&lt;/strong&gt;: Family-friendly + Swiss data protection&lt;/p&gt;

&lt;p&gt;Swisscows is the extreme privacy option. They don't mess around.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Switzerland Advantage
&lt;/h3&gt;

&lt;p&gt;Switzerland has:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Federal Data Protection Act&lt;/strong&gt; — Stricter than GDPR in some ways&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;"Bunker" Data Center&lt;/strong&gt; — Swiss Alps location, highest security&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No US Jurisdiction&lt;/strong&gt; — Patriot Act doesn't apply&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Strong banking privacy traditions&lt;/strong&gt; — Culture of secrecy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Swisscows headquarters is in Egnach, serving this exact jurisdiction.&lt;/p&gt;

&lt;h4&gt;
  
  
  Technical Stack
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Own Servers&lt;/strong&gt;: Swisscows has its own infrastructure (unlike most competitors):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Located in Switzerland only&lt;/li&gt;
&lt;li&gt;Not using cloud providers (avoids Patriot Act)&lt;/li&gt;
&lt;li&gt;Only Swiss staff can access servers&lt;/li&gt;
&lt;li&gt;Queries anonymized after 7 days&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Search Index&lt;/strong&gt;: Originally powered by Bing, but recently partnered with &lt;strong&gt;Brave&lt;/strong&gt; to develop independent European index. This is strategic.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Features (Standard)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;No data collection on free version&lt;/li&gt;
&lt;li&gt;IP address removal&lt;/li&gt;
&lt;li&gt;No user profiling&lt;/li&gt;
&lt;li&gt;No cookies for tracking&lt;/li&gt;
&lt;li&gt;Semantic search (intelligent understanding)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Swisscows Pro (Premium)
&lt;/h3&gt;

&lt;p&gt;For absolute paranoia (in the good way):&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Feature&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Zero Data Storage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Literally no data saved about you, ever&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;100% Anonymous&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Complete anonymity, even from Swisscows&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ad-Free&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No advertising revenue model needed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Custom Results&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;You curate which sources appear&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Swiss Servers Only&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No data leaves Switzerland&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Family-Friendly Feature
&lt;/h3&gt;

&lt;p&gt;Swisscows filters pornographic and violent content by default:&lt;br&gt;
This is useful for:&lt;/p&gt;

&lt;p&gt;Schools wanting safe search&lt;br&gt;
Parents protecting kids&lt;br&gt;
Organizations with content policies&lt;/p&gt;

&lt;p&gt;Some see this as censorship, others appreciate it.&lt;/p&gt;

&lt;h3&gt;
  
  
  Pros
&lt;/h3&gt;

&lt;p&gt;✅ &lt;strong&gt;Strictest privacy jurisdiction&lt;/strong&gt; — Swiss law is gold standard&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Own servers&lt;/strong&gt; — No cloud, no Patriot Act risk&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Bunker data center&lt;/strong&gt; — Physically secure infrastructure&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No US parent company&lt;/strong&gt; — Completely independent&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Partner with Brave&lt;/strong&gt; — Contributing to European index independence&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Family-friendly filtering&lt;/strong&gt; — Good for institutions&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Very transparent&lt;/strong&gt; — Clear about what they do/don't collect&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Semantic search&lt;/strong&gt; — Intelligent query understanding  &lt;/p&gt;

&lt;h3&gt;
  
  
  Cons
&lt;/h3&gt;

&lt;p&gt;❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — ~0.001% usage&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited result quality&lt;/strong&gt; — Smaller index means gaps&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Expensive premium&lt;/strong&gt; — Around €89/month or €899/year&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Content filtering controversial&lt;/strong&gt; — Some see it as censorship&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Newer to independence&lt;/strong&gt; — Recently partnered with Brave for index&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Language limitations&lt;/strong&gt; — Better for European languages&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Poor search features&lt;/strong&gt; — Minimal instant answers or tools  &lt;/p&gt;




&lt;h3&gt;
  
  
  5. Qwant
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkz44vvwokdqpbgujwe23.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkz44vvwokdqpbgujwe23.jpg" alt="Qwant" width="474" height="207"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Paris, France&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: February 2013&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founders&lt;/strong&gt;: Jean-Manuel Rozan, Éric Léandri, Patrick Constant&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Government Support&lt;/strong&gt;: Backed by French state investment&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.5% (mostly in Europe)&lt;/p&gt;

&lt;p&gt;Qwant is France's answer to Google dominance — and it's complicated.&lt;/p&gt;

&lt;h4&gt;
  
  
  The French National Project
&lt;/h4&gt;

&lt;p&gt;Qwant received backing from French government and Caisse des dépôts (French investment bank) because of geopolitical concerns about US tech dominance. This is interesting from a sovereignty perspective.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works
&lt;/h4&gt;

&lt;p&gt;Qwant uses &lt;strong&gt;Microsoft Bing as primary index&lt;/strong&gt; with its own improvements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fetches Google results for some queries&lt;/li&gt;
&lt;li&gt;Has own index but it's supplementary&lt;/li&gt;
&lt;li&gt;Uses Wikipedia for knowledge panels&lt;/li&gt;
&lt;li&gt;Integrates APIs from TripAdvisor, DeepL, YouTube, Twitter, Facebook&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The results are &lt;strong&gt;similar to Bing&lt;/strong&gt; because that's the underlying technology.&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Model (Mostly)
&lt;/h4&gt;

&lt;p&gt;Here's where it gets murky:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Qwant Claims&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No tracking cookies&lt;/li&gt;
&lt;li&gt;No personalized ads&lt;/li&gt;
&lt;li&gt;No user profiling&lt;/li&gt;
&lt;li&gt;Queries anonymized&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What Actually Happens&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sends data to Microsoft Bing Ads&lt;/strong&gt; for ad targeting&lt;/li&gt;
&lt;li&gt;IP address is masked (last octet removed) but not fully anonymized&lt;/li&gt;
&lt;li&gt;User-Agent and search keywords sent to Microsoft&lt;/li&gt;
&lt;li&gt;Data retained up to &lt;strong&gt;18 months&lt;/strong&gt; (not "never stored")&lt;/li&gt;
&lt;li&gt;This wasn't disclosed until mid-2021, causing privacy backlash&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is the fundamental weakness. They claim privacy but still feed Microsoft your behavioral data for ad targeting. It's better than Google, but not actually private.&lt;/p&gt;

&lt;h4&gt;
  
  
  Unique Features
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Junior Mode&lt;/strong&gt;: Filtered version for kids (similar to Swisscows)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Collections&lt;/strong&gt;: Save and organize search results like Pinterest&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Qwant News&lt;/strong&gt;: Aggregated news with diverse sources (actually good feature)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Translation Integration&lt;/strong&gt;: Built-in DeepL translator for results&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;EU/France jurisdiction&lt;/strong&gt; — GDPR protected&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Government investment&lt;/strong&gt; — Funding stability&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;No personalized ads&lt;/strong&gt; — Ad model isn't behavior-targeted&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Decent search quality&lt;/strong&gt; — Bing is solid index&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;News aggregation&lt;/strong&gt; — Good for current events&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Junior mode&lt;/strong&gt; — Family-friendly filtering&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Fast interface&lt;/strong&gt; — Minimalist design  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Misleading privacy claims&lt;/strong&gt; — Says "private" but feeds Microsoft data&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Bing dependent&lt;/strong&gt; — No independence from Microsoft&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Data retention&lt;/strong&gt; — 18 months storage contradicts privacy narrative&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited features&lt;/strong&gt; — Fewer tools than Google/DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Tiny market share&lt;/strong&gt; — Limited resources for improvement&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;French government ties&lt;/strong&gt; — Some see as political tool&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;IP masking not anonymization&lt;/strong&gt; — Last octet removed ≠ private&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Unreliable history&lt;/strong&gt; — Financial struggles, multiple pivots  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Real Problem
&lt;/h4&gt;

&lt;p&gt;Qwant markets itself as private but fundamentally isn't. The Bing Ads data sharing was buried in their privacy policy. For crypto people doing sensitive research, this is a no-go. You're still being profiled, just not visibly personalized.&lt;/p&gt;




&lt;h3&gt;
  
  
  6. Ecosia
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6qqt6ws6xk3m4f84jcl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw6qqt6ws6xk3m4f84jcl.jpg" alt="Ecosia" width="474" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Location&lt;/strong&gt;: Berlin, Germany&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founded&lt;/strong&gt;: December 2009&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Founders&lt;/strong&gt;: Christian Kroll, Achim Steiner (UN figure)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Business Model&lt;/strong&gt;: Non-profit, B Corp certified&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Market Share&lt;/strong&gt;: ~0.04%&lt;/p&gt;

&lt;p&gt;Ecosia is unique because &lt;strong&gt;it's not primarily about privacy&lt;/strong&gt; — it's about environmental impact. But it's worth understanding because the trade-offs are interesting.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Mission
&lt;/h4&gt;

&lt;p&gt;Ecosia uses search revenue to plant trees. &lt;strong&gt;50% of profit goes to reforestation projects&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;45+ million trees planted (as of 2024)&lt;/li&gt;
&lt;li&gt;Partnerships with The Nature Conservancy, IUCN&lt;/li&gt;
&lt;li&gt;Multiple continents: Brazil, Indonesia, Ethiopia, Peru, India&lt;/li&gt;
&lt;li&gt;Verified impact tracking&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is legitimate environmental work, not greenwashing.&lt;/p&gt;

&lt;h4&gt;
  
  
  How It Works (Technically)
&lt;/h4&gt;

&lt;p&gt;Ecosia uses &lt;strong&gt;Bing index&lt;/strong&gt; (like DuckDuckGo and Qwant):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Powered by Microsoft Bing results&lt;/li&gt;
&lt;li&gt;Own supplementary crawler (Ecosiabot)&lt;/li&gt;
&lt;li&gt;Generates revenue through Bing partner ads&lt;/li&gt;
&lt;li&gt;Takes ~€0.50 per search to tree planting&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The economics: You search → Bing shows ads → Ecosia gets commission → ~50% goes to trees&lt;/p&gt;

&lt;h4&gt;
  
  
  Privacy Features
&lt;/h4&gt;

&lt;p&gt;Here's the reality check:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Ecosia Does Right&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No persistent user tracking&lt;/li&gt;
&lt;li&gt;No search history storage&lt;/li&gt;
&lt;li&gt;HTTPS encryption&lt;/li&gt;
&lt;li&gt;No third-party profiling cookies&lt;/li&gt;
&lt;li&gt;GDPR compliant (EU based)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Where Privacy Falls Short&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IP address logging&lt;/strong&gt; — Stored for debugging, cleared after 7 days&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bing data sharing&lt;/strong&gt; — Microsoft sees your searches (anonymized but still shared)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Analytics cookies&lt;/strong&gt; — Matomo analytics (privacy-focused but still collects)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limited anonymization&lt;/strong&gt; — Not like StartPage's full proxy approach&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ecosia is &lt;strong&gt;more private than Google but less private than DuckDuckGo/StartPage&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Environmental Breakdown
&lt;/h4&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Initiative&lt;/th&gt;
&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tree Planting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;45M+ trees in 70+ countries&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Carbon Negative&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Offsets more CO2 than servers emit&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;B Corp Certified&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Independent third-party verified&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Transparent Reporting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Monthly impact dashboard public&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Partnership Model&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Works with local organizations&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The tree count is audited. They show exact locations, coordinates, photos. This is serious environmental work.&lt;/p&gt;

&lt;h4&gt;
  
  
  Pros
&lt;/h4&gt;

