About

About Predaxia.

Predaxia exists because most privacy advice is either written by people who’ve never had a real reason to care, or by people trying to sell you something. This site is neither.

We don’t talk about our background. We don’t need to. The work speaks for itself, or it doesn’t. What we can tell you: every article on this site is written from the perspective of someone who has seen what happens when things go wrong. Not theoretically. Actually.

We write for journalists, lawyers, NGO workers, military families, and anyone else who has a real reason to take their privacy seriously. If that’s you, you’ll know within the first paragraph of the first article.


Who this is for.

Most privacy advice is written for people who are slightly paranoid. This one is written for people who have a real reason to care.

Journalists in hostile environments

Your sources depend on your decisions. The tools you use, the accounts you open, the devices you carry. They all create records. This site explains which records matter and how to control them.

Lawyers & notaries

Client confidentiality starts before you open your laptop. The email provider your firm uses, the cloud service where you store documents, the password manager your team shares. All of these are decisions with professional consequences.

NGO workers & expats

Operating in environments where security is not optional. The threat profile changes depending on where you are and what you’re working on. This site helps you build the right response to your actual situation.

Military families

What you post while they’re deployed matters more than you think. Location data, routine patterns, unit information. All of it is findable. This site explains what to stop sharing and how.

Anyone going through a legal dispute

If you’re filing for divorce, assume your devices are already compromised. Your digital life becomes evidence. This site explains what to audit, in what order, before you make any other move.

Professionals in high-risk countries

A security checklist before you land, not after. Border searches, hotel Wi-Fi, local SIM cards. each of these is a threat vector. This site gives you the timeline to prepare before you board.


How we test our recommendations.

Every tool mentioned on this site has been tested under real conditions. Our affiliate criteria is a single question: would we use this ourselves in a situation where our security depended on it? If no, It doesn’t appear. If yes, we explain exactly why, including the limitations.

We run three affiliate programmes. Proton, 1Password, and DeleteMe. We turned down the rest, including NordVPN, Surfshark, and ExpressVPN. The article explaining exactly why is on this site. It costs us money. That’s the point.


What this site is not.

This is not a tech review site. We don’t benchmark download speeds or test whether a VPN unblocks Netflix. We test whether a tool would hold up if our security depended on it. Those are different tests.

This is not a fear-based site. Every threat we describe is documented. Every recommendation is specific. The goal is not to make you anxious. it’s to make you harder to compromise than the person next to you.

This is not written for everyone. If you’re looking for the cheapest VPN or the easiest password manager, this is not the right place. If you’re looking for the most defensible setup for your actual threat model, you’re in the right place.


Or go directly to our Resources page to see the tools we actually recommend.

Get in touch.

Name