← Back to Home

Frequently Asked Questions

Real questions from real people who are tired of being watched, tracked, and told what they can do with their own money and data.

General

Who is this for?

Anyone who's realized that "I have nothing to hide" is the wrong question. The right question is: "Who gets to decide what I should hide?" If you want control over your digital life—your communications, your finances, your data—without asking permission from corporations or governments, we should talk.

Do I need to be technical?

No. That's literally why I exist. I translate complexity into clarity. Whether you're a complete beginner or someone technical who wants to level up, I meet you where you are. You'll understand not just what to do, but why.

Is this legal?

Everything I teach and provide is completely legal. Privacy is a human right, recognized by the UN and enshrined in EU law (GDPR, ePrivacy). Using encryption, secure operating systems, and private communication tools is legal everywhere in the EU and most of the world. I'm based in Estonia—one of the most digitally advanced and privacy-respecting jurisdictions in Europe.

Why Estonia?

Estonia has the most advanced digital infrastructure in the world, a strong rule of law, and genuine respect for privacy. It's also outside the Five Eyes surveillance alliance. The government here understands that digital freedom and security aren't threats—they're features.

Services

What's the difference between Hardware, Turn-Key, and Education?

Hardware: I source privacy-focused devices from verified suppliers. You get the hardware, you set it up. Turn-Key: I source and configure the hardware for you—it arrives ready to use. You just set your passwords. Education: I teach you how to protect yourself. You operate your own devices while I guide you. Most people combine these based on their needs and comfort level.

Will you have access to my devices after setup?

Absolutely not. This is non-negotiable. I never set passwords, never retain credentials, never install backdoors. After handover, I have zero access. This is documented in writing and you'll sign a Device Handover Checklist confirming it. If I could access your device, the whole point would be defeated.

Do you set up cryptocurrency wallets?

I teach you how to set up your own wallet securely. I never touch your seed phrase or private keys. You generate them, you write them down, you secure them. I guide you through the process and teach you best practices. Your keys, your coins, your responsibility.

Can you recommend which crypto to buy?

No. I provide technical security education, not investment advice. I can teach you how to secure whatever you decide to hold, but I won't tell you what to buy, when to sell, or make any claims about future value. That's not what I do, and honestly, anyone who claims to know is lying to you.

What about getting crypto without KYC?

I can educate you on options that exist for acquiring crypto with varying levels of privacy, depending on your jurisdiction. Some methods are legal everywhere, some depend on local regulations. I always emphasize understanding and complying with your local laws. My job is education, not facilitating anything illegal.

Privacy & Security

"I have nothing to hide. Why should I care?"

That depends on who's listening today. Laws change. Governments change. What's legal today might not be tomorrow. What's socially acceptable today might be a target tomorrow. Privacy isn't about hiding wrongdoing—it's about maintaining autonomy over your own life. You close the bathroom door not because you're doing something wrong, but because some things are simply not anyone else's business.

Is any system truly "secure"?

No. Anyone who promises perfect security is lying. Security is about raising the cost and difficulty of attack, not achieving invincibility. My goal is to help you become a harder target than the average person—hard enough that most adversaries will move on. We'll also discuss threat modeling: understanding who you're protecting against and calibrating your defenses accordingly.

What's a "threat model"?

A threat model is simply understanding: What am I protecting? From whom? What are the consequences if I fail? A journalist protecting sources has different needs than someone avoiding corporate data harvesting. A political dissident has different needs than someone who just wants their bank to stop snooping. We figure out your specific situation and build accordingly.

Why not just use a VPN?

A VPN is one tool, not a complete solution. It hides your traffic from your ISP but moves the trust to the VPN provider. Some VPNs log everything. Some are honeypots. A VPN doesn't protect you if you log into Google, use Chrome, or post on social media. Real privacy requires a layered approach: secure devices, secure software, secure practices. I teach the whole picture.

Financial Privacy

Why would I want financial privacy?

Ever had a bank freeze your account and demand you explain a transaction? Ever been told you can't send your own money to a family member in another country? Ever had a payment declined because some algorithm flagged it? Financial surveillance isn't theoretical—it's happening daily. Bitcoin and self-custody give you an alternative: money that moves when you say so, without asking permission.

Isn't Bitcoin traceable?

Bitcoin is pseudonymous, not anonymous. The blockchain is public. But there are tools and practices that significantly improve privacy when used correctly. More importantly, self-custody means no one can freeze your funds or demand explanations. We'll discuss the tradeoffs and techniques for your specific needs.

What about Monero or other privacy coins?

Different tools for different needs. I can educate you on various options and their tradeoffs. Availability and legal status vary by jurisdiction. We'll discuss what makes sense for your situation.

Logistics

How do sessions work?

Usually via secure video call (Signal, Jitsi, or similar). For hardware handovers, we can arrange in-person meetings in Estonia or secure shipping. Education sessions are typically 1-2 hours. We go at your pace—no rushing, no judgment.

How much does it cost?

Depends on what you need. Education sessions start around €100-150/hour. Hardware prices vary by product. Turn-key solutions include hardware cost plus configuration fee. I'll give you a clear quote before we start—no surprises. Contact me to discuss your specific needs.

How do I pay?

Bank transfer (SEPA), or crypto (BTC, XMR). Whatever works for you.

Do you work with people outside the EU?

Yes, I work with clients globally. Education services work anywhere with internet. Hardware shipping depends on destination and export regulations. Some sanctioned jurisdictions are excluded for legal reasons.

Still have questions?

Reach out directly. No sales pitch, just a real conversation about whether I can help with your specific situation.

Get in Touch