&lt;p&gt;✅ &lt;strong&gt;Environmental impact verified&lt;/strong&gt; — Real trees, real numbers&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Decent privacy&lt;/strong&gt; — Better than Google, not as strict as DDG&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;B Corp certified&lt;/strong&gt; — Independent auditing of social mission&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Reasonable search quality&lt;/strong&gt; — Bing index is solid&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Transparent financials&lt;/strong&gt; — Public impact reports&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;EU jurisdiction&lt;/strong&gt; — GDPR protection&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Growing adoption&lt;/strong&gt; — ~15M monthly active users&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Mission-driven team&lt;/strong&gt; — Passionate about environment  &lt;/p&gt;

&lt;h4&gt;
  
  
  Cons
&lt;/h4&gt;

&lt;p&gt;❌ &lt;strong&gt;Privacy not primary focus&lt;/strong&gt; — IP logging, Bing data sharing&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Bing dependent&lt;/strong&gt; — No search independence&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Effectiveness questioned&lt;/strong&gt; — Tree planting ROI debated&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Limited instant answers&lt;/strong&gt; — Fewer tools than Google/DDG&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Smaller index&lt;/strong&gt; — Result quality gaps on niche queries&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Free version slower&lt;/strong&gt; — Premium for faster results (weird model)&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Can't verify tree quality&lt;/strong&gt; — Planting numbers public, survival rates less so&lt;br&gt;&lt;br&gt;
❌ &lt;strong&gt;Ad-supported&lt;/strong&gt; — Still needs advertising revenue  &lt;/p&gt;

&lt;h4&gt;
  
  
  The Trade-Off Philosophy
&lt;/h4&gt;

&lt;p&gt;Ecosia explicitly says: &lt;strong&gt;"Choose environmental impact over maximum privacy"&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is honest. If your primary concern is privacy, use DuckDuckGo or StartPage. If you want to offset carbon while searching reasonably privately, Ecosia makes sense.&lt;/p&gt;




&lt;h2&gt;
  
  
  Comparison Matrix
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Engine&lt;/th&gt;
&lt;th&gt;Privacy Tier&lt;/th&gt;
&lt;th&gt;Independence&lt;/th&gt;
&lt;th&gt;Speed&lt;/th&gt;
&lt;th&gt;Search Quality&lt;/th&gt;
&lt;th&gt;Jurisdiction&lt;/th&gt;
&lt;th&gt;Best For&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;DuckDuckGo&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;Medium (Bing+own)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Very Good&lt;/td&gt;
&lt;td&gt;USA&lt;/td&gt;
&lt;td&gt;General use, ecosystem&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;StartPage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Extreme&lt;/td&gt;
&lt;td&gt;Low (Google proxy)&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;Netherlands&lt;/td&gt;
&lt;td&gt;Google quality + privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Brave&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Excellent&lt;/td&gt;
&lt;td&gt;High (own index)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Good/Improving&lt;/td&gt;
&lt;td&gt;USA&lt;/td&gt;
&lt;td&gt;Independence-focused&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Swisscows&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Extreme&lt;/td&gt;
&lt;td&gt;High (own infra)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Fair&lt;/td&gt;
&lt;td&gt;Switzerland&lt;/td&gt;
&lt;td&gt;Absolute privacy, bunker&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Qwant&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Fair (misleading)&lt;/td&gt;
&lt;td&gt;Low (Bing)&lt;/td&gt;
&lt;td&gt;Fast&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;EU users, news&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ecosia&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Low (Bing)&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;Good&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;Environmental impact&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Online Privacy is not like a road from Point A to B. It's a rather a multi-layer process, that if taken seriously and applied correctly, can benefit you and your environment by liberating you from big-tech, government surveillance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F080pyq6531jxi3wof7tc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F080pyq6531jxi3wof7tc.png" alt="Ice berg" width="800" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a way I would envision privacy. Btw, the Penguin is probably the Linux one :D&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I hope you enjoyed this article and you learnt something from it. I honestly have spent hours on reading, fact checking, researching, comprehending and editing the text so that not only me but also you could understand it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqgbt8pfdn5z0f7ay8o6h.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqgbt8pfdn5z0f7ay8o6h.gif" alt="bye" width="498" height="371"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Be ready for Part 2 ! Where I will present couple of alternatives for Mail Providers and Messengers for you, so that you can switch from the big-tech ones to more private ones.&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>discuss</category>
      <category>tooling</category>
      <category>security</category>
    </item>
    <item>
      <title>From Zero To Crypto Hero (Week 5) - BIG CHANGES !</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 05 Apr 2026 01:35:20 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-5-big-changes--39fj</link>
      <guid>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-5-big-changes--39fj</guid>
      <description>&lt;h2&gt;
  
  
  Hi Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;As a weekly habit I decided to post an update on what I actually did recently and there are actually some changes to be announced. &lt;/p&gt;

&lt;p&gt;But before the main part, I would like to wish you all happy easter out there, hope you do not grind and touch grass in this time and you're afk, same as here me and other fellow dinos !&lt;/p&gt;

&lt;p&gt;_Btw. There should be easter, not eastern. It's because of german word Ostern, I have primarily mismatched the words. And even after request to corrrect the text, it remained the same. 😅&lt;br&gt;
_&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkg4uc0ifjba4ul03jh8g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkg4uc0ifjba4ul03jh8g.png" alt="easter" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I wish you that you charge your batteries and after easter, you'll be rested out and ready for challenges and difficulties. I know that it's easier said then done, but belief dies at last.&lt;/p&gt;
&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;This week I have been doing a lot of research for an article I write on privacy-tools and privacy in general. What I mean by tools is actually a set of a lot of digital-world/IT world elements like OS, VPNs, Marketplaces, almost everything, that I use and I prepare a list of tools, I recommend.&lt;/p&gt;

&lt;p&gt;I decided that for reliable tech-journalism, I also have to test out one of the other most popular phone OS, that cares about privacy, besides the one I'm using, so it will take time to write.&lt;/p&gt;
&lt;h2&gt;
  
  
  How is PokeStake doing ?
&lt;/h2&gt;

&lt;p&gt;As you could see there have been couple of changes committed, most of them were mostly minor, but I actually fixed one important bug that was inside my code. Namely it was about real-time updates on frontend, it was working fine, until some time and afterwards the page crashed i.e. both players were not able to utilize their turn.&lt;/p&gt;

&lt;p&gt;Luckily I reminded myself on &lt;code&gt;useEffectEvent&lt;/code&gt;-hook, which basically enables you to prevent useEffect from unnecessary calls, due to it's dependency. Here's a video I recommend to see if someone does not like reading docs 😂&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/uQpky6ygfk0"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;Now after the change the battle is working greatly, the only things now to be implemented are handling reconnections, fixing frontend bugs, handling proper display of the winner state and looser state e.g. If user leaves when the battle started already, timeout of turn. Next up there are plans to implement the rewarding-system with implementation of ZKProofs by means of Noir language, so that the contract instead of getting the data of the battle and based on it verify and grant user the reward, user could pass a hash of the battle-data and verify soundness onchain, so that the minimal anonymity is reached (that are for now just plans, but I look forward to do it).&lt;/p&gt;

&lt;h2&gt;
  
  
  Not everything went as planed...
&lt;/h2&gt;

&lt;p&gt;It might sound, that it's almost nothing however it's good to bear in mind that I have an allergy, which occurs in the time of end of March - April and I actually got the symptoms and literally I used 2 toilet-paper rolls (not to jerk off, perverts) to blow my nose basically. It feels tough to focus and code, but somehow I manage it. So may future bring better health condition soon. &lt;/p&gt;

&lt;h2&gt;
  
  
  Aside from coding
&lt;/h2&gt;

&lt;p&gt;I participated recently also in Hashlock online networking-event, where I got acquainted with 2 cool devy mates, whom I reckon I can&lt;br&gt;
learn a lot from.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhd8tz7mcj61ky5oo0fe3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhd8tz7mcj61ky5oo0fe3.png" alt="devy-meeting" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For context, Hashlock is a comapany that offers to web3 projects the security-audits, while they also host events either online or offline around the world. &lt;/p&gt;

&lt;p&gt;Shout out to &lt;a href="https://www.linkedin.com/in/fletchroberts" rel="noopener noreferrer"&gt;Fletcher Roberts&lt;/a&gt;, who invited me on the meeting ❤️&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the impending changes ?!
&lt;/h2&gt;

&lt;p&gt;Now everyone might wonder, what are the changes about that I want to announce and and label them as &lt;strong&gt;BIG&lt;/strong&gt;. Before I start, I have say that I really enjoy reading and writing technical articles, coz in such way I learn from others experience, what actually can decrease the occurance of the same situation in my case.&lt;/p&gt;

&lt;p&gt;However, weekly updates are for me kind of tough to be handled I realised. I could just &lt;em&gt;ChAd-jIpiDi&lt;/em&gt; everything given my description, but it would take the entire joy from the process of writing. Because you have to know, that every line, every word, letter, embedding, video, has been done by me personally. And writing it is really time consuming. &lt;/p&gt;

&lt;p&gt;Thus I decided, to temporarily cease postage of the series "From Zero To Crypto Hero", and I will hopefully come back to it later, and restart it as I finally start with actual cryptography and blockchain development/architecture.&lt;/p&gt;

&lt;p&gt;Another big change, that I wanted to announce is that I'd rather post less, but more valuable content, I guess bi-weekly or monthly posts would be manageable with what I want perform. I currently work on an extensive article that covers a lot about digital privacy-extending tools to use, and it's gonna be really long and reliable, but I need time to do it, and recently I fell like frog hopping from a lilly-pad onto another one and another one. Something like that:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tkqtbvr6uj61hpmc8ol.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tkqtbvr6uj61hpmc8ol.gif" alt="xd" width="220" height="124"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So the announcement sounds, that this month it's likely not to be any posts because weekly updates turned out to be for me a bit of burden and too short period of time to do a significant change to my devy process for now and also the I will have a lot of private matters to be resolved this month.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Temporary cease of posting for a month and change of content and series of "From Zero To Crypto Hero". Switch from weekly updates, to bi-weekly or monthly mode. Less frequent posts, but more value in posts, more to infer and learn.&lt;/p&gt;

&lt;p&gt;That's all from my side for today, wish you all the best and take care !&lt;/p&gt;

&lt;p&gt;Cheerio, Luftie :D&lt;/p&gt;

</description>
      <category>cryptocurrency</category>
      <category>web3</category>
      <category>webdev</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>From Zero to Crypto Hero (Week 4) - Week of Break from Coding and Big Regret</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Mon, 30 Mar 2026 21:39:02 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-4-week-of-break-from-coding-and-big-regret-3ejn</link>
      <guid>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-4-week-of-break-from-coding-and-big-regret-3ejn</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community
&lt;/h2&gt;

&lt;p&gt;This time I'm writing the article one day later, as I usually kept to push the updates to appear regularly on sunday. Well today is monday, so I guess it's not a big deal 😅 (Especially coz mostly my posts do not make big outreach). Anyways, promise is a promise, thus I upload this tiny update on my work. &lt;/p&gt;

&lt;p&gt;Are you ready ? Let's go !&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;So if I said, that I took break from coding, it means I've been buggering around, doing nothing and I just post it to just keep the streak ? Well technically correct :D&lt;/p&gt;

&lt;p&gt;Thanks for reading, I hope you enjoyed this part, don't forget to hit a like or some other cool emoji and till next time. See ya !&lt;/p&gt;

&lt;p&gt;.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;br&gt;
.&lt;/p&gt;

&lt;p&gt;Ok, I was joking 🤣. If you're still here to read further, congrats your curiosity is out of space 🚀. &lt;/p&gt;

