The Case for Privacy
Privacy isn't the opposite of security — it's a component of it. The psychological, societal, and practical case for why privacy is a fundamental right, not a luxury.
News, updates, and articles about air-gapped computing and privacy-first software.
Privacy isn't the opposite of security — it's a component of it. The psychological, societal, and practical case for why privacy is a fundamental right, not a luxury.
In 1994, CALEA required telecom carriers to build surveillance into their networks. Three decades later, that infrastructure has been exploited by foreign adversaries and misused from within.
Quantum computing threatens current encryption through 'harvest now, decrypt later' attacks. Air-gapping removes the most scalable collection vector: the network itself.
How air-gapped environments can strengthen the software supply chain by creating auditable boundaries for open-source dependency management.
The oldest file-sharing protocol is still the best one for large transfers, privacy, and fun. Here's how to start a sneakernet with your friends.
Understanding USB threat models and practical habits for secure data transfers across air-gapped systems.
Learn how AirGap Deploy automates the process of packaging Rust applications with all their dependencies for deployment to systems without internet access.
Learn how AirGap Transfer handles multi-USB orchestration for deploying large ML models like Ollama to air-gapped systems.
Learn how Cleanroom Whisper enables quick voice capture workflows without sending your audio to external servers.
Cleanroom Whisper, AirGap Deploy, and AirGap Transfer provide offline transcription, deployment, and file transfer capabilities for air-gapped environments.
Air-gapping isn't perfect. No security measure is. But it solves a specific problem better than any alternative: it collapses a distributed, continuous attack surface into discrete, auditable events.