Your Computer is Spying On You, Learn How to Stop It.

Learn How to convert your big-tech spyware computer into a private and easy-to-use Linux computer.

Over 30+ lessons

Flexible Schedule, 
Go Your Own Speed

Lifetime Course Membership


Russel Gray

Russel Gray

Marjory Wildcraft

Marjory Wildcraft

Tom Woods

Tom Woods

David Wolfe

David Wolfe

Alex Newman

Alex Newman

David Icke

David Icke

Sarah Westall

Sarah Westall

Maria  Zeee

Maria Zeee

+ over 11,000 students!

Big Tech + Big Brother

Without knowing it, we have walked into a “walled garden” of surveillance technology. Big Tech companies like Apple, Microsoft, and Google have successfully marketed their products and services into everyone’s lives. But what most people don’t realize is that their products are constantly gathering information, like your location, your interests, your friends, and where you spend your money. These companies are not just collecting your data to sell you tailored ads. They are the backbone of the surveillance state, as well as things like Central Bank Digital Currencies, Digital IDs, and Social Credit Systems.

Ensure a Legacy of Freedom 
and Liberty

Freedom and liberty cannot exist without privacy. If we fail to protect our privacy, and exit the surveillance state, the globalists will succeed in trapping us into an inescapable surveillance prison. We the people, can come together and prevent this from happening. If we can protect our privacy, support freedom/privacy oriented solutions, the we can ensure a free internet and in turn allow for the most high-tech, freedom-oriented society ever. Big tech is not your only option. But remember this change will not happen without your help.

Urgent Message to Windows and Apple Users.

Over the last two years, both Apple and Windows have aggressively pushed AI spyware onto their users.

All of their modern devices are embedded with AI spyware, which means nothing you do is private.

A lot of people think that they can avoid this AI spyware by using older devices.

Well, that’s not the case.

Last year, on October 14th, Windows made the decision to stop supporting all Windows 10 devices.

That means if you are still on a Windows 10 device, you then you are at serious risk for hacks and scams.

And if you moved to Windows 11, you are using a computer that is watching and analyzing everything that you do. (Out of the frying pan and into the fire, right?)

Well, let me give you some background info…

Towards the end of 2023, Windows announced CoPilot Recall, their AI software that watches and understands everything that you do on your computer.

So much so that it takes a screenshot every second and stores it for posterity.

Everything you search, type, or read is monitored, recorded, and analyzed. And let me be crystal clear, they are doing this to create a profile on you. They want to know your likes, your dislikes, and your beliefs. And yes, CoPilot (and Recall) is already being used right now, this is not some future thing.

With this level of surveillance, they will know if you are a skeptical person or not, if you believe propaganda or not, or even “small” things like if you search for censored news, where you store your money, or who your friends are.

The same thing goes for Apple. If you are using an old computer, it is not secure. If you are using a new computer, it is not private.

They are trying to create a walled garden, a surveillance net that will control everything, and they are wagering that you won’t notice until it’s too late.

Because Windows and Apple have such a strong monopoly on the market, they believe the average person doesn’t notice that there is an exit door out of this walled tech garden, which is Linux.

For the longest time, Linux was out of reach for the average user. It was complicated, clunky, and made only for tech geeks.

But two years ago, we finally found a private and user-friendly distribution of Linux that actually felt like an upgrade to Windows and Apple.

Since then, it’s been our goal to help average, non-techy people move out of the big tech computer walled garden.

So, if you want to protect yourself and your right to privacy and freedom…

Then I recommend that you get this USB, and please share it with your friends and family.

See you there!

Free TraINING

YOUR COMPUTER IS SPYING ON YOU… HERE’S HOW YOU CAN STOP IT.

Enter your email below sign up for our webinar this Wednesday at 7pm CT.

Privacy Academy made privacy feel approachable instead of overwhelming. I walked away with practical steps I could actually use the same day. Easily one of the most valuable online workshops I’ve attended.