&lt;p&gt;This week perhaps was not filled a lot of with coding/programming whatsoever. But for sure it was not boring or completely wasted time.&lt;/p&gt;
&lt;h2&gt;
  
  
  So what have I been doing throughout this week ?
&lt;/h2&gt;

&lt;p&gt;Let's start with the fact, that I've been 3 days out and about in Warsaw on the conference Next Block Expo, specially devoted to cryptocurrencies but discussed from financial angle. I have shared more of my views on the event in that article (If you're interested go on and read it)&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka" class="crayons-story__hidden-navigation-link"&gt;My Experiences from NBX and Privacy Hell For Crypto....&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image" width="256" height="256"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3413798" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt="" width="256" height="256"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 27&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka" id="article-link-3413798"&gt;
          My Experiences from NBX and Privacy Hell For Crypto....
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/web3"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;web3&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/event"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;event&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/blockchain"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;blockchain&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;6&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              1&lt;span class="hidden s:inline"&gt; comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            5 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;As I reached my home-town and woke-up the next day, I honestly felt as though someone would have completely stolen my batteries🪫&lt;/p&gt;

&lt;p&gt;In general, I liked the event from the point of view, that there were more projects that were genuinely interesting me than on the last edition, however here are yet couple of inferences that came into my mind. Not only about &lt;/p&gt;

&lt;h2&gt;
  
  
  Inferences
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;I'm not a fan of big cities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvunbftlnbaaifwrfg22z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvunbftlnbaaifwrfg22z.jpg" alt="warsaw" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I know in previous article I have written, that I do not like big cities, but that was very general statement. I've written in the article that I hate big cities, I forgot to add that at least in Poland, but more on that later.&lt;/p&gt;

&lt;p&gt;Before I start let's define what is a big city (at least for me) ? A big city at least for me is a agglomeration in which live 500k+ people (incld. commute-workers + students). &lt;/p&gt;

&lt;p&gt;Although I personally do not live in some hicksville, I used to say so about place where I live. Warsaw felt for me like rotten, toxic and fake. I felt more endangered than even in Berlin tbh, whereas Berlin got the most unliked city in my hierarchy.&lt;/p&gt;

&lt;p&gt;And additionally the air-conditions in Warsaw seemed awful to me (However I'm kind of over-sensitive in this case, so I might be biased). I mean indeed, the centre, accompanied by skyscrapers is looking nice and the most popular places are impressive, but for me it was enough to see how the city looks like 2/4/6 km away from the highlight-spots, to realise that Warsaw's beauty is only marketing (as always lol). &lt;/p&gt;

&lt;p&gt;It's actually quite common in Poland, but I guess every city has it's issues, regardless of the country. I remember back 2023, as I gone for my first ever solo-trip to Manchester, England. I've been there for about 4 days, back then I really didn't experience something that would be hideous in some way, except a hobo, who pissed on a wall while I've been walking through the city, seeking a place to purchase a ticket for public-transport.&lt;/p&gt;

&lt;p&gt;I admire always England for their infrastructure and architecture, when it comes to metropolis like Greater Manchester. I always laughed that Manchester is smaller than my city, but then I realised that the cities fade between each other and I remember that I could not realise if I'm in Salford/Trafford or Manchester. So were my experiences at least.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The World is centralized, not by government, by technology&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;Sorry, I had no clue how to name this inference lol. I want to tell about my experience in Warsaw that indeed, was very mixed because I had kind of emergency situation. I haven't taken the phone-charger to my phone, although before leaving the house I had been plugging in the power-bank to pack it into backpack.&lt;/p&gt;

&lt;p&gt;Unfortunately both power-bank and charger have been left at home by the time of my departure. Unluckily, my phone's battery's level was decreasing rapidly, like never before. &lt;/p&gt;

&lt;p&gt;And I was looking for place where to purchase a charger and I had impression that almost everything is against me. Suddenly some arab-guy and afterwards a hobo wanted to scrounge money from me and as I gone to the mall by bus, there was some shady-guy following me weirdly as though he wanted to pick-pocket me or something, he resigned after I have shown him a pepper-spray in my hand, not having even made an eye-contact with that guy.&lt;/p&gt;

&lt;p&gt;I gone to a first mall and the charger cheapest charger was 100 PLN, it was Media-Markt shop. I asked the assistant, if can help me choose some cheap charger, and shockingly he advised me to go to the mall on the other side of the street to buy a charger in a supermarket.&lt;/p&gt;

&lt;p&gt;The price there ? 18.50 PLN (for cable and the charger-cube) ! Whereas the cable at Media-Markt its-self was 79 PLN ! Can you comprehend it ? There is more 500% spread between price in special IT-RTV-AGD Shop and Super-market. It just blew my mind, honestly speaking and would never say it was reality.&lt;/p&gt;

&lt;p&gt;I almost burst in tears when I have experienced the vibration of my phone going out of battery and me being not even with knowledge, where to purchase a charger.&lt;/p&gt;

&lt;p&gt;What I meant by centralisation is that everything nowadays is heavily based on electronics and current/electricity. Perhaps that's another problem to be solved, huh ? I know it's my fault in the end of the days, that I hadn't taken the charger 😅. I do not seek for excuses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Small events &amp;gt; Big events&lt;/strong&gt;: I reckon smaller events that are highly technical or devoted specifically for specific topic, are better than big events, where there are a lot of people. Big events tend to be more general and kind of discombobulating, as there are so many people talking to each other one has an impression to be a weirdo, not having talked to anyone. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fncx06rv7ceb7ofsi4qc0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fncx06rv7ceb7ofsi4qc0.jpg" alt="Ferrari" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft920yzs7mmm8fq35pepz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft920yzs7mmm8fq35pepz.jpg" alt="Cybertruck" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Big events have also a flaw, that there is very intrusive and pressure-full marketing done and on one day you can buy the same ticket for 65$ and the next day you can have 2 tickets in the same price, which is annoying. Smaller events often have stable price of the event-ticket, which I find a great solution, even if for someone it out of budget.&lt;/p&gt;

&lt;p&gt;However for sure good things about big-events is bigger amount of projects and companies to be approached and talked to, to know what services are nowadays offered on the market. &lt;/p&gt;

&lt;p&gt;And therefore, the amount of stickers is also greater :D Here's the new layout/design of my laptop. Hope you like it 😁&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft70soiw5k0c2zgu64syf.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft70soiw5k0c2zgu64syf.jpg" alt="sticker-filled" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu2l5n7tcbupcfuajpb9t.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu2l5n7tcbupcfuajpb9t.jpg" alt="front-case" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Whereas smaller events like for sure &lt;a href="https://www.monerokon.org/" rel="noopener noreferrer"&gt;Monero Konferenco&lt;/a&gt; could be such event...... &lt;/p&gt;

&lt;p&gt;Unfortunately, I guess I will not be able to get to the event, due to the financial circumstances on my own. Now, I've an impression as though I wasted my money on NBX to be honest, although there are visible benefits from that event.&lt;/p&gt;

&lt;p&gt;I really would love to visit Monero Konferenco this year's edition (even though it's in Warsaw). This event is going to be technical and specific, something I had dreamt about and could not find so specifically. It sounds it's not going to be sort of scattered gibberish about financial matters.&lt;/p&gt;

&lt;p&gt;Don't get me wrong, finances are super-important field of human-life, but when it comes to such events, it ends up on artificially looking for me severe talks about the future, another 101 sessions instead of bringing some more medium-advanced/advanced knowledge so people can develop. &lt;/p&gt;

&lt;p&gt;And unfortunately a lot of speakers in my eyes are just dreams-sellers and are excluded from reality, pushing from the stage some truisms about hard-work, persistence, everything everyone knows about. But in the end of the days, everyone has to deal with their own issues and do everything what they can in their scale to solve them, not in the speaker's scale.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flndbouuqb0muavyllbri.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flndbouuqb0muavyllbri.jpg" alt="politics" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Furthermore, I do not preach that big-events, are bad and you should not attend them. No I just present the trade-offs of both types of events. Both have pros and cons, that should be basically taken into a count and should be treated separately and not as a comparing-pair.&lt;/p&gt;

&lt;p&gt;I have to confess, even though there were projects that interested me like Gen6, Relocatify or Sealed. Most of the projects were already about combining Tradfi with Defi. Speaking outspoken, that hurts. Cryptocurrencies were the hope, which were about to turn the way we understand finances and the way we pay. Unfortunately, it seems that cryptocurrencies become only an asset instead of what their real purpose was. It seems crypto became alternative and is not going to become a payment-system. At least not in next 5/10 years, I suppose.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9dok93k5sntaakb2ega.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9dok93k5sntaakb2ega.jpg" alt="tradfi" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafl6ri7u86ioigs74vxd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafl6ri7u86ioigs74vxd.jpg" alt="tradfi2" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpjsln3nmubeodog3xsmr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpjsln3nmubeodog3xsmr.jpg" alt="tradfi3" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That doesn't mean however that I stopped being engaged in cryptocurrencies and blockchain. No, I just know that I'm just likely to build a very niche product if I were to build a private-blockchain and it will not be something that institutions would put money into (Which I actually would not like them to do). &lt;/p&gt;

&lt;p&gt;We saw how big pump was on ZTrash (ZCash) and even bigger dump occured, only to pump the narrative and take the money from naive people, who blindly believed in privacy-turn. Unless markets are controlled by big whales, that operate in fiat, psychotically indulge theirself in seeing wars and blood of other innocent people, and understand only money-language, no change in financial-system is about to occur, and people will exist, so long will the markets be manipulated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resign from my privacy standard was a failure&lt;/strong&gt; - On NBX, I came to a conclusion, not to cover my face as I usually do in public and not only. I did it for common convenience and not to trigger controversies among people there (usually a covered face is associated mostly with criminals, than carrying about privacy). Also as I got to the venue, it turned out light was shit and the air was slightly humid for me, so I could suffocate in the mask and could basically fall on someone or cause damage while walking, if I had my glasses on. &lt;/p&gt;

&lt;p&gt;Also I gone there with an attitude that, if I don't show my face in social media anywhere, so I will not be recognisable by anyone (Previously I used to post my images in a mask online). &lt;/p&gt;

&lt;p&gt;Big events have their flaw also that there are basically cameras everywhere, everyone is recording something and I genuinely felt, when I was just resting after networking as though someone would basically put the camera right into my face. Whereas MoneroKonferenco seems to be a really private arrangement. They have even their &lt;strong&gt;Photo Policy&lt;/strong&gt;, which sound like:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Ask before snapping, all persons in a photo/video must have explicitly given consent to be photographed/recorded. As such, please avoid taking photos/video of large crowds, audience, or workshop participants.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Don't get me wrong, I'm not saying those all fluffy stuff about that conference, trying to scrounge money from you guys or something, no.&lt;/p&gt;

&lt;p&gt;Rather just express my genuine willingness to appear, there though given my financial situation I know it will be tough. I will not create a fund-raising for a trip to Warsaw specifically for Monero-Konferenco, if I cannot even give you anything in exchange.&lt;/p&gt;

&lt;p&gt;One option would be to go and work there as an volunteer, as they get the ticket for free. Which sounds as an interesting experience in my opinion, we will see if the event will fit my schedule or not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;People on the big-events&lt;/strong&gt;: I was surprised, when I saw people who have less knowledge about cryptocurrencies than I have, are younger than me, and make money in this industry, whereas I, not being fake-modest have a quite big knowledge on cryptocurrencies both from financial and technical point of view and haven't made a single penny. &lt;/p&gt;

