Privacy & Security Consulting

Your digital life.
Your rules.

Hardware, turn-key solutions, and hands-on education for those who refuse to compromise on privacy.

Scroll

Privacy isn't about having something to hide.
It's about having something to protect.

Three ways to work together

01

Hardware

Privacy-focused devices sourced from verified suppliers. Air-gapped laptops, GrapheneOS-ready phones, secure routers, and more.

  • Air-gapped & secure laptops
  • GrapheneOS Pixel phones
  • Privacy routers (4G/5G)
  • Verified supply chain

Products only. No crypto pre-installed. Ever.

02

Turn-Key Solutions

Pre-configured systems ready to use. Hardware plus expert setup, delivered secure. You just set your passwords.

  • Qubes OS workstations
  • Tails portable systems
  • GrapheneOS phones (configured)
  • Home privacy routers

Zero backdoors. Zero retained access. Guaranteed.

03

Education & Services

Learn to protect yourself. Hands-on training on encryption, secure operating systems, and digital self-defense.

  • PGP & encryption training
  • Secure OS workshops
  • OPSEC fundamentals
  • Crypto self-custody setup

You operate. I guide. Your keys stay yours.

Security without the corporate BS

I started this because I was tired of seeing people get burned—by exchanges that vanish overnight, by "secure" services that sell your data, by complexity designed to keep you dependent.

My approach is simple: teach you to protect yourself, give you the tools to do it, and then get out of your way. No recurring subscriptions. No vendor lock-in. No "trust me, bro."

I'm based in Estonia—one of the most digitally advanced and privacy-respecting jurisdictions in the EU. But I work with clients globally, wherever they are.

Clarity over complexity
Education over dependence
Your keys, your control

What I don't do

  • Investment advice
  • Trading recommendations
  • Custody of your assets
  • Touch your private keys
  • Promise "unhackable" anything

How it works

01

Initial conversation

We talk about your situation, goals, and threat model. No jargon, no pressure. Just figuring out if and how I can help.

02

Proposal & agreement

I'll recommend a path forward—hardware, setup, training, or a combination. Clear scope, clear pricing, no surprises.

03

Delivery & handover

Whether it's a configured device or a training session, everything is documented. You'll know exactly what was done and how to use it.

04

You're in control

After handover, you own it completely. I have zero access to your devices or credentials. That's the point.

Ready to take back control?

No pitch decks. No sales calls. Just a real conversation about your needs.

Get in Touch

Let's talk

Prefer secure channels? So do I. Choose whatever works for you.

Signal thoughtcrime.1984

Response time: Usually within 24-48 hours. If it's urgent, mention it.

Location: Estonia, EU. Working with clients globally.

Or reach out directly: hello@thoughtcrime.ee · Signal: thoughtcrime.1984