Anonymity & Privacy
Understanding the layers of protection that keep your identity safe on Catharsis.
Why Anonymity Matters
In the digital age, anonymity is not about hiding wrongdoing — it is about preserving the fundamental right to privacy that every human being deserves. Throughout history, the ability to communicate and transact privately has been a cornerstone of free societies. From the anonymous political pamphlets that fueled the American Revolution to the encrypted communications that protect journalists and whistleblowers today, anonymity serves as a shield against tyranny, persecution, and the chilling effects of surveillance on free expression.
The modern internet was originally designed as a decentralized, open network where information could flow freely. However, over the past two decades, this vision has been systematically undermined by governments and corporations that seek to monitor, control, and monetize every aspect of our digital lives. Mass surveillance programs, data brokers, and invasive tracking technologies have created a digital panopticon where every click, every purchase, and every conversation is recorded, analyzed, and stored indefinitely. Catharsis exists as a direct response to this erosion of privacy — a platform where anonymity is not an afterthought but the foundational principle upon which everything is built.
When you use Catharsis, your identity is protected by multiple overlapping layers of anonymity technology. Each layer is designed to function independently, so that even if one layer is compromised, your identity remains protected by the remaining layers. This defense-in-depth approach is the gold standard in information security and represents a fundamental departure from platforms that rely on a single point of security.
Tor Integration
Catharsis operates exclusively as a Tor hidden service (.onion), ensuring that all connections are routed through the Tor network. This means your real IP address is never exposed to our servers, and our server's location is equally hidden from you and from any external observer.
Zero Data Collection
We collect absolutely no identifying information. No email addresses, no phone numbers, no IP logs, no browser fingerprints. Our servers are configured to discard connection metadata before it can be stored, making it technically impossible to trace activity back to any individual user.
The Tor Network — Your First Layer of Defense
The Tor network, short for "The Onion Router," is the backbone of anonymous communication on the internet. Developed originally by the United States Naval Research Laboratory and now maintained by the non-profit Tor Project, the Tor network encrypts your internet traffic and routes it through a series of volunteer-operated relays distributed across the globe. Each relay only knows the identity of the relay immediately before and after it in the chain, meaning that no single relay can determine both the origin and destination of your traffic.
When you connect to Catharsis through the Tor Browser, your traffic is encrypted in three layers — like the layers of an onion, hence the name. The first relay (known as the guard node) peels off the first layer of encryption and forwards the traffic to the middle relay. The middle relay removes the second layer and passes it to the exit node. However, because Catharsis is a hidden service, the traffic never actually exits the Tor network — it remains within the network's encrypted infrastructure from end to end. This provides even stronger anonymity than browsing regular websites through Tor, because there is no exit node that could potentially observe your unencrypted traffic.
The Tor network has been extensively studied and audited by academic researchers, government security agencies, and independent security experts. While no system is perfect, Tor represents the most thoroughly vetted and widely deployed anonymity network in existence. Millions of people around the world rely on Tor every day to protect their privacy, including journalists working in authoritarian regimes, human rights activists facing persecution, law enforcement agents conducting undercover investigations, and ordinary citizens who simply value their right to privacy.
PGP Encryption — Securing Your Communications
Pretty Good Privacy (PGP) is the industry standard for end-to-end encrypted communication, and it plays a critical role in maintaining anonymity on Catharsis. Every user on the platform is encouraged to set up a PGP key pair — a public key that others can use to encrypt messages sent to you, and a private key that only you possess and can use to decrypt those messages. This asymmetric encryption scheme ensures that even if our servers were compromised, the contents of your private messages would remain completely unreadable to any unauthorized party.
On Catharsis, PGP is integrated directly into the messaging system, making it easy to send and receive encrypted messages without needing external software. When you compose a message to another user, it is automatically encrypted with their public key before being transmitted. Only the intended recipient can decrypt and read the message using their private key. This means that neither Catharsis administrators, nor law enforcement, nor any other third party can read your private communications — the mathematical properties of public-key cryptography make this a mathematical certainty, not merely a policy promise.
