Take Back Your Digital Privacy

Cypherpunk School - Digital Privacy and Cryptography

Stop trusting Big Tech with your data. Start protecting it yourself.

In 12 weeks, you’ll go from privacy-curious to crypto-capable—mastering the same tools cypherpunks use to resist surveillance, protect communications, and maintain digital sovereignty.

Zero fluff. All terminal. Completely free.

→ Start Week 1 Now


You Don’t Need a Computer Science Degree

You just need:

Everything else? We’ll teach you.


What You’ll Actually Build

This isn’t theory. Every week, you’ll master practical tools:

Weeks 1-3: Foundations

Weeks 4-5: Secure Everything

Weeks 6-8: Network Like a Ghost

Weeks 9-10: Automate Your Security

Weeks 11-12: Advanced Topics


How This Works (Iterative Release)

Week 1 is available now. You can start today.

New weeks release as they’re completed—battle-tested through personal walkthroughs, refined with real screenshots, polished for clarity.

Why? Because delivering value now beats perfecting everything later. You start learning immediately. We improve iteratively based on real feedback.

See Full Curriculum →


Who This Is For

You’re perfect for this if you:

This probably isn’t for you if:


The Cypherpunk Philosophy

“Privacy is necessary for an open society in the electronic age. Privacy is not secrecy… Privacy is the power to selectively reveal oneself to the world.” — Eric Hughes, A Cypherpunk’s Manifesto (1993)

Cypherpunks write code. We believe:

This course teaches you to be a cypherpunk—not just read about them.


Start Now (It’s Free)

Week 1 is live. Week 2 is coming soon. All 12 weeks will be free forever.

No signup required. No email list. No paywall. Just start.

→ Begin Week 1: Cypherpunk Ideals & Threat Modeling


Questions?

“Is this really free?” Yes. Core courses (Cypherpunk 101, Privacy 101) are always free. We may offer advanced courses or guided cohorts later, but foundational skills stay free.

“Do I need to know programming?” Basic terminal comfort helps, but we’re not writing code. We’re using powerful tools via command line. If you can cd, ls, and grep, you’re ready.

“How long until I can actually use this stuff?” Week 1 gives you a threat model framework you’ll use immediately. Week 3 teaches GPG—you’ll encrypt your first message that day. Every week has practical output.

“What if I get stuck?” Report issues here or email us. As the community grows, we’ll add discussion forums.


Additional Courses:

Start Week 1 →