&lt;p&gt;I do not complain or say I'm worse, just assert the facts that some people make money faster.&lt;/p&gt;

&lt;p&gt;Candidly, I'm more looking on events for connecting with devs and people who build and also people who worked on projects already, than financial or businessman connection.&lt;/p&gt;

&lt;h2&gt;
  
  
  I decided to resign from hackathon participation
&lt;/h2&gt;

&lt;p&gt;Given the fact that my financial struggle nowadays and my experience from trips, I decided not to participate in ETHSilesia hackathon, that I intended to.&lt;/p&gt;

&lt;p&gt;Apparently everything seemed to fit in time perfectly, but the budget doesn't lie and I cannot pump it somehow out of nowhere. My investments currently are 60% down, and I will not resolve the loss. &lt;/p&gt;

&lt;p&gt;Hence, I decided to devote this time to implement solid gameplay feature with reward system based on ZKP (likely to be implemented with Noir).  &lt;/p&gt;

&lt;h2&gt;
  
  
  Was there something technical, that I've done ?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Obviously !&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;I have tested for the first time Quebes OS in VirtualBox env.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I watched couple of youtube videos from a guy called Reject Convenience and his second channel where they show discrepancies in Proton narrative and their actual state. And that intrigued me even more to read privacy policies (spoiler Dev.to has no better pplcy than other social media platforms). They openly state to sell and share data with their business partners or sponsors. But, what can I do ?&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And ofc, a Week without going is lost week though :D (Don't take it literally). On Sunday/Monday I started implementing the gameplay functionality with socket.io and was fixing the bugs with the actual frontend code in my Pokestake project, that I work on. &lt;/p&gt;

&lt;p&gt;&lt;iframe src="https://player.vimeo.com/video/1178602620" width="710" height="399"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;You can see above the mechanism, that the connection between two players, has been successfully estabilished.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you have some suggestions, feel free to visit my repos and create an issue with your suggestion :D If you see some bug or see a way to make code more efficient, also feel free to post an issue&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Frontend&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake-Dapp" rel="noopener noreferrer"&gt;
        PokeStake-Dapp
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      A Pokemon themed staking protocol with usage of Chainlink VRF
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h1 class="heading-element"&gt;PokeStake 🎴⛓️&lt;/h1&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer" href="https://github.com/public/Pokestake-baner.png"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub.com%2Fpublic%2FPokestake-baner.png" alt="PokeStake Banner"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A decentralized staking protocol where you can lock Pokemon cards and draw random rewards daily. Built on-chain with verifiable randomness and IPFS storage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Overview&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;PokeStake is a Web3 staking protocol that lets users stake Pokemon cards and participate in daily random draws. Each day, stakers can claim a random card from the pool—powered by Chainlink VRF for cryptographically secure randomness and Pinata for decentralized card metadata storage.&lt;/p&gt;

&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Tech Stack&lt;/h2&gt;
&lt;/div&gt;
&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technology&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;th&gt;Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Next.js&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Frontend framework &amp;amp; API routes&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;TypeScript&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Type-safe development&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Solidity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Smart contract logic&lt;/td&gt;
&lt;td&gt;^0.8.0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foundry&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Smart contract development &amp;amp; testing&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;RainbowKit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Wallet connection &amp;amp; UI&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Wagmi&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Ethereum hooks &amp;amp; contract interaction&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;TanStack Query&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Server state management&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Chainlink VRF&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Verifiable randomness&lt;/td&gt;
&lt;td&gt;v2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Pinata SDK&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;IPFS pinning &amp;amp; card metadata&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Features&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🎴 &lt;strong&gt;Stake Pokemon Cards&lt;/strong&gt; - Lock your cards into the protocol&lt;/li&gt;
&lt;li&gt;🎰 &lt;strong&gt;Daily Random Draws&lt;/strong&gt; - Once per day, draw…&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/PokeStake-Dapp" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Smart-Contracts&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake_Protocol" rel="noopener noreferrer"&gt;
        PokeStake_Protocol
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      A  Staking protocol with usage of Chainlink VRF for drawing a random pokemon Card
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Foundry&lt;/h2&gt;

&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Foundry consists of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Forge&lt;/strong&gt;: Ethereum testing framework (like Truffle, Hardhat and DappTools).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cast&lt;/strong&gt;: Swiss army knife for interacting with EVM smart contracts, sending transactions and getting chain data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Anvil&lt;/strong&gt;: Local Ethereum node, akin to Ganache, Hardhat Network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Chisel&lt;/strong&gt;: Fast, utilitarian, and verbose solidity REPL.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Documentation&lt;/h2&gt;

&lt;/div&gt;
&lt;p&gt;&lt;a href="https://book.getfoundry.sh/" rel="nofollow noopener noreferrer"&gt;https://book.getfoundry.sh/&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Usage&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Build&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge build&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Test&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge &lt;span class="pl-c1"&gt;test&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Format&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge fmt&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Gas Snapshots&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge snapshot&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Anvil&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ anvil&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Deploy&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge script script/Counter.s.sol:CounterScript --rpc-url &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;your_rpc_url&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt; --private-key &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;your_private_key&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Cast&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ cast &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;subcommand&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Help&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge --help
$ anvil --help
$ cast --help&lt;/pre&gt;

&lt;/div&gt;
&lt;/div&gt;



&lt;/div&gt;
&lt;br&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/PokeStake_Protocol" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;&lt;strong&gt;Backend Code&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend" rel="noopener noreferrer"&gt;
        pokestake-backend
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      Robust server-side gaming component powering the Pokestake web3 ecosystem
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h1 class="heading-element"&gt;pokestake-backend&lt;/h1&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/a5f65acdd93f79ceedd196fee525d99c8ba1c222bd4d5333dc37bddfb32b51da/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/a5f65acdd93f79ceedd196fee525d99c8ba1c222bd4d5333dc37bddfb32b51da/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub stars"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/2d9fc062022356c1adb341032a013acf2d7ee30e844b89ee26c9482933d281ce/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/2d9fc062022356c1adb341032a013acf2d7ee30e844b89ee26c9482933d281ce/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub forks"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/1206c494f41cdc6eb5c4f9c7be00475dfbe732cb9c3eef358f331487cd1fb2d8/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/1206c494f41cdc6eb5c4f9c7be00475dfbe732cb9c3eef358f331487cd1fb2d8/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub issues"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/ae18daf61cd167a121245b2f7e3b6ed12e92c6bb4f2557458c728f059b42222f/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f457870726573732e6a732d3030303030303f7374796c653d666f722d7468652d6261646765266c6f676f3d65787072657373266c6f676f436f6c6f723d7768697465"&gt;&lt;img src="https://camo.githubusercontent.com/ae18daf61cd167a121245b2f7e3b6ed12e92c6bb4f2557458c728f059b42222f/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f457870726573732e6a732d3030303030303f7374796c653d666f722d7468652d6261646765266c6f676f3d65787072657373266c6f676f436f6c6f723d7768697465" alt="Express.js"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/2ab4127dedd4ccf7d3dbb0d440cacca4f720cbb4f06c74350a37f6925b828523/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f547970655363726970742d3331373843363f7374796c653d666f722d7468652d6261646765266c6f676f3d74797065736372697074266c6f676f436f6c6f723d7768697465"&gt;&lt;img src="https://camo.githubusercontent.com/2ab4127dedd4ccf7d3dbb0d440cacca4f720cbb4f06c74350a37f6925b828523/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f547970655363726970742d3331373843363f7374796c653d666f722d7468652d6261646765266c6f676f3d74797065736372697074266c6f676f436f6c6f723d7768697465" alt="TypeScript"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/9d0011ba8fa4dded4db7ba61707e90bb2962623e37ffe4da5023690fc1b119d7/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f6c6963656e73652d4953432d677265656e3f7374796c653d666f722d7468652d6261646765"&gt;&lt;img src="https://camo.githubusercontent.com/9d0011ba8fa4dded4db7ba61707e90bb2962623e37ffe4da5023690fc1b119d7/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f6c6963656e73652d4953432d677265656e3f7374796c653d666f722d7468652d6261646765" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📑 Table of Contents&lt;/h2&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#description" rel="noopener noreferrer"&gt;Description&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#features" rel="noopener noreferrer"&gt;Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#tech-stack" rel="noopener noreferrer"&gt;Tech Stack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#quick-start" rel="noopener noreferrer"&gt;Quick Start&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#key-dependencies" rel="noopener noreferrer"&gt;Key Dependencies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#run-commands" rel="noopener noreferrer"&gt;Run Commands&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#screenshots" rel="noopener noreferrer"&gt;Screenshots&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#project-structure" rel="noopener noreferrer"&gt;Project Structure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#contributing" rel="noopener noreferrer"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#license" rel="noopener noreferrer"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📝 Description&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;Pokestake-backend is the robust server-side engine powering the Pokestake web3 ecosystem.
Leveraging the high performance of Express.js and the strict type safety of TypeScript,
this project provides a scalable and secure infrastructure to handle core application logic and seamless API integrations.
It is designed to offer a reliable and efficient backend solution for Pokémon-themed web3 project, ensuring a smooth experience for end-users.&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;✨ Features&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🎮 Pokemon Battle Gameplay Handling&lt;/li&gt;
&lt;li&gt;📡 Event Driven Blockchain State Mirroring&lt;/li&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;🛠️ Tech Stack&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🚀 Express.js&lt;/li&gt;
&lt;li&gt;📜 TypeScript&lt;/li&gt;
&lt;li&gt;🔃 Socket.io&lt;/li&gt;
&lt;li&gt;🏎️ Redis&lt;/li&gt;
&lt;li&gt;Ether.js&lt;/li&gt;
&lt;li&gt;Mongoose/MongoDB&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;⚡ Quick Start&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Clone the repository&lt;/span&gt;
git clone https://github.com/LuftieTheAnonymous/pokestake-backend.git

&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Install dependencies&lt;/span&gt;
npm install

&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Start development server&lt;/span&gt;
npm run dev&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📦 Key Dependencies&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="snippet-clipboard-content notranslate position-relative overflow-auto"&gt;
&lt;pre class="notranslate"&gt;&lt;code&gt;@types/express: ^5.0.6
@types/socket.io: ^3.0.2
eiows: ^8.2.0
express: ^5.2.1
redis: ^5.11.0
socket.io: ^4.8.3
tsc: ^2.0.4
tsx:&lt;/code&gt;&lt;/pre&gt;…&lt;/div&gt;
&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/pokestake-backend" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


&lt;h2&gt;
  
  
  How have you been doing ?
&lt;/h2&gt;

&lt;p&gt;What were you up to in recent week ? Some event attended ? Some side-project done ? Some wins ? Some failures ? Let me know down in the comments, hope you reading enjoyed the article (I have edited and written it about 7 hours). &lt;/p&gt;

&lt;p&gt;Cheers for reaching until the end, Luftie&lt;/p&gt;

</description>
      <category>web3</category>
      <category>privacy</category>
      <category>event</category>
      <category>discuss</category>
    </item>
    <item>
      <title>My Experiences from NBX and Privacy Hell For Crypto....</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Fri, 27 Mar 2026 19:21:00 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka</link>
      <guid>https://dev.to/luftietheanonymous/my-experiences-from-nbx-and-privacy-hell-for-crypto-3mka</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;It's been a while since my recent post on the platform. Today I would like to share with you my experience from NBX (Next Block Expo) event, that was organized in Warsaw, Poland. Although this post will not be filled so much with technical or programming knowledge, I just want to share my view on the conference, from my perspective and couple of thoughts that came into my mind.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;First, let's define what Next Block Expo is ? NBX or Next Block Expo is an cryptocurrency-focused event, where all sorts of people from blockchain-technology gather in one place, where there are lectures for newbies or also more advanced market-participants, projects present their product and many more. And by having said all sorts of people, I mean literally ALL SORTS OF PEOPLE, from investors, businessmen/women, CEOs, Journalists, and even politicians through software-devs, people that have no clue what blockchain actually is, scammers, moon-boiz, marketing guys to companies that had their stands at the event.&lt;/p&gt;

