Cypherpunk 101 Curriculum
12 weeks. Zero to crypto-capable. All hands-on.
Current Status: Week 1 is live. Start now. New weeks release as completed.
π Quick Start
| Week | Topic | Status |
|---|---|---|
| Week 1 | Cypherpunk Ideals & Threat Modeling | π’ Available |
| Week 2 | Cryptography Fundamentals | π΅ Coming Soon |
| Week 3 | GnuPG Basics | π΅ Coming Soon |
| Week 4 | Secure Communications | π΅ Coming Soon |
| Week 5 | Filesystem & Disk Encryption | π΅ Coming Soon |
| Week 6 | Networking & Anonymity | π΅ Coming Soon |
| Week 7 | SSH & Secure Shell Habits | π΅ Coming Soon |
| Week 8 | Identity Hygiene | π΅ Coming Soon |
| Week 9 | Automation & Scripting | π΅ Coming Soon |
| Week 10 | Real-World Projects | π΅ Coming Soon |
| Week 11 | Distributed Systems | π΅ Coming Soon |
| Week 12 | Advanced Protocols | π΅ Coming Soon |
π Course Overview
- Total Duration: 12 weeks
- Time Commitment: 4-6 hours per week
- Skill Level: Beginner-friendly (basic Linux CLI knowledge required)
- Cost: Free forever
- Format: Self-paced, hands-on labs
π Learning Path
Week 1-3: Foundations (philosophy, crypto, GPG)
β
Week 4-5: Secure everything (communications, storage)
β
Week 6-8: Network like a ghost (Tor, SSH, identity)
β
Week 9-10: Automate and integrate (scripting, projects)
β
Week 11-12: Advanced concepts (distributed systems, protocols)
Week-by-Week Details
β Week 1: Cypherpunk Ideals & Threat Modeling
Status: π’ Available Now | Difficulty: Beginner | Time: 4-5 hours
What You’ll Learn:
- The cypherpunk manifesto and philosophy
- Why privacy matters in the digital age
- Building your personal threat model
- Setting up a secure development environment
- Understanding adversaries and attack vectors
What You’ll Build:
- Your personal threat model document
- Secure Linux workspace
π Week 2: Cryptography Fundamentals
Status: π΅ Coming Soon | Difficulty: Beginner | Estimated Time: 5-6 hours | Prerequisites: Week 1
What You’ll Learn:
- Symmetric vs. asymmetric encryption
- Hash functions and their properties
- Entropy and randomness
- How encryption algorithms actually work
- Common crypto primitives (AES, RSA, SHA-256)
What You’ll Build:
- Hands-on encryption/decryption exercises
- Hash verification workflows
π Week 3: GnuPG Basics
Status: π΅ Coming Soon | Difficulty: Beginner | Estimated Time: 5-6 hours | Prerequisites: Week 2
What You’ll Learn:
- GPG keypair generation and management
- Encrypting and decrypting files
- Digital signatures and verification
- Web of trust concepts
- Key servers and distribution
What You’ll Build:
- Your first GPG keypair
- Encrypted file workflows
- Signed messages
π Week 4: Secure Communications
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 5-6 hours | Prerequisites: Week 3
What You’ll Learn:
- Email encryption with GPG
- Secure messaging (Signal, Element/Matrix)
- Metadata and what it reveals
- Forward secrecy and perfect forward secrecy
- Communication protocol analysis
What You’ll Build:
- Encrypted email setup
- Secure messaging configurations
- Metadata minimization strategies
π Week 5: Filesystem & Disk Encryption
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 5-6 hours | Prerequisites: Week 4
What You’ll Learn:
- Encrypted filesystems (gocryptfs, eCryptfs)
- Full disk encryption (LUKS)
- Encrypted backups
- Key management strategies
- Data-at-rest protection
What You’ll Build:
- Encrypted filesystem for sensitive data
- Automated encrypted backup system
π Week 6: Networking & Anonymity
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 6 hours | Prerequisites: Week 5
What You’ll Learn:
- Tor network architecture and usage
- VPNs vs. Tor (when to use each)
- DNS privacy and DNS-over-HTTPS
- Network traffic analysis
- Correlation attacks and defenses
What You’ll Build:
- Properly configured Tor setup
- Privacy-respecting DNS configuration
- Network traffic routing strategies
π Week 7: SSH & Secure Shell Habits
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 5 hours | Prerequisites: Week 6
What You’ll Learn:
- SSH key authentication
- SSH tunnels and port forwarding
- Jump boxes and bastion hosts
- SSH hardening and best practices
- Certificate-based SSH authentication
What You’ll Build:
- SSH key infrastructure
- Secure remote access setup
- Tunneled connections
π Week 8: Identity Hygiene
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 5-6 hours | Prerequisites: Week 7
What You’ll Learn:
- Operational security (OpSec) principles
- Digital identity compartmentalization
- Virtual machines for isolation
- Browser fingerprinting and defenses
- OSINT awareness (what others can find about you)
What You’ll Build:
- Compartmentalized identity strategy
- VM-based isolation setup
- Privacy-hardened browser configurations
π Week 9: Automation & Scripting
Status: π΅ Coming Soon | Difficulty: Intermediate | Estimated Time: 6 hours | Prerequisites: Week 8
What You’ll Learn:
- Automating encryption workflows
- Cron jobs and systemd timers
- Bash scripting for security tasks
- Encrypted log management
- Secure backup automation
What You’ll Build:
- Automated encrypted backup scripts
- Security monitoring scripts
- Workflow automation tools
π Week 10: Real-World Projects
Status: π΅ Coming Soon | Difficulty: Advanced | Estimated Time: 6-8 hours | Prerequisites: Weeks 1-9
What You’ll Learn:
- Combining all previous weeks’ skills
- End-to-end encrypted workflows
- Building privacy-respecting systems
- Threat model implementation
- Security architecture design
What You’ll Build:
- Complete encrypted communication system
- Personal privacy infrastructure
- Real-world project of your choice
π Week 11: Distributed Systems
Status: π΅ Coming Soon | Difficulty: Advanced | Estimated Time: 6 hours | Prerequisites: Week 10
What You’ll Learn:
- Decentralized systems and consensus
- Distributed hash tables (DHTs)
- Peer-to-peer networking
- Blockchain basics (the tech, not the hype)
- Censorship-resistant architectures
What You’ll Build:
- P2P application exploration
- Decentralized system analysis
π Week 12: Advanced Protocols
Status: π΅ Coming Soon | Difficulty: Advanced | Estimated Time: 6-8 hours | Prerequisites: Week 11
What You’ll Learn:
- Advanced cryptographic protocols
- Multi-party computation concepts
- Secure multi-party communication
- Protocol design and analysis
- Cryptographic best practices
What You’ll Build:
- Advanced encrypted communication setups
- Protocol implementation analysis
- Your complete cypherpunk toolkit
π After Completion
Once you’ve mastered Cypherpunk 101, explore:
- Privacy 101 (Week 1 live now!) - Beginner-friendly, GUI-first privacy fundamentals
- Advanced Cypherpunk (coming later) - Post-quantum crypto, zero-knowledge proofs, advanced protocols
π¬ Questions or Feedback?
- Found an error? Report it here (GitHub Issues coming soon)
- Need help? Questions answered as community grows
- Want updates? New weeks are announced as they release