black cat :3
hiii :3! i'm Vix. i love music, tech, and freedom! i'm a huge advocate for digital sovereignty, maintaining good personal OPSEC, and owning your data! this lil website is just meant to tell you a bit about me, share resources that i found helpful, and provide recommendations for some useful tools broadly relating to protecting and exercising your digital rights! ^-^
i am not affiliated with any tools or services mentioned. all tools, resources, and services that i recommend are only ones i have had good personal experience with. do your own research.
| Name | Vix |
| Species | Domestic Cat |
| Gender | Male |
| Height | 5'6 |
| Colors | Black - Gray - Blue |
my fursona is a black cat! his name is vix (just like my display name!) not much of a backstory to tell, but i've had him for years and i love him!
i love music! my favorite music genres have been black metal and neofolk for quite a while now, but i'll occasionally branch out. i avoid streaming services, and instead i directly support my favorite artists by collecting cds and merchandise! the most popular streaming services pay artists terribly, so i always recommend supporting your favorite artists directly if it's within your financial means to do so.
| Agalloch |
| Drudkh |
| Leviathan |
| Panopticon |
| Urfaust |
| :Of the Wand & the Moon: |
| Death in June |
| Darkwood |
| Neutral |
| Nature & Organisation |
| David Bowie |
| Immortal Technique |
| Life on Venus |
| Phil Collins |
| The Mamas & the Papas |
| Black Metal |
| Doom Metal |
| Folk Metal |
| Neoclassical |
| Neofolk |
bad actors like big corporations, law enforcement, and stalkers rely on the internet to track you down and harass you. this guide tells you some steps you can take to erase your digital footprint, in a tiered order of difficulty and practicality :3. before doing anything, it's important to determine your threat model.
these are the essentials for everyday people. for anyone who doesn't want to be easily found by strangers, employers, or data brokers.
one of the most common ways people are traced online is through metadata in the files they share. the first thing you should do is disable location access for the camera on your smartphone, which is often on by default. this is already a big step, but you can take it even further by stripping metadata from every file before you share it online. for the desktop, i recommend ExifTool, and for mobile, ExifEraser. while many social media platforms nowadays strip photo and video metadata by default, it's still a good idea to get in the habit of doing it yourself.
look up your full name and phone number to see what pops up. this will tell you exactly what's out there before you start removing it. try Google, Bing, TruePeopleSearch, and NumLookup first. you can also sign up for Optery's free plan to get a comprehensive list of all the websites that you appear on. if any shitty websites ask you to pay for access to your personal information records, don't.
how you approach this depends on the severity. if you couldn't find anything about yourself on the internet, you're probably better off not doing anything at all. if there are only a select number of websites that you need removed from, you can request removal manually. IntelTechniques is a great resource to look into. in more severe cases, it's a good idea to use a paid opt-out service that can handle it all for you. there are plenty of services that do this, but the only two that i recommend are EasyOptOuts and Optery. the issue with most other services like this (especially the free ones offered by banks) is that they simply blast out a cookie-cutter email requesting the removal of your personal information to every single data broker they have on file. If they didn't have your information before, they do now. only use a service that performs opt-outs after verifying that your information actually exists there in the first place.
if you are going to use social media, it's a good idea to set profiles to private, turn off all device permissions, disable all personalization settings, and if possible, randomize your profile details. there's often no good reason to have your personal accounts set to public, and doing so ensures everything you ever post or do will be scraped and archived permanently.
apps on your smartphone should only have the absolute minimum permissions they need to function at any given moment. this greatly reduces your attack surface and potential for vulnerabilites. on iOS, go to Settings → Privacy & Security → Safety Check → Manage Sharing & Access and on Step 2, tap "Select all & Stop Access." this will force all apps to re-prompt you for permissions, and you can grant them as needed. on Android, go to Settings → Privacy → Permission Manager and revoke all unecessary app permissions.
for those who want to stop creating new footprint and start taking their online privacy seriously. for anyone who doesn't want to be easily found or tracked, and especially for those concerned about organized harassment, civil litigation, private investigators, or tracking and data collection by large corporations.
delete as many online accounts and apps as possible, especially social media. not only is it good for your mental health, but it's a huge improvement for your privacy. social media algorithms are inherently exploitative. it's understandable that there are going to be certain social platforms that you simply aren't willing to give up. for those, refer to step 4. you should make an effort to keep your presence online as minimal as possible. JustDeleteMe is a great tool to find the deletion page for hundreds of services.
as a general rule, you should never post anything on a public-facing social platform that you aren't comfortable with being permanently archived, and you should never message someone with personal or intimate information via unsecure channels. however, if you are going to do this, it's a good idea to regularly scrub your post and message history. if you don't have an extensive post or message history on a given platform, you can simply do this manually. if you have a lot to erase and want something automated, a solid all-around tool for this is Redact, but it's expensive and might not be necessary if you don't need all of its features. many free options exist for specific websites, it just takes a quick search. if you use discord, Undiscord is a great free tool to get the job done.
your browsing habits and online accounts should be compartmentalized with different browser profiles, perceived identities, phone numbers, usernames, emails, and profile pictures. for usernames, you can simply pick a random assortment of words or characters. however, you don't want to have a clear pattern. don't make every online username the same 16 character assortment of letters and numbers. change it up every time. for email, you can use one of the many aliasing services, such as SimpleLogin, addy.io, or even Apple's Hide My Email. for phone numbers, consider getting a few VOIP numbers and using a one-time phone verification service like JuicySMS. one of the most common ways Tor users have their identity exposed is by failing at this very basic OPSEC.