Beyond messaging, PGP also serves as the foundation for our two-factor authentication system. When you enable 2FA on your Catharsis account, each login requires you to decrypt a random challenge string using your PGP private key, providing cryptographic proof that you are the legitimate account holder. This is far more secure than SMS-based or app-based 2FA, which can be intercepted through SIM swapping attacks or compromised by malware on your device. PGP-based 2FA ensures that even if your password is stolen, your account remains secure as long as your private key is protected.
Operational Security Best Practices
While Catharsis provides robust technical protections for your anonymity, true privacy requires a holistic approach that encompasses your personal operational security (OPSEC) practices. No technology can protect you if you inadvertently reveal identifying information through careless behavior. Below, we outline essential OPSEC practices that every Catharsis user should follow to maximize their anonymity.
Use a dedicated device or operating system. We strongly recommend using Tails OS (The Amnesic Incognito Live System) or Whonix for accessing Catharsis. Tails is a portable operating system that runs from a USB drive, routes all traffic through Tor, and leaves no traces on the host computer. Whonix runs in a virtual machine and provides similar protections with the added benefit of persistent storage for your PGP keys and other data. Using a dedicated system ensures that no data from your regular computing activities can leak into your anonymous sessions.
Never mix identities. Your Catharsis username, PGP key, and all associated activity should be completely separate from any other online identity you maintain. Do not use the same username, password, writing style, or PGP key on any other platform. Compartmentalization is the cornerstone of good OPSEC — if one identity is compromised, the others remain safe.
Be mindful of metadata. Even when the content of your communications is encrypted, metadata — such as timing patterns, message sizes, and frequency of activity — can potentially be used to correlate your anonymous identity with your real-world identity. Vary the times at which you access the platform, avoid posting immediately after significant real-world events in your life, and be conscious of any patterns that might distinguish your behavior.
Secure your cryptocurrency transactions. Use Monero whenever possible, as it provides built-in privacy features that make transactions untraceable. If you must use Bitcoin, always use a coin mixing service or CoinJoin implementation to break the transaction chain before depositing to your Catharsis wallet. Never deposit Bitcoin directly from an exchange that requires identity verification, as this creates a direct link between your real identity and your marketplace activity.
Keep your software updated. Always use the latest version of the Tor Browser, your operating system, and any privacy tools you rely on. Security vulnerabilities are regularly discovered and patched, and using outdated software is one of the most common ways that anonymity is compromised. Enable automatic updates wherever possible, and regularly check for new versions of critical software.
The Importance of Privacy in Modern Society
Privacy is not just a technical concern — it is a social and political necessity. The renowned security expert Bruce Schneier has argued that privacy is essential to human dignity and is the foundation of a free society. Without privacy, individuals cannot develop their own thoughts, opinions, and identities without fear of judgment or retribution. Privacy enables the free exchange of ideas, the exploration of unpopular viewpoints, and the protection of vulnerable minorities from the tyranny of the majority.
History has shown us repeatedly the dangers of unchecked surveillance. From the Stasi in East Germany to the NSA's mass surveillance programs revealed by Edward Snowden, governments that monitor their citizens' every move inevitably abuse that power. Even in ostensibly democratic societies, surveillance data has been used to target political dissidents, intimidate journalists, and suppress social movements. The right to privacy is recognized by the United Nations Universal Declaration of Human Rights (Article 12), the International Covenant on Civil and Political Rights (Article 17), and the constitutions of virtually every democratic nation.
At Catharsis, we take our role in protecting privacy seriously. We understand that we are part of a broader ecosystem of privacy tools and services that, together, form the last line of defense against total surveillance. We are committed to continuously improving our platform, supporting the development of privacy-enhancing technologies, and advocating for the fundamental right of every individual to conduct their affairs in private.