Daniel R.Portland, Oregon

Privacy Academy made privacy feel approachable instead of overwhelming. I walked away with practical steps I could actually use the same day. Easily one of the most valuable online workshops I’ve attended.

Maya L.Toronto, Ontario

I thought I understood privacy until I purchased this membership. The material was current, thoughtful, and incredibly relevant. It changed how I think about my online habits.

Chris T.Austin, Texas

The #1 Obstacle to Online Privacy & Security

For years getting private online was reserved only for the “tech-savvy.” This was a huge problem because privacy is the most essential component in the modern era for protecting your assets and liberty. The goal of Privacy Academy is to be the “knowledge bridge” teaching average, non-techy people how to get private online. At Privacy Academy, we provide a guided path forward with a team of privacy experts ready to help you if you get stuck.

Glenn and Eric Meder

Privacy Academy started as an offshoot of the “Glenn Meder Newsletter,” where Glenn would write about privacy and how it relates to liberty. After years of spreading awareness, Glenn wanted to take it to the next level and provide actionable steps. That’s when the “Privacy Action Plan” was born.

Since then, his son Eric has joined him to spread this message.

Over the years, it has evolved into a full-on academy with many recorded courses, live trainings, and an active chat room of privacy- and freedom-loving people.

Glenn Meder

Glenn’s passion for privacy began when Edward Snowden revealed that the NSA was spying on US citizens. Since then, he has gone deep into studying online privacy and in-turn found that this is the biggest threat to liberty… potentially ever. Glenn designed Privacy Academy with the average, non-techy person in mind. To bridge the gap and preserve liberty.

Eric Meder

Eric Meder

Eric joined Glenn on his “privacy journey” over 5 years ago. Eric has a strong love for liberty and educating people on how modern technology is radically changing modern life. One of his biggest passions is educating parents and the youth about how they are being radicalized and manipulated through modern propaganda (think social media.)

Weekly Live Trainings

Don’t worry, all classes have replays so you can watch on your own schedule.

Each week we hold two live trainings: Fundamentals and Advanced. That way you can join live, follow along, and ask questions as we teach the lesson. It’s a great way to hold yourself accountable, and not get overwhelmed or stuck.

2

Pre-Recorded Courses

Go at your own pace and follow along with our 3 top-rated privacy courses – Privacy Action Plan Fundamentals, Privacy Action Plan Masterclass, and Private Online Shopping. Each course is packed with powerful videos and actionable steps.

3

Active Community with Privacy Experts

Join an active community of freedom and privacy loving people. If you get stuck along the way, ask your questions in the “Privacy Questions” chat so other community members or privacy experts can help.

Creating Burner Payment Cards

When you shop online, you are trusting that corporations are keeping your card info private. All it takes is one data breach for your cards to fall into bad hands. Learn how to easily create burner cards for each transaction.

How to Protect Yourself from Identity Theft

A reported 1 out of 3 Americans falls victim to identity theft each year. All of those victims share a common trait -they never thought it would happen to them. Learn how to prevent ever falling victim to identity theft.

How to Kill Spam Forever

The worst part about email is the spam and endless clutter. We will teach you 1. How to clean and organize your email, and make it actually enjoyable to use, and 2. Get tid of spam emails forever. (I know, that is a big promise, but yes, it really works!)

How to Set Up Your Bank Account Properly

Most people are completely unaware of what really happens at their banks. Learn how to interview your bank, what it means to be an unsecure creditor, and also set up your accounts for daily activity and ‘stop pay’ locks.

Private and Secure Crypto

At its inception, crypto was designed to be a tool for peer-to-peer transactions. Learn how to ensure 1. That your crypto is safe and secure and 2. How to use private cryptocurrencies like Monero to send and receive cash privately and digitally.

Create Your Own 
De-Googled Phone

Smartphones are the modern-day “Trojan Horse.” They are constantly with us, gathering an absurd amount of data and using that data to create profiles on us. Learning how to create your own private phone is essential.