&lt;h3&gt;
  
  
  What companies/projects where at the event ?
&lt;/h3&gt;

&lt;p&gt;It actually needs to be pointed out, that this NBX-edition was combined together with an AI-Summit event, although there were only a couple of companies, having their stands that were focused on AI particularly, and not being an "AI-company" only because they added an tranding OpenClaw-Bot to aid customer's portfolio. &lt;/p&gt;

&lt;p&gt;A lot of the stands were either belonging to B2B-focused companies that help businesses to implement crypto-payments, offering immediate-conversion from crypto to fiat-transfers, off-ramp and on-ramp and this sort of stuff, or exchanges there were BingX, Bybit, ZondaCrypto, Kanga Exchange.&lt;/p&gt;

&lt;p&gt;Besides that, what really has thrilled me, is that there were 4 companies or projects that I kept eye on, that were in some-sense delivering or willing to deliver privacy-extending product or they care about privacy. &lt;/p&gt;

&lt;p&gt;I will list them out shortly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://relocatify.com/en/" rel="noopener noreferrer"&gt;Relocatify&lt;/a&gt; - A company that provides help while opening a bank account in Cambodia and purchase of an real-estate in Cambodia. Why Cambodia is somehow related to privacy ? It's because they do not have KYC once you want to purchase/sell crypto.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Their financial system is outside of the CRS-system, so they do not report your financial activity. Does it sound like a safe-heaven for criminals ? Well technically yes, but remember criminals were/are/and unfortunately will exist everywhere but will use different methods for their operation.&lt;/p&gt;

&lt;p&gt;For me living in EU, where surveillance grows and privacy already seems as a luxury and one needs to fight for it, usually with miserable outcome.   &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.sealed.channel/" rel="noopener noreferrer"&gt;Sealed&lt;/a&gt; - A private messenger, that is using &lt;a href="https://falcon-sign.info/" rel="noopener noreferrer"&gt;Falcon&lt;/a&gt; as key-signature algorithm, that provides quantum-resistant. It's still developing and I had an opportunity to test-out the MVP. &lt;br&gt;
For now it's going to be supporting only text-messages, but the founders say, that they work on implementing features that support images and documents. The messages will be safely stored on blockchain. The blockchain they are going to use is Algorand.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://gen6.app/" rel="noopener noreferrer"&gt;Gen6&lt;/a&gt; - It's a blockchain that already has it's collective of Dapps like NCrypt, a private messenger (does not store messages on blockchain and is free to use). There is also RealSeal signs and timestamps your work on-chain. Gen6 Me Identity as an alternative to linktree, but on-chain. And many other products.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://neti-soft.com/" rel="noopener noreferrer"&gt;Neti&lt;/a&gt; - A company that is actually all into blockchain and privacy. They are those guys, who can manage everything from tokenization, ZK-Proofs, Privacy tools to Building a Blockchain from ground up. I asked if they have any intern-program and the lady I talked to, has said that it's limited but they are about to organize hackathons and blockchain-dev community.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  My View on freedom and privacy in Europe and Cryptocurrencies in Europe
&lt;/h2&gt;

&lt;p&gt;Although I talked to a lot of cool people from the industry, collected a lot of merch as you can see on the pictures:  &lt;/p&gt;

&lt;p&gt;Although I talked to a lot of cool people from the industry, collected a lot of merch as you can see on the pictures: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49wynkc8dbv9udljn56e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49wynkc8dbv9udljn56e.jpg" alt="nbx-conference" width="800" height="1422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then one thing is certain for me. When it comes to Europe, privacy of your financial-matters, does not already exist in Europe. And there is no sign of hope to change this trend, as surveillance will only grow and grow in this region, together with stupid regulations taking away your freedom.&lt;/p&gt;

&lt;p&gt;The privacy for cryptocurrencies in Europe is gone, because every for transaction even in ATM or in Exchange-Points, will require from you to go through KYC, which I personally hate and find it only as a part of mass-surveillance.&lt;/p&gt;

&lt;p&gt;It's actually for me disastrous to see, how cryptocurrencies from technology that was about to threaten the entire monetary system and became only an assets or alternative form of payment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvyalrdoqst4iyxlaj9d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvyalrdoqst4iyxlaj9d.png" alt="expectations-reality" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I think this image explains everything, better than anyone would.&lt;/p&gt;

&lt;h2&gt;
  
  
  My Personal Experiences
&lt;/h2&gt;

&lt;p&gt;To the event its-self, I'd say I'm disappointed, this time organizers have decided to care more about quantity and not quality of the event, although indeed there were cool projects, this event seemed as a ghost-town for me and the venue was for me not as intuitive as previous one. &lt;/p&gt;

&lt;p&gt;The organizers indeed announce a big success, on the event there were more than 2500 people. But the venue for me was a shot in the foot, because of the amount of free space and the actual design of the halls.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhzcu3u9zc4xc7iatalxw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhzcu3u9zc4xc7iatalxw.png" alt="Merch-from-nbx" width="609" height="752"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I realized also, there is not so much to learn for me from the panels or lectures, but that's was obvious to me and tremendously outraged when one of the organizer in the interview said, that those speeches, panels are rather as an add-on and more it's focused for businesses to be a gateway for new connections and so on. &lt;/p&gt;

&lt;p&gt;Is it good ? Is it bad ? I guess as always, depends on the personal perspective. I also did not really like the fact that there has been a separate event for people who speak Ukrainian or Russian. &lt;/p&gt;

&lt;p&gt;Don't get me wrong, I do not have anything against any nation, I don't care where are you from and what is your skin color, though organizing an separated event solely for certain language-speaking people, this is for a cause that splits people and separates from each other.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; I do not like big places e.g. halls and non-technical talks. It was my last NBX-event attended and will look definitely look for technical events or those that are within my field of interest. So cryptography, privacy, blockchain and cybersecurity.&lt;/p&gt;

&lt;h2&gt;
  
  
  What about you ?
&lt;/h2&gt;

&lt;p&gt;What have you guys been up to recently ? Have you been building some project or have you been doing something else ? Let me know down in the comments and feel free to share your opinion on any part of my article.&lt;/p&gt;

&lt;p&gt;Cheers for reading, till next one :D&lt;/p&gt;

</description>
      <category>web3</category>
      <category>event</category>
      <category>blockchain</category>
      <category>discuss</category>
    </item>
    <item>
      <title>From Zero To Crypto Hero (Week 3) - Further Work on Web3 Pokemon Project</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 22 Mar 2026 09:21:49 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-3-further-work-on-web3-pokemon-project-1cb9</link>
      <guid>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-3-further-work-on-web3-pokemon-project-1cb9</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;It's almost a month as I have started writing articles on Dev.to. Candidly speaking it's a mesmerising, how much fun and knowledge can writing and reading articles bring to ones life. And I want to express my gratefulness to all of my readers until now. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;⚠️ WARNING: Next couple of paragraphs will not be related to coding and my week effort's specifically. If you want the gritty details, scroll down to &lt;strong&gt;Introduction&lt;/strong&gt; section.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Ofc there is a jeopardy that I might be feeding a infinitely hungry dragon called "AI" with the data about my efforts and daily workflow and I might be targeted by the ads.&lt;/p&gt;

&lt;p&gt;However...... &lt;strong&gt;SCREW THAT&lt;/strong&gt;, coz as I mentioned in my post about AI (Although there were mentioned more topics from AI 🦾 to React and homo-sapiens species root of behaviour 🦍).&lt;/p&gt;


&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce" class="crayons-story__hidden-navigation-link"&gt;My Take On AI and Technology (Besides the Pure Developer PoV)&lt;/a&gt;
    &lt;div class="crayons-article__cover crayons-article__cover__image__feed"&gt;
      &lt;iframe src="https://www.youtube.com/embed/GSRXY3_yeN4" title="My Take On AI and Technology (Besides the Pure Developer PoV)"&gt;&lt;/iframe&gt;
    &lt;/div&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image" width="256" height="256"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3291391" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt="" width="256" height="256"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Feb 27&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce" id="article-link-3291391"&gt;
          My Take On AI and Technology (Besides the Pure Developer PoV)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/ai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;ai&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/future"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;future&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/machinelearning"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;machinelearning&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;26&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              6&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            7 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;Humanity seems already to be at the verge of its existence, given the blazingly fast changes in the world, all of unsettling occurances, that it's tough to catch up with. &lt;/p&gt;

&lt;p&gt;Tech CEOs (for me those are dumb assholes, not from the intellectual side, rather what they say publicly and how they influent others) and media spreading fear and uncertainty, willing you only to watch another clickbait video under label of "geopolitics", "development" across all of the people,only to get money for ads, simultaneously killing ambitions and eagerness to grow.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcu8709ewvamd6y69crjh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcu8709ewvamd6y69crjh.jpg" alt="sammy" width="474" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And in the end you've got linkedin posters (which are managed likely by an agent, given the quality of those posts) and triggering me to puke with rainbow on them all.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmwm1vhr0uosa90i7kty.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmwm1vhr0uosa90i7kty.gif" alt="rainbow-puke" width="496" height="280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, imo it's high-key better to have an attitude as though world would end up tomorrow, than caring about when will the next bomb blow in Iran and what causes will it bring to all of us at all.&lt;/p&gt;

&lt;p&gt;Answering however finally why SCREW THAT, and isn't it self-hypocrisy, as I used to define myself as privacy first ? Well not really, I genuinely like the way it's been described in Cypherpunk Manifesto by Eric Hughes&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And thus I do not expose it to the entire world per se, coz my post will likely have less than 25 views and 2 likes from people I met on dev.to, 5 likes from me and that's it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Ok, enough of general prattling and I hope you didn't leave me at this time (Thank you :D) and perhaps I managed to bring you laugh. Let's go into nitty-gritty details.&lt;/p&gt;

&lt;h3&gt;
  
  
  What have I been doing actually ?
&lt;/h3&gt;

&lt;p&gt;As you might know I'm still working on my web3 pokemon-themed protocol or should I call it &lt;em&gt;ecosystem&lt;/em&gt;, because it already has a mechanism for random card drawing ability 1 per day for each user, staking protocol for the cards, marketplace and yet in-build but there will be a pokemon battle mode, based on socket.io.&lt;/p&gt;

&lt;p&gt;All of the sudden, getting rid of the most mundane part of coding for me throughout those years, which was designing and frontend UI-building, allowed my brain to fall back onto an idea to implement ZKP (Zero-Knowledge Proofs) to this project for Pokemon Trades, like e.g. users want to swap Pokemon with each other and there could be a proof that a user has the pokemon without a need to reveal it to the actual 3rd party.&lt;/p&gt;

&lt;h3&gt;
  
  
  Here you have links to particular parts of my project:
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Smart-Contracts
&lt;/h4&gt;


&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake_Protocol" rel="noopener noreferrer"&gt;
        PokeStake_Protocol
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      A  Staking protocol with usage of Chainlink VRF for drawing a random pokemon Card
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Foundry&lt;/h2&gt;

