Skip to content

Vicent00/Dark-Layer-2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Dark Layer - Privacy Documentation

Built with Starlight

Your privacy, your control, your freedom.

Dark Layer is a comprehensive privacy guide that teaches you how to protect your digital and physical privacy using professional tools, integrated strategies, and step-by-step guides.

What is Dark Layer?

Dark Layer provides practical privacy solutions for different threat levels:

  • Level 1: Basic Privacy - General privacy, avoid advertising tracking, protect financial data
  • Level 2: Advanced Privacy - For journalists, activists, sensitive data protection
  • Level 3: Extreme Anonymity - High-risk situations, complete system separation

πŸš€ Project Structure

.
β”œβ”€β”€ public/
β”‚   β”œβ”€β”€ favicon.svg
β”‚   β”œβ”€β”€ favicon2.svg
β”‚   └── DARK_LAYER.png
β”œβ”€β”€ src/
β”‚   β”œβ”€β”€ assets/
β”‚   β”‚   └── DARK_LAYER.png
β”‚   β”œβ”€β”€ content/
β”‚   β”‚   └── docs/
β”‚   β”‚       β”œβ”€β”€ guides/          # Step-by-step tutorials
β”‚   β”‚       β”œβ”€β”€ strategies/      # Privacy strategies by level
β”‚   β”‚       └── reference/       # Tool comparisons
β”‚   β”œβ”€β”€ styles/
β”‚   β”‚   └── custom.css          # Custom styling
β”‚   └── content.config.ts
β”œβ”€β”€ astro.config.mjs
β”œβ”€β”€ package.json
└── tsconfig.json

πŸ“š Content Organization

Privacy Strategies by Level

Level 1: Basic Privacy (4-6 hours)

Perfect for everyday users who want to protect their digital privacy without major lifestyle changes.

What you'll get:

  • Anonymous browsing with Firefox + uBlock Origin
  • Secure password management with Bitwarden
  • Private email with ProtonMail
  • Encrypted messaging with Signal
  • File encryption with Cryptomator

Who it's for: General users, students, professionals who want basic privacy protection.

Level 2: Advanced Privacy (8-12 hours)

Designed for journalists, activists, and anyone handling sensitive information.

What you'll get:

  • Complete Linux setup (Pop!_OS)
  • Tor browser for anonymous browsing
  • VPN configuration (Mullvad recommended)
  • PGP email encryption
  • Multiple identity management
  • Advanced Signal security features

Who it's for: Journalists, activists, lawyers, whistleblowers, anyone with sensitive data.

Level 3: Extreme Anonymity (24-40 hours)

For high-risk situations requiring complete separation from the system.

What you'll get:

  • Tails OS for complete anonymity
  • Tor bridges and advanced routing
  • Monero cryptocurrency for anonymous payments
  • Complete identity separation
  • Advanced operational security

Who it's for: High-risk individuals, investigative journalists, political dissidents.

Specialized Strategies

  • Corporate Privacy: Maintain privacy in professional environments without raising suspicion
  • Financial Privacy: Anonymous payment methods, cash strategies, prepaid cards, cryptocurrency

Step-by-Step Guides

Essential Privacy Tools

  • Firefox Privacy Setup: Configure Firefox with uBlock Origin, Enhanced Tracking Protection, and privacy-focused settings
  • ProtonMail + SimpleLogin: Set up private email with aliases for maximum anonymity
  • Bitwarden + 2FA: Secure password management with two-factor authentication
  • Signal Messaging: Encrypted communication with safety numbers verification
  • Cryptomator: Encrypt sensitive files and folders locally

Operating System Security

  • Linux Installation: Complete Pop!_OS setup with security hardening
  • Data Removal: Remove personal information from internet databases and search engines

Tool Comparisons & Analysis

Operating Systems

Detailed comparison of Windows, macOS, Linux distributions, Tails OS, and Qubes OS for privacy and security.

Browsers & VPNs

Analysis of Firefox, Brave, Tor Browser, LibreWolf, and VPN services like Mullvad, ProtonVPN, IVPN, and Windscribe.

Communication Tools

Comparison of Signal, Wire, Jami, Element, and other secure messaging platforms.

Email Services

Evaluation of ProtonMail, Tutanota, SimpleLogin, AnonAddy, and other privacy-focused email solutions.

Password Management

Analysis of Bitwarden, KeePass, 1Password, and other password managers with 2FA options.

Payment Methods

Comparison of cash, prepaid cards, Bitcoin, Monero, Zcash, and other anonymous payment methods.

Encryption & Storage

Tools for file encryption, secure cloud storage, and local data protection.

Anonymity Tools

Advanced tools for Tor, VPNs, proxy chains, and other anonymity-enhancing technologies.

Physical Privacy

Protection against surveillance, secure communication devices, and physical security measures.

Data Removal Services

Services to remove personal information from data brokers, search engines, and public databases.

🧞 Commands

All commands are run from the root of the project, from a terminal:

Command Action
npm install Installs dependencies
npm run dev Starts local dev server at localhost:4321
npm run build Build your production site to ./dist/
npm run preview Preview your build locally, before deploying

🎨 Customization

The site uses custom CSS styling located in src/styles/custom.css:

  • Dark theme optimized for privacy-focused content
  • Compact TOC (Table of Contents) for better content focus
  • Responsive design that works on all devices
  • Custom color palette matching the Dark Layer brand

πŸ”§ Development

This project is built with:

  • Astro 5.6+ - Static site generator
  • Starlight 0.36+ - Documentation framework
  • TypeScript - Type safety
  • Sharp 0.34+ - Image optimization

πŸš€ Getting Started

For Regular Users (Level 1)

Start with basic privacy protection that doesn't disrupt your daily routine:

  1. This week: Read the threat assessment and install Firefox with uBlock Origin
  2. Next week: Set up ProtonMail and Bitwarden password manager
  3. Following week: Install Signal for encrypted messaging

For Journalists/Activists (Level 2)

If you handle sensitive information or are at higher risk:

  1. Before starting: Read the Level 2 threat assessment
  2. Week 1: Install Linux and configure basic security
  3. Week 2: Set up VPN, Tor Browser, and advanced Signal features

For High-Risk Individuals (Level 3)

Complete anonymity for extreme situations:

  1. Preparation: Understand the risks and requirements
  2. Phase 1: Set up Tails OS and Tor bridges
  3. Phase 2: Implement Monero payments and identity separation

πŸ“– Philosophy

Dark Layer follows these principles:

  • Pragmatic: No paranoia preaching. Practical tools for real situations.
  • Open: All resources are free or low-cost. Privacy is not a luxury.
  • Educational: Understand WHY, not just WHAT. Adapt to your needs.
  • Secure: Verified tools and methods. No recommendations that don't work.
  • Global: Advice applicable in any country. No location bias.

Remember: Privacy is a process, not a destination.

Your privacy, your control, your freedom.

About

A complete privacy documentation site teaching digital and physical privacy protection through professional tools, integrated strategies, and step-by-step guides. Features three privacy levels (Basic, Advanced, Extreme) with specialized strategies for corporate and financial privacy.

Resources

Stars

Watchers

Forks

Contributors