01 / 07

PRAXIS

Theory without action is just philosophy. This is the operational layer — concrete steps for living outside the system across money, privacy, and trade.

02 / 07
Private Money

Monero (XMR) —
The Default Currency

"There is no transparent mode. All transactions are private, always."

Monero is the gold standard for private digital cash. Unlike Bitcoin, where every transaction is permanently public, Monero uses ring signatures, stealth addresses, and RingCT to hide the sender, receiver, and amount of every transaction by default — not as an option, not as a mixing service, but as the protocol itself.

The counter-economy runs on Monero because it has to. Every other payment system — banks, cards, PayPal, even most crypto — creates a permanent record linkable to your identity. Monero creates a receipt that proves the transaction happened without revealing anything about who participated or how much moved.

Get a Wallet
  • Feather Wallet — Recommended desktop wallet for Windows, Mac, and Linux. Lightweight, open source. Download from featherwallet.org.
  • Monerujo — Open source Android wallet. Available on F-Droid (preferred) or Google Play.
  • Cake Wallet — Multi-coin wallet with full XMR support for iOS and Android. Clean interface, built-in exchange.
Get XMR Without KYC
  • Haveno DEX — Decentralized exchange built specifically for XMR. No central server, no custodian, no KYC.
  • Mine it — XMR uses RandomX, ASIC-resistant. Any modern CPU can mine profitably in a pool. Software: XMRig. No exchange, no identity.
  • Earn it directly — Offer goods or services and accept XMR as payment. No exchange, no trace. The cleanest entry.
  • P2P with cash — In-person cash trades with trusted individuals in local agorist communities, via encrypted communication.
Sending and Receiving Privately
  • Each incoming transaction goes to a one-time stealth address — no blockchain link to your wallet address exists.
  • Use a unique subaddress per sender or purpose. Subaddresses are unlinkable to each other on-chain.
  • All sends are private by default. Ring signatures and RingCT protect every transaction automatically — no extra steps required.
  • Avoid reusing your primary address. Always generate a fresh subaddress per counterparty.
Run Your Own Node
  • Download monerod from getmonero.org. Full blockchain ~180GB; pruned node ~40GB with full privacy.
  • Point Feather Wallet to 127.0.0.1:18081 — your local node. No third party sees your queries.
  • Running your own node means your view key is never exposed to an external server. This is the complete sovereignty stack.
03 / 07
Sound Money & Privacy

The Alt Stack —
Zano · ARRR · Quai · Kaspa

Each coin solves a different piece of the sovereign stack. Privacy, decentralization, and sound-money principles applied across different architectures. Trade without KYC on TradeOgre, ChangeNOW, or through atomic swaps where supported.

Zano (ZANO) — Privacy · PoW/PoS Hybrid

Confidential assets with RingCT-derived protocol. Native atomic swap and DEX features built into the protocol. Wallet: official Zano GUI from zano.org. Trade: TradeOgre or native Zano DEX.

ARRR — Pirate Chain — Privacy · zk-SNARKs

Mandatory Sapling shielded transactions — no transparent mode exists. Every ARRR transaction is fully shielded. The most private UTXO chain. Wallet: Treasure Chest. Trade: TradeOgre.

Quai Network (QUAI) — Sound Money · PoW · Multi-Shard

Proof-of-work with merged mining across shards. High throughput, EVM compatible, decentralized sound-money network. Wallet: Pelagus browser extension.

Kaspa (KAS) — Sound Money · PoW · blockDAG

GHOSTDAG protocol — blockDAG processing multiple blocks in parallel. Near-instant finality, full PoW decentralization, no premine. Wallet: wallet.kaspa.org. Trade: TradeOgre.

04 / 07
Bitcoin

Use BTC Without
Being Watched

Bitcoin's blockchain is fully public. Every transaction, address, and balance is visible to anyone forever. Chain analysis firms sell address-tracing tools to governments. Raw BTC from a KYC exchange is linked to your identity. Using BTC privately requires deliberate effort — it is not automatic.

Wasabi Wallet — Desktop wallet with built-in WabiSabi CoinJoin. Breaks the transaction graph by coordinating trustless mixing with other users. Available on Windows, Mac, Linux. Never reuse addresses — most modern HD wallets do this automatically.

Bisq — Decentralized P2P exchange. No account, no ID. Trades settled on-chain with BTC in multisig escrow. Gold standard for no-KYC acquisition. RoboSats — Lightning-based P2P over Tor. Anonymous robot identities per trade. No registration.

Run your own full node via Umbrel or RaspiBlitz — without it, a third party logs your address queries and links them to your IP. Always connect your wallet to the network via Tor. Phoenix Wallet — Self-custodial Lightning for Android/iOS; routing nodes see only adjacent hops, not the full payment path.

05 / 07
Operational Security

The Privacy Stack

"Financial privacy is meaningless if your network activity, communications, and identity are exposed."

The tools below form a layered stack — each closes a different attack surface. You do not need all of them at once. Start where you are. Every tool you deploy makes mass surveillance incrementally more expensive. The aggregate effect of millions of people using these tools is a structural reduction in the state's capacity to monitor its population.

The barrier is never difficulty. Tor Browser requires no configuration. Signal is simpler to install than most apps. The barrier is inertia — the habit of convenience, the assumption that privacy is someone else's problem until it visibly becomes yours.

Network
  • Tor Browser — Routes traffic through three encrypted relays. Your ISP sees a connection to the Tor network; destinations see the exit node's IP. No configuration required. torproject.org.
  • Mullvad VPN — No account email. Anonymous account number only. Accepts cash by mail and XMR. Independently audited no-log policy.
  • IVPN — Same model: anonymous account, crypto payment, open source clients, audited. Good alternative to Mullvad.
Communications
  • Signal — End-to-end encrypted messaging. Disappearing messages. No metadata stored. Set message expiry to the shortest interval that works for your patterns.
  • SimpleX Chat — No phone number required. Decentralized. No central server holds your contact list.
  • Briar — P2P messaging that works over Tor. No server. Operates even when internet infrastructure is restricted.
Email
  • ProtonMail — E2E encrypted for Proton-to-Proton messages. Swiss jurisdiction. Access via Tor for maximum privacy. Free tier available.
  • SimpleLogin — Email alias service. Create unlimited disposable addresses that forward to your real inbox. Never give your real email to any service you want to keep private.
Operating Systems
  • Tails OS — Boot from USB. Routes all traffic through Tor. Leaves no trace on the host computer when removed. Use for sensitive activities. tails.boum.org.
  • Whonix — Two-VM setup: gateway routes all traffic through Tor, workstation is isolated. Even if the workstation is compromised, your real IP cannot leak.
  • Qubes OS — Every application runs in its own isolated VM. A compromise of one cannot touch another. Steep learning curve; for high-threat models.
06 / 07
Counter-Economics

Gray Market
Economics in Practice

The gray market is the babysitter paid in cash, the freelancer invoicing in crypto, the neighbor who fixes your roof for produce from your garden. It is vast, already operating, and grows every time the formal economy fails someone or extracts too much. Agorism is the conscious, deliberate expansion of what people already do.

What It Looks Like
Find Communities
07 / 07
Begin

Start With One Thing

Download Tor Browser and use it for your next sensitive search. Set Signal as your default messaging app. Move some savings into Monero. Each step compounds — in the privacy it creates and in the habits it builds. Sovereignty is not achieved once; it is maintained daily through specific technical choices that add up to a different kind of relationship with digital infrastructure.

The counter-economy is already there. The step is making it conscious — naming what you are doing, connecting with others who are doing the same, and deliberately expanding it. Start now.