Each Drop is a tactical, step‑by‑step protocol built to solve one high‑urgency problem. Start with Drop 001 and stack from there.
First countermeasures: ghost email stack, hardened browser, trail scan. Choose your path: Passive Ghost, Rebuilder, or Operator.
Download (coming soon)Harden Firefox, configure DoH (NextDNS/Cloudflare), pair with ProtonVPN/Mullvad, validate DNS/WebRTC/fingerprint leaks.
Access DropErase hidden metadata from docs, photos, audio, video, and PDFs. Validate before upload. Includes ExifCleaner/MAT2 + verification flow.
Access DropCreate a functional, legal alternate identity stack (email + number + photo + personality template) mapped to real use cases.
Access Drop