&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Foundry consists of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Forge&lt;/strong&gt;: Ethereum testing framework (like Truffle, Hardhat and DappTools).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cast&lt;/strong&gt;: Swiss army knife for interacting with EVM smart contracts, sending transactions and getting chain data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Anvil&lt;/strong&gt;: Local Ethereum node, akin to Ganache, Hardhat Network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Chisel&lt;/strong&gt;: Fast, utilitarian, and verbose solidity REPL.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Documentation&lt;/h2&gt;

&lt;/div&gt;
&lt;p&gt;&lt;a href="https://book.getfoundry.sh/" rel="nofollow noopener noreferrer"&gt;https://book.getfoundry.sh/&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Usage&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Build&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge build&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Test&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge &lt;span class="pl-c1"&gt;test&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Format&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge fmt&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Gas Snapshots&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge snapshot&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Anvil&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ anvil&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Deploy&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge script script/Counter.s.sol:CounterScript --rpc-url &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;your_rpc_url&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt; --private-key &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;your_private_key&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Cast&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ cast &lt;span class="pl-k"&gt;&amp;lt;&lt;/span&gt;subcommand&lt;span class="pl-k"&gt;&amp;gt;&lt;/span&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h3 class="heading-element"&gt;Help&lt;/h3&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;$ forge --help
$ anvil --help
$ cast --help&lt;/pre&gt;

&lt;/div&gt;
&lt;/div&gt;



&lt;/div&gt;
&lt;br&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/PokeStake_Protocol" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;/div&gt;
&lt;br&gt;


&lt;h4&gt;
  
  
  Web-app
&lt;/h4&gt;


&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake-Dapp" rel="noopener noreferrer"&gt;
        PokeStake-Dapp
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      A Pokemon themed staking protocol with usage of Chainlink VRF
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h1 class="heading-element"&gt;PokeStake 🎴⛓️&lt;/h1&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer" href="https://github.com/public/Pokestake-baner.png"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub.com%2Fpublic%2FPokestake-baner.png" alt="PokeStake Banner"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A decentralized staking protocol where you can lock Pokemon cards and draw random rewards daily. Built on-chain with verifiable randomness and IPFS storage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Overview&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;PokeStake is a Web3 staking protocol that lets users stake Pokemon cards and participate in daily random draws. Each day, stakers can claim a random card from the pool—powered by Chainlink VRF for cryptographically secure randomness and Pinata for decentralized card metadata storage.&lt;/p&gt;

&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Tech Stack&lt;/h2&gt;
&lt;/div&gt;
&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technology&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;th&gt;Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Next.js&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Frontend framework &amp;amp; API routes&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;TypeScript&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Type-safe development&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Solidity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Smart contract logic&lt;/td&gt;
&lt;td&gt;^0.8.0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foundry&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Smart contract development &amp;amp; testing&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;RainbowKit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Wallet connection &amp;amp; UI&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Wagmi&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Ethereum hooks &amp;amp; contract interaction&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;TanStack Query&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Server state management&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Chainlink VRF&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Verifiable randomness&lt;/td&gt;
&lt;td&gt;v2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Pinata SDK&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;IPFS pinning &amp;amp; card metadata&lt;/td&gt;
&lt;td&gt;Latest&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Features&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🎴 &lt;strong&gt;Stake Pokemon Cards&lt;/strong&gt; - Lock your cards into the protocol&lt;/li&gt;
&lt;li&gt;🎰 &lt;strong&gt;Daily Random Draws&lt;/strong&gt; - Once per day, draw…&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/PokeStake-Dapp" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


&lt;h4&gt;
  
  
  Backend
&lt;/h4&gt;


&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://assets.dev.to/assets/github-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/LuftieTheAnonymous" rel="noopener noreferrer"&gt;
        LuftieTheAnonymous
      &lt;/a&gt; / &lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend" rel="noopener noreferrer"&gt;
        pokestake-backend
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      Robust server-side gaming component powering the Pokestake web3 ecosystem
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h1 class="heading-element"&gt;pokestake-backend&lt;/h1&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/a5f65acdd93f79ceedd196fee525d99c8ba1c222bd4d5333dc37bddfb32b51da/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/a5f65acdd93f79ceedd196fee525d99c8ba1c222bd4d5333dc37bddfb32b51da/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub stars"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/2d9fc062022356c1adb341032a013acf2d7ee30e844b89ee26c9482933d281ce/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/2d9fc062022356c1adb341032a013acf2d7ee30e844b89ee26c9482933d281ce/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub forks"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/1206c494f41cdc6eb5c4f9c7be00475dfbe732cb9c3eef358f331487cd1fb2d8/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562"&gt;&lt;img src="https://camo.githubusercontent.com/1206c494f41cdc6eb5c4f9c7be00475dfbe732cb9c3eef358f331487cd1fb2d8/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f4c7566746965546865416e6f6e796d6f75732f706f6b657374616b652d6261636b656e643f7374796c653d666f722d7468652d6261646765266c6f676f3d676974687562" alt="GitHub issues"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/ae18daf61cd167a121245b2f7e3b6ed12e92c6bb4f2557458c728f059b42222f/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f457870726573732e6a732d3030303030303f7374796c653d666f722d7468652d6261646765266c6f676f3d65787072657373266c6f676f436f6c6f723d7768697465"&gt;&lt;img src="https://camo.githubusercontent.com/ae18daf61cd167a121245b2f7e3b6ed12e92c6bb4f2557458c728f059b42222f/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f457870726573732e6a732d3030303030303f7374796c653d666f722d7468652d6261646765266c6f676f3d65787072657373266c6f676f436f6c6f723d7768697465" alt="Express.js"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/2ab4127dedd4ccf7d3dbb0d440cacca4f720cbb4f06c74350a37f6925b828523/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f547970655363726970742d3331373843363f7374796c653d666f722d7468652d6261646765266c6f676f3d74797065736372697074266c6f676f436f6c6f723d7768697465"&gt;&lt;img src="https://camo.githubusercontent.com/2ab4127dedd4ccf7d3dbb0d440cacca4f720cbb4f06c74350a37f6925b828523/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f547970655363726970742d3331373843363f7374796c653d666f722d7468652d6261646765266c6f676f3d74797065736372697074266c6f676f436f6c6f723d7768697465" alt="TypeScript"&gt;&lt;/a&gt; &lt;a rel="noopener noreferrer nofollow" href="https://camo.githubusercontent.com/9d0011ba8fa4dded4db7ba61707e90bb2962623e37ffe4da5023690fc1b119d7/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f6c6963656e73652d4953432d677265656e3f7374796c653d666f722d7468652d6261646765"&gt;&lt;img src="https://camo.githubusercontent.com/9d0011ba8fa4dded4db7ba61707e90bb2962623e37ffe4da5023690fc1b119d7/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f6c6963656e73652d4953432d677265656e3f7374796c653d666f722d7468652d6261646765" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📑 Table of Contents&lt;/h2&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#description" rel="noopener noreferrer"&gt;Description&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#features" rel="noopener noreferrer"&gt;Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#tech-stack" rel="noopener noreferrer"&gt;Tech Stack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#quick-start" rel="noopener noreferrer"&gt;Quick Start&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#key-dependencies" rel="noopener noreferrer"&gt;Key Dependencies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#run-commands" rel="noopener noreferrer"&gt;Run Commands&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#screenshots" rel="noopener noreferrer"&gt;Screenshots&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#project-structure" rel="noopener noreferrer"&gt;Project Structure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#contributing" rel="noopener noreferrer"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/LuftieTheAnonymous/pokestake-backend#license" rel="noopener noreferrer"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📝 Description&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;Pokestake-backend is the robust server-side engine powering the Pokestake web3 ecosystem.
Leveraging the high performance of Express.js and the strict type safety of TypeScript,
this project provides a scalable and secure infrastructure to handle core application logic and seamless API integrations.
It is designed to offer a reliable and efficient backend solution for Pokémon-themed web3 project, ensuring a smooth experience for end-users.&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;✨ Features&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🎮 Pokemon Battle Gameplay Handling&lt;/li&gt;
&lt;li&gt;📡 Event Driven Blockchain State Mirroring&lt;/li&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;🛠️ Tech Stack&lt;/h2&gt;

&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;🚀 Express.js&lt;/li&gt;
&lt;li&gt;📜 TypeScript&lt;/li&gt;
&lt;li&gt;🔃 Socket.io&lt;/li&gt;
&lt;li&gt;🏎️ Redis&lt;/li&gt;
&lt;li&gt;Ether.js&lt;/li&gt;
&lt;li&gt;Mongoose/MongoDB&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;⚡ Quick Start&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="highlight highlight-source-shell notranslate position-relative overflow-auto js-code-highlight"&gt;
&lt;pre&gt;&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Clone the repository&lt;/span&gt;
git clone https://github.com/LuftieTheAnonymous/pokestake-backend.git

&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Install dependencies&lt;/span&gt;
npm install

&lt;span class="pl-c"&gt;&lt;span class="pl-c"&gt;#&lt;/span&gt; Start development server&lt;/span&gt;
npm run dev&lt;/pre&gt;

&lt;/div&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;📦 Key Dependencies&lt;/h2&gt;

&lt;/div&gt;
&lt;div class="snippet-clipboard-content notranslate position-relative overflow-auto"&gt;
&lt;pre class="notranslate"&gt;&lt;code&gt;@types/express: ^5.0.6
@types/socket.io: ^3.0.2
eiows: ^8.2.0
express: ^5.2.1
redis: ^5.11.0
socket.io: ^4.8.3
tsc: ^2.0.4
tsx:&lt;/code&gt;&lt;/pre&gt;…&lt;/div&gt;
&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/LuftieTheAnonymous/pokestake-backend" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


&lt;p&gt;This week I focused on handling the UI display of the onchain data to the user, with error and loading states, improving the smart-contract tests and implementing the marketplace. The tests had to be conducted from scratch because there's been some issues with the initial code split I approached to build.&lt;/p&gt;

&lt;p&gt;I also finally grasped how socket.io works, I had huge issue with understanding it and was having mind-fuck after mind-fuck, whenever I approached to learn it. But I guess many factors have impacted the fact I was not able to learn it, nevermind.&lt;/p&gt;

&lt;p&gt;I visited this week also the university, that I'm likely to be a student of, here a link to the post with my impressions and a bit of linux-propaganda :D&lt;br&gt;
&lt;/p&gt;
&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k" class="crayons-story__hidden-navigation-link"&gt;My Impressions on the Uni Open Day&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/luftietheanonymous" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" alt="luftietheanonymous profile" class="crayons-avatar__image" width="256" height="256"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/luftietheanonymous" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Luftie The Anonymous
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Luftie The Anonymous
                
              
              &lt;div id="story-author-preview-content-3372601" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/luftietheanonymous" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1427991%2F34f464cd-3419-4ebb-aa1b-a594f1412485.webp" class="crayons-avatar__image" alt="" width="256" height="256"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Luftie The Anonymous&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 19&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k" id="article-link-3372601"&gt;
          My Impressions on the Uni Open Day
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/learning"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;learning&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/career"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;career&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/exploding-head-daceb38d627e6ae9b730f36a1e390fca556a4289d5a41abb2c35068ad3e2c4b5.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;7&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            3 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


&lt;p&gt;I will not lie, that I would really like to integrate ZK into this project, however I also know that 17th of April is incoming with giant steps and I have to be ready to select a project I want to build and no theme has been announced yet. Thus I decided to build the project as long as the theme is not announced.&lt;/p&gt;

&lt;h2&gt;
  
  
  Current focus
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Pokestake PVP mode implementation with socket.io with ability to win some SNORLIEs (in-app token)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keeping an eye on the theme announcement for the ETHSilesia Hackathon and drafting a plan on what to build as a project on the hackathon.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Honestly I also have to say, that this project is by far the most engaging and perhaps not the most complex in terms of logic, but in case of tools you though. And it's weird that all of that happens, all of those experiences are emerging while I decided to leave web-dev and smart-contracts to delve into cryptography and so will it be.&lt;/p&gt;