there's almost no reason to have your real information associated with purchases you make online. many credit card issuers offer free services that do this, but you should only use these if they allow name anonymization as well. i recommend Privacy.com. they have a pretty generous free tier and allow both vendor-locked and disposable cards. when making card purchases online, use a virtual card number, fake name, and fake address (within your zip code).
your browser leaks a ton of information about you, even without cookies. a combination of browser identifiers are used to uniquely identify you across the web. the best solution for this is to switch to a browser dedicated to reducing fingerprinting and making you blend in with everyone else, such as Tor Browser or Mullvad Browser. the second best solution is to use a trusted VPN to mask your IP, minimize extension usage, and switch to a privacy-respecting browser that receives regular security patches, such as Orion, Vanadium, or Trivalent. for any other browser, such as Safari, keep it as bone stock as possible. please keep in mind that any setting you change and any extension you install in any browser is a potential fingerprinting technique.
for anyone trying to maximize their privacy while using the internet. builds on everything in the previous tiers, and is especially relevant for those concerned about law enforcement surveillance, intelligence agencies, state-sponsored actors, corporate espionage, or anyone whose safety depends on their digital identity remaining unknown, such as journalists and activists.
the Tor Browser is one of the best ways to truly browse the internet anonymously. tor routes your traffic through three independently operated relays. an entry node, a middle relay, and an exit node. no single relay knows both who you are and what you're accessing.
Monero is the gold standard for financial privacy. it's an untraceable decentralized cryptocurrency that ensures anonymity and private transactions through various cryptographic techniques. obtaining Monero is becoming increasingly more difficult due to government pressure and censorship, but the best way I've found is using a decentralized Tor exchange like Haveno to purchase XMR with FIAT money. for a list of websites and services that support Monero purchases, refer to Monerica. to make purchases online with XMR for websites that don't already support it, you can use a service like Coincards to purchase gift cards with Monero.
for the desktop, the gold standard for everyday usage is Qubes OS. Qubes is a Xen-based operating system that runs every application in its own isolated virtual machine called a "qube." Qubes has Whonix integration, which makes it easy to safely and anonymously browse the internet with Tor. for mobile, the only recommended operating system is GrapheneOS. GrapheneOS doesn't require an account and provides a vast array of privacy and security improvements over other mobile operating systems.
regardless of the operating system your phone is using, good cellular network privacy is basically impossible. your carrier knows every cell tower your phone is connected to, and cell tower triangulation means your exact pinpoint location is known at all times. if you don't feel comfortable having your location tracked, leave your phone powered on at home. this just makes you look like a person who stayed home, while a phone that goes dark for a regularly scheduled period of time can raise some flags. if you're travelling and must bring your phone, consider a faraday bag, but be careful not to create a pattern of behavior.
absolutely nothing you do matters if your behavior gives you away. in the vast majority of cases, leaks caused by poor OPSEC are behavioral and not insufficient tools. the person at home using Tor on their outdated Windows 8 craptop with perfect discipline and the ability to keep their mouth shut is much harder to track than the person running Qubes-Whonix on rotating public WiFi networks who brags on the internet over multiple forums with the same username.
my home server is an HP EliteDesk 800 G5 SFF that I bought for around ~$100. everything is accessible only through Tailscale, including SSH.
| CPU | Intel i5-9500 |
| RAM | 1x16GB DDR4 |
| OS | Debian GNU/Linux 13 |
| Data | 2X 4TB T500 NVMe (ZFS) |
| Backup | 8TB WD HDD (EXT4) |
| Management | Dockge |
| Monitoring | Beszel |
| Containers | Navidrome Jellyfin Invidious |
general hardware and software tools that i either actively
use or have used in the past and personally recommend. it's
crucial to note that security and privacy are not the same
thing. to make the list here, the product must meet one of
the following criteria:
- strong privacy and security by default
- strong security by default with the ability to easily
obtain strong privacy
- strong privacy by default with the ability to easily
obtain strong security
| Desktop |
macOS¹ Qubes Secureblue Tails Whonix |
| Mobile | GrapheneOS iOS² |
| Server |
Secureblue Fedora IoT openSUSE MicroOS |
| Desktop |
Mullvad Browser Orion Tor Browser Trivalent |
| Mobile | Orion Vanadium |
| VPN | iVPN Mullvad |
| Search |
Brave Search DuckDuckGo Kagi SearXNG Startpage |
| Passwords |
Bitwarden KeePassXC Strongbox Vaultwarden |
| 2FA |
2FAS Aegis Authenticator NitroKey YubiKey |
| Files | Nextcloud |
| Music | Finamp Navidrome Slskd |
| Video | Jellyfin |
| Messaging |
Briar iMessage Matrix Session Signal |
| Media | Lemmy Mastodon |
| Coins | Litecoin MWEB Monero XMR |
| Wallets |
Cake Wallet Feather Wallet Monero GUI Trezor |
| Exchanges | CoinCards Haveno |
¹ macOS on modern Apple hardware is decently secure but not
very private by default. Apple collects telemetry, app usage
data, and crash reports continuously. For optimal macOS
privacy settings, see
macOS Overview.
² Modern iPhones, especially
iPhone 17 and later, are extremely secure but not very private by default. iOS
unfortunately lacks the fine-tuning offered by macOS, but
you can still obtain decent privacy by following the steps
shown on
iOS Overview.