Educational Resources

Privacy & Security Guides

Free in-depth guides explaining the tools, techniques, and concepts behind online privacy and security — written in plain English with no jargon.

🔑
Best Password Generators
Security Guide

What separates a cryptographically secure generator from an insecure one. Entropy tables, features to look for, and how to use generated passwords effectively.

🛡
Password Security Guide
Security Guide

How attackers crack passwords, what breach patterns look like, and a practical framework for securing every account you own.

🔐
How to Generate a Secure Password
Security Guide

Step-by-step walkthrough of generating a strong password: choosing length, character sets, and verifying entropy.

#
Free Hash Generators
Cybersecurity Guide

SHA-256 vs SHA-512, MD5 deprecation, HMAC authentication codes, and how to verify file integrity using checksums.

🔒
Online Encryption Tools
Cybersecurity Guide

How AES-256-GCM works, why PBKDF2 key derivation matters, and what makes a browser-based encryption tool truly secure.

🗑
Metadata Removal Guide
Privacy Guide

What EXIF data in photos reveals, what PDF metadata discloses, and a complete checklist for removing metadata before sharing files.

👁
Privacy Tools Online
Privacy Guide

Why client-side tools matter, an overview of image, document, and security privacy tools, and how to verify a tool runs locally.

Base64 Encoder Guide
Encoding Guide

How Base64 works, standard vs URL-safe variants, data URIs, and why Base64 is not encryption.

{ }
JSON Formatting & Privacy
Developer Guide

Privacy risks in JSON APIs, PII in payloads, JWT token inspection, and safe practices for working with sensitive JSON data.

🔑
UUID Generator Guide
Developer Guide

UUID v4 vs v7, uniqueness guarantees, privacy implications of sequential IDs, and when to use UUIDs in applications.