&lt;h2&gt;
  
  
  How about your week ?
&lt;/h2&gt;

&lt;p&gt;Feel free to share how has your week been going and share it in the comments ? &lt;/p&gt;

&lt;p&gt;Cheerio, your Luftie !&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>blockchain</category>
      <category>web3</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sat, 21 Mar 2026 05:55:27 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/-3nok</link>
      <guid>https://dev.to/luftietheanonymous/-3nok</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/daan_acohen/windows-servers-are-a-cryptographic-liability-entire-countries-can-be-left-exposed-to-quantum-32md" class="crayons-story__hidden-navigation-link"&gt;Windows Servers Are a Cryptographic Liability: Entire Countries Can Be Left Exposed to Quantum Attacks&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/daan_acohen" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3759765%2F3430b840-7a5d-49ca-a1a4-ff761faa9259.png" alt="daan_acohen profile" class="crayons-avatar__image" width="96" height="96"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/daan_acohen" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Daan Acohen
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Daan Acohen
                
              
              &lt;div id="story-author-preview-content-3377961" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/daan_acohen" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3759765%2F3430b840-7a5d-49ca-a1a4-ff761faa9259.png" class="crayons-avatar__image" alt="" width="96" height="96"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Daan Acohen&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/daan_acohen/windows-servers-are-a-cryptographic-liability-entire-countries-can-be-left-exposed-to-quantum-32md" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 20&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/daan_acohen/windows-servers-are-a-cryptographic-liability-entire-countries-can-be-left-exposed-to-quantum-32md" id="article-link-3377961"&gt;
          Windows Servers Are a Cryptographic Liability: Entire Countries Can Be Left Exposed to Quantum Attacks
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/webdev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;webdev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/openssl"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;openssl&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/daan_acohen/windows-servers-are-a-cryptographic-liability-entire-countries-can-be-left-exposed-to-quantum-32md" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;6&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/daan_acohen/windows-servers-are-a-cryptographic-liability-entire-countries-can-be-left-exposed-to-quantum-32md#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            4 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>webdev</category>
      <category>programming</category>
      <category>security</category>
      <category>openssl</category>
    </item>
    <item>
      <title>My Impressions on the Uni Open Day</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Thu, 19 Mar 2026 14:44:03 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k</link>
      <guid>https://dev.to/luftietheanonymous/my-impressions-on-the-uni-open-day-441k</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community
&lt;/h2&gt;

&lt;p&gt;Today I got a quite special article to you because I'm about to tell you what are my impressions on the university's open day I'd pleasure to attend. &lt;/p&gt;

&lt;p&gt;You're ready ? Let's go !&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This article is not an paid-article or advertisement for the university, it's just an expression of my own experiences after such event.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Firstly let's establish where the heck have I been to ? So I've attended the open-day at the IT-Faculty of ZUT (pl. Zachodniopomorski Uniwersytet Technologiczny), in english West-Pomeranian Technological University, placed in Szczecin.&lt;/p&gt;

&lt;p&gt;The open-day consisted of walk-around tour, where I and other visitors visited 3 Laboratories. One, where there was a car drive simulator and visitors got the opportunity to try driving a car simulator experiencing what's called immersion. &lt;/p&gt;

&lt;p&gt;Then we headed over to the basement-part (No they haven't wanted to show us kittens), rather the embedded-systems lab and the studio where there can occur a voice manipulation and prove that IT is not only about strictly profit-maximalization focused software for analysis or other tasks. But also about things like voice manipulation, voice recognition ect.&lt;/p&gt;

&lt;p&gt;Below you can see some from the labs mentioned:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff6vzodgqyuqxzvleb26p.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff6vzodgqyuqxzvleb26p.jpg" alt="Car-simulator" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Image 1: &lt;em&gt;Car Simulator Lab&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flctxd89qqp89c9r6pjkt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flctxd89qqp89c9r6pjkt.jpg" alt="Embedded-systems labs machine" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Image 2: Machine which prints elements on the board needed for a component's circuit&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F68p2md43tm4p2cjoxl36.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F68p2md43tm4p2cjoxl36.jpg" alt="Univesity's Studio" width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Image 3: PC with a special device to manipulate the sound (I cannot name)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;As the labs we directed to the game-dev student research club lab, where we have been given the opportunity to play a game that students have done during their internal game-jam event.&lt;br&gt;
And finally, the most awaited part of the entire open-day was about to start, the lecture about voice conversion, meaning how the voice is actually understood by the machine. &lt;/p&gt;

&lt;h3&gt;
  
  
  BUT UNEXPECTEDLY
&lt;/h3&gt;

&lt;p&gt;The beautiful and flawless day had to be interrupted by shitty Microsoft SpywareOS by other called "Windows", which had either to debug or update, I don't remember already. And that's a great reasons for the uni-principals or heads of the university to start considering switching uni-PCs to Linux ;D (Half Joke, Half Truth). &lt;/p&gt;

&lt;p&gt;Therefore the Lecture was shortened and fully conducted. However I did manage to catch the terminology and the overall grasp of how the voice is actually converted to numbers and also why sometimes PCs or electronical devices do not understand what we tell to them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsnhm2b7talb2gx8h20rd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsnhm2b7talb2gx8h20rd.jpg" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Image one with explanation and visualisation, what Sound pressure (Ciśnienie akustyczne) is.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9xjc6y6cstmypnoe4y0k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9xjc6y6cstmypnoe4y0k.jpg" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Slide with defintion of Phoneme and visualisation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;It's been really interesting and I have written some of the key-words where I could expand my knowledge on voice manipulation and general voice-machine work.&lt;/p&gt;

&lt;p&gt;After the lecture, there was also a possibility to get some university's merch or even win something, if a valid answer on drawn question was valid. I actually was successful with answering the question and I won a bag of the faculty, which really fits my office colours.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpysd4jjyzeyp1abdx0zd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpysd4jjyzeyp1abdx0zd.jpg" alt=" " width="720" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Overall, the event was a satisfying introduction to the student although it were only 2 hours. I'm high-key disappointed, that the lecture had to be sped up and some slides were just flashed over. In general, I give in US-grade-scale A- as an encouragement to switch to Linux and perhaps prepare and check the work of presentation before the lecture :D&lt;/p&gt;

&lt;p&gt;I'm looking forward to become a student at the uni to learn as well as share knowledge I gained throughout my journey with IT.  &lt;/p&gt;

</description>
      <category>learning</category>
      <category>programming</category>
      <category>discuss</category>
      <category>career</category>
    </item>
    <item>
      <title>Are you a real dev or just a coder ? Go and read this article.</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 15 Mar 2026 20:41:48 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/are-you-a-real-dev-or-just-a-coder-go-and-read-this-article-55nc</link>
      <guid>https://dev.to/luftietheanonymous/are-you-a-real-dev-or-just-a-coder-go-and-read-this-article-55nc</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/konark_13/are-you-really-a-developer-the-mindset-that-matters-more-than-code-40e" class="crayons-story__hidden-navigation-link"&gt;Are You Really a Developer? The Mindset That Matters More Than Code&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/konark_13" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2928108%2Ffb504115-5d98-486b-bee9-c2de7cb7b632.png" alt="konark_13 profile" class="crayons-avatar__image" width="800" height="1096"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/konark_13" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Konark Sharma
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Konark Sharma
                
              
              &lt;div id="story-author-preview-content-3355840" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/konark_13" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2928108%2Ffb504115-5d98-486b-bee9-c2de7cb7b632.png" class="crayons-avatar__image" alt="" width="800" height="1096"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Konark Sharma&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/konark_13/are-you-really-a-developer-the-mindset-that-matters-more-than-code-40e" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 15&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/konark_13/are-you-really-a-developer-the-mindset-that-matters-more-than-code-40e" id="article-link-3355840"&gt;
          Are You Really a Developer? The Mindset That Matters More Than Code
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag crayons-tag--filled  " href="/t/discuss"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;discuss&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/webdev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;webdev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/career"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;career&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/learning"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;learning&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/konark_13/are-you-really-a-developer-the-mindset-that-matters-more-than-code-40e" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="24" height="24"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;17&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/konark_13/are-you-really-a-developer-the-mindset-that-matters-more-than-code-40e#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              9&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            5 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>webdev</category>
      <category>career</category>
      <category>learning</category>
      <category>discuss</category>
    </item>
    <item>
      <title>From Zero To Crypto-Hero - (Week 2) A Dream Came True...</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sat, 14 Mar 2026 22:50:22 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-2-a-dream-came-true-413m</link>
      <guid>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-2-a-dream-came-true-413m</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;This week, I would like to share with you, what I've built throughout last 7 days, what I learned, discovered and what happened by me in general as well. There will be some project, some crypto-geekish teasers, perhaps something more 😉...&lt;/p&gt;

&lt;p&gt;Interested ? Let's fucking go 💥 &lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;As I announced in recent week, I decided to focus for now until the hackathon-time on web3, web-dev and building some small-projects to test myself for the farewell hackathon :D And build under time-pressure. &lt;/p&gt;

&lt;p&gt;Well I didn't fit the time I expected to. But at least I built in a bit of cool features into the dapp, that I built.&lt;/p&gt;

&lt;h3&gt;
  
  
  But what have I built actually ?
&lt;/h3&gt;

&lt;p&gt;I have been lately vibing a lot with pokemon and by &lt;strong&gt;a lot&lt;/strong&gt;, I mean freaking out like berserk. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Fun fact: I got even 3 the same Gengar-hoodies in my cloth-wardrobe, lol 😆.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;However as I said, before I had realized I'm fed-up with web-dev and smart-contracts, and now I do it solely because I want my farewell with this part of my programming journey and my life to be unique. &lt;/p&gt;

&lt;p&gt;I had been planning to build a pokemon-themed web3 project (namely a multiplayer game with ZK implementation), but the designing part and not allowing to focus on actual logic, made me upset and frustrated. &lt;/p&gt;

&lt;p&gt;Back then I had been conceptualising/brainstorming about the project infra and logic and all of the sudden I fell into thoughts like: &lt;em&gt;Should my app on mobile be in landscape or in portait mode ?&lt;/em&gt;, in meanwhile designing the mock-up in Figma, that was a point were I really told myself, I need to departure from board called web-dev, design because it's an anchor for me and does not allow me for proper work.&lt;/p&gt;

&lt;h3&gt;
  
  
  Ok, but what have I been building finally ?
&lt;/h3&gt;

&lt;p&gt;Now, as I feel no guilt, if I screw up the hackathon or not, henceforth I decided to build as a hackathon-training project a simple staking protocol with drawing a random card of a pokemon once a day. &lt;/p&gt;

&lt;p&gt;The staker can gain coins for the staking, which then can be used in the in-app marketplace, where players can sell their cards in exchange for either Ether or specific amount of the in-game currency.&lt;/p&gt;

&lt;p&gt;You can &lt;a href="https://www.canva.com/design/DAHD3u59QXQ/AvGbyOLxNTsHuPvxX0tqAA/watch?utlId=hac07b1b323" rel="noopener noreferrer"&gt;click here&lt;/a&gt; to see how cool effect I built for drawing the card, what made me really smile.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Stack I used for the project
&lt;/h4&gt;

&lt;p&gt;I decided that I will not build UI from scratch and will use an AI tool for it so that after elaborate specification of the imagination, I got the template, which was actually something I would need at least 1 month to build. &lt;/p&gt;

