Why I Deleted WhatsApp and What I've Gained From Living Without It for 5 Years

3 minute read Modified:

I deleted WhatsApp and gained freedom, peace of mind, and better connections
In today’s world, it’s almost impossible to imagine life without WhatsApp. The popular messaging app has become an integral part of our daily lives, allowing us to stay connected with friends, family, and colleagues no matter where we are. But what if you were to live without WhatsApp for 5 years? I know this sounds like a daunting task, but hear me out. I recently made the decision to delete WhatsApp from my phone and, after nearly five years of living without it, I can confidently say that it’s been a liberating experience.

A fully decentralised, easy accessible app

3 minute read Modified:

Unstoppable Web 3.0 App with IPFS, OrbitDB and the tor-protocol in any browser.
The vision Imagine an application that could do it all… Something between reddit, instagram, telegram and eBay. Now imagine everyone on this platform can be anonymous - no IP log, no nothing. The application would not be served from a single server, instead it would be decentralised and accessible through a regular browser. This means, that anyone can participate and communicate / buy / sell anything they want. Because of its decentralised nature, the application could not be stopped or shut down by a government entities.

Piracy and privacy bible

1 minute read Modified:

If it rhymes, it chimes. Only an invisible pirate is a good pirate. Not really a post, just two very good resources, that i want to share. is one of my favorite sites. I fo─║lowed many tips & tricks such as switching to as my email provider, using bitwarden as my password manager, standardnotes as my note taking tool and the like. Study it and try to realize as much as possible. After you went incognito, you can start to do some fun things without creating to much noise. Follow the awesome piracy guide to find hidden treasures.

Corebooted Thinkpad x230 with hardware mods

3 minute read Modified:

Say goodbye to your personal NSA agent and hello to a cheap and powerful laptop
The why and how Ever since the end of the bush era 2008, every Intel chip comes with an embedded subsystem called the intel management engine. Every i3, i5, i7 and i9 processor has this engine. It is a black-box and has access to every peripheral device like RAM, camera, microphone hard drive, … even when the main processor is turned off. Some say this is a backdoor for the NSA, some say this is pure paranoia.