Codex

Documenting infrastructure rituals, domain claims, and glyphic milestones.

📱 How App Permissions Leak You — A mobile privacy guide for Android & iOS

🔌 Understanding DMA & Device-Level Threats — A privacy-safe primer on hardware security

🕵️ Stalkerware & Commercial Spyware — Detection, removal, and safety guidance

📡 Stingrays in Minnesota: What They Are, What the Law Requires, and What to Watch

🎮 When a Steam "Update" Becomes a Wallet Drainer: Inside the BlockBlasters Malware

🔍 Spyware, Face-Recognition & Oversight: What These Tech Scandals Show Us

⚖️ Spotify vs. ReVanced: What Happened and What It Means

🧰 NoScript — Script Control for Power Users

🐧 Why Linux Deserves Your Attention

🦠 Rituals of Purge: Malware Encounters & Sovereign Remedies

📦 LocalCDN — Kill Unnecessary Third-Party CDN Calls

🧱 uBlock Origin — Network-level blocking, done right

🔐 KeePassXC — Local passwords, no cloud

🔁 Syncthing — Peer-to-peer sync without a cloud

📶 Signal — private messaging that just works

🦊 LibreWolf — Firefox, hardened

🛡️ Mullvad VPN — Cloak Your Signal in Pine-Scented Privacy

🕳️ Pi-hole — DNS-level blocking for your LAN

🧅 Tor Browser — anonymity, not just privacy

🛡️ AdGuard Home — network-wide DNS filtering

✉️ Thunderbird + Mailvelope — private email, your way

🔐 SimpleX — messaging without identifiers

📡 OpenWrt — take back your router

🗝️ age — simple, modern file encryption

🦆 DuckDuckGo — why it matters for privacy

⚡ JavaScript — why privacy folks are wary

🐌 JavaScript Performance — how heavy JS hurts users

🤖 Ollama — run AI locally (no cloud, no meter)

🌐 Privacy Browsers — why they matter and how to choose

📚 Privacy Resources — trusted sites, blogs, and channels

🦊 Firefox — privacy, customizability, and power

The Conrad Rockenhaus Case — Deep Dive

🛡️ Security & Malware

🦠 Shlayer Mac Malware — fake Flash installers and browser hijacking

VX Underground: The Internet’s Malware Archive (Explained)

[Malware Family] Explainer — Codex Entry

What is a Virtual Machine? (Explained)

Fun Fact: This homepage was coded using a pinecone, a VPN tunnel, and the distant hum of a fax machine.

  • OSINT Toolbox
  • 📊 Data Broker Audit: MyLife.com and the MNCDPA

    I launched my first data broker audit against MyLife.com, one of the most aggressive "background check" sites out there. By invoking my rights under the Minnesota Consumer Data Privacy Act (MNCDPA), I forced them to remove my profile. What surprised me was the cascade effect — other brokers who rely on the same data pools also lost their grip on my information.

    This experience taught me that targeting even a single broker can ripple across the entire surveillance economy. I now treat data broker audits as digital hygiene, re-checking every few months to keep my footprint clean.

    Read the full case study →

    Connect

    Follow the codex trail on Mastodon — where the goofy meets the glyphic.

    Signal Channels

    Encrypted whispers from the pines:

    Mystical energy flow patterns

    About

    Architected by Daemonlogger, strategist, and sovereign steward of the off-grid web.

    When not codex-logging infrastructure rituals, Orrin can be found whispering to routers and bartering with squirrels.

    Snowflake: Live Censorship Bypass

    Snowflake is a censorship-busting tool built by the Tor Project. It lets people in heavily censored regions slip past firewalls by disguising their connection as a simple video call.

    I run a 24/7 Snowflake proxy on my infrastructure. That means when someone in a country where the internet is blocked opens Tor, their encrypted traffic may pass through my server — and out into the open world.

    This isn't theory. Every hour, dozens of real connections pass through my node. Each one is a human voice breaking past censorship.

    Why do I support it? Because free communication is a right, not a privilege. Running a Snowflake proxy is safe, anonymous, and powerful. The more of us who run them, the harder it is for censors to keep the world in the dark.

    Connections (last hour)
    Connections (today)
    Relayed Up (today)
    — MiB
    Relayed Down (today)
    — MiB
    Updated: —

    What is Snowflake?

    Independent Signals: Local Radio

    I support KAXE/KBXE Northern Community Radio — a member-powered station bringing independent voices, local music, and community news across northern Minnesota. In a media landscape dominated by algorithms, stations like this are vital.

    KAXE / Northern Community Radio — Live
    Having trouble? Open stream directly.

    Visit KAXE.org | Support the station

    ☕🍺 Fuel the Codex

    If you enjoy these sovereign rituals and goofy glyphs, you can keep the cabin lights glowing by buying me an IPA (my favorite 🍺) or a coffee (for long nights of coding ☕).

    More Privacy Tools We Trust

    We endorse PrivacyGuides.org — a community-run directory of privacy-respecting tools. No ads, no tracking, just honest recommendations for those who value autonomy.

    Explore their codex at privacyguides.org.

    Privacy & Digital Rights – Latest Headlines

    Gallery

    Mystical energy flow patterns Cabin node visualization Mystical visualization Final mystical artwork Photo 1 Photo 2 Photo 3 Photo 4

    🔧 Advanced Privacy Tools

    Deep tools for digital sovereignty:

    • Tails OS - Amnesic live operating system for maximum privacy
    • Qubes OS - Security through compartmentalization
    • I2P Network - Anonymous peer-to-peer communication layer
    • Briar Messenger - Decentralized messaging without servers

    📡 Network Status

    Third Degree Media infrastructure status:

    Website
    Online
    Snowflake Proxy
    Active

    Lean Speed & Privacy

    GitHub Pages • zero trackers • no cookies by default
    TTFB
    LCP
    DOMContentLoaded
    Load
    Total Requests
    Total Bytes
    JS Bytes
    3rd-Party Reqs
    Cookies: —
    Third-party: —
    Local-only. No beacons.
    Contribute