&lt;p&gt;The colours ? Well selected. The files and folder split ? Far from ideal and had to tweak it, but it's ok. The actual code ? Sort of messy, because the pages have been by default turned into the &lt;code&gt;"use client"&lt;/code&gt; and not being server-rendered.&lt;/p&gt;

&lt;p&gt;But the actual tech-stack is following:&lt;/p&gt;

&lt;p&gt;Frontend: Next.js + Typescript + V0 (AI generated base UI)&lt;br&gt;
Smart-Contracts: Foundry + Solidity&lt;br&gt;
Key SDKs, Libaries:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;TRN-generation: Chainlink-VRF&lt;/li&gt;
&lt;li&gt;Wallet-agnosticism: RainbowKit&lt;/li&gt;
&lt;li&gt;Interactions with smart-contracts: Wagmi&lt;/li&gt;
&lt;li&gt;Storage of NFT-data in IPFS: Pinata SDK&lt;/li&gt;
&lt;li&gt;Data Fetching and display: Tanstack-Query&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're interested what it looks like &lt;a href="http://pokestake-dapp.fly.dev/" rel="noopener noreferrer"&gt;visit here !&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you're willing to see the code base, &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake-Dapp" rel="noopener noreferrer"&gt;click here to see frontend-code&lt;/a&gt; and if you're more into smart-contract side &lt;a href="https://github.com/LuftieTheAnonymous/PokeStake" rel="noopener noreferrer"&gt;click here !&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  WARNING ⚠️
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;By the time of article-release (Sunday 12 AM, GMT + 1), the project it yet not ready to use and still works on the marketplace implementations are conducted. I will make special post on the project, for now please star the repo on github, would be really thankful.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  My Inferences on the project and take on AI usage
&lt;/h3&gt;

&lt;p&gt;I only asserted that my choice of leaving web-dev is rational and well substantiated. If something what I really put effort into and forced myself to do things I didn't want to do throughout 3 years can be replaced with chat-bot prompting with just a tweak to display something, use appropriate libraries. It's a sign to leave imo.&lt;/p&gt;

&lt;p&gt;I've really shun using AI in generating UI, because I really wanted to prove myself that I also can build beautiful UIs and also can build phenomenal website on my own, and I just need time.&lt;/p&gt;

&lt;p&gt;I experienced how AI sped up my work with the UI, this peace, that I do not have to care about pixels on the screen, settled me down tremendously. &lt;/p&gt;
&lt;h3&gt;
  
  
  What I learned by building this project ?
&lt;/h3&gt;

&lt;p&gt;Besides realizing the real aid of AI, I kind of avoided (if you want to know my previous usage of AI feel free to &lt;a href="https://dev.to/luftietheanonymous/my-take-on-ai-and-technology-besides-the-pure-developer-pov-cce"&gt;checkout this article&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;I was slightly wondering that the transfer of my NFT from my account to my &lt;code&gt;StakingProtocol&lt;/code&gt;-contract, was not successful. I figured out that contracts need a special function kind of &lt;code&gt;fallback&lt;/code&gt; or &lt;code&gt;receive&lt;/code&gt; for the NFTies. It really surprised me because I haven't found it even in Mastering Ethereum example with auctions. This function is derived from a special extension for the contracts, namely an interface of &lt;code&gt;IERC721Receiver&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;   function onERC721Received(address operator, address from, uint256 tokenId, bytes calldata data)
        external
        override
        returns (bytes4)
    {

   // Here place your logic what to do after the token has been
// successfully transferred to the contract     

        return IERC721Receiver.onERC721Received.selector;
    }

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This function can be thought of as &lt;code&gt;fallback()&lt;/code&gt; or &lt;code&gt;receive()&lt;/code&gt; for NFTIes, as I've written before. For those who do not know, &lt;code&gt;fallback()&lt;/code&gt; and &lt;code&gt;receive()&lt;/code&gt; functions in soldity can execute code after an amount of ether has been transferred to the contract.&lt;/p&gt;

&lt;h4&gt;
  
  
  What does &lt;code&gt;fallback()&lt;/code&gt; differ from &lt;code&gt;receive()&lt;/code&gt; ?
&lt;/h4&gt;

&lt;p&gt;&lt;code&gt;receive()&lt;/code&gt; – takes only ether, no data. Executes when someone sends ETH to your contract with empty calldata.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;fallback()&lt;/code&gt; – takes ether AND data. Executes when calldata doesn't match any function signature, or when someone sends ETH with non-empty calldata and there's no &lt;code&gt;receive()&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Another Surprise 🤩
&lt;/h2&gt;

&lt;p&gt;I recently just checked my Luma account to see if there are any updates on the hackathon rules, terms or so. There was no update on it, however I got an invitation for Co-work Event organised by ETHWarsaw ! and I was really wondered and shocked seeing it. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mi9uhxwp2t14ex515zl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mi9uhxwp2t14ex515zl.png" alt="ETH-WARSAW INVITATION" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Not only because the event is something I wanted to participate in something like that, whereas my city although it's almost 400k dwellers is rather treated as an no-go zone for any coding initiatives like co-work coding events, what really made me sob sometimes. &lt;/p&gt;

&lt;p&gt;But also because it collides in time with my private family-event, so quite suspicious coincidence (I do not believe in such thing as coincidence).&lt;/p&gt;

&lt;p&gt;And although I'm about to leave smart-contracts development and the EVM, then I'm looking forward to feel the spirit of that even there, meet brainy people in Ethereum-ecosystem circle and of course steal some stickers so I can glue over my entire laptop and some merch if possible (and even if not then cmon I'm polish though) :D&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;This week was absolutely challenging but at the same time, I've saw how easily my work can be sped-up without mundane effort. I've reminded myself and also learned crucial facts when it comes to Soldity and handling ERC721 in external contracts. I got an surprise I did not expect and look forward now only to the hackathon and can't wait to make the farewell and go cryptography all-in.&lt;/p&gt;

&lt;h2&gt;
  
  
  What about you ?
&lt;/h2&gt;

&lt;p&gt;How was your week ? Have you been successful ? stuck ? Or completely derailed this week ? Let me know in the comments and let's connect :D&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>web3</category>
      <category>sideprojects</category>
      <category>ai</category>
    </item>
    <item>
      <title>From Zero To Crypto-Hero - (Week 1)</title>
      <dc:creator>Luftie The Anonymous</dc:creator>
      <pubDate>Sun, 08 Mar 2026 10:25:19 +0000</pubDate>
      <link>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-1-1co3</link>
      <guid>https://dev.to/luftietheanonymous/from-zero-to-crypto-hero-week-1-1co3</guid>
      <description>&lt;h2&gt;
  
  
  Hello Dev.to Community !
&lt;/h2&gt;

&lt;p&gt;This time I will share with you what I did in a full week 1 of my transition from zero to crypto-hero ? And as I promised, every sunday I will post a weekly-summary of my effort.&lt;/p&gt;

&lt;p&gt;Are you ready ?&lt;/p&gt;

&lt;p&gt;Let's go !&lt;/p&gt;

&lt;h2&gt;
  
  
  1 Week Overview
&lt;/h2&gt;

&lt;p&gt;Surprisingly, I haven't done much this week in terms of cryptography development. I had a bit of tiny errands this week, that took my time and energy. One of them you can see here: One of the &lt;a href="https://www.canva.com/design/DAHDWNthFCU/85gbMr6yesrcNZKNFWrNEA/watch?utm_content=DAHDWNthFCU&amp;amp;utm_campaign=designshare&amp;amp;utm_medium=link2&amp;amp;utm_source=uniquelinks&amp;amp;utlId=h01aa2489d9" rel="noopener noreferrer"&gt;Errand-video&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I would not say that my efforts were low because of lack of time, but rather because of cognitive overload I would name it.&lt;/p&gt;

&lt;h2&gt;
  
  
  What have I done ?
&lt;/h2&gt;

&lt;p&gt;I have practiced modular mathematics together with turning the binary into a polynomial and practiced modular reduction of an polynomial, that is actually needed for AES on the substitution-layer level, as in the substitution table in order to get the value we have 2 approaches.&lt;/p&gt;

&lt;p&gt;To those who do not know in short AES is an symmetric block-cipher that is built in a following way.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;input                      original-key
|                          |
|                          |
|                          |
v                          V
key addition    &amp;lt;---   nth round-key
|
|
|
v
substitution layer
|
|
v
shift-row layer
|
|
v
mix-column
|
|
v
add-round-key
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Not comming much into details this process above of encryption is repeated depending on the key length in AES, which is:&lt;br&gt;
For 128 bits: 10 rounds / 11 round-keys&lt;br&gt;
For 192 bits: 12 rounds / 13 round-keys&lt;br&gt;
For 256 bits: 14 rounds / 15 round-keys&lt;/p&gt;

&lt;p&gt;Because key addition is done on the beginning before actual encryption and at the end as the last round is finished, thus there are round-quantity + 1 amount of keys.&lt;/p&gt;

&lt;p&gt;And for the substitution-layer we get the value for the input either by turning the byte value to a position in a look-up table or we will turn the byte value to polynomial and find an inverse for this polynomial in GF(2^8), by usage of Extended Euclidian Algorithm with irreducible polynomial of the GF(2^8), such that:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;input-polynomial * input-polynomial-inverse = 1 mod field-irreducible-polynomial.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I have been relearning DES and AES cipher, whereas I spent about 2 days on AES, because I could not understand fully it's key-schedule workflow.&lt;/p&gt;

&lt;p&gt;I have explored the bit manipulation key-words in TS like left-shift, right-shift or that we can xor without turning into binary, what I actually did in my implementation for OTP 😅&lt;/p&gt;

&lt;p&gt;I recapped all of my notes on cryptography from Christof Paar course.&lt;/p&gt;

&lt;p&gt;I implemented decimal to hex value helper function, Euler's totient function and Extended Euclidian Algorithm to my crypto-library project in TS.&lt;/p&gt;

&lt;p&gt;And here are couple things I inferred.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;My notes were purely theoretical and were mostly math-focused and for understanding concept instead of ready to implement the cipher in code. For instance I wanted to implement RSA, because it's quite simple math, that is rather math-focused than about bit shifting etc.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What I realized was that in order to get an p and q value, that would be prime-values, that are at least 2^512 bit long, I need to implement primality test from Miller-Rabin Primality Test or Little Fermat's Theorem, whereas Miller-Rabin is more efficient for large numbers than Little Fermat's approach. And I actually run into headache to understand how miller-rabin primality test works 😬&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;I would need to recap the ciphers all from scratch by reading the book and focusing on implementation rather than understanding how it works.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Unexpected Approval and Plan Change
&lt;/h2&gt;

&lt;p&gt;Additionally there came an unexpected surprise, I have written an article on this this week, however to recall it I got approved to participate in an ETHSilesia Hackathon. Where honestly I did not expected to approved.&lt;/p&gt;

&lt;p&gt;And it kind of forced me to change my plans. Namely I decided to temporarily cease development of my crypto-library that I started and my plans to move all-in to cryptography and blockchain architecture. And focus purely on web3-focused matters together with the hackathon-preparation, sometimes such shit happens. And I will comeback to cryptography development all in, after the hackathon.&lt;/p&gt;

&lt;p&gt;So that's it for this week, to every woman in programming and in the world, I wish you all the best, you're rocking !&lt;/p&gt;

&lt;p&gt;Cheers and see you next week :D&lt;/p&gt;

&lt;p&gt;Ps. if you found some mistake feel free to correct me in terms of AES explanation.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>web3</category>
      <category>cryptography</category>
    </item>
  </channel